last executing test programs: 1m26.019716605s ago: executing program 1 (id=275): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010e7010000000000000000000000000a20000000000a03000000000000000000070000000c00044000000000000000021c000000090a010400000000000000000700000008000a4000000003"], 0x64}, 0x1, 0x0, 0x0, 0x4004001}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001240)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x70bd28, 0x4000000, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_RTAB={0x404, 0x2, [0x1, 0x0, 0x1fc, 0x0, 0xfffffc80, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x20, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3f, 0x0, 0x0, 0x0, 0xffffffff, 0x2, 0xc00, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x272, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, 0x0, 0x0, 0x7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0xb97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5e, 0xfffffffc, 0x8, 0x0, 0x0, 0x400000, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xd79, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x100, 0x0, 0x8, 0xfffffffd, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x1, 0x0, 0x0, 0x0, 0x2, 0x6}, {0xff}}}]}}]}, 0x45c}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@ipv6_getaddrlabel={0x0, 0x4a, 0x10, 0x70bd26, 0x25dfdbff, {0xa, 0x0, 0x20, 0x0, r1, 0xffffffff}, [@IFAL_ADDRESS={0x0, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFAL_LABEL={0x0, 0x2, 0x1}, @IFAL_ADDRESS={0x0, 0x1, @mcast2}, @IFAL_LABEL={0x0, 0x2, 0x2}, @IFAL_LABEL={0x0, 0x2, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="500000001000010425bbe5ad600027842cf52300", @ANYRES32=0x0, @ANYBLOB="0300000000000000280012800a00010076786c616e00"], 0x50}, 0x1, 0x0, 0x0, 0x13d33d22cca65c15}, 0x4008840) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@newqdisc={0x24, 0x24, 0x1, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}, {0x5}}}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x300000a, 0x4031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x0) get_mempolicy(0x0, 0x0, 0x2fc, &(0x7f000027f000/0x1000)=nil, 0x3) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000001000)=""/4102, 0x1006) sendmmsg(r2, &(0x7f00000002c0), 0x4000000000000c1, 0x0) 1m25.977325056s ago: executing program 1 (id=278): bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xa, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1008d2}, [@ldst={0x3, 0x2, 0x3, 0x1, 0x0, 0xb8}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000"], 0x0, 0xfff, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a, @void, @value}, 0x94) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000d40)={0x44, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x44, 0x9, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast1=0xe0004001}}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x10000047}, 0x48001) sendmsg$IPSET_CMD_SWAP(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000580)={0x34, 0x6, 0x6, 0x301, 0x0, 0x0, {0x5, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x844}, 0x840) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0xe000, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000280)={0x0, 0x0}) move_pages(r4, 0x1, &(0x7f0000000200)=[&(0x7f0000ffd000/0x3000)=nil], &(0x7f0000000440)=[0x7ff, 0x1, 0x7, 0x7, 0x0, 0xa9ba000, 0x81], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xd}, 0x8, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/stat\x00', 0x0, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r6, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) connect$inet(r6, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendfile(r6, r5, 0x0, 0x20000023893) sysfs$1(0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x18) alarm(0x9) syz_clone3(&(0x7f00000007c0)={0x40120000, 0x0, 0x0, 0x0, {0x40}, 0x0, 0x0, 0x0, 0x0}, 0x58) r7 = socket(0x10, 0x3, 0x0) r8 = socket$packet(0x11, 0x3, 0x300) socket(0xf, 0x805, 0x9) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'veth0_to_hsr\x00', 0x0}) sendmsg$nl_route_sched(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=@newqdisc={0x44, 0x24, 0xf0b, 0x0, 0x200, {0x60, 0x0, 0x0, r9, {0x0, 0x3}, {0xffff, 0xffff}, {0x8}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x14, 0x2, [@TCA_CAKE_WASH={0x8}, @TCA_CAKE_FLOW_MODE={0x8, 0x5, 0x5}]}}]}, 0x44}}, 0x44040) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x6b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x5}, 0x50, 0x1, 0x0, 0x7, 0xcb38, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 1m25.462035953s ago: executing program 1 (id=287): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000001f80), 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000f00)='kfree\x00', r2, 0x0, 0x10000000005}, 0x76) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_GET(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000004c0)={0x2c, r4, 0x1, 0x0, 0x25dfdbfc, {0x1c}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}]}, 0x2c}}, 0x4000000) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7}, &(0x7f0000000180), &(0x7f00000001c0)=r6}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) unshare(0x44040200) sendto$inet6(r5, 0x0, 0x11, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x1, @mcast1}, 0x1c) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r9}, 0x9) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000001fc0)={0x80, 0x1000, 0x6, 0x89f0, 0x4e, 0x7c}) 1m24.806654084s ago: executing program 1 (id=302): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, &(0x7f0000001f00)=[{&(0x7f0000000e40)="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", 0xbba}], 0x1}}], 0x1, 0x0) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x10004, &(0x7f00000000c0), 0x0, 0x4c0, &(0x7f0000000540)="$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") r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=ANY=[@ANYBLOB="010000000a000000070000000902000040000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000c769000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280), &(0x7f0000000180), 0x3ff, r3}, 0x38) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000800)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004070000000000000400000004000e1ff95000000000000002ba76bb33123751c4e3409e62751ee00ba19ce670d25010000020000040000009fc404000000c788b277beee1cbf9b0a4def23d410f6accd3641110bec4e90a6341965dac03d046837d907b09ec39e9ef8f6e396ad200e011ea665c45a3449abe802f5ab3e89cf40b8580218ce740068720000074e3e8eea3fd8cf49827ca315f5b87e1ca6433a8acd715f5888b2007f0000000000000000010089937090c34410000000000000090000000000414027efc842b6d6f800005335001db43a5c000000000000000024000000000000000000e75a89faff01210cce39bf405f1e846c1242000000000000cad326ad7add65873d9f87463ad6f7c2e8ee1a39244960b318778f2a047f6d5bc24fef5d7d617da7fb5e2a431ab9142f3a06d55740a43088696daaed74b9c5c29647d2f950a959cf9938d6df8600a62e96b7cb8e52cbdce57a79d6fce424c22001f6c3784a1975fa657d05003a32a4fd67ce446ac5430207db79240acaf091231b986e77d05d988d6edc71df48dca02113a38300c2bd2b5543ffc16695572361629d1022f722ec23812b70d72cd0010000007881bfa35b9fd6864e90ddb31f75f6324989cdc7044f563a1f74d4efe895fdbc463f747c08f40105869035000000000003000000000000000000000000000000000000080000003ddf4aa4b1c8b8a0ae6feb6737c275dc2740f742b5425f1d5819610608bbab35471cdb0500000000000000d4123f955267fe4a75c114f874e086287547d4099aeec9f15b8ee25a2a5ccf4a9b603c88e12ff25184d4e3c2f7f623559435b2c505fb7113400000f0bc440550ee91302f5a00000000000000000000000000000000e67ccc00148ac4c43021cce9f24f4b2f9492c32e7a92a557ac2b44b8f7a49789906d922b3e4916f390ab7edcd3f5b9fe14446dd446a52131c464f2c08efb46d934615c8631b7c42efd0294bea179b0433f5c899119ec0c0acef5383b5a2720caeb68f1e9c05b05d89467ded84da092dea262e51811e2d7fa515722516bd5ef6c8c4966e5937562a5648a696abaa042a7097ddefe0671f977fb145890f5bf41ba92b8c4c8b14f0d4a880ef4518bb328790700000021e041254f06bd7f000000000000000000000000000000282ffe000000000000000431e8e3204a7d95938c5334a0dd177f1a7389ee570d95e543a27546d3770740f354df6dfdb3d1179b4b9fccd0cd5b7578802c66f5dbf22ad0bd03cbe0fecd096bcf419d35988948d1cd4c51c406040000000090a3bc3cbc08255975f3cee08dab765d8a4ef870aaae3f81ed6364837171ce5564f3cf6feba1b6745409000000000000003459263499fae97e7dcb30e4cff009e0f4f78c155c4ab19b878fcb4cc14b8d2823643a17120418f42b42ed879cb23e6d4e0d11db988d0bc46de02702d29243b72215d5563bdae8c2ccda4498687cd50f3a9058f61d52d70aabccb18d41d75788faf60ce9be97c13e4252d9d112d9ac47368829f8a29eca17de807c840293dd387eee13fdecf3d5a334350f045a22b9adb0539d44d58a00fb9e83ebf4fea36b87e2afdf63f7abf5caf2b01317a5f65f22c8bcf36b390dece1e98541ae932ec3486f74c1eea673c1647568acb17efcef24a9c3504dfa7c7eefe3dcb8d570a730a0837839f54527ce334b8173e7bf73bcd8d80ef294fde6549a0f1a23b78b41f79ea543d2b38b80d3d28c6c93901b763fc8b88794aa74facc345e28f0ad79de4df5afd52e7dfc387e4d2ca4d5caca74754987dbbd4d64e233b4a1d81a9aeb981734ca5416cacf516ca8384d85310f24d393fd48c668465546117377547d11a61bd2bd9e35fa0da5118554a1d93147b103a51baf94aeb1b6292038300423344e6add2226ba5f6724a08567ef515898f0f7dfd3fc198092af3265c5df377a66bbde4fa4a049692e06ee5022c58290bdc37eeb16f4e099e33679044ba21898f76c982c8203663f1adb7bbb42ed8d9b0bb8bd9255e342959b822fa8b3d08b29f2201dfe3a3c5c8bf8bc82f249e7eb9f8571823d730fdc78c6b3122a3fd9209dcae70c10c7b17e83dd759a52fe5c362358dbb780a52f540000000000000000000011230e1d6f9fd3315ada8ecee55fc0ec6ec0ec950c0ad006a06a162035d5729795c4a58b59f9a252723480b08ae9bd52c176380a42b972a3400b5d28b273e60000007cac9d35a991c27e23ce5217fec9ce89ea2dea8ddb383e53cdd077e7c2d73404b7450664f70225897307d8a140ba97bfc2232dccdb1dd0496c219315c02f2ef46f30add1aa13e52d67116328c3a5ee3356eadea07abe8506767771d68e760f8c623fb64865a942acc4912dcd1fa5d729cb45c15577bbb8b08a705efeaf09dd6aadeb8d61501e4fd9c9b1ac845a2138cbde58a04589888c0e528a5134e1dfa8b3f6d8a76517df589cae1019a3bc280e99fb661271357dbbd7e9c42d3fe45efaaa00"/1810], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x35, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000200)=r7, 0x4) sendmsg$inet(r6, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000280)="43e5a33403", 0x5}], 0x1}, 0x2404c014) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x275a, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r8, 0x0) readv(r0, &(0x7f0000001b00)=[{&(0x7f0000000300)=""/33, 0x21}, {&(0x7f00000003c0)=""/4, 0x4}, {&(0x7f0000000ac0)=""/186, 0xba}, {&(0x7f0000000b80)=""/246, 0xf6}, {&(0x7f0000000c80)=""/130, 0x82}, {&(0x7f0000000d40)=""/119, 0x77}, {&(0x7f0000000400)=""/15, 0xf}, {&(0x7f0000001a00)=""/251, 0xfb}, {&(0x7f0000000dc0)=""/112, 0x70}], 0x9) r9 = syz_clone(0x40200, 0x0, 0x49, 0x0, 0x0, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r10, &(0x7f00000004c0)={'#! ', './file0'}, 0xb) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000027"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000a00)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRESDEC=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r11}, 0x10) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x9f, 0x0, 0x0, 0x0, 0xfffffffc, 0xfffe, 0x0, 0x0, 0x0, 0xffff}, r9, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0xb00, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0xc04, 0x1, 0x0, 0x0, 0x0, 0x1fffffff, 0xfffc, 0x0, 0x40, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000001bc0), 0x0, &(0x7f0000001d40)=ANY=[]) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000000)={0x0, 0x4, 0xe, 0x9}) 1m24.473424878s ago: executing program 1 (id=309): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r1}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 1m24.161102663s ago: executing program 1 (id=313): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ec0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='objagg_obj_parent_unassign\x00'}, 0x18) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x340, 0x11, 0x148, 0x0, 0x0, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x88000000, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}, {0x0, 0x0, 0x0, {0x80000000}}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x200, 0x9}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x530) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) prctl$PR_SET_NAME(0xf, 0x0) r2 = syz_io_uring_setup(0x23d, &(0x7f0000000080)={0x0, 0x1, 0x10100, 0x2, 0x200}, &(0x7f0000000000), &(0x7f00000001c0)) r3 = socket(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000a80)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYRESHEX=r1, @ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000070000000080000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r4, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) socket(0x1, 0x803, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000280)='./mnt\x00', 0x1100c14, &(0x7f0000000040)={[{@dax_inode}, {@errors_continue}]}, 0x2, 0x25c, &(0x7f0000000f80)="$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") r7 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101042, 0x45) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000140)) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r8, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) write(r3, &(0x7f0000000000)="240000001a005f2014f9f4070009040081000000002c00000000000008000f0001000000", 0x24) setsockopt$inet6_group_source_req(r3, 0x29, 0x2b, &(0x7f00000003c0)={0x594, {{0xa, 0x4e24, 0x9, @dev={0xfe, 0x80, '\x00', 0x16}, 0x200000}}, {{0xa, 0x4e22, 0x0, @private0, 0x7}}}, 0x108) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1900000004000000040000000800000000", @ANYRES32=0x0, @ANYRES32], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r9, @ANYRES8=r7], &(0x7f0000000240)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x10) membarrier(0x40, 0x0) io_uring_register$IORING_REGISTER_NAPI(r8, 0x1b, &(0x7f0000000040)={0x3, 0x1}, 0x1) io_uring_enter(r2, 0x2def, 0x0, 0x0, 0x0, 0x0) 1m24.160854363s ago: executing program 32 (id=313): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ec0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='objagg_obj_parent_unassign\x00'}, 0x18) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x340, 0x11, 0x148, 0x0, 0x0, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x88000000, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}, {0x0, 0x0, 0x0, {0x80000000}}}]}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x200, 0x9}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x530) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) prctl$PR_SET_NAME(0xf, 0x0) r2 = syz_io_uring_setup(0x23d, &(0x7f0000000080)={0x0, 0x1, 0x10100, 0x2, 0x200}, &(0x7f0000000000), &(0x7f00000001c0)) r3 = socket(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000a80)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYRESHEX=r1, @ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000070000000080000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r4, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) socket(0x1, 0x803, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000280)='./mnt\x00', 0x1100c14, &(0x7f0000000040)={[{@dax_inode}, {@errors_continue}]}, 0x2, 0x25c, &(0x7f0000000f80)="$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") r7 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101042, 0x45) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000140)) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r8, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) write(r3, &(0x7f0000000000)="240000001a005f2014f9f4070009040081000000002c00000000000008000f0001000000", 0x24) setsockopt$inet6_group_source_req(r3, 0x29, 0x2b, &(0x7f00000003c0)={0x594, {{0xa, 0x4e24, 0x9, @dev={0xfe, 0x80, '\x00', 0x16}, 0x200000}}, {{0xa, 0x4e22, 0x0, @private0, 0x7}}}, 0x108) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1900000004000000040000000800000000", @ANYRES32=0x0, @ANYRES32], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r9, @ANYRES8=r7], &(0x7f0000000240)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x10) membarrier(0x40, 0x0) io_uring_register$IORING_REGISTER_NAPI(r8, 0x1b, &(0x7f0000000040)={0x3, 0x1}, 0x1) io_uring_enter(r2, 0x2def, 0x0, 0x0, 0x0, 0x0) 10.436749363s ago: executing program 4 (id=2709): gettid() r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000700), &(0x7f00000000c0), 0xff, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x42, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) socket$netlink(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="180800001bc81a000000000000001e00851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 10.357681104s ago: executing program 4 (id=2713): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f0000000280)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f00000000c0), 0x1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x401, @loopback}], 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='sys_enter\x00', r2, 0x0, 0x2}, 0x18) pause() syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000380)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@dioread_lock}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@data_err_ignore}, {@grpquota}, {@nobh}, {@user_xattr}, {@bh}, {@dioread_nolock}]}, 0x1, 0x553, &(0x7f0000001080)="$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") r3 = socket$nl_rdma(0x10, 0x3, 0x14) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000180), 0x4) chdir(0x0) r4 = semget$private(0x0, 0x5, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) getpid() sched_setaffinity(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x400a010) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001000)=ANY=[@ANYBLOB="70010000100033060000000000000000fc000000000000000000000000000000ffffffff00000000000000000000000000004000000080040000000000000000", @ANYRES32=0x0, @ANYRES16=r3, @ANYRES16=r5], 0x170}, 0x1, 0x0, 0x0, 0x48000}, 0x0) semtimedop(r4, &(0x7f0000000480)=[{0x4, 0xfff6}], 0x1, 0x0) semop(r4, &(0x7f00000007c0)=[{0x4, 0x81}, {0x0, 0xfffd, 0x1000}], 0x2) 9.457098709s ago: executing program 4 (id=2726): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0xffffffff, 0xfc, "ac4eb71f1100"}) r1 = syz_open_pts(r0, 0x0) r2 = dup(r1) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r3, &(0x7f0000000000)={0x1f, 0x0, @any, 0x4, 0x1}, 0xe) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f00850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) fsetxattr$security_selinux(r2, &(0x7f0000000000), &(0x7f0000000040)='system_u:object_r:mouse_device_t:s0\x00', 0x20, 0x0) 9.456486289s ago: executing program 4 (id=2727): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a0000000300000008000000"], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e20, @broadcast}, 0x10) r2 = syz_open_dev$usbfs(&(0x7f0000000180), 0x205, 0x2581) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$USBDEVFS_RELEASEINTERFACE(r3, 0x80045510, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r4, 0x0, 0x5}, 0x18) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/arp\x00') preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000200)=""/233, 0xe9}], 0x1, 0x10, 0x0) semop(0x0, &(0x7f0000000240), 0x0) r6 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000001c0), 0xffffffffffffffff) socket$unix(0x1, 0x1, 0x0) r7 = accept(0xffffffffffffffff, &(0x7f0000000400)=@phonet, &(0x7f0000000600)=0x80) setsockopt$inet6_tcp_TCP_REPAIR(r7, 0x6, 0x13, &(0x7f0000000640)=0x1, 0x4) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r6, 0x0, 0x4) 9.199836813s ago: executing program 4 (id=2729): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r0, 0x0, 0xfffffffffffffffe}, 0x18) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) r2 = openat(r1, &(0x7f0000000040)='./file1\x00', 0x12000, 0x98) connect$unix(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='rcu_utilization\x00', r3}, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r5, &(0x7f0000001640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x34000, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000340)=ANY=[@ANYRESHEX=r4, @ANYRES16, @ANYBLOB="a787000000ff000000000b00000404000180"], 0x18}}, 0x8004) r6 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000800fd0f00000800000000000000", @ANYRES32=r2, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000feffffff00"/28], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_read_part_table(0x1061, &(0x7f0000001080)="$eJzsz71tAlEQBOA5n33nwJJdgku5yB24GSemCiogogdEA8SUgYRIkRZx/HUABN+XPI3erFYbHquZzqqqfhan+LfKe30m2TbXypj7oW2PYZLxSZf+/N0lr8m+Km+3kSH1kl2+kmZstJd135ssP1L1n6zzO7/bnQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADwxA4BAAD//0yNF/Y=") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r9}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r8}, &(0x7f0000000040), &(0x7f0000000080)=r9}, 0x20) sendmsg$IPCTNL_MSG_CT_GET_DYING(r2, &(0x7f0000000580)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x6, 0x1, 0x5, 0x0, 0x0, {0x5, 0x0, 0x5}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000084}, 0x4040010) r10 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r10, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/59, 0x304000, 0x800, 0x0, 0x3}, 0x20) r11 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000f80), 0x140, 0x0) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r11, 0x80083313, 0x0) syz_genetlink_get_family_id$smc(&(0x7f00000001c0), r1) r12 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r12, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x94, 0x24, 0xf0b, 0x70bd2b, 0x0, {0x0, 0x0, 0x12, r7, {}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x64, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], 0x0, [0x8, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6], [0x0, 0x8]}}, @TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x8, 0x2, 0x0, 0x1, [{0x4}]}]}}]}, 0x94}}, 0x0) 9.091098365s ago: executing program 4 (id=2736): r0 = syz_open_dev$loop(&(0x7f0000000140), 0x75f, 0x2a382) r1 = memfd_create(&(0x7f0000000880)='C\x13\xfc2\x95WD\xaa\xba^\x90\xfd\x8d\xc2\xb1[\x81\xda\xda\xd6\x8c\xc99\xec\x0e*||\xe4\xb3\xc4\xb6\v\xaa\x15\x86,\xac\x8d\x89cu\x10\xdc\x93\x9b\xb4\x93\xafE*:\xe4\xdd\xa5\xa75\xb8\x1e;7\xb7.V\xdcrw[\r\x98\x93j\x9c\xf6\xf8\x99\xefF_\xcd\xdf!b\xc5\xec\ntb\xff\b\xaaF?!\x9f\a\x1a\x03\f\xe94\x1deU\x06zS\xc90\xb9voI\xa5/\xb4\xa7@\xa1\\B\xc2@\r_b\x9a\xeb\b\x81\x00V\xd6/N\xc5\xc6f\xb1\x95Z\xe5w^\xd8\xe7J\x80\xf7\xae\xafuv\x84\x9eG\xd1\xe7\x9b\xf0_9\xc2\x9b\xfd\xc3\xf3\xe4\x95P\xf1m\xcf\xc2\xe1\xe6\xa6\x8c\x11\xfb\xb8S\x8b\x92\\\asW-Ee\x02\x00\x00\x00\xd0;Q\xc1~\x89\xec\xc8\x9b\x88\a\xf2\x93\x82(\x8b\x00\xd8\xb4T\x80\x95\x93\x9c5\xcf\t\x04\x00\x00\x00\x00\x00\x00v\xef\xee+\xab\x9c\x00^R\xb2n?i=\xbe\x16\x8a\xbf\xe3\xcdB\xed\xe14\xe8\xd0\xb7\xff\xfeQ\x1c\x85n8\x1b\xc1\b\x00\x00\x00\x00\x00\x00\x00\x17\x94\xdfW\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\x94\x13^\x13\xaf\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n0x0, &(0x7f0000000280)) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x60}, {0x16}]}) r5 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000000)={0x42, 0x1}, 0x10) bind$tipc(r5, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000580)={0x1, &(0x7f0000000540)=[{0x5, 0x1, 0x2, 0xcb}]}, 0x10) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800000001"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r7}, 0x18) syz_clone3(&(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, {0x15}, 0x0, 0x0, 0x0, 0x0}, 0x58) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r3, 0x10, &(0x7f0000000240)={0x75, 0x0, &(0x7f0000000180), &(0x7f00000004c0)=[0xb, 0x6e3a, 0x83d7, 0x1, 0xb44, 0x3, 0x9, 0x10000, 0x2, 0x639cead]}, 0x20) r8 = syz_io_uring_setup(0xb3a, &(0x7f0000000440)={0x0, 0x83d3, 0x10100, 0x2, 0x2a5}, &(0x7f0000000140), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_PBUF_RING(r8, 0x16, &(0x7f0000000380)={&(0x7f0000001000)={[{0x0}, {0x0}, {0x0}, {0x0}]}, 0x4}, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0xffffffffffffffff}, 0x18) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000f80)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a030000000000000000000100000009000034000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000140000000e0a0102000000000000000001000000140000001000010000000000000000000000000a94d99f4a88af8f7c"], 0x90}}, 0x0) io_uring_enter(r8, 0x27e2, 0x0, 0x0, 0x0, 0x0) 7.131361696s ago: executing program 2 (id=2756): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x10, &(0x7f0000000840)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000000300)={&(0x7f0000000040)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10, 0x0, 0x0, &(0x7f00000006c0)=[@rdma_args={0x48, 0x114, 0x1, {{0x3, 0x2}, {&(0x7f00000003c0)=""/163, 0xa3}, &(0x7f0000000340)=[{&(0x7f0000001140)=""/102, 0x66}], 0x1, 0x60, 0x995}}], 0x48, 0x8004}, 0x2000000) 6.402120968s ago: executing program 5 (id=2759): prctl$PR_GET_THP_DISABLE(0x2a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r1, 0x0, 0xffffffffffffffff}, 0x18) r2 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r2) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw\x00') preadv(r3, &(0x7f0000000240)=[{&(0x7f00000004c0)=""/23, 0x17}, {0x0}], 0x2, 0x73, 0xe) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYRES8=r0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="398b842a33f8510fd4c00000"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e20, @broadcast}, 0x10) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000040)=ANY=[@ANYRES32=r0], 0x48) setpriority(0x2, 0xff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendto$inet(r4, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) recvfrom(r3, &(0x7f0000000640)=""/117, 0x75, 0x2020, 0x0, 0x3) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x17}, 0xd}, 0x1c) creat(&(0x7f0000000000)='./file1\x00', 0xa6) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00', r6}, 0x10) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f00000000c0)={0x1, 0x2, 0x0, 0x80000000}) pidfd_send_signal(0xffffffffffffffff, 0x2, 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f00000007c0)='./file1\x00', 0xffffffffffffff9c, &(0x7f00000005c0)='./file1\x00', 0x4) 6.401540858s ago: executing program 2 (id=2760): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RGETLOCK(r5, &(0x7f00000000c0)=ANY=[], 0xffffff6a) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='cmdline\x00') mount$9p_fd(0x0, &(0x7f00000001c0)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB="2c7766646e6f3f37d63fff0feac5fcc810b2721496423d", @ANYRESHEX=r6, @ANYBLOB=',\x00']) socket$kcm(0x10, 0x2, 0x0) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)=0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000003c0)='./file1\x00', 0x3014850, &(0x7f00000002c0)={[{@noload}, {@noload}, {@orlov}, {}, {@resuid={'resuid', 0x3d, r7}}]}, 0x3, 0x4c1, &(0x7f0000000b80)="$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") r8 = socket(0x10, 0x2, 0x0) io_uring_register$IORING_REGISTER_RESTRICTIONS(r4, 0xb, &(0x7f0000000800)=[@ioring_restriction_sqe_op, @ioring_restriction_sqe_op={0x1, 0x15}, @ioring_restriction_sqe_flags_allowed, @ioring_restriction_sqe_flags_required, @ioring_restriction_register_op={0x0, 0x16}, @ioring_restriction_sqe_flags_required={0x3, 0x1}], 0x6) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lchown(&(0x7f00000000c0)='./file0/../file0\x00', r9, r10) chown(&(0x7f00000007c0)='./file0\x00', r7, r10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000680)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000000c0)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0x8}, 0x18) r11 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r3) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000280)=0x0) sendmsg$NFC_CMD_DEV_UP(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r11, @ANYBLOB="11002abd7000ffdbdd140200000108000100", @ANYRES32=r12], 0x1c}, 0x1, 0x0, 0x0, 0x20040044}, 0x8004) write$nci(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="508403c102b306"], 0x7) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="3c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="1502000000000000140012800b00010062617461647600000400028008000a00", @ANYRES32], 0x3c}, 0x1, 0xba01, 0x0, 0x20000000}, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000080), 0x64, 0x50a, &(0x7f0000000200)="$eJzs3VFrHFsdAPD/bHZr06Y3ueqDXvB6tZW0aHeTxrbBh1pB9Kmg1vcak00I2WRDdtM2oWiKH0AQUcEnffFF8AMIUvDFRxEK+qyoKKKtPvigncvuTtI03U227TabZn8/mMw5Z2b2f86GmZ0zc5gJYGC9FxHXI+JJmqYXImI0K89lU2y1psZ6jx/dm21MSaTpzX8mkWRl25+VZPPT2WYnI+JrX474ZvJ83NrG5tJMpVJey/Kl+vJqqbaxeXFxeWahvFBemZqavDJ9dfry9ERP2nkmIq598a8/+O7PvnTtV5+586dbfz//rUa1RrLlu9vxgvL7LWw1vdD8LnZvsPaSwY6ifLOFmeF2aww9V3L/NdcJAID2Guf4H4yIT0bEhRiNof1PZwEAAIA3UPr5kfhfEpG2d6JDOQAAAPAGyTXHwCa5YjYWYCRyuWKxNYb3w3EqV6nW6p+er66vzLXGyo5FITe/WClPZGOFx6KQNPKTzfTT/KU9+amIeDsivj863MwXZ6uVuX5f/AAAAIABcXpP//8/o63+PwAAAHDMjPW7AgAAAMBrp/8PAAAAx5/+PwAAABxrX7lxozGl2++/nru9sb5UvX1xrlxbKi6vzxZnq2urxYVqdaH5zL7lgz6vUq2ufjZW1u+W6uVavVTb2Ly1XF1fqd9afOYV2AAAAMAhevvjD/6QRMTW54abU8OJ7jbtcjXgqMrvpJJs3ma3/uNbrflfDqlSwKEY6ncFgL7J97sCQN8U+l0BoO+SA5Z3HLzz22z+id7WBwAA6L3xj3a+/5/bd8ut/RcDR56dGAaX+/8wuJr3/7sdyetkAY6VgjMAGHivfP//QGn6QhUCAAB6bqQ5JblidnlvJHK5YjHiTPO1AIVkfrFSnoiItyLi96OFDzTyk80tkwP7DAAAAAAAAAAAAAAAAAAAAAAAAABAS5omkQIAAADHWkTub8mvW8/yHx89N7L3+sCJ5L+jkb0i9M6Pb/7w7ky9vjbZKP/XTnn9R1n5pX5cwQAAAICB8EIv8N/up2/34wEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACglx4/uje7PR1m3H98ISLG2sXPx8nm/GQUIuLUv5PI79ouiYihHsQfbvz5SLv4SaNaOyHbxR/uQfyt+/vGj7HsW2gX/3QP4sMge9A4/lxvt//l4r3mvP3+l494Jv+yOh//Yuf4N9Rh/z/TZYx3Hv6i1DH+/Yh38u2PP9vxkw7xz3YZ/xtf39zstCz9ScR429+f5JlYpfryaqm2sXlxcXlmobxQXpmamrwyfXX68vREaX6xUs7+to3xvY/98sl+7T/VIf7YAe0/12X7///w7qMPtZKFdvHPn20T/zc/zdZ4Pn4u++37VJZuLB/fTm+10ru9+/Pfvbtf++c6tP+g///5Ltt/4avf+XOXqwIAh6C2sbk0U6mU145totFLPwLVkDiCiW/39APTNE0b+9QrfE4SR+FraSb6fWQCAAB67elJf79rAgAAAAAAAAAAAAAAAAAAAIPrMB4ntjfm1k4q6cUjtAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeuL9AAAA//+GAdlV") r13 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r14 = syz_io_uring_setup(0xec5, &(0x7f0000000c00)={0x0, 0x0, 0x2}, &(0x7f0000000500)=0x0, &(0x7f0000000600)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r15, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) io_uring_enter(r14, 0xcb, 0x10a5, 0x3, &(0x7f0000000040)={[0xcb]}, 0x8) fremovexattr(r13, &(0x7f0000000040)=@known='system.posix_acl_default\x00') 5.373501804s ago: executing program 0 (id=2761): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) r1 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_IPV6_RTHDR(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="000202"], 0x18) 5.372989874s ago: executing program 3 (id=2762): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) r1 = socket$inet6(0xa, 0x3, 0x3c) setsockopt$inet6_IPV6_RTHDR(r1, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="000202"], 0x18) (fail_nth: 1) 4.680833145s ago: executing program 0 (id=2763): pipe2$9p(0x0, 0x0) r0 = syz_io_uring_setup(0x10a, &(0x7f0000000140)={0x0, 0x114df, 0x2, 0x3, 0x2000088}, &(0x7f00000004c0)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_LINKAT={0x27, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='./file0/../file0\x00', 0xffffffffffffffff, 0x1000, 0x1}) r3 = bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffff4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0, r3, 0x0, 0x3}, 0xfca8) io_uring_enter(r0, 0x3516, 0xaddf, 0x2, 0x0, 0x1517f) timer_create(0xfffffffd, 0x0, &(0x7f00000011c0)) timer_create(0xfffffffd, 0x0, &(0x7f0000000040)=0x0) timer_settime(r4, 0x0, &(0x7f00000001c0)={{}, {0x0, 0x9}}, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r6, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="090200000000000000000100000008000600ac1414aa08000b0077daa387"], 0x24}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) syz_read_part_table(0x104f, &(0x7f0000001200)="$eJzsz8EJwkAQBdC/GyPuyZZswiZswtiGdy+24EWr8qgEE0gDIsJ7h93PDHyY8FO3epzjZTu+LbmXlHRJDknW8/p5Ki01w5jPSX116bNZVLUhKTWtrJL0n9kjU+fim+yS7K9fPQ4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/sQ7AAD//4vpCY8=") write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x7c8) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[]) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2000002, 0x42032, 0xffffffffffffffff, 0x80000000) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './bus\x00'}) ioctl$TIOCMIWAIT(r8, 0x545c, 0x0) r9 = timerfd_create(0x0, 0x0) read(r9, &(0x7f0000000380)=""/189, 0x8) timerfd_settime(r9, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000007000000020000000400000005"], 0x87) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r10}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) 4.673742625s ago: executing program 5 (id=2764): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x2101, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0xff2e) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) socket$inet6(0xa, 0x80001, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x3, 0x0, 0x0, "0062ba7d82000000000000000000f7fffeff00"}) r2 = syz_open_pts(r1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/13], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000010018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) poll(&(0x7f0000000780)=[{r0, 0x4364}, {0xffffffffffffffff, 0xa002}, {0xffffffffffffffff, 0x481}, {r0, 0x2080}, {0xffffffffffffffff, 0x1c}, {0xffffffffffffffff, 0x4c}, {0xffffffffffffffff, 0x4013}, {0xffffffffffffffff, 0x29}, {r2, 0x9442}], 0x9, 0x7) 4.673329295s ago: executing program 2 (id=2765): sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, 0x0, 0x40000) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) listen(0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x41}}}, 0x10, 0x0}, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x1) r1 = socket(0x10, 0x3, 0x9) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x14, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4048080}, 0x40044) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) 4.672854215s ago: executing program 3 (id=2766): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a0000000300000008000000"], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e20, @broadcast}, 0x10) r2 = syz_open_dev$usbfs(&(0x7f0000000180), 0x205, 0x2581) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$USBDEVFS_RELEASEINTERFACE(r3, 0x80045510, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r4, 0x0, 0x5}, 0x18) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/arp\x00') preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000200)=""/233, 0xe9}], 0x1, 0x10, 0x0) semop(0x0, &(0x7f0000000240), 0x0) r6 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$mptcp(&(0x7f00000001c0), 0xffffffffffffffff) socket$unix(0x1, 0x1, 0x0) r8 = accept(0xffffffffffffffff, &(0x7f0000000400)=@phonet, &(0x7f0000000600)=0x80) setsockopt$inet6_tcp_TCP_REPAIR(r8, 0x6, 0x13, &(0x7f0000000640)=0x1, 0x4) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="94000000", @ANYRES16=r7, @ANYBLOB="240025bd7000fbdbdf25f2000000080003000100100005000500050000003800538b8cb72bb004068008000700", @ANYRES32, @ANYBLOB="08000300e000000208000300ac141418050002001000000014000400fe8000000000000000000000000000bb0500050002000000080002000700000008000200030000000800020008000000050005000400000005000500050000000800040088000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040890}, 0x4) 3.671136831s ago: executing program 0 (id=2767): r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r6, 0x0, 0x4008804) ioctl$SIOCSIFHWADDR(r5, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='fdb_delete\x00', r2, 0x0, 0x1}, 0x18) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x1}, 0x8) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) sendto$inet6(r0, &(0x7f00000005c0)="04", 0x1, 0x24008081, &(0x7f0000000240)={0xa, 0x4e20, 0xfffffff9, @rand_addr=' \x01\x00'}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={0x0, 0x0, 0x4}, 0x8) 3.670666311s ago: executing program 5 (id=2768): openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x141a82, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000bc0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffb, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r1}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000005f80)=@newtfilter={0x88, 0x2c, 0xd27, 0x70bd25, 0x2, {0x0, 0x0, 0x0, 0x0, {0x0, 0x1}, {}, {0x8}}, [@filter_kind_options=@f_flow={{0x9}, {0x58, 0x2, [@TCA_FLOW_ACT={0x54, 0x9, 0x0, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x1, 0x0, 0x20000001, 0x4, 0x2}, 0x1}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}]}]}}]}, 0x88}}, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{}, &(0x7f0000000280), &(0x7f00000006c0)='%pI4 \x00'}, 0x20) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) r5 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23}, 0x1c) listen(r5, 0x3) r6 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r6, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) accept4(r5, 0x0, 0x0, 0x0) close_range(r4, 0xffffffffffffffff, 0x0) 3.670157611s ago: executing program 2 (id=2769): r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/fscreate\x00', 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r3, &(0x7f00000001c0), &(0x7f0000000240), 0x2, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYBLOB="0000000000000000b7080000000000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x100, 0x200, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000040)="2e00000011008188040f80ec59acbc0413a1f8480b0000005e140602000000000e0027001000000002800000121f", 0x2e}], 0x1}, 0x0) 3.666847762s ago: executing program 3 (id=2770): syslog(0x2, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[], 0x20}, 0x1, 0x0, 0x0, 0x24000001}, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x3, &(0x7f0000000000)=[{0x8001, 0x7f, 0xf0, 0x1}, {0xf12, 0x1, 0x8, 0x4}, {0x6, 0x2, 0xf6, 0xfffffffc}]}, 0x10) socket$kcm(0xa, 0x2, 0x3a) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x82) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) getdents64(0xffffffffffffffff, &(0x7f0000000f80)=""/4096, 0x1000) splice(r5, 0x0, r4, 0x0, 0x6, 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) tee(r3, r6, 0x1004e, 0x2) r7 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) mremap(&(0x7f00006bd000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000721000/0x4000)=nil) madvise(&(0x7f0000ad2000/0x4000)=nil, 0x4000, 0x10) mremap(&(0x7f000046b000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000769000/0x1000)=nil) munmap(&(0x7f00003fe000/0xc00000)=nil, 0xc00000) sendmmsg$inet(r7, &(0x7f0000000780)=[{{&(0x7f00000002c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYRESOCT=r5], 0x30}}], 0x1, 0x4008804) ioctl$SIOCSIFHWADDR(r0, 0x8922, &(0x7f0000002280)={'team0\x00', @random="2b0100004ec6"}) 2.556137449s ago: executing program 0 (id=2771): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000580)={0x0, 0x0, 0x0, 'queue0\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket(0xc, 0x4, 0x0) ioperm(0x9, 0x2, 0x5c06) r2 = open(&(0x7f0000000300)='./bus\x00', 0x169042, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ftruncate(r2, 0x88801) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x100, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r6 = dup(r5) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r8 = socket(0x400000000010, 0x3, 0x0) r9 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r8, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0xfffffffffffffe50, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0xffffffff, {0x0, 0x0, 0x0, r10, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0xa73}}}]}, 0x38}}, 0x24000098) sendmsg$nl_route_sched(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001300)=@newtfilter={0x24, 0x2c, 0xd27, 0x70bd25, 0x25dfdbfc, {0x0, 0x0, 0x0, r10, {0x0, 0x2}, {}, {0x7, 0x5}}}, 0x24}, 0x1, 0x0, 0x0, 0x804}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000800)={0x0, @in6={{0xa, 0x4e23, 0x911, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9}}, 0x7, 0x6}, 0x90) write$P9_RLERRORu(r6, &(0x7f0000000080)=ANY=[@ANYBLOB="5300000007000046009d40"], 0x53) mount$9p_fd(0x0, 0x0, &(0x7f0000000180), 0x800000, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYRESHEX=r6, @ANYBLOB="db86ca9d69b0ed2453db272902ead93020e89f9d65ae3305e3d3995741790011fc7c6ae41aac7d87cb62ad21de43eba10e77e54731173795b56479738cde67e21619915accd5496fd3bb05b5103269"]) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{0x0, 0x1000000}, {0x0, 0x10}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x410200}], 0x1, 0x0, 0x10}}], 0x48}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x3, &(0x7f00000008c0)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x40f00, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sysfs$1(0x1, &(0x7f0000000280)='/proc/thread-self\x00') sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 2.555205569s ago: executing program 5 (id=2772): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYRES16, @ANYRESOCT], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1b, 0x1ffffdf3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYRES8=r0, @ANYRES32=r2, @ANYRES32=r2, @ANYRESOCT=r1, @ANYRESDEC=r2, @ANYRES8=r0], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6c, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='kfree\x00', r1}, 0x18) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000001e00)=""/194, 0x153, 0xc2, 0x7fffffff, 0x3c60, 0x0, @void, @value}, 0x28) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000001900)=ANY=[@ANYBLOB="9feb010018000000000000006400000064000000050000000300001e0b0000110400000005000000010000000000000a010000000000000c00000003000000000000000500000d0000010000000500000001000000050000000200000009000000000000000000006100"], &(0x7f0000000380)=""/14, 0x81, 0xe, 0x1, 0x88c, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="030000f603000000040000000a00000000000000", @ANYRESHEX=r2, @ANYBLOB='\t\x00'/20, @ANYRES32=0x0, @ANYRES64=r3, @ANYBLOB="000000000200"/28], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007500000095"], &(0x7f00000004c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001880)={&(0x7f00000018c0)='nilfs2_transaction_transition\x00', r5, 0x0, 0x40000000000}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000002c0)='./file1\x00', 0x3000046, &(0x7f00000019c0)={[{@delalloc}, {@nodioread_nolock}, {@barrier_val={'barrier', 0x3d, 0x1}}, {@bsdgroups}, {@bh}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@nodiscard}, {@nodelalloc}, {@nobh}, {@user_xattr}, {@dioread_lock}, {@dioread_nolock}]}, 0x1, 0x567, &(0x7f0000000b00)="$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") chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x3, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = memfd_create(&(0x7f0000000bc0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf#2\x99\x1e\xa1`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\f<\x8f\xc1\x99\x89r\xe1?\xbdu\x98\xc3\xf8\xd2Q#\xc6g\xa0\x85\xd6G\x85\x11X\x8d,\x02\xd45\xb8\xca\x97\x9d\xcb\x1e\x80\xd6\xd5>N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec\x8aog\x87BR\x9d\xad\xd4FcB\xda\x95\xc3\xdd\x9d\x8f\x1a\xce\x18\x80\"j\xe1\xba\x1e\x97uX\xccv\xd6\vcz\x92A^\xbc\xceF\xf7\xe5:\xaf\xc5~\xbcJ e\r\x88c\x9d\xb92\xb6i4zq\xb3c\x0f\xb2t\x93\xf2E6b\xfa\xcdJ5\xe3W]`4\xd8D\x05\v\xfc)\xca\xedQ\xd0]Ot\'\xc2tDF\xf9\xa7\xb5(\x83\xa5\x0f\x1d\x1d\x06Dg\x13>\x19\xe85#\aaT\x89=\x104\xd5\x85Q\x96\x91\xea\x172P\xb3:\xadZ\xbc\xbe\x00\xf0\x14\x96\xd9M\xd7\x88QZs\xb2\xe1+$jfQodH\x05/y`~Mx\x02\x00(v\xe6`\x026\xfcgC\xb5\xf0\x13.zb\xc5bj+@\x00\x00\x00\x00\x00\x00\x00.\xd4`=z\xd1n\x8d\x8f\xa5hS\x8e[\xb3\xa3\x87\xb9\xe2_Z\x11\xef\xc2]V\xf3\x03\x94\xb9\xe1\xa68\x8d\\\xe5\xef\xacpM\xf0\xa6\x04\x10\xb7\xc0t\x83\\\xf7\x12k\x9f\x10\xd5Z\x19\xc1\xc1\x80\\o\x97\xce=U\xdd\xaa\x1b\x05\x14\x13\xa6\xbd#\xde\x04\xe6$\xec$3\xf6\x97\xc6\xeaSL\xb7A72M\x88k@\xe5\xa3\n&\x1e\xc84\xa9\xe2\xccM\x906\x95xQ-2p\xd62\'\xec\x0f\x13;I\x95fE_\r\xe7\t!A\x05\xe4\x8f\x9e0\xf8/T\x18\xf7\xa1\x9f\xde1\xd5\x80<\xf5\b\xa9\xec\x85\xaeW\xb3\xd8#)bn \xfb\xf2\x88\xfaR\xff\xdd\x80\x96_\xec5\xf0\x1c\a\x8a\x80\x00@=\r8u+%f:\x1e\x82\xfap\xf6\x89\xea\xba\xe3\xbbM%F\xdb\\\xd1eJJ*\xc67\xca\x03\xa3\xf7(\xbb\xecN\xd4\xe7\xf2:u\x8a\b\xd5\v\xca\xfd\\\xd6\xe3\x05\xb3\x03\xd5\xe0\xd2\xf2{\'\x8b\xdf\xa1\xbe}\xb2\xe4y\xbb\xe6\x1f\x10c\xf5WQ\x82\x04\x01C\x83,\x90\x1a\xfa\x8e\x17\x89\xe2\xedX\x8d\rmq\t\xb5$\xb4\x9b\x92z\xd6/-\x13,\xb5%\x8eM/\x04\xa7\x7f\x1b\x85\xf1\xa4X\x17\xbb\x1cR14\xfb!\b\x10\xe8\xb2\xd41gK\xe4\xea\xe39d\bL\xe5\x1b\xbd[\x9bWD:\r&\xe9\vn^\xcc\x86\xe3\xce1>3{\xaa{\xbd0P\x9f\xa68\xf5\x82\xb8\x9aD\x9c{\xe6\xf8\xcbD\xb5aJ\xb0\x92\x89\xbc\x80\x1ch\x89\xe7\xdd]q,\xec\xc4\xa5\x93\xe5,\x0e,>/\xaf|\xf0\x01V\x7f\xc9?\xba\x16\xe4$+}5dy\xb1\xef\xf1m\xa5\x94d9\xaf\xcfq\x8b=\x026\xef\r\x91\x18\xc5\xb6\xb9fM\x8ayZ\xbcd\xa5\x8a\x88\x98\xc3\xfc`\xa6\xba\x1f\x17\v$\x88g\xb4\xad\b\xc1\xddW\xa6\xc1\xb7\xb0\xa3\x84Q\x13GoU\xe2\xb7\x03\x9c\xd5\x0f\xa8\x0ef\"\x15\x82\xe7\xbd\xf8\xca\x10f\xfe6h\xe9\xc3\xc2\xa0O:\xac~\x1a\xf7\xbeF\xbe\xe5\xf0\x81\xd6&\xc00x0, &(0x7f0000002a00)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r0, 0xdb4, 0x0, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') socket$rds(0x15, 0x5, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) truncate(&(0x7f0000000140)='./file2\x00', 0x2328) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r5, &(0x7f0000000180)="7753fc0969193fe68d0c94ad4ea06829de7a306adfcb6c487317fdc40fe56333da837ba02e89bcc904564a96cd9b9a075d7aa54e1024b2ee6f3666db64995166be347d53983c015a9246839505e7e33c71edf2ceb071d13896cb2a7be57a6fad3a9aaeaf3cbf754599daaf40dd39a00a6f3f8362a58e2bcd4b92453ca1b03e71c03590771543513de53678efb86ad77d97c07889a5514f30"}, 0x20) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r7, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="495300000000fdffffff670000000c009d"], 0x30}, 0x1, 0x0, 0x0, 0x40001}, 0x80) unshare(0x8000000) semget$private(0x0, 0x4000, 0x555) semtimedop(0x0, &(0x7f0000000280)=[{0x0, 0x1200, 0x1000}], 0x1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000027c0)={0x11, 0x4, &(0x7f0000000a40)=ANY=[], &(0x7f0000000a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) unshare(0x2c040000) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000240)={0x1, 'vlan0\x00', {}, 0xffff}) r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_ADD(r8, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @local}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004800}, 0x900) 1.342933139s ago: executing program 0 (id=2775): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffdfc, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x8, &(0x7f00000002c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x2000034000, 0x4, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="0200ffff0000", 0x6}]) 1.341948758s ago: executing program 5 (id=2776): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300001e880000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a000002000000240001801400018008000100e000000108000200e00000010c00028005000100000000002400028014000180080001000000000008000200ac1e00010c0002800500010000000000080007"], 0x64}}, 0x4004) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="6c00000000010104000061b9ae540000020000002c0001801400018008000100e000000108000200ac1414000c00028005000100000000000600034000667300240002801400018008000100e000000108000200e00000010c0002800500010000000000080007"], 0x6c}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=ANY=[@ANYBLOB="38000000010101010000000000ff000002000000240002801400018008000100e000000108000200e00000010c000280050001"], 0x38}}, 0x0) 1.340898129s ago: executing program 3 (id=2777): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x8000, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400ffd9b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = syz_io_uring_setup(0x44f, &(0x7f00000002c0)={0x0, 0xfffffffe, 0x10100, 0x2}, &(0x7f00000000c0)=0x0, &(0x7f0000000080)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000100)=@IORING_OP_RENAMEAT={0x23, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x60, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8, 0x13, 0x0}, @IPSET_ATTR_HASHSIZE={0x8}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x14, 0x3, 'hash:ip,port,ip\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) io_uring_enter(r2, 0x2dbe, 0x0, 0x0, 0x0, 0x0) 6.94476ms ago: executing program 0 (id=2778): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x40241, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) (async) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18080000000000000000000000000002850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) (async) write$tun(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="000086dd0203030009000a004000623d885d009c11fffc000000000000000000000000000000ff0200000000000000000000000000014e224e21009c90"], 0xd2) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) (async) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="d800000018008111e00212ba0d8105040a020000030f000b067c55a1bc000900b8000699030000000500160002008178a8001500080001400200000901ac040000d67f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f27260e970300000000000000000000000000000000000000008dc5fb510162", 0xd8}], 0x1}, 0x20000044) 6.56853ms ago: executing program 5 (id=2779): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a0000000300000008000000"], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e20, @broadcast}, 0x10) r2 = syz_open_dev$usbfs(&(0x7f0000000180), 0x205, 0x2581) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$USBDEVFS_RELEASEINTERFACE(r3, 0x80045510, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r4, 0x0, 0x5}, 0x18) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/arp\x00') preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000200)=""/233, 0xe9}], 0x1, 0x10, 0x0) semop(0x0, &(0x7f0000000240), 0x0) r6 = openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$mptcp(&(0x7f00000001c0), 0xffffffffffffffff) socket$unix(0x1, 0x1, 0x0) r8 = accept(0xffffffffffffffff, &(0x7f0000000400)=@phonet, &(0x7f0000000600)=0x80) setsockopt$inet6_tcp_TCP_REPAIR(r8, 0x6, 0x13, &(0x7f0000000640)=0x1, 0x4) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="94000000", @ANYRES16=r7, @ANYBLOB="240025bd7000fbdbdf25f2000000080003000100100005000500050000003800538b8cb72bb004068008000700", @ANYRES32, @ANYBLOB="08000300e000000208000300ac141418050002001000000014000400fe8000000000000000000000000000bb0500050002000000080002000700000008000200030000000800020008000000050005000400000005000500050000000800040088000000"], 0x94}, 0x1, 0x0, 0x0, 0x4040890}, 0x4) 351.99µs ago: executing program 2 (id=2780): syz_open_dev$usbfs(&(0x7f0000000080), 0x1ff, 0x402) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000240)={0x23, 0x3, 0x2, 0x1, 0x0, 0x5, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = socket(0x10, 0x3, 0x9) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x14, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4048080}, 0x40044) 0s ago: executing program 3 (id=2781): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x10, &(0x7f0000000400), 0x4) r1 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000040)=ANY=[], 0x9) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffd6d}, 0x0) (async) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x2800001, 0xc3072, 0xffffffffffffffff, 0x0) (async) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x8000000) kernel console output (not intermixed with test programs): 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Apr 20 17:05:34 syzkaller kern.warn kernel: [ 107.021461][ T9179] RSP: 002b:00007fb0767c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 Apr 20 17:05:34 syzkaller kern.warn kernel: [ 107.021483][ T9179] RAX: ffffffffffffffda RBX: 00007fb078385fa0 RCX: 00007fb07815e169 Apr 20 17:05:34 syzkaller kern.warn kernel: [ 107.021495][ T9179] RDX: 0000000000[ 107.805830][ T9206] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9206 comm=syz.2.2338 000000 RSI: 0000000000000004 RDI: 0000000000000005 Apr 20 17:05:34 syzkaller kern.warn kernel: [ 107.021508][ T9179] RBP: 00007fb0767c7090 R08: 0000000000000000 R09: 0000000000000000 Apr 20 17:05:34 syzkaller kern.warn kernel: [ 107.021521][ T9179] R10: 000000007ffff000 R11: 0000000000000246 R12: 0000000000000001 Apr 20 17:05:34 syzkaller kern.warn kernel: [ 107.021534][ T9179] R13: 0000000000000000 R14: 00007fb078385fa0 R15: 00007fffa1f7d578 Apr 20 17:05:34 syzkaller kern.warn kernel: [ 107.021552][ T9179] Apr 20 17:05:34 syzkaller kern.warn kernel: [ 107.247698][ T29] kauditd_prApr 20 17:05:34 syzkaller kern.notice kernel: [ 107.335499][ T29] audit: type=1400 audit(1745168734.073:27035): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Apr 20 17:05:34 syzkaller kern.notice kernel: [ 107.359216][ T29] audit: type=1400 audit(1745168734.073:27036): avc: denied { prog_load } for pid=9178 comm="syz.4.2329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Apr 20 17:05:34 syzkaller kern.notice kernel: [ 107.379134][ T29] audit: type=1400 audit(1745168734.073:27037): avc: denied { prog_load } for pid=9178 comm="syz.4.2329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Apr 20 17:05:34 syzkaller kern.notice kernel: [ 107.400318][ T29] audit: type=1400 audit(1745168734.073:27038): avc: denied { map_create } for pid=9178 comm="syz.4.2329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Apr 20 17:05:34 syzkaller kern.notice kernel: [ 107.400404][ T29] audit: type=1400 audit(1745168734.073:27039): avc: denied { prog_load } for pid=9178 comm="syz.4.2329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Apr 20 17:05:34 syzkaller kern.notice kernel: [ 107.400432][ T29] audit: type=1400 audit(1745168734.083:27040): avc: denied { read write } for pid=3309 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f Apr 20 17:05:34 syzkaller kern.notice kernel: [ 107.400482][ T29] audit: type=1400 audit(1745168734.103:27041): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Apr 20 17:05:34 syzkaller kern.notice kernel: [ 107.400504][ T29] audit: type=1400 audit(1745168734.103:27042): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Apr 20 17:05:34 syzkaller kern.notice kernel: [ 107.400527][ T29] audit: type=1400 audit(174Apr 20 17:05:34 syzkaller kern.warn kernel: [ 107.682896][ T9195] SELinux: unreApr 20 17:05:34 syzkaller kern.warn kernel: [ 107.805830][ T9206] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9206 comm=syz.2.2338 [ 108.108236][ T9223] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9223 comm=syz.0.2347 Apr 20 17:05:34 syzkaller kern.warn kernel: [ 108.108236][ T9223] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9223 comm=syz.0.2347 [ 108.195688][ T9236] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9236 comm=syz.2.2352 Apr 20 17:05:35 [ 108.215632][ T9235] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9235 comm=syz.3.2353 syzkaller kern.warn kernel: [ 108.195688][ T9236] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9236 comm=syz.2.2352 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.215632][ T9235] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9235 comm=syz.3.2353 [ 108.259498][ T9243] FAULT_INJECTION: forcing a failure. [ 108.259498][ T9243] name failslab, interval 1, probability 0, space 0, times 0 [ 108.273401][ T9243] CPU: 1 UID: 0 PID: 9243 Comm: syz.2.2355 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) [ 108.273432][ T9243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 108.273447][ T9243] Call Trace: [ 108.273455][ T9243] [ 108.273492][ T9243] dump_stack_lvl+0xf6/0x150 [ 108.273518][ T9243] dump_stack+0x15/0x1a [ 108.273556][ T9243] should_fail_ex+0x261/0x270 [ 108.273585][ T9243] should_failslab+0x8f/0xb0 [ 108.273612][ T9243] kmem_cache_alloc_noprof+0x59/0x340 [ 108.273652][ T9243] ? security_inode_alloc+0x37/0x100 [ 108.273679][ T9243] security_inode_alloc+0x37/0x100 [ 108.273717][ T9243] inode_init_always_gfp+0x4a2/0x4f0 [ 108.273812][ T9243] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 108.273904][ T9243] alloc_inode+0x86/0x170 [ 108.273920][ T9243] new_inode+0x1e/0xe0 [ 108.273937][ T9243] shmem_get_inode+0x24e/0x730 [ 108.273964][ T9243] shmem_symlink+0x9b/0x3e0 [ 108.273996][ T9243] ? selinux_inode_symlink+0x22/0x30 [ 108.274099][ T9243] vfs_symlink+0xca/0x1d0 [ 108.274120][ T9243] do_symlinkat+0xe3/0x370 [ 108.274139][ T9243] __x64_sys_symlink+0x50/0x60 [ 108.274155][ T9243] x64_sys_call+0x2a77/0x2e10 [ 108.274174][ T9243] do_syscall_64+0xc9/0x1a0 [ 108.274229][ T9243] ? clear_bhb_loop+0x25/0x80 [ 108.274252][ T9243] ? clear_bhb_loop+0x25/0x80 [ 108.274276][ T9243] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 108.274300][ T9243] RIP: 0033:0x7f1c633ae169 [ 108.274317][ T9243] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 108.274382][ T9243] RSP: 002b:00007f1c61a17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 108.274399][ T9243] RAX: ffffffffffffffda RBX: 00007f1c635d5fa0 RCX: 00007f1c633ae169 [ 108.274410][ T9243] RDX: 0000000000000000 RSI: 00002000000017c0 RDI: 0000200000001780 [ 108.274424][ T9243] RBP: 00007f1c61a17090 R08: 0000000000000000 R09: 0000000000000000 [ 108.274438][ T9243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 108.274489][ T9243] R13: 0000000000000000 R14: 00007f1c635d5fa0 R15: 00007fff8c739938 [ 108.274509][ T9243] Apr 20 17:05:35 syzkaller kern.notice kernel: [ 108.259498][ T9243] FAULT_INJECTION: forcing a failure. Apr 20 17:05:35 syzkaller kern.notice kernel: [ 108.259498][ T9243] name failslab, interval 1, probability 0, space 0, times 0 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.273401][ T9243] CPU: 1 UID: 0 PID: 9243 Comm: syz.2.2355 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.273432][ T9243] Hardware name: Google Google Compute Engi[ 108.547709][ T9251] dummy0 speed is unknown, defaulting to 1000 ne/Google Compute Engine, BIOS Google 02/12/2025 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.273447][ T9243] Call Trace: Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.273455][ T9243] Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.273492][ T9243] dump_stack_lvl+0xf6/0x150 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.273518][ T9243] dump_stack+0x15/0x1a Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.273556][ T9243] should_fail_ex+0x261/0x270 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.273585][ T9243] should_failslab+0x8f/0xb0 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.273612][ T9243] kmem_cache_alloc_noprof+0x59/0x340 Apr 20 17:05:35 sy[ 108.615826][ T9264] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9264 comm=syz.2.2364 zkaller kern.warn kernel: [ 108.273652][ T9243] ? security_inode_alloc+0x37/0x100 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.273679][ T9243] security_inode_alloc+0x37/0x100 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.273717][ T9243] inode_init_always_gfp+0x4a2/0x4f0 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.273812][ T9243] ? __pfx_shmem_alloc_inode+0x10/0x10 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.273904][ T9243] alloc_inode+0x86/0x170 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.273920][ T9243] new_inode+0x1e/0xe0 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.273937][ T9243] shmem_get_inode+0x24e/0x730 [ 108.686228][ T9273] binfmt_misc: register: failed to install interpreter file ./file0 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 1[ 108.697971][ T9278] FAULT_INJECTION: forcing a failure. [ 108.697971][ T9278] name fail_usercopy, interval 1, probability 0, space 0, times 0 08.273964][ T9243] shmem_symlin[ 108.713308][ T9278] CPU: 0 UID: 0 PID: 9278 Comm: syz.4.2371 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) k+0x9b/0x3e0 Ap[ 108.713379][ T9278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 r 20 17:05:35 sy[ 108.713394][ T9278] Call Trace: zkaller kern.war[ 108.713402][ T9278] n kernel: [ 108[ 108.713411][ T9278] dump_stack_lvl+0xf6/0x150 .273996][ T9243][ 108.713473][ T9278] dump_stack+0x15/0x1a ? selinux_inod[ 108.713490][ T9278] should_fail_ex+0x261/0x270 e_symlink+0x22/0[ 108.713517][ T9278] should_fail+0xb/0x10 x30 Apr 20 17:0[ 108.713575][ T9278] should_fail_usercopy+0x1a/0x20 5:35 syzkaller k[ 108.713606][ T9278] _copy_from_user+0x1c/0xa0 ern.warn kernel:[ 108.713704][ T9278] kstrtouint_from_user+0x84/0x100 [ 108.274099][[ 108.713744][ T9278] ? 0xffffffff81000000 T9243] vfs_sym[ 108.713759][ T9278] ? selinux_file_permission+0x22d/0x360 link+0xca/0x1d0[ 108.713786][ T9278] proc_fail_nth_write+0x54/0x160 Apr 20 17:05:35[ 108.713827][ T9278] ? __pfx_proc_fail_nth_write+0x10/0x10 syzkaller kern.[ 108.713917][ T9278] vfs_write+0x295/0x950 warn kernel: [ [ 108.713936][ T9278] ? __pfx_proc_fail_nth_read+0x10/0x10 108.274120][ T92[ 108.713974][ T9278] ? __fget_files+0x186/0x1c0 43] do_symlinka[ 108.714003][ T9278] ksys_write+0xeb/0x1b0 t+0xe3/0x370 Ap[ 108.714104][ T9278] __x64_sys_write+0x42/0x50 r 20 17:05:35 sy[ 108.714122][ T9278] x64_sys_call+0x2a45/0x2e10 zkaller kern.war[ 108.714143][ T9278] do_syscall_64+0xc9/0x1a0 n kernel: [ 108[ 108.714169][ T9278] ? clear_bhb_loop+0x25/0x80 .274139][ T9243][ 108.714188][ T9278] ? clear_bhb_loop+0x25/0x80 __x64_sys_syml[ 108.714287][ T9278] entry_SYSCALL_64_after_hwframe+0x77/0x7f ink+0x50/0x60 A[ 108.714307][ T9278] RIP: 0033:0x7fb07815cc1f pr 20 17:05:35 s[ 108.714322][ T9278] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 yzkaller kern.wa[ 108.714343][ T9278] RSP: 002b:00007fb0767c7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 108.714365][ T9278] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb07815cc1f rn kernel: [ 10[ 108.714420][ T9278] RDX: 0000000000000001 RSI: 00007fb0767c70a0 RDI: 0000000000000003 8.274155][ T9243[ 108.714434][ T9278] RBP: 00007fb0767c7090 R08: 0000000000000000 R09: 0000000000000000 ] x64_sys_call+[ 108.714445][ T9278] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 0x2a77/0x2e10 A[ 108.714456][ T9278] R13: 0000000000000000 R14: 00007fb078385fa0 R15: 00007fffa1f7d578 pr 20 17:05:35 s[ 108.714472][ T9278] yzkaller kern.warn kernel: [ 108.274174][ T9243] do_syscall_64+0xc9/0x1a0 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.274229][ T9243] ? clear_bhb_loop+0x25/0x80 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.274252][ T9243] ? clear_bhb_loop+0x25/0x80 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.274276][ T9243] entry_SYSCALL_64_after_hwframe+0x77/0x7f Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.274300][ T9243] RIP: 0033:0x7f1c633ae169 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.274317][ T9243] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff [ 109.024041][ T9287] ip6_tunnel: non-ECT from fc00:0000:0000:0000:0000:0000:0000:0000 with DS=0x3 ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.274382][ T9243] RSP: 002b:00007f1c61a17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.274399][ T9243] RAX: ffffffffffffffda RBX: 00007f1c635d5fa0 RCX: 00007f1c633ae169 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.274410][ T9243] RDX: 0000000000000000 RSI: 00002000000017c0 RDI: 0000200000001780 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.274424][ T9243] RBP: 00007f1c61a17090 R08: 0000000000000000 R09: 0000000000000000 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.274438][ T9243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.274489][ T9243] R13: 0000000000000000 R14: 00007f1c635d5fa0 R15: 00007fff8c739938 Apr 20 17:05:35 syz[ 109.109826][ T9289] dummy0 speed is unknown, defaulting to 1000 kaller kern.warn kernel: [ 108.274509][ T9243] Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.547709][ T9251] dummy0 speed is unknown, defaulting to 1000 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.615826][ T9264] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9264 comm=syz.2.2364 Apr 20 17:05:35 syzkaller kern.notice kernel: [ 108.686228][ T9273] binfmt_misc: register: failed to install interpreter file ./file0 Apr 20 17:05:35 syzkaller kern.notice kernel: [ 108.697971][ T9278] FAULT_INJECTION: forcing a failure. Apr 20 17:05:35 syzkaller kern.notice kernel: [ 108.697971][ T9278] name fail_usercopy, interval 1, probability 0, space 0, times 0 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.713308][ T9278] CPU: 0 UID: 0 PID: 9278 Comm: syz.4.2371 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.713379][ T9278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.713394][ T9278] Call Trace: Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.713402][ T9278] Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.713411][ T9278] dump_stack_lvl+0xf6/0x150 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.713473][ T9278] dump_stack+0x15/0x1a Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.713490][ T9278] should_fail_ex+0x261/0x270 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.713517][ T9278] should_fail+0xb/0x10 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.713575][ T9278] should_fail_usercopy+0x1a/0x20 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.713606][ T9278] _copy_from_user+0x1c/0xa0 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.713704][ T9278] kstrtouint_from_user+0x84/0x100 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.713744][ T9278] ? 0xffffffff81000000 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.713759][ T9278] ? selinux_file_permission+0x22d/0x360 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.713786][ T9278] proc_fail_nth_write+0x54/0x160 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.713827][ T9278] ? __pfx_proc_fail_nth_write+0x10/0x10 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.713917][ T9278] vfs_write+0x295/0x950 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.713936][ T9278] ? __pfx_proc_fail_nth_read+0x10/0x10 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.713974][ T9278] ? __fget_files+0x186/0x1c0 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 108.714003][ T9278] ksys_write+0xeb/0x1b0 Apr Apr 20 17:05:35 Apr 20 17:05:35 Apr 20 17:05:35 syzkaller kern.info kernel: [ 109.024041][ T9287] ip6_tunnel: non-ECT from fc00:0000:0000:0000:0000:0000:0000:0000 with DS=0x3 Apr 20 17:05:35 syzkaller kern.warn kernel: [ 109.109826][ T9289] dummy0 speed is unknown, defaulting to 1000 [ 109.469666][ T9339] dummy0 speed is unknown, defaulting to 1000 Apr 20 17:05:36 syzkaller kern.warn kernel: [ 109.469666][ T9339] dummy0 speed is unknown, defaulting to 1000 [ 109.877443][ T9373] dummy0 speed is unknown, defaulting to 1000 Apr 20 17:05:36 syzkaller kern.warn kernel: [ 109.877443][ T9373] dummy0 speed is unknown, defaulting to 1000 [ 110.034446][ T9394] FAULT_INJECTION: forcing a failure. [ 110.034446][ T9394] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 110.048303][ T9394] CPU: 0 UID: 0 PID: 9394 Comm: syz.3.2422 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) [ 110.048337][ T9394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 110.048352][ T9394] Call Trace: [ 110.048422][ T9394] [ 110.048431][ T9394] dump_stack_lvl+0xf6/0x150 [ 110.048456][ T9394] dump_stack+0x15/0x1a [ 110.048475][ T9394] should_fail_ex+0x261/0x270 [ 110.048498][ T9394] should_fail+0xb/0x10 [ 110.048519][ T9394] should_fail_usercopy+0x1a/0x20 [ 110.048550][ T9394] _copy_from_user+0x1c/0xa0 [ 110.048626][ T9394] get_user_ifreq+0x4f/0x100 [ 110.048706][ T9394] sock_ioctl+0x56d/0x630 [ 110.048734][ T9394] ? __pfx_sock_ioctl+0x10/0x10 [ 110.048769][ T9394] __se_sys_ioctl+0xc9/0x140 [ 110.048817][ T9394] __x64_sys_ioctl+0x43/0x50 [ 110.048851][ T9394] x64_sys_call+0x168d/0x2e10 [ 110.048935][ T9394] do_syscall_64+0xc9/0x1a0 [ 110.048965][ T9394] ? clear_bhb_loop+0x25/0x80 [ 110.048991][ T9394] ? clear_bhb_loop+0x25/0x80 [ 110.049016][ T9394] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 110.049053][ T9394] RIP: 0033:0x7fb625a4e169 [ 110.049094][ T9394] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 110.049116][ T9394] RSP: 002b:00007fb6240b7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 110.049137][ T9394] RAX: ffffffffffffffda RBX: 00007fb625c75fa0 RCX: 00007fb625a4e169 [ 110.049151][ T9394] RDX: 00002000000005c0 RSI: 00000000000089f1 RDI: 0000000000000003 [ 110.049166][ T9394] RBP: 00007fb6240b7090 R08: 0000000000000000 R09: 0000000000000000 [ 110.049180][ T9394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 110.049194][ T9394] R13: 0000000000000000 R14: 00007fb625c75fa0 R15: 00007ffc91d29bf8 [ 110.049215][ T9394] Apr 20 17:05:37 syzkaller kern.notice kernel: [ 110.034446][ T9394] FAULT_INJECTION: forcing a failure. Apr 20 17:05:37 syzkaller kern.notice kernel: [ 110.034446][ T9394] name fail_usercopy, interval 1, probability 0, space 0, times 0 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.048303][ T9394] CPU: 0 UID: 0 PID: 9394 Comm: syz.3.2422 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.048337][ T9394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.048352][ T9394] Call Trace: Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.048422][ T9394] Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.048431][ T9394] dump_stack_lvl+0xf6/0x150 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.048456][ T9394] dump_stack+0x15/0x1a Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.048475][ T9394] should_fail_ex+0x261/0x270 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.048498][ T9394] should_fail+0xb/0x10 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.048519][ T9394] should_fail_usercopy+0x1a/0x20 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.048550][ T9394] _copy_from_user+0x1c/0xa0 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.048626][ T9394] get_user_ifreq+0x4f/0x100 Apr 20 17:05:37 syzkaller kern.warn kern[ 110.459751][ T9415] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(8) el: [ 110.04870[ 110.466434][ T9415] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) 6][ T9394] sock[ 110.475880][ T9415] vhci_hcd vhci_hcd.0: Device attached _ioctl+0x56d/0x630 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.048734][ T9394] ? __pfx_sock_ioctl+0x10/0x10 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.048769][ T9394] __se_sys_ioctl+0xc9/0x140 Apr 20 17:05:37 syzkaller k[ 110.502012][ T9422] vhci_hcd vhci_hcd.0: pdev(3) rhport(1) sockfd(11) [ 110.509782][ T9422] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) ern.warn kernel:[ 110.517650][ T9422] vhci_hcd vhci_hcd.0: Device attached [ 110.048817][ T9394] __x64_sys_ioctl+0x43/0x50 Apr 20 17:05:37 syzkaller ke[ 110.531307][ T9415] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN rn.warn kernel: [ 110.048851][ [ 110.542974][ T9415] vhci_hcd vhci_hcd.0: pdev(3) rhport(3) sockfd(14) [ 110.549756][ T9415] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) T9394] x64_sys_[ 110.558322][ T9415] vhci_hcd vhci_hcd.0: Device attached call+0x168d/0x2e10 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.048935][ T9394] do_syscall_64+0xc9/0x1a0 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.048965][ T9394] ? clear_bhb_loop+0x25/0x80 Apr 20 17:05:37 syzkaller kern[ 110.584710][ T9415] vhci_hcd vhci_hcd.0: pdev(3) rhport(4) sockfd(16) .warn kernel: [ [ 110.592122][ T9415] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) 110.048991][ T9[ 110.601811][ T9415] vhci_hcd vhci_hcd.0: Device attached 394] ? clear_bhb_loop+0x25/0x80 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.049016][ T9394] entry_SYSCALL_64_after_hwframe+0x77/0x7f Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.049053][ T9394] RIP: 0033:0x7fb625a4e169 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.049094][ T9394] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f[ 110.644868][ T9415] vhci_hcd vhci_hcd.0: pdev(3) rhport(5) sockfd(18) 05 <48> 3d 01 f[ 110.652362][ T9415] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) 0 ff ff 73 01 c3[ 110.661376][ T9415] vhci_hcd vhci_hcd.0: Device attached 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.049116][ T9394] RSP: 002b:00007fb624[ 110.678481][ T9438] FAULT_INJECTION: forcing a failure. [ 110.678481][ T9438] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 110.684939][ T10] vhci_hcd: vhci_device speed not set 0b7038 EFLAGS: 0[ 110.692316][ T9438] CPU: 1 UID: 0 PID: 9438 Comm: syz.4.2438 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) [ 110.692352][ T9438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 110.692407][ T9438] Call Trace: 0000246 ORIG_RAX[ 110.692416][ T9438] [ 110.692427][ T9438] dump_stack_lvl+0xf6/0x150 [ 110.692458][ T9438] dump_stack+0x15/0x1a : 00000000000000[ 110.692479][ T9438] should_fail_ex+0x261/0x270 10 Apr 20 17:05[ 110.692510][ T9438] should_fail+0xb/0x10 :37 syzkaller ke[ 110.692548][ T9438] should_fail_usercopy+0x1a/0x20 rn.warn kernel: [ 110.692580][ T9438] _copy_to_user+0x20/0xa0 [ 110.049137][ [ 110.692668][ T9438] simple_read_from_buffer+0xb2/0x130 T9394] RAX: ffff[ 110.692710][ T9438] proc_fail_nth_read+0x103/0x140 ffffffffffda RBX[ 110.692754][ T9438] ? __pfx_proc_fail_nth_read+0x10/0x10 : 00007fb625c75f[ 110.692842][ T9438] vfs_read+0x1b2/0x710 a0 RCX: 00007fb6[ 110.692863][ T9438] ? __rcu_read_unlock+0x4e/0x70 25a4e169 Apr 20[ 110.692965][ T9438] ? __fget_files+0x186/0x1c0 17:05:37 syzkal[ 110.692994][ T9438] ksys_read+0xeb/0x1b0 ler kern.warn ke[ 110.693093][ T9438] __x64_sys_read+0x42/0x50 rnel: [ 110.049[ 110.693116][ T9438] x64_sys_call+0x2a3b/0x2e10 151][ T9394] RDX[ 110.693144][ T9438] do_syscall_64+0xc9/0x1a0 : 00002000000005[ 110.693248][ T9438] ? clear_bhb_loop+0x25/0x80 [ 110.693275][ T9438] ? clear_bhb_loop+0x25/0x80 c0 RSI: 00000000[ 110.693301][ T9438] entry_SYSCALL_64_after_hwframe+0x77/0x7f 000089f1 RDI: 00[ 110.693328][ T9438] RIP: 0033:0x7fb07815cb7c 00000000000003 [ 110.693417][ T9438] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 Apr 20 17:05:37 [ 110.693440][ T9438] RSP: 002b:00007fb0767c7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 syzkaller kern.w[ 110.693463][ T9438] RAX: ffffffffffffffda RBX: 00007fb078385fa0 RCX: 00007fb07815cb7c arn kernel: [ 1[ 110.693479][ T9438] RDX: 000000000000000f RSI: 00007fb0767c70a0 RDI: 0000000000000003 [ 110.693494][ T9438] RBP: 00007fb0767c7090 R08: 0000000000000000 R09: 0000000000000000 10.049166][ T939[ 110.693509][ T9438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 4] RBP: 00007fb6[ 110.693530][ T9438] R13: 0000000000000000 R14: 00007fb078385fa0 R15: 00007fffa1f7d578 240b7090 R08: 00[ 110.693621][ T9438] 00000000000000 R[ 110.750017][ T9443] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN 09: 000000000000[ 110.826368][ T9415] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN 0000 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.049180][ T9394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.049194][ T9394] R13: 0000000000000000 R14: 00007fb625c75fa0 R15: 00007ffc91d29bf8 Apr 20 17:05:37 syzkaller kern[ 110.971868][ T9422] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN .warn kernel: [ 110.049215][ T9394] Apr 20 17:05:37 syzkaller kern.info kernel: [ 110.459751][ T9415] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(8) Apr 20 17:05:37 syzkaller kern.info kernel: [ 110.466434][ T9415] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) Apr 20 17:05:37 syzkaller kern.info kernel: [ 110.475880][ T9415] vhci_hcd vhci_hcd.0: Device attached Apr 20 17:05:37 syzkaller kern.info [ 111.015110][ T9427] vhci_hcd: connection closed kernel: [ 110.5[ 111.018190][ T9429] vhci_hcd: connection closed 02012][ T9422] v[ 111.025252][ T51] vhci_hcd: stop threads hci_hcd vhci_hcd[ 111.036861][ T51] vhci_hcd: release socket .0: pdev(3) rhpo[ 111.041982][ T51] vhci_hcd: disconnect device rt(1) sockfd(11) Apr 20 17:05:37 syzkaller kern.info kernel: [ 110.509782][ T9[ 111.053416][ T9433] vhci_hcd: connection closed 422] vhci_hcd vh[ 111.054595][ T9423] vhci_hcd: connection closed ci_hcd.0: devid(0) speed(1) speed_str(low-speed) Apr 20 17:05:3[ 111.059904][ T9418] vhci_hcd: connection closed 7 syzkaller kern[ 111.070296][ T10] usb 7-1: new full-speed USB device number 2 using vhci_hcd .info kernel: [ 110.517650][ T9422] vhci_hcd vhci_hcd.0: Device attached Apr 20 17:05:37 syzkaller kern.err kernel: [ 110.531307][ T9415] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN[ 111.101587][ T9419] vhci_hcd: sendmsg failed!, ret=-32 for 48 Apr 20 17:05:37[ 111.109025][ T51] vhci_hcd: stop threads syzkaller kern.[ 111.114342][ T51] vhci_hcd: release socket info kernel: [ [ 111.120225][ T51] vhci_hcd: disconnect device 110.542974][ T9415] vhci_hcd vhci_hcd.0: pdev(3) rhport(3) sockfd(14) Apr 20 17:05:37 syzkaller kern.info kernel: [ 110.549756][ T9415] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) Apr 20 17:05:37 syzkaller kern.info kernel: [ 110.558322][ T9415] vhci_hcd vhci_hcd.0: Device attached Apr 20 17:05:37 syzkaller kern.info kernel: [ 110.584710][ T9415] vhci_hcd vhci_hcd.0: pdev(3) rhport(4) sockfd([ 111.161990][ T51] vhci_hcd: stop threads 16) Apr 20 17:0[ 111.167178][ T51] vhci_hcd: release socket 5:37 syzkaller k[ 111.172988][ T51] vhci_hcd: disconnect device ern.info kernel: [ 110.592122][ T9415] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) Apr 20 17:05:37 syzkaller kern.info kernel: [ 110.601811][ T9415] vhci_hcd vhci_hcd.0: Device attached Apr 20 17:05:37 syzkaller kern.info kernel: [ 110.644868][ T9415] vhci_hcd vhci_hcd.0: pdev(3) r[ 111.204964][ T51] vhci_hcd: stop threads hport(5) sockfd([ 111.209652][ T51] vhci_hcd: release socket 18) Apr 20 17:0[ 111.216101][ T51] vhci_hcd: disconnect device 5:37 syzkaller kern.info kernel: [ 110.652362][ T9415] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) Apr 20 17:05:37 syzkaller kern.info kernel: [ 110.661376][ T9415] vhci_hcd vhci_hcd.0: Device attached Apr 20 17:05:37 syzkaller kern.notice kernel: [ 110.678481][ T9438] FAULT_INJECTION: forcing a failure. Apr 20 [ 111.250796][ T51] vhci_hcd: stop threads 17:05:37 syzkall[ 111.255380][ T51] vhci_hcd: release socket er kern.notice k[ 111.261183][ T51] vhci_hcd: disconnect device ernel: [ 110.678481][ T9438] name fail_usercopy, interval 1, probability 0, space 0, times 0 Apr 20 17:05:37 syzkaller kern.err kernel: [ 110.684939][ T10] vhci_hcd: vhci_device speed not set Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.692316][ T9438] CPU: 1 UID: 0 PID: 9438 Comm: syz.4.2438 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.692352][ T9438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.692407][ T9438] Call Trace: Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.692416][ T9438] Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.692427][ T9438] dump_stack_lvl+0xf6/0x150 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.692458][ T9438] dump_stack+0x15/0x1a Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.692479][ T9438] should_fai[ 111.350113][ T9479] dummy0 speed is unknown, defaulting to 1000 l_ex+0x261/0x270 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.692510][ T9438] should_fail+0xb/0x10 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.692548][ T9438] should_fail_usercopy+0x1a/0x20 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.692580][ T9438] _copy_to_user+0x20/0xa0 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.692668][ T9438] simple_read_from_buffer+0xb2/0x130 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.692710][ T9438] proc_fail_nth_read+0x103/0x140 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.692754][ T9438] ? __pfx_proc_fail_nth_read+0x10/0x10 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.692842][ T9438] vfs_read+0x1b2/0x710 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 110.692863][ T9438] ? __rcu_read_unlock+0x4e/0x70 Apr 20 17:05:37 syzkaller kern.wApr 20 17:05:37 syzkaller kern.warn kernel: [ 110.693248][ T9438] ? clear_bhb_loop+0x25/0x80 Apr 20 17:05:37 syzkaller kern.warn kernel: [ 1Apr 20 17:05:37 Apr 20 17:05:37 syzkaller kern.err kernel: [ 110.971868][ T9422] vhci_hcd: Failed attach request for unsupporteApr 20 17:05:37 syzkaller kern.info kernel: [ 111.015110][ T9427] vhci_hcd: connection closed Apr 20 17:05:37 syzkaller kern.info kernel: [ 111.018190][ T9429] vhci_hcd: connection closed Apr 20 17:05:37 syzkaller kern.info kernel: [ 111.025252][ T51] vhci_hcd: stop threads Apr 20 17:05:37 syzkaller kern.info kernel: [ 111.036861][ T51] vhci_hcd: release socket Apr 20 17:05:37 syzkaller kern.info kernel: [ 111.041982][ T51] vhci_hcd: disconnect device Apr 20 17:05:37 syzkaller kern.info kernel: [ 111.053416][ T9433] vhci_hcd: connection closed Apr 20 17:05:37 syzkaller kern.info kernel: [ 111.054595][ T9423] vhci_hcd: connection closed Apr 20 17:05:37 syzkaller kern.info kernel: [ 111.059904][ T9418] vhci_Apr 20 17:05:37 syzkaller kern.err kernel: [ 111.101587][ T9419] vhci_hcd: sendmsg failed!, ret=-32 for 48 Apr 20 17:05:37 syzkaller kern.info kernel: [ 111.109025][ T51] Apr 20 17:05:38 syzkaller kern.info kernel: [ 111.161990][ T51] vhci_hcd: stop threads Apr 20 17:05:38 syzkaller kern.info kernel: [ 111.167178][ T51] vhci_hcd: release socket Apr 20 17:05:38 syzkaller kern.info kernel: [ 111.172988][ T51] vhci_hcd: disconnect device Apr 20 17:05:38 syzkaller kern.info kernel: [ 111.204964][ T51] vhci_hcd: stop threads Apr 20 17:05:38 syzkaller kern.info kernel: [ 111.209652][ T51] vhci_hcd: release socket Apr 20 17:05:38 syzkaller kern.info kernel: [ 111.216101][ T51] vhci_hcd: disconnect device Apr 20 17:05:38 syzkaller kern.info kernel: [ 111.250796][ T51] vhci_hcd: stop threads Apr 20 17:05:38 syzkaller kern.info kernel: [ 111.255380][ T51] vhci_hcd: release socket Apr 20 17:05:38 syzkaller kern.info kernel: [ 111.261183][ T51] vhci_hcd: disconnect [ 111.605900][ T9495] selinux_netlink_send: 10 callbacks suppressed device Apr 20 1[ 111.605920][ T9495] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9495 comm=syz.0.2463 7:05:38 syzkaller kern.warn kernel: [ 111.350113][ T9479] dummy0 speed is unknown, defaulting to 1000 Apr 20 17:05:38 syzkaller kern.warn kernel: [ 111.605900][ T9495] selinux_netlink_send: 10 callbacks suppressed Apr 20 17:05:38 syzkaller kern.warn kernel: [ 111.605920][ T9495] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9495 comm=syz.0.2463 [ 112.012402][ T9532] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9532 comm=syz.0.2477 Apr 20 17:05:38 syzkaller kern.warn kernel: [ 112.012402][ T9532] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9532 comm=syz.0.2477 [ 112.075265][ T9541] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9541 comm=syz.3.2483 Apr 20 17:05:38 syzkaller kern.warn kernel: [ 112.075265][ T9541] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9541 comm=syz.3.2483 [ 112.191904][ T9561] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9561 comm=syz.4.2491 Apr 20 17:05:39 syzkaller kern.warn kernel: [ 112.191904][ T9561] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9561 comm=syz.4.2491 [ 112.325432][ T9579] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9579 comm=syz.4.2497 [ 112.363328][ T9582] audit_log_start: 1912 callbacks suppressed [ 112.363343][ T9582] audit: audit_backlog=65 > audit_backlog_limit=64 [ 112.376792][ T9582] audit: audit_lost=128 audit_rate_limit=0 audit_backlog_limit=64 [ 112.384694][ T9582] audit: backlog limit exceeded [ 112.413471][ T3309] audit: audit_backlog=65 > audit_backlog_limit=64 [ 112.420185][ T3309] audit: audit_lost=129 audit_rate_limit=0 audit_backlog_limit=64 [ 112.428771][ T3309] audit: backlog limit exceeded [ 112.469697][ T9584] audit: audit_backlog=65 > audit_backlog_limit=64 [ 112.476349][ T9584] audit: audit_lost=130 audit_rate_limit=0 audit_backlog_limit=64 [ 112.484236][ T9584] audit: backlog limit exceeded [ 112.491038][ T2986] audit: audit_backlog=65 > audit_backlog_limit=64 Apr 20 17:05:39 syzkaller kern.warn kernel: [ 112.325432][ T9579] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9579 comm=syz.4.2497 Apr 20 17:05:39 syzkaller kern.warn kernel: [ 112.363328][ T9582] audit_log_start: 1912 callbacks suppressed Apr 20 17:05:39 syzkaller kern.warn kernel: [ 112.363343][ T9582] audit: audit_backlog=65 > audit_backlog_limit=64 Apr 20 17:05:39 syzkaller kern.warn kernel: [ 112.376792][ T9582] audit: audit_lost=128 audit_rate_limit=0 audit_backlog_limit=64 Apr 20 17:05:39 syzkaller kern.err kernel: [ 112.384694][ T9582] audit: backlog[ 112.554405][ T9584] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9584 comm=syz.4.2499 limit exceeded Apr 20 17:05:39 syzkaller kern.warn kernel: [ 112.413471][ T3309] audit: audit_backlog=65 > audit_backlog_limit=64 Apr 20 17:05:39 syzkaller kern.warn kernel: [ 112.420185][ T3309] audit: audit_lost=129 audit_rate_limit=0 audit_backlog_limit=64 Apr 20 17:05:39 syzkaller kern.err kernel: [ 112.428771][ T3309] audit: backlog limit exceeded Apr 20 17:05:39 syzkaller kern.warn kernel: [ 112.469697][ T9584] audit: audit_backlog=65 > audit_backlog_limit=64 Apr 20 17:05:39 syzkaller kern.warn kernel: [ 112.476349][ T9584] audit: audit_lost=130 audit_rate_limit=0 audit_backlog_limit=64 Apr 20 17:05:39 syzkaller kern.err kernel: [ 112.484236][ T9584] audit: backlog limit exceeded Apr 20 17:05:39 syzkaller kern.warn kernel: [ 112.491038][ T2986] audit: audit_backlog=65 > audit_backlog_limit=64 Apr 20 17:05:39 syzkaller kern.warn kernel: [ 112.554405][ T9584] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9584 comm=syz.4.2499 [ 112.735678][ T9603] dummy0 speed is unknown, defaulting to 1000 Apr 20 17:05:39 syzkaller kern.warn kernel: [ 112.735678][ T9603] dummy0 speed is unknown, defaulting to 1000 [ 112.843777][ T9617] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9617 comm=syz.2.2514 Apr 20 17:05:39 syzkaller kern.warn kernel: [ 112.843777][ T9617] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9617 comm=syz.2.2514 [ 113.154638][ T9639] dummy0 speed is unknown, defaulting to 1000 Apr 20 17:05:39 syzkaller kern.w[ 113.168526][ T9641] dummy0 speed is unknown, defaulting to 1000 arn kernel: [ 113.154638][ T9639] dummy0 speed is unknown, defaulting to 1000 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.168526][ T9641] dummy0 speed is unknown, defaulting to 1000 [ 113.302092][ T9652] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9652 comm=syz.2.2529 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.302092][ T9652] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9652 comm=syz.2.2529 [ 113.400736][ T9662] SELinux: syz.2.2534 (9662) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.400736][ T9662] SELinux: syz.2.2534 (9662) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 113.503805][ T9672] dummy0 speed is unknown, defaulting to 1000 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.503805][ T9672] dummy0 speed is unknown, defaulting to 1000 [ 113.548241][ T9675] FAULT_INJECTION: forcing a failure. [ 113.548241][ T9675] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 113.561391][ T9675] CPU: 1 UID: 0 PID: 9675 Comm: syz.5.2539 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) [ 113.561418][ T9675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 113.561430][ T9675] Call Trace: [ 113.561436][ T9675] [ 113.561444][ T9675] dump_stack_lvl+0xf6/0x150 [ 113.561477][ T9675] dump_stack+0x15/0x1a [ 113.561497][ T9675] should_fail_ex+0x261/0x270 [ 113.561527][ T9675] should_fail+0xb/0x10 [ 113.561552][ T9675] should_fail_usercopy+0x1a/0x20 [ 113.561579][ T9675] _copy_to_user+0x20/0xa0 [ 113.561620][ T9675] simple_read_from_buffer+0xb2/0x130 [ 113.561654][ T9675] proc_fail_nth_read+0x103/0x140 [ 113.561687][ T9675] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 113.561774][ T9675] vfs_read+0x1b2/0x710 [ 113.561795][ T9675] ? __rcu_read_unlock+0x4e/0x70 [ 113.561870][ T9675] ? __fget_files+0x186/0x1c0 [ 113.561891][ T9675] ksys_read+0xeb/0x1b0 [ 113.561911][ T9675] __x64_sys_read+0x42/0x50 [ 113.561933][ T9675] x64_sys_call+0x2a3b/0x2e10 [ 113.561960][ T9675] do_syscall_64+0xc9/0x1a0 [ 113.562036][ T9675] ? clear_bhb_loop+0x25/0x80 [ 113.562062][ T9675] ? clear_bhb_loop+0x25/0x80 [ 113.562086][ T9675] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 113.562106][ T9675] RIP: 0033:0x7f34d625cb7c [ 113.562167][ T9675] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 113.562189][ T9675] RSP: 002b:00007f34d48c7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 113.562211][ T9675] RAX: ffffffffffffffda RBX: 00007f34d6485fa0 RCX: 00007f34d625cb7c [ 113.562222][ T9675] RDX: 000000000000000f RSI: 00007f34d48c70a0 RDI: 0000000000000004 [ 113.562232][ T9675] RBP: 00007f34d48c7090 R08: 0000000000000000 R09: 0000000000000000 [ 113.562244][ T9675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 113.562254][ T9675] R13: 0000000000000000 R14: 00007f34d6485fa0 R15: 00007ffe01a5d1b8 [ 113.562319][ T9675] Apr 20 17:05:40 syzkaller kern.notice kernel: [ 113.548241][ T9675] FAULT_INJECTION: forcing a failure. Apr 20 17:05:40 syzkaller kern.notice kernel: [ 113.548241][ T9675] name fail_usercopy, interval 1, probability 0, space 0, times 0 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.561391][ T9675] CPU: 1 UID: 0 PID: 9675 Comm: syz.5.2539 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.561418][ T9675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.561430][ T9675] Call Trace: Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.561436][ T9675] Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.561444][ T9675] dump_stack_lvl+0xf6/0x150 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.561477][ T9675] dump_stack+0x15/0x1a Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.561497][ T9675] should_fail_ex+0x261/0x270 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.561527][ T9675] should_fail+0xb/0x10 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.561552][ T9675] should_fail_usercopy+0x1a/0x20 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.561579][ T9675] _copy_to_user+0x20/0xa0 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.561620][ T9675] simple_read_from_buffer+0xb2/0x130 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.561654][ T9675] proc_fail_nth_read+0x103/0x140 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.561687][ T9675] ? __pfx_proc_fail_nth_read+0x10/0x10 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.561774][ T9675] vfs_read+0x1b2/0x710 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.561795][ T9675] ? __rcu_read_unlock+0x4e/0x70 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.561870][ T9675] ? __fget_files+0x186/0x1c0 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.561891][ T9675] ksys_read+0xeb/0x1b0 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.561911][ T9675] __x64_sys_read+0x42/0x50 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.561933][ T9675] x64_sys_call+0x2a3b/0x2e10 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.561960][ T9675] do_syscall_64+0xc9/0x1a0 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.562036][ T9675] ? clear_bhb_loop+0x25/0x80 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.562062][ T9675] ? clear_bhb_loop+0x25/0x80 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.562086][ T9675] entry_SYSCALL_64_after_hwframe+0x77/0x7f Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.562106][ T9675] RIP: 0033:0x7f34d625cb7c Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.562167][ T9675] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.562189][ T9675] RSP: 002b:00007f34d48c7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.562211][ T9675] RAX: ffffffffffffffda RBX: 00007f34d6485fa0 RCX: 00007f34d625cb7c Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.562222][ T9675] RDX: 000000000000000f RSI: 00007f34d48c70a0 RDI: 0000000000000004 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.562232][ T9675] RBP: 00007f34d48c7090 R08: 0000000000000000 R09: 0000000000000000 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.562244][ T9675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.562254][ T9675] R13: 0000000000000000 R14: 00007f34d6485fa0 R15: 00007ffe01a5d1b8 Apr 20 17:05:40 syzkaller kern.warn kernel: [ 113.562319][ T9675] [ 114.429085][ T9718] FAULT_INJECTION: forcing a failure. [ 114.429085][ T9718] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 114.442428][ T9718] CPU: 0 UID: 0 PID: 9718 Comm: syz.0.2557 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) [ 114.442462][ T9718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 114.442478][ T9718] Call Trace: [ 114.442485][ T9718] [ 114.442495][ T9718] dump_stack_lvl+0xf6/0x150 [ 114.442596][ T9718] dump_stack+0x15/0x1a [ 114.442617][ T9718] should_fail_ex+0x261/0x270 [ 114.442665][ T9718] should_fail_alloc_page+0xfd/0x110 [ 114.442695][ T9718] __alloc_frozen_pages_noprof+0x11d/0x360 [ 114.442720][ T9718] alloc_pages_mpol+0xb6/0x260 [ 114.442768][ T9718] vma_alloc_folio_noprof+0x19c/0x300 [ 114.442887][ T9718] handle_mm_fault+0xdda/0x2e80 [ 114.442914][ T9718] ? mas_walk+0x204/0x320 [ 114.442941][ T9718] ? __rcu_read_unlock+0x4e/0x70 [ 114.443010][ T9718] exc_page_fault+0x3b9/0x6a0 [ 114.443039][ T9718] asm_exc_page_fault+0x26/0x30 [ 114.443064][ T9718] RIP: 0033:0x7fc8d7170be3 [ 114.443082][ T9718] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 114.443103][ T9718] RSP: 002b:00007fc8d59164a0 EFLAGS: 00010202 [ 114.443209][ T9718] RAX: 0000000000004000 RBX: 00007fc8d5916540 RCX: 00007fc8cd4f7000 [ 114.443232][ T9718] RDX: 00007fc8d59166e0 RSI: 0000000000000003 RDI: 00007fc8d59165e0 [ 114.443247][ T9718] RBP: 00000000000000e7 R08: 0000000000000009 R09: 00000000000001a6 [ 114.443262][ T9718] R10: 00000000000001c8 R11: 00007fc8d5916540 R12: 0000000000000001 [ 114.443277][ T9718] R13: 00007fc8d734bf40 R14: 000000000000000b R15: 00007fc8d59165e0 [ 114.443299][ T9718] [ 114.443310][ T9718] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF Apr 20 17:05:41 syzkaller kern.notice kernel: [ 114.429085][ T9718] FAULT_INJECTION: forcing a failure. Apr 20 17:05:41 syzkaller kern.notice kernel: [ 114.429085][ T9718] name fail_page_alloc, interval 1, probability 0, space 0, times 0 Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.442428][ T9718] CPU: 0 UID: 0 PID: 9718 Comm: syz.0.2557 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.442462][ T9718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.442478][ T9718] Call Trace: Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.442485][ T9718] Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.442495][ T9718] dump_stack_lvl+0xf6/0x150 Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.442596][ T9718] dump_stack+0x15/0x1a Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.442617][ T9718] should_fail_ex+0x261/0x270 Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.442665][ T9718] should_fail_alloc_page+0xfd/0x110 Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.442695][ T9718] __alloc_frozen_pages_noprof+0x11d/0x360 Apr 20 17:05:41 syzkaller kern.warn kernel: [ [ 114.726499][ T9730] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 114.442720][ T9[ 114.735909][ T9730] netdevsim netdevsim2: Direct firmware load for . failed with error -22 718] alloc_pages_mpol+0xb6/0x260 Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.442768][ T9718] vma_alloc_folio_noprof+0x19c/0x300 Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.442887][ T9718] handle_mm_fault+0xdda/0x2e80 Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.442914][ T9718] ? mas_walk+0x204/0x320 Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.442941][ T9718] ? __rcu_read_unlock+0x4e/0x70 Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.443010][ T9718] exc_page_fault+0x3b9/0x6a0 Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.443039][ T9718] asm_exc_page_fault+0x26/0x30 Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.443064][ T9718] RIP: 0033:0x7fc8d7170be3 Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.443082][ T9718] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.443103][ T9718] RSP: 002b:00007fc8d59164a0 EFLAGS: 00010202 Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.443209][ T9718] RAX: 0000000000004000 RBX: 00007fc8d5916540 RCX: 00007fc8cd4f7000 Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.443232][ T9718] RDX: 00007fc8d59166e0 RSI: 0000000000000003 RDI: 00007fc8d59165e0 Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.443247][ T9718] RBP: 00000000000000e7 R08: 0000000000000009 R09: 00000000000001a6 Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.443262][ T9718] R10: 00000000000001c8 R11: 00007fc8d5916540 R12: 0000000000000001 Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.443277][ T9718] R13: 00007fc8d734bf40 R14: 000000000000000b R1[ 114.897247][ T9742] dummy0 speed is unknown, defaulting to 1000 5: 00007fc8d59165e0 Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.443299][ T9718] Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.443310][ T9718] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.726499][ T9730] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.735909][ T9730] netdevsim netdevsim2: Direct firmware load for . failed with error -22 Apr 20 17:05:41 syzkaller kern.warn kernel: [ 114.897247][ T9742] dummy0 speed is unknown, defaulting to 1000 [ 115.178709][ T9776] dummy0 speed is unknown, defaulting to 1000 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.178709][ T9776] dummy0 speed is unknown, defaulting to 1000 [ 115.356148][ T9807] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 115.356148][ T9807] The task syz.5.2591 (9807) triggered the difference, watch for misbehavior. Apr 20 17:05:42 syzkaller kern.info kernel: [ 1[ 115.379251][ T9810] FAULT_INJECTION: forcing a failure. [ 115.379251][ T9810] name failslab, interval 1, probability 0, space 0, times 0 15.356148][ T9807] semctl(GETNCN[ 115.392161][ T9810] CPU: 1 UID: 0 PID: 9810 Comm: syz.2.2599 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) [ 115.392232][ T9810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 115.392248][ T9810] Call Trace: [ 115.392254][ T9810] [ 115.392263][ T9810] dump_stack_lvl+0xf6/0x150 [ 115.392292][ T9810] dump_stack+0x15/0x1a [ 115.392312][ T9810] should_fail_ex+0x261/0x270 [ 115.392378][ T9810] should_failslab+0x8f/0xb0 [ 115.392405][ T9810] __kvmalloc_node_noprof+0x12c/0x520 [ 115.392476][ T9810] ? seq_read_iter+0x143/0x970 [ 115.392560][ T9810] seq_read_iter+0x143/0x970 [ 115.392624][ T9810] ? alloc_pages_bulk_noprof+0x414/0x580 [ 115.392659][ T9810] proc_reg_read_iter+0x118/0x190 [ 115.392687][ T9810] copy_splice_read+0x390/0x5d0 [ 115.392728][ T9810] ? __pfx_copy_splice_read+0x10/0x10 [ 115.392829][ T9810] splice_direct_to_actor+0x26c/0x680 [ 115.392863][ T9810] ? __pfx_direct_splice_actor+0x10/0x10 [ 115.392902][ T9810] do_splice_direct+0xd9/0x150 [ 115.392929][ T9810] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 115.393045][ T9810] do_sendfile+0x40a/0x690 [ 115.393080][ T9810] __x64_sys_sendfile64+0x113/0x160 [ 115.393110][ T9810] x64_sys_call+0xfc3/0x2e10 [ 115.393241][ T9810] do_syscall_64+0xc9/0x1a0 [ 115.393265][ T9810] ? clear_bhb_loop+0x25/0x80 [ 115.393285][ T9810] ? clear_bhb_loop+0x25/0x80 [ 115.393309][ T9810] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.393334][ T9810] RIP: 0033:0x7f1c633ae169 [ 115.393359][ T9810] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 115.393442][ T9810] RSP: 002b:00007f1c61a17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 115.393460][ T9810] RAX: ffffffffffffffda RBX: 00007f1c635d5fa0 RCX: 00007f1c633ae169 [ 115.393474][ T9810] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 115.393486][ T9810] RBP: 00007f1c61a17090 R08: 0000000000000000 R09: 0000000000000000 [ 115.393500][ T9810] R10: 00000000003fffff R11: 0000000000000246 R12: 0000000000000001 [ 115.393513][ T9810] R13: 0000000000000000 R14: 00007f1c635d5fa0 R15: 00007fff8c739938 [ 115.393534][ T9810] T/GETZCNT) is since 3.16 Single Unix Specification compliant. Apr 20 17:05:42 syzkaller kern.info kernel: [ 115.356148][ T9807] The task syz.5.2591 (9807) triggered the difference, watch for misbehavior. Apr 20 17:05:42 syzkaller kern.notice kernel: [ 115.379251][ T9810] FAULT_INJECTION: forcing a failure. Apr 20 17:05:42 syzkaller kern.notice kernel: [ 115.379251][ T9810] name failslab, interval 1, probability 0, space 0, times 0 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.392161][ T9810] CPU: 1 UID: 0 PID: 9810 Comm: syz.2.2599 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.392232][ T9810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.392248][ T9810] Call Trace: Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.392254][ T9810] Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.392263][ T9810] dump_stack_lvl+0xf6/0x150 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.392292][ T9810] [ 115.718409][ T9826] dummy0 speed is unknown, defaulting to 1000 dump_stack+0x15/0x1a Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.392312][ T9810] should_fail_ex+0x261/0x270 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.392378][ T9810] should_failslab+0x8f/0xb0 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.392405][ T9810] __kvmalloc_node_noprof+0x12c/0x520 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.392476][ T9810] ? seq_read_iter+0x143/0x970 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.392560][ T9810] seq_read_iter[ 115.767502][ T9837] FAULT_INJECTION: forcing a failure. [ 115.767502][ T9837] name failslab, interval 1, probability 0, space 0, times 0 +0x143/0x970 Ap[ 115.780652][ T9830] Falling back ldisc for ttyS3. r 20 17:05:42 sy[ 115.780652][ T9837] CPU: 1 UID: 0 PID: 9837 Comm: syz.2.2609 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) zkaller kern.war[ 115.780685][ T9837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 n kernel: [ 115[ 115.780699][ T9837] Call Trace: [ 115.780708][ T9837] .392624][ T9810][ 115.780742][ T9837] dump_stack_lvl+0xf6/0x150 ? alloc_pages_[ 115.780773][ T9837] dump_stack+0x15/0x1a bulk_noprof+0x41[ 115.780795][ T9837] should_fail_ex+0x261/0x270 4/0x580 Apr 20 [ 115.780887][ T9837] should_failslab+0x8f/0xb0 [ 115.780915][ T9837] __kmalloc_node_track_caller_noprof+0xaa/0x410 17:05:42 syzkall[ 115.780955][ T9837] ? sidtab_sid2str_get+0xb8/0x140 er kern.warn ker[ 115.780981][ T9837] ? vsnprintf+0x84d/0x8a0 nel: [ 115.3926[ 115.781024][ T9837] kmemdup_noprof+0x2b/0x70 59][ T9810] pro[ 115.781087][ T9837] sidtab_sid2str_get+0xb8/0x140 [ 115.781126][ T9837] security_sid_to_context_core+0x1eb/0x2f0 c_reg_read_iter+[ 115.781172][ T9837] security_sid_to_context+0x27/0x30 0x118/0x190 Apr[ 115.781214][ T9837] selinux_lsmprop_to_secctx+0x6c/0xf0 [ 115.781241][ T9837] security_lsmprop_to_secctx+0x40/0x80 20 17:05:42 syz[ 115.781400][ T9837] audit_log_task_context+0x7a/0x180 kaller kern.warn[ 115.781442][ T9837] audit_log_task+0xfb/0x250 kernel: [ 115.[ 115.781475][ T9837] audit_seccomp+0x62/0x100 392687][ T9810] [ 115.781508][ T9837] __seccomp_filter+0x694/0x10e0 copy_splice_rea[ 115.781534][ T9837] ? vfs_write+0x669/0x950 d+0x390/0x5d0 A[ 115.781595][ T9837] ? up_write+0x35/0xf0 pr 20 17:05:42 s[ 115.781618][ T9837] ? putname+0xe1/0x100 yzkaller kern.wa[ 115.781652][ T9837] __secure_computing+0x7e/0x150 rn kernel: [ 11[ 115.781676][ T9837] syscall_trace_enter+0xcf/0x1f0 [ 115.781704][ T9837] ? fpregs_assert_state_consistent+0x83/0xa0 5.392728][ T9810[ 115.781756][ T9837] do_syscall_64+0xaa/0x1a0 ] ? __pfx_copy_[ 115.781839][ T9837] ? clear_bhb_loop+0x25/0x80 [ 115.781866][ T9837] ? clear_bhb_loop+0x25/0x80 splice_read+0x10[ 115.781894][ T9837] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.781922][ T9837] RIP: 0033:0x7f1c633acb7c /0x10 Apr 20 17[ 115.781943][ T9837] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 :05:42 syzkaller[ 115.782039][ T9837] RSP: 002b:00007f1c61a17030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 kern.warn kerne[ 115.782062][ T9837] RAX: ffffffffffffffda RBX: 00007f1c635d5fa0 RCX: 00007f1c633acb7c l: [ 115.392829[ 115.782078][ T9837] RDX: 000000000000000f RSI: 00007f1c61a170a0 RDI: 0000000000000003 ][ T9810] splic[ 115.782173][ T9837] RBP: 00007f1c61a17090 R08: 0000000000000000 R09: 0000000000000000 e_direct_to_acto[ 115.782187][ T9837] R10: 0000200000ffa000 R11: 0000000000000246 R12: 0000000000000001 r+0x26c/0x680 A[ 115.782202][ T9837] R13: 0000000000000000 R14: 00007f1c635d5fa0 R15: 00007fff8c739938 pr 20 17:05:42 s[ 115.782224][ T9837] yzkaller kern.warn kernel: [ 115.392863][ T9810] ? __pfx_direct_splice_actor+0x10/0x10 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.392902][ T9810] do_splice_direct+0xd9/0x150 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.392929][ T9810] ? __pfx_direct_file_splice_eof+0x10/0x10 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.393045][ T9810] do_sendfile+0x40a/0x690 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.393080][ T9810] __x64_sys_sendfile64+0x113/0x160 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.393110][ T9810] x64_sys_call+0xfc3/0x2e10 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.393241][ T9810] do_syscall_64+0xc9/0x1a0 Apr 20 17:05:42 syzkaller kern.warn ker[ 116.132394][ T9855] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9855 comm=syz.2.2615 nel: [ 115.393265][ T9810] ? clear_bhb_loop+0x25/0x80 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.393285][ T9810] ? clear_bhb_loop+0x25/0x80 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.393309][ T9810] ent[ 116.164833][ T10] usb 7-1: enqueue for inactive port 0 ry_SYSCALL_64_af[ 116.170900][ T10] usb 7-1: enqueue for inactive port 0 ter_hwframe+0x77/0x7f Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.393334][ T9810] RIP: 0033:0x7f1c633ae169 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.393359][ T9810] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.393442][ T9810] RSP: 002b:00007f1c61a17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 Apr 2[ 116.223223][ T9868] FAULT_INJECTION: forcing a failure. [ 116.223223][ T9868] name failslab, interval 1, probability 0, space 0, times 0 0 17:05:42 syzkaller kern.warn kernel: [ 115.393460][ T9810] RAX: ffffffffffffffda RBX: 00007f1[ 116.237169][ T9868] CPU: 1 UID: 0 PID: 9868 Comm: syz.2.2622 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) [ 116.237199][ T9868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 116.237214][ T9868] Call Trace: c635d5fa0 RCX: 0[ 116.237221][ T9868] [ 116.237229][ T9868] dump_stack_lvl+0xf6/0x150 0007f1c633ae169[ 116.237301][ T9868] dump_stack+0x15/0x1a Apr 20 17:05:42[ 116.237319][ T9868] should_fail_ex+0x261/0x270 syzkaller kern.[ 116.237391][ T9868] should_failslab+0x8f/0xb0 warn kernel: [ [ 116.237492][ T9868] __kmalloc_node_track_caller_noprof+0xaa/0x410 115.393474][ T98[ 116.237532][ T9868] ? sidtab_sid2str_get+0xb8/0x140 10] RDX: 0000000[ 116.237552][ T9868] ? vsnprintf+0x84d/0x8a0 000000000 RSI: 0[ 116.237669][ T9868] kmemdup_noprof+0x2b/0x70 000000000000003 [ 116.237706][ T9868] sidtab_sid2str_get+0xb8/0x140 RDI: 00000000000[ 116.237734][ T9868] security_sid_to_context_core+0x1eb/0x2f0 00004 Apr 20 17[ 116.237772][ T9868] security_sid_to_context+0x27/0x30 :05:42 syzkaller[ 116.237813][ T9868] selinux_lsmprop_to_secctx+0x6c/0xf0 kern.warn kerne[ 116.237840][ T9868] security_lsmprop_to_secctx+0x40/0x80 l: [ 115.393486[ 116.237938][ T9868] audit_log_task_context+0x7a/0x180 ][ T9810] RBP: 0[ 116.237977][ T9868] audit_log_task+0xfb/0x250 0007f1c61a17090 [ 116.238008][ T9868] audit_seccomp+0x62/0x100 R08: 00000000000[ 116.238032][ T9868] __seccomp_filter+0x694/0x10e0 00000 R09: 00000[ 116.238136][ T9868] ? vfs_write+0x669/0x950 00000000000 Apr[ 116.238234][ T9868] ? up_write+0x35/0xf0 20 17:05:42 syz[ 116.238261][ T9868] ? putname+0xe1/0x100 kaller kern.warn[ 116.238285][ T9868] __secure_computing+0x7e/0x150 kernel: [ 115.[ 116.238384][ T9868] syscall_trace_enter+0xcf/0x1f0 393500][ T9810] [ 116.238405][ T9868] ? fpregs_assert_state_consistent+0x83/0xa0 R10: 00000000003[ 116.238434][ T9868] do_syscall_64+0xaa/0x1a0 fffff R11: 00000[ 116.238459][ T9868] ? clear_bhb_loop+0x25/0x80 00000000246 R12:[ 116.238484][ T9868] ? clear_bhb_loop+0x25/0x80 000000000000000[ 116.238588][ T9868] entry_SYSCALL_64_after_hwframe+0x77/0x7f 1 Apr 20 17:05:[ 116.238608][ T9868] RIP: 0033:0x7f1c633acb7c 42 syzkaller ker[ 116.238646][ T9868] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 n.warn kernel: [[ 116.238663][ T9868] RSP: 002b:00007f1c61a17030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 115.393513][ T[ 116.238681][ T9868] RAX: ffffffffffffffda RBX: 00007f1c635d5fa0 RCX: 00007f1c633acb7c 9810] R13: 00000[ 116.238692][ T9868] RDX: 000000000000000f RSI: 00007f1c61a170a0 RDI: 0000000000000003 00000000000 R14:[ 116.238705][ T9868] RBP: 00007f1c61a17090 R08: 0000000000000000 R09: 0000000000000000 00007f1c635d5fa[ 116.238719][ T9868] R10: 0000200000ffa000 R11: 0000000000000246 R12: 0000000000000001 0 R15: 00007fff8[ 116.238750][ T9868] R13: 0000000000000000 R14: 00007f1c635d5fa0 R15: 00007fff8c739938 c739938 Apr 20 [ 116.238771][ T9868] 17:05:42 syzkall[ 116.251424][ T10] vhci_hcd: vhci_device speed not set er kern.warn ker[ 116.286329][ T9872] FAULT_INJECTION: forcing a failure. [ 116.286329][ T9872] name fail_usercopy, interval 1, probability 0, space 0, times 0 nel: [ 115.3935[ 116.555250][ T9872] CPU: 1 UID: 0 PID: 9872 Comm: syz.2.2624 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) 34][ T9810] Apr 20 17:05:42 syzkaller [ 116.555326][ T9872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 kern.warn kernel[ 116.555341][ T9872] Call Trace: : [ 115.718409][ T9826] dummy0 speed is unknown, defaulting to 1000 Apr 20 17:05:42 syzkaller kern.notice kernel: [ 115.76750[ 116.555349][ T9872] 2][ T9837] FAULT[ 116.555357][ T9872] dump_stack_lvl+0xf6/0x150 _INJECTION: forc[ 116.555382][ T9872] dump_stack+0x15/0x1a ing a failure. [ 116.555399][ T9872] should_fail_ex+0x261/0x270 Apr 20 17:05:42 [ 116.555495][ T9872] should_fail+0xb/0x10 syzkaller kern.n[ 116.555520][ T9872] should_fail_usercopy+0x1a/0x20 [ 116.555552][ T9872] _copy_from_user+0x1c/0xa0 otice kernel: [ [ 116.555620][ T9872] copy_msghdr_from_user+0x54/0x2b0 [ 116.555660][ T9872] ? __fget_files+0x186/0x1c0 115.767502][ T9[ 116.555752][ T9872] __sys_sendmsg+0x141/0x240 [ 116.555798][ T9872] __x64_sys_sendmsg+0x46/0x50 837] name failsl[ 116.555827][ T9872] x64_sys_call+0x26f3/0x2e10 ab, interval 1, [ 116.555900][ T9872] do_syscall_64+0xc9/0x1a0 probability 0, s[ 116.555932][ T9872] ? clear_bhb_loop+0x25/0x80 pace 0, times 0[ 116.555959][ T9872] ? clear_bhb_loop+0x25/0x80 [ 116.556012][ T9872] entry_SYSCALL_64_after_hwframe+0x77/0x7f Apr 20 17:05:42[ 116.556039][ T9872] RIP: 0033:0x7f1c633ae169 syzkaller kern.[ 116.556058][ T9872] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 warn kernel: [ [ 116.556079][ T9872] RSP: 002b:00007f1c61a17038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 115.780652][ T98[ 116.556102][ T9872] RAX: ffffffffffffffda RBX: 00007f1c635d5fa0 RCX: 00007f1c633ae169 30] Falling back[ 116.556117][ T9872] RDX: 0000000000000000 RSI: 00002000000003c0 RDI: 0000000000000004 [ 116.556132][ T9872] RBP: 00007f1c61a17090 R08: 0000000000000000 R09: 0000000000000000 ldisc for ttyS3[ 116.556155][ T9872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 . Apr 20 17:05:[ 116.556170][ T9872] R13: 0000000000000000 R14: 00007f1c635d5fa0 R15: 00007fff8c739938 42 syzkaller ker[ 116.556192][ T9872] n.warn kernel: [[ 116.597649][ T9880] SELinux: syz.0.2627 (9880) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. 115.780652][ T[ 116.610199][ T9882] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9882 comm=syz.3.2628 9837] CPU: 1 UID: 0 PID: 9837 Comm: syz.2.2609 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.780685][ T9837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.780699][ T9837] Call Trace: Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.780708][ T9837] Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.780742][ T9837] dump_stack_lvl+0xf6/0x150 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.780773][ T9837] dump_stack+0x15/0x1a Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.780795][ T9837] should_fail_ex+0x261/0x270 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.780887][ T9837] should_failslab+0x8f/0xb0 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.780915][ T9837] __kmalloc_node_track_caller_noprof+0xaa/0x410 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.780955][ T9837] ? sidtab_sid2str_get+0xb8/0x140 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.780981][ T9837] ? vsnprintf+0x84d/0x8a0 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.781024][ T9837] kmemdup_noprof+0x2b/0x70 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.781087][ T9837] sidtab_sid2str_get+0xb8/0x140 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.781126][ T9837] security_sid_to_context_Apr 20 17:05:42 Apr 20 17:05:42 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.781652][ T9837] __secure_computing+0x7e/0x150 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.781676][ T9837] syscall_trace_enter+0xcf/0x1f0 Apr 20 17:05:42 syzkaller[ 116.948540][ T9895] dummy0 speed is unknown, defaulting to 1000 kern.warn kernel: [ 115.781704][ T9837] ? fpregs_assert_state_consistent+0x83/0xa0 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 115.781756][ T9837] do_syscall_64+0xaa/0xApr 20 17:05:42 Apr 20 17:05:42 Apr 20 17:05:42 syzkaller kern.warn kernel: [ 116.132394][ T9855] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9855 comm=syz.2.2615 Apr 20 17:05:43 syzkaller kern.err kernel: [ 116.164833][ T10] usb 7-1: enqueue for inactive port 0 Apr 20 17:05:43 syzkaller kern.err kernel: [ 116.170900][ T10] usb 7-1: enqueue for inactive port 0 Apr 20 17:05:43 syzkaller kern.notice kernel: [ 116.223223][ T9868] FAULT_INJECTION: forcing a failure. Apr 20 17:05:43 syzkaller kern.notice kernel: [ 116.223223][ T9868] name failslab, interval 1, probability 0, space 0, times 0 Apr 20 17:05:43 syzkaller kern.warn kernel: [ 116.237169][ T9868] CPU: 1 UID: 0 PID: 9868 Comm: syz.2.2622 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) Apr 20 17:05:43 syzkaller kern.warn kernel: [ 116.237199][ T9868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 20 17:05:43 syzkaller kern.warn kernel: [ 116.237214][ T9868] Call Trace: Apr 20 17:05:43 syzkaller kern.warn kernel: [ 116.237221][ T9868] Apr 20 17:05:43 syzkaller kern.warn kernel: [ 116.237229][ T9868] dump_stack_lvl+0xf6/0x150 Apr 20 17:05:43 syzkaller kern.warn kernel: [ 116.237301][ T9868] dump_stack+0x15/0x1a Apr 20 17:05:43 syzkaller kern.warn kernel: [ 116.237319][ T9868] should_fail_ex+0x261/0x270 Apr 20 17:05:43 syzkaller kern.warn kernel: [ 116.237391][ T9868] should_failslab+0x8f/0xb0 Apr 20 17:05:43 syzkaller kern.warn kernel: [ 116.237492][ T9868] __kmalloc_node_track_caller_noprof+0xaa/0x410 Apr 20 17:05:43[ 117.115947][ T9910] FAULT_INJECTION: forcing a failure. [ 117.115947][ T9910] name failslab, interval 1, probability 0, space 0, times 0 syzkaller kern.warn kernel: [ 116.237532][ T9868] ? sidtab_si[ 117.129808][ T9910] CPU: 1 UID: 0 PID: 9910 Comm: syz.2.2639 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) [ 117.129842][ T9910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 117.129858][ T9910] Call Trace: [ 117.129866][ T9910] [ 117.129876][ T9910] dump_stack_lvl+0xf6/0x150 [ 117.129904][ T9910] dump_stack+0x15/0x1a [ 117.129923][ T9910] should_fail_ex+0x261/0x270 [ 117.130006][ T9910] should_failslab+0x8f/0xb0 [ 117.130034][ T9910] __kmalloc_noprof+0xad/0x410 [ 117.130095][ T9910] ? copy_splice_read+0xb8/0x5d0 [ 117.130133][ T9910] copy_splice_read+0xb8/0x5d0 [ 117.130225][ T9910] ? __pfx_splice_write_null+0x10/0x10 [ 117.130257][ T9910] ? __pfx_copy_splice_read+0x10/0x10 [ 117.130313][ T9910] splice_direct_to_actor+0x26c/0x680 [ 117.130364][ T9910] ? __pfx_direct_splice_actor+0x10/0x10 [ 117.130407][ T9910] do_splice_direct+0xd9/0x150 [ 117.130442][ T9910] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 117.130481][ T9910] do_sendfile+0x40a/0x690 [ 117.130516][ T9910] __x64_sys_sendfile64+0x113/0x160 [ 117.130554][ T9910] x64_sys_call+0xfc3/0x2e10 [ 117.130575][ T9910] do_syscall_64+0xc9/0x1a0 [ 117.130618][ T9910] ? clear_bhb_loop+0x25/0x80 [ 117.130640][ T9910] ? clear_bhb_loop+0x25/0x80 [ 117.130660][ T9910] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 117.130679][ T9910] RIP: 0033:0x7f1c633ae169 [ 117.130697][ T9910] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 117.130756][ T9910] RSP: 002b:00007f1c61a17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 117.130779][ T9910] RAX: ffffffffffffffda RBX: 00007f1c635d5fa0 RCX: 00007f1c633ae169 [ 117.130793][ T9910] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 117.130804][ T9910] RBP: 00007f1c61a17090 R08: 0000000000000000 R09: 0000000000000000 [ 117.130814][ T9910] R10: 000000040000f63c R11: 0000000000000246 R12: 0000000000000002 [ 117.130825][ T9910] R13: 0000000000000000 R14: 00007f1c635d5fa0 R15: 00007fff8c739938 [ 117.130842][ T9910] d2str_get+0xb8/0x140 Apr 20 17:05:43 syzkaller kern.warn kernel: [ 116.237552][ T9868] ? vsnprintf+0x84d/0x8a0 Apr 20 17:05:43 syzkaller kern.warn kernel: [ 116.237669][ T9868] kmemdup_noprof+0x2b/0x70 Apr 20 17:05:43 syzkaller kern.warn kernel: [ 116.237706][ T9868] sidtab_sid2str_get+0xb8/0x140 Apr 20 17:05:43 syzkaller kern.warn kernel: [ 116.237734][ T9868] security_sid_to_context_core+0x1eb/0x2f0[ 117.374882][ T29] kauditd_printk_skb: 2050 callbacks suppressed Apr 20 17:05:4[ 117.374904][ T29] audit: type=1400 audit(1745168744.203:31002): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 3 syzkaller kern.warn kernel: [ 116.237772][ T9868] security_sid_to_context+0x27/0x30 Apr 20 17:05:43 syzkaller kern.warn ker[ 117.415514][ T29] audit: type=1400 audit(1745168744.203:31003): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 nel: [ 116.2378[ 117.439670][ T29] audit: type=1400 audit(1745168744.203:31004): avc: denied { read write } for pid=3300 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Apr 20 17:05:43 [ 117.439699][ T29] audit: type=1400 audit(1745168744.233:31005): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Apr 20 17:05:43 [ 117.439774][ T29] audit: type=1400 audit(1745168744.233:31006): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Apr 20 17:05:43 [ 117.511997][ T29] audit: type=1400 audit(1745168744.233:31007): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Apr 20 17:05:43 [ 117.512022][ T29] audit: type=1400 audit(1745168744.233:31008): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Apr 20 17:05:43 [ 117.559051][ T29] audit: type=1400 audit(1745168744.233:31009): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Apr 20 17:05:43 Apr 20 17:05:43 Apr 20 17:05:43 syzkaller kern.w[ 117.587211][ T29] audit: type=1400 audit(1745168744.243:31010): avc: denied { map_create } for pid=9913 comm="syz.2.2641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 arn kernel: [ 1[ 117.607928][ T29] audit: type=1400 audit(1745168744.243:31011): avc: denied { prog_load } for pid=9913 comm="syz.2.2641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 16.948540][ T9895] dummy0 speed is unknown, defaulting to 1000 Apr 20 17:05:44 syzkaller kern.notice kernel: [ 117.115947][ T9910] FAULT_INJECTION: forcing a failure. Apr 20 17:05:44 syzkaller kern.notice kernel: [ 117.115947][ T9910] name failslab, interval 1, probability 0, space 0, times 0 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.129808][ T9910] CPU: 1 UID: 0 PID: 9910 Comm: syz.2.2639 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.129842][ T9910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.129858][ T9910] Call Trace: Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.129866][ T9910] Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.129876][ T9910] dump_stack_lvl+0xf6/0x150 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.129904][ T9910] dump_stack+0x15/0x1a Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.129923][ T9910] should_fail_ex+0x261/0x270 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130006][ T9910] should_failslab+0x8f/0xb0 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130034][ T9910] __kmalloc_noprof+0xad/0x410 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130095][ T9910] ? copy_splice_read+0xb8/0x5d0 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130133][ T9910] copy_splice_read+0xb8/0x5d0 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130225][ T9910] ? __pfx_splice_write_null+0x10/0x10 Apr 20 17:05:44 syzkaller ke[ 117.766552][ T9938] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9938 comm=syz.4.2652 rn.warn kernel: [ 117.130257][ T9910] ? __pfx_copy_splice_read+0x10/0x10 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130313][ T9910] splice_direct_to_actor+0x26c/0x680 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130364][ T9910] ? __pfx_direct_splice_actor+0x10/0x10 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130407][ T9910] do_splice_direct+0xd9/0x150 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130442][ T9910] ? __pfx_direct_file_splice_eof+0x10/0x10 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130481][ T9910] do_sendfile+0x40a/0x690 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130516][ T9910] __x64_sys_sendfile64+0x113/0x160 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130554][ T9910] x64_sys_call+0xfc3/0x2e10 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130575][ T9910] do_syscall_64+0xc9/0x1a0 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130618][ T9910] ? clear_bhb_loop+0x25/0x80 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130640][ T9910] ? clear_bhb_loop+0x25/0x80 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130660][ T9910] entry_SYSCALL_64_after_hwframe+0x77/0x7f Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130679][ T9910] RIP: 0033:0x7f1c633ae169 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130697][ T9910] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130756][ T9910] RSP: 002b:00007f1c61a17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130779][ T9910] RAX: ffffffffffffffda RBX: 00007f1c635d5fa0 RCX: 00007f1c633ae169 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130793][ T9910] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130804][ T9910] RBP: 00007f1c61a17090 R08: 0000000000000000 R09: 0000000000000000 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130814][ T9910] R10: 000000040000f63c R11: 0000000000000246 R12: 0000000000000002 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130825][ T9910] R13: 0000000000000000 R14: 00007f1c635d5fa0 R15: 00007fff8c739938 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.130842][ T9910] Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.374882][ T29] kauditd_printk_skb: 2050 callbacks suppressed Apr 20 17:05:44 syzkaller kern.notice kernel: [ 117.374904][ T29] audit: type=1400 audit(1745168744.203:31002): Apr 20 17:05:44 Apr 20 17:05:44 syzkaller kern.warn kernel: [ 117.766552][ T9938] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9938 comm=syz.4.2652 [ 118.192092][ T9975] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' Apr 20 17:05:45 syzkaller kern.info kernel: [ 118.192092][ T9975] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 118.631005][T10023] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2687'. [ 118.641064][T10024] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10024 comm=syz.0.2690 Apr 20 17:05:45 [ 118.654598][T10017] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2687'. syzkaller kern.warn kernel: [ 1[ 118.667053][T10023] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2687'. 18.631005][T10023] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2687'. Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.641064][T10024] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10024 comm=syz.0.2690 Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.654598][T10017] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2687'. Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.667053][T10023] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2687'. [ 118.857229][T10050] FAULT_INJECTION: forcing a failure. [ 118.857229][T10050] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 118.871184][T10050] CPU: 1 UID: 0 PID: 10050 Comm: syz.2.2702 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) [ 118.871218][T10050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 118.871259][T10050] Call Trace: [ 118.871265][T10050] [ 118.871274][T10050] dump_stack_lvl+0xf6/0x150 [ 118.871297][T10050] dump_stack+0x15/0x1a [ 118.871411][T10050] should_fail_ex+0x261/0x270 [ 118.871440][T10050] should_fail+0xb/0x10 [ 118.871459][T10050] should_fail_usercopy+0x1a/0x20 [ 118.871483][T10050] _copy_to_user+0x20/0xa0 [ 118.871536][T10050] simple_read_from_buffer+0xb2/0x130 [ 118.871578][T10050] proc_fail_nth_read+0x103/0x140 [ 118.871620][T10050] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 118.871794][T10050] vfs_read+0x1b2/0x710 [ 118.871811][T10050] ? __rcu_read_unlock+0x4e/0x70 [ 118.871837][T10050] ? __fget_files+0x186/0x1c0 [ 118.871865][T10050] ksys_read+0xeb/0x1b0 [ 118.871888][T10050] __x64_sys_read+0x42/0x50 [ 118.871968][T10050] x64_sys_call+0x2a3b/0x2e10 [ 118.871995][T10050] do_syscall_64+0xc9/0x1a0 [ 118.872084][T10050] ? clear_bhb_loop+0x25/0x80 [ 118.872111][T10050] ? clear_bhb_loop+0x25/0x80 [ 118.872136][T10050] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 118.872182][T10050] RIP: 0033:0x7f1c633acb7c [ 118.872249][T10050] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 118.872271][T10050] RSP: 002b:00007f1c61a17030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 118.872310][T10050] RAX: ffffffffffffffda RBX: 00007f1c635d5fa0 RCX: 00007f1c633acb7c [ 118.872325][T10050] RDX: 000000000000000f RSI: 00007f1c61a170a0 RDI: 0000000000000004 [ 118.872336][T10050] RBP: 00007f1c61a17090 R08: 0000000000000000 R09: 0000000000000000 [ 118.872347][T10050] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 118.872391][T10050] R13: 0000000000000000 R14: 00007f1c635d5fa0 R15: 00007fff8c739938 [ 118.872412][T10050] Apr 20 17:05:45 syzkaller kern.notice kernel: [ 118.857229][T10050] FAULT_INJECTION: forcing a failure. Apr 20 17:05:45 syzkaller kern.notice kernel: [ 118.857229][T10050] name fail_usercopy, interval 1, probability 0, space 0, times 0 Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.871184][T10050] CPU: 1 UID: 0 PID: 10050 Comm: syz.2.2702 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.871218][T10050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.87125[ 119.127685][T10058] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10058 comm=syz.2.2707 9][T10050] Call Trace: Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.871265][T10050] Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.871274][T10050] dump_stack_lvl+0xf6/0x150 Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.871297][T10050] dump_stack+0x15/0x1a Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.871411][T10050] should_fail_ex+0x261/0x270 Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.871440][T10050] should_fail+0xb[ 119.183632][T10070] FAULT_INJECTION: forcing a failure. [ 119.183632][T10070] name failslab, interval 1, probability 0, space 0, times 0 /0x10 Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.871459][T10050] should_fail_usercopy+[ 119.196789][T10070] CPU: 0 UID: 0 PID: 10070 Comm: syz.5.2712 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) 0x1a/0x20 Apr 2[ 119.196824][T10070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 0 17:05:45 syzka[ 119.196904][T10070] Call Trace: ller kern.warn k[ 119.196911][T10070] ernel: [ 118.87[ 119.196920][T10070] dump_stack_lvl+0xf6/0x150 1483][T10050] _[ 119.196948][T10070] dump_stack+0x15/0x1a copy_to_user+0x2[ 119.196964][T10070] should_fail_ex+0x261/0x270 0/0xa0 Apr 20 1[ 119.196993][T10070] should_failslab+0x8f/0xb0 7:05:45 syzkalle[ 119.197028][T10070] __kmalloc_node_track_caller_noprof+0xaa/0x410 [ 119.197149][T10070] ? sidtab_sid2str_get+0xb8/0x140 [ 119.197173][T10070] ? vsnprintf+0x84d/0x8a0 r kern.warn kern[ 119.197285][T10070] kmemdup_noprof+0x2b/0x70 [ 119.197323][T10070] sidtab_sid2str_get+0xb8/0x140 el: [ 118.87153[ 119.197348][T10070] security_sid_to_context_core+0x1eb/0x2f0 [ 119.197413][T10070] security_sid_to_context+0x27/0x30 [ 119.197485][T10070] selinux_lsmprop_to_secctx+0x6c/0xf0 6][T10050] simp[ 119.197505][T10070] security_lsmprop_to_secctx+0x40/0x80 le_read_from_buf[ 119.197598][T10070] audit_log_task_context+0x7a/0x180 fer+0xb2/0x130 [ 119.197635][T10070] audit_log_task+0xfb/0x250 Apr 20 17:05:45 [ 119.197657][T10070] ? kstrtouint+0x7b/0xc0 syzkaller kern.w[ 119.197746][T10070] audit_seccomp+0x62/0x100 arn kernel: [ 1[ 119.197794][T10070] __seccomp_filter+0x694/0x10e0 18.871578][T1005[ 119.197820][T10070] ? vfs_write+0x669/0x950 0] proc_fail_nt[ 119.197842][T10070] ? putname+0xe1/0x100 h_read+0x103/0x1[ 119.197873][T10070] __secure_computing+0x7e/0x150 40 Apr 20 17:05[ 119.197895][T10070] syscall_trace_enter+0xcf/0x1f0 :45 syzkaller ke[ 119.197993][T10070] ? fpregs_assert_state_consistent+0x83/0xa0 rn.warn kernel: [ 119.198031][T10070] do_syscall_64+0xaa/0x1a0 [ 118.871620][T[ 119.198097][T10070] ? clear_bhb_loop+0x25/0x80 10050] ? __pfx_[ 119.198123][T10070] ? clear_bhb_loop+0x25/0x80 proc_fail_nth_re[ 119.198151][T10070] entry_SYSCALL_64_after_hwframe+0x77/0x7f ad+0x10/0x10 Ap[ 119.198178][T10070] RIP: 0033:0x7f34d625e169 r 20 17:05:45 sy[ 119.198207][T10070] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 zkaller kern.war[ 119.198277][T10070] RSP: 002b:00007f34d48c7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a0 n kernel: [ 118[ 119.198352][T10070] RAX: ffffffffffffffda RBX: 00007f34d6485fa0 RCX: 00007f34d625e169 .871794][T10050][ 119.198364][T10070] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000007 vfs_read+0x1b2[ 119.198437][T10070] RBP: 00007f34d48c7090 R08: 0000000000000000 R09: 0000000000000000 /0x710 Apr 20 1[ 119.198451][T10070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 7:05:45 syzkalle[ 119.198465][T10070] R13: 0000000000000000 R14: 00007f34d6485fa0 R15: 00007ffe01a5d1b8 r kern.warn kern[ 119.198485][T10070] el: [ 118.871811][T10050] ? __rcu_read_unlock+0x4e/0x70 Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.871837][T10050] ? __fget_files+0x186/0x1c0 Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.871865][T10050] ksys_read+0xeb/0x1b0 Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.871888][T10050] __x64_sys_read+0x42/0x50 Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.871968][T10050] x64_sys_call+0x2a3b/0x2e10 Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.871995][T10050] do_syscall_64+0xc9/0x1a0 Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.872084][T10050] ? clear_bhb_loop+0x25/0x80 Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.872111][T10050] ? clear_bhb_loop+0x25/0x80 Apr 20 17:05:45 syzkaller kern.[ 119.557042][T10079] dummy0 speed is unknown, defaulting to 1000 warn kernel: [ 118.872136][T10050] entry_SYSCALL_64_after_hwframe+0x77/0x7f Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.872182][T10050] RIP: 0033:0x7f1c633acb7c Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.872249][T10050] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.872271][T10050] RSP: 002b:00007f1c61a17030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.872310][T10050] RAX: ffffffffffffffda RBX: 00007f1c635d5fa0 RCX: 00007f1c633acb7c Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.872325][T10050] RDX: 000000000000000f RSI: 00007f1c61a170a0 RDI: 0000000000000004 Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.872336][T10050] RBP: 00007f1c61a17090 R08: 0000000000000000 R09: 0000000000000000 Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.872347][T10050] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.872391][T10050] R13: 0000000000000000 R14: 00007f1c635d5fa0 R15: 00007fff8c739938 Apr 20 17:05:45 syzkaller kern.warn kernel: [ 118.872412][T10050] Apr 20 17:05:45 syzkaller kern.warn kernel: [ 119.127685][T10058] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10058 comm=syz.2.2707 Apr 20 17:05:46 syzkaller kern.notice kernel: [ 119.183632][T10070] FAULT_INJECTION: forcing a failure. Apr 20 17:05:46 syzkaller kern.notice kernel: [ 119.183632][T10070] name failslab, interval 1, probability 0, space 0, times 0 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.196789][T10070] CPU: 0 UID: 0 PID: 10070 Comm: syz.5.2712 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.196824][T10070] Hardware name: Go[ 119.740724][T10093] FAULT_INJECTION: forcing a failure. [ 119.740724][T10093] name failslab, interval 1, probability 0, space 0, times 0 ogle Google Comp[ 119.753728][T10093] CPU: 1 UID: 0 PID: 10093 Comm: syz.5.2719 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) [ 119.753766][T10093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 119.753781][T10093] Call Trace: [ 119.753790][T10093] [ 119.753799][T10093] dump_stack_lvl+0xf6/0x150 [ 119.753827][T10093] dump_stack+0x15/0x1a [ 119.753907][T10093] should_fail_ex+0x261/0x270 [ 119.753938][T10093] should_failslab+0x8f/0xb0 [ 119.753965][T10093] __kmalloc_noprof+0xad/0x410 [ 119.754063][T10093] ? copy_splice_read+0xb8/0x5d0 [ 119.754095][T10093] copy_splice_read+0xb8/0x5d0 [ 119.754133][T10093] ? __kmalloc_noprof+0x287/0x410 [ 119.754191][T10093] ? alloc_pipe_info+0x1cb/0x360 [ 119.754212][T10093] ? __pfx_shmem_file_splice_read+0x10/0x10 [ 119.754324][T10093] splice_direct_to_actor+0x28e/0x680 [ 119.754356][T10093] ? __pfx_direct_splice_actor+0x10/0x10 [ 119.754396][T10093] do_splice_direct+0xd9/0x150 [ 119.754465][T10093] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 119.754501][T10093] do_sendfile+0x40a/0x690 [ 119.754577][T10093] __x64_sys_sendfile64+0x113/0x160 [ 119.754608][T10093] x64_sys_call+0xfc3/0x2e10 [ 119.754633][T10093] do_syscall_64+0xc9/0x1a0 [ 119.754682][T10093] ? clear_bhb_loop+0x25/0x80 [ 119.754702][T10093] ? clear_bhb_loop+0x25/0x80 [ 119.754725][T10093] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 119.754764][T10093] RIP: 0033:0x7f34d625e169 [ 119.754783][T10093] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 119.754803][T10093] RSP: 002b:00007f34d48c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 119.754821][T10093] RAX: ffffffffffffffda RBX: 00007f34d6485fa0 RCX: 00007f34d625e169 [ 119.754895][T10093] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 119.754910][T10093] RBP: 00007f34d48c7090 R08: 0000000000000000 R09: 0000000000000000 [ 119.754924][T10093] R10: 0000000800000009 R11: 0000000000000246 R12: 0000000000000001 [ 119.754938][T10093] R13: 0000000000000000 R14: 00007f34d6485fa0 R15: 00007ffe01a5d1b8 [ 119.754955][T10093] ute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.196904][T10070] Call Trace: Apr 20 17:05:46 syzkaller kern.warn ke[ 119.978141][T10101] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10101 comm=syz.3.2721 rnel: [ 119.196911][T10070] Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.196920][T10070] dump_stack_lvl+0xf6/0x150 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.196948][T10070] dump_stack+0x15/0x1a Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.196964][T10070] should_fail_ex+0x261/0x270 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.196993][T10070] should_failslab+0x8f/0xb0 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.197028][T10070] __kmalloc_node_track_caller_noprof+0xaa/0x410 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.197149][T10070] ? sidtab_sid2str_get+0xb8/0x140 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.197173][T10070] ? vsnprintf+0x84d/0x8a0 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.197285][T10070] kmemdup_noprof+0x2b/0x70 Apr 20 17:05:46[ 120.064334][T10106] dummy0 speed is unknown, defaulting to 1000 syzkaller kern.warn kernel: [ 119.197323][T10070] sidtab_sid2str_get+0xb8/0x140 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 120.082047][T10109] FAULT_INJECTION: forcing a failure. [ 120.082047][T10109] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 119.197348][T10070] security_sid_to_context_core+0x1eb/0x2f0 Apr 20 17:05:46 syzkaller kern.warn kernel: [ [ 120.095486][T10109] CPU: 1 UID: 0 PID: 10109 Comm: Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) [ 120.095518][T10109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 120.095535][T10109] Call Trace: [ 120.095541][T10109] [ 120.095549][T10109] dump_stack_lvl+0xf6/0x150 [ 120.095576][T10109] dump_stack+0x15/0x1a [ 120.095597][T10109] should_fail_ex+0x261/0x270 [ 120.095627][T10109] should_fail+0xb/0x10 [ 120.095649][T10109] should_fail_usercopy+0x1a/0x20 [ 120.095745][T10109] strncpy_from_user+0x25/0x230 [ 120.095763][T10109] ? getname_flags+0x81/0x3b0 [ 120.095792][T10109] getname_flags+0xb0/0x3b0 [ 120.095821][T10109] do_sys_openat2+0x65/0x110 [ 120.095876][T10109] __x64_sys_openat+0xf8/0x120 [ 120.095913][T10109] x64_sys_call+0x1ac/0x2e10 [ 120.095939][T10109] do_syscall_64+0xc9/0x1a0 [ 120.095968][T10109] ? clear_bhb_loop+0x25/0x80 [ 120.096037][T10109] ? clear_bhb_loop+0x25/0x80 [ 120.096078][T10109] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 120.096104][T10109] RIP: 0033:0x7f34d625cad0 [ 120.096118][T10109] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 120.096136][T10109] RSP: 002b:00007f34d48c6f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 120.096158][T10109] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f34d625cad0 [ 120.096210][T10109] RDX: 0000000000000000 RSI: 00007f34d48c6fa0 RDI: 00000000ffffff9c [ 120.096225][T10109] RBP: 00007f34d48c6fa0 R08: 0000000000000000 R09: 0000000000000000 [ 120.096238][T10109] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 120.096252][T10109] R13: 0000000000000000 R14: 00007f34d6485fa0 R15: 00007ffe01a5d1b8 [ 120.096273][T10109] 119.197413][T10070] security_sid_to_context+0x27/0x30 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.197485][T10070] selinux_lsmprop_to_secctx+0x6c/0xf0 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.197505][T10Apr 20 17:05:46 Apr 20 17:05:46 Apr 20 17:05:46 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.557042][T10079] dummy0 speed is unknown, defaulting to 1000 Apr 20 17:05:46 syzkaller kern.notice kernel: [ 119.740724][T10093] FAULT_INJECTION: forcing a failure. Apr 20 17:05:46 syzkaller kern.notice kernel: [ 119.740724][T10093] name failslab, interval 1, probability 0, space 0, times 0 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.753728][T10093] CPU: 1 UID: 0 PID: 10093 Comm: syz.5.2719 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.753766][T10093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.753781][T10093] Call Trace: Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.753790][T10093] Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.753799][T10093] dump_stack_lvl+0xf6/0x150 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.753827][T10093] dump_stack+0x15/0x1a Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.753907][T10093] should_fail_ex+0x261/0x270 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.753938][T10093] should_failslab+0x8f/0xb0 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.753965][T10093] __kmalloc_noprof+0xad/0x410 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.754063][T10093] ? copy_splice_read+0xb8/0x5d0 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.754095][T10093] copy_splice_read+0xb8/0x5d0 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.754133][T10093] ? __kmalloc_noprof+0x287/0x410 Apr 20 17:05:46 syzkaller kern.w[ 120.446692][T10131] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10131 comm=syz.2.2734 arn kernel: [ 119.754191][T10093] ? alloc_pipe_info+0x1cb/0x360 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.754212][T10093] ? __pfx_shmem_file_splice_read+0x10/0x10 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.754324][T10093] splice_direct_to_actor+0x28e/0x680 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.754356][T10093] ? __pfx_direct_splice_actor+0x10/0x10 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.754396][T10093] do_splice_direct+0xd9/0x150 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.754465][T10093] ? __pfx_direct_file_splice_eof+0x10/0x10 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.754501][T10093] do_sendfile+0x40a/0x690 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.754577][T10093] __x64_sys_sendfile64+0x113/0x160 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.754608][T10093] x64_sys_call+0xfc3/0x2e10 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.754633][T10093] do_syscall_64+0xc9/0x1a0 Apr 20 17:05:46 syzkaller kern.warn kernel: [Apr 20 17:05:46 Apr 20 17:05:46 Apr 20 17:05:46 syzkaller kern.warn kernel: [ 119.978141][T10101] SELinux: unrecognized netlinkApr 20 17:05:46 syzkaller kern.warn kernel: [ 120.064334][T10106] dummy0 speed is unknown, defaulting to 1000 Apr 20 17:05:47 syzkaller kern.notice kernel: [ 120.082047][T10109] FAULT_INJECTION: forcing a failure. Apr 20 17:05:47 syzkaller kern.notice kernel: [ 120.082047][T10109] name fail_usercopy, interval 1, probability 0, space 0, times 0 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.095486][T10109] CPU: 1 UID: 0 PID: 10109 Comm: Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) Apr 20 17:05:47 syzkaller kern.warn kernel: [ 1[ 120.610031][T10154] FAULT_INJECTION: forcing a failure. [ 120.610031][T10154] name fail_usercopy, interval 1, probability 0, space 0, times 0 20.095518][T1010[ 120.624025][T10154] CPU: 1 UID: 0 PID: 10154 Comm: syz.5.2743 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) [ 120.624059][T10154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 120.624148][T10154] Call Trace: [ 120.624156][T10154] [ 120.624165][T10154] dump_stack_lvl+0xf6/0x150 [ 120.624191][T10154] dump_stack+0x15/0x1a [ 120.624210][T10154] should_fail_ex+0x261/0x270 [ 120.624238][T10154] should_fail+0xb/0x10 [ 120.624275][T10154] should_fail_usercopy+0x1a/0x20 [ 120.624298][T10154] _copy_to_user+0x20/0xa0 [ 120.624328][T10154] simple_read_from_buffer+0xb2/0x130 [ 120.624358][T10154] proc_fail_nth_read+0x103/0x140 [ 120.624460][T10154] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 120.624569][T10154] vfs_read+0x1b2/0x710 [ 120.624589][T10154] ? do_vmi_munmap+0x1eb/0x230 [ 120.624616][T10154] ? __rcu_read_unlock+0x4e/0x70 [ 120.624686][T10154] ? __fget_files+0x186/0x1c0 [ 120.624707][T10154] ksys_read+0xeb/0x1b0 [ 120.624725][T10154] __x64_sys_read+0x42/0x50 [ 120.624748][T10154] x64_sys_call+0x2a3b/0x2e10 [ 120.624768][T10154] do_syscall_64+0xc9/0x1a0 [ 120.624839][T10154] ? clear_bhb_loop+0x25/0x80 [ 120.624866][T10154] ? clear_bhb_loop+0x25/0x80 [ 120.624888][T10154] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 120.624924][T10154] RIP: 0033:0x7f34d625cb7c [ 120.624939][T10154] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 120.624958][T10154] RSP: 002b:00007f34d48c7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 120.624980][T10154] RAX: ffffffffffffffda RBX: 00007f34d6485fa0 RCX: 00007f34d625cb7c [ 120.624994][T10154] RDX: 000000000000000f RSI: 00007f34d48c70a0 RDI: 0000000000000003 [ 120.625006][T10154] RBP: 00007f34d48c7090 R08: 0000000000000000 R09: 0000000000000000 [ 120.625021][T10154] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 120.625070][T10154] R13: 0000000000000000 R14: 00007f34d6485fa0 R15: 00007ffe01a5d1b8 [ 120.625091][T10154] 9] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.095535][T10109] Call Trace: Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.095541][T10109] Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.095549][T10109] dump_stack_lvl+0xf6/0x150 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.095576][T10109] dump_stack+0x15/0x1a Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.095597][T10109] should_fail_ex+0x261/0x270 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.095627][T10109] should_fail+0xb/0x10 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.095649][T10109] should_fail_usercopy+0x1a/0x20 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.095745][T10109] strncpy_from_user+0x25/0x230 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.095763][T10109] ? getname_flags+0x81/0x3b0 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.095792][T10109] getname_fApr 20 17:05:47 Apr 20 17:05:47 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.446692][T10131] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10131 comm=syz.2.2734 Apr 20 17:05:47 syzkaller kern.notice kernel: [ 120.610031][T10154] FAULT_INJECTION: forcing a failure. Apr 20 17:05:47 syzkaller kern.notice kernel: [ 120.610031][T10154] name fail_usercopy, interval 1, probability 0, space 0, times 0 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.624025][T10154] CPU: 1 UID: 0 PID: 10154 Comm: syz.5.2743 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.624059][T10154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.624148][T10154] Call Trace: Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.624156][T10154] Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.624165][T10154] dump_stack_lvl+0xf6/0x150 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.624191][T10154] dump_stack+0x15/0x1a Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.624210][T10154] should_fail_ex+0x261/0x270 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.624238][T10154] should_fail+0xb/0x10 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 1[ 121.031211][ T3821] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 20.624275][T10154] should_fail_usercopy+0x1a/0x20 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.624298][T10154] _copy_to_user+0x20/0xa0 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.624328][T10154] simple_read_from_buffer+0xb2/0x130 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.624358][T10154] proc_fail_nth_read+0x103/0x140 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.[ 121.077547][ T3821] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 624460][T10154] ? __pfx_proc_fail_nth_read+0x10/0x10 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.624569][T10154] vfs_read+0x1b2/0x710 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.624589][T10154] ? do_vmi_munmap+0x1eb/0x230 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.624616][T10154] ? __rcu_read_unlock+0x4e/0x70 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.624686][T10154] ? __fget_files+0x186/0x1c0 Apr 20 17:05:47 syzkaller k[ 121.127577][ T3821] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 ern.warn kernel: [ 120.624707][T10154] ksys_read+0xeb/0x1b0 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.624725][T10154] __x64_sys_read+0x42/0x50 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.624748][T10154] x64_sys_call+0x2a3b/0x2e10 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.624768][T10154] do_syscall_64+0xc9/0x1a0 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.624839][T10154] ? clear_bhb_loop+0x25/0x80 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.624866][T10154] ? clear_bhb_loop+0x25/0x80 Apr 20 17:05:47 syzka[ 121.187553][ T3821] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 ller kern.warn kernel: [ 120.624888][T10154] entry_SYSCALL_64_after_hwframe+0x77/0x7f Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.624924][T10154] RIP: 0033:0x7f34d625cb7c Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.624939][T10154] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.624958][T10154] RSP: 002b:00007f34d48c7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 Apr 20 17:05:47 syzkaller kern.warn kernel: [ 120.624980][T10154] RAX: ffffffffffffffda RBX: 00007f34d6485fa0 RCX: 00007f34d625cb7c Apr 20 17:05:Apr 20 17:05:47 Apr 20 17:05:47 syzkaller kern.wApr 20 17:05:47 Apr 20 17:05:47 syzkaller kern.info kernel: [ 121.031211][ T3821] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 Apr 20 17:05:47 syzkaller kern.info kernel: [ 121.077547][ T3821] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 Apr 20 17:05:47 syzkaller kern.info kernel: [ 121.127577][ T3821] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 Apr 20 17:05:48 syzkaller kern.info kernel: [ 121.187553][ T3821] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 121.357739][ T3821] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 121.368342][ T3821] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface Apr 20 17:05:48 [ 121.377955][ T3821] bond0 (unregistering): Released all slaves syzkaller kern.info kernel: [ 121.357739][ T3821] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface Apr 20 17:05:48 syzkaller kern.info kernel: [ 121.368342][ T3821] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface Apr 20 17:05:48 syzkaller kern.info kernel: [ 121.377955][ T3821] bond0 (unregistering): Released all slaves [ 121.429454][ T3821] hsr_slave_0: left promiscuous mode [ 121.435236][ T3821] hsr_slave_1: left promiscuous mode [ 121.440897][ T3821] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 121.448472][ T3821] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 121.448980][ T3821] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 121.449004][ T3821] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 121.457955][ T3821] veth1_macvtap: left promiscuous mode Apr 20 17:05:48 [ 121.478246][ T3821] veth0_macvtap: left promiscuous mode syzkaller kern.i[ 121.484059][ T3821] veth1_vlan: left promiscuous mode nfo kernel: [ 1[ 121.491531][ T3821] veth0_vlan: left promiscuous mode 21.429454][ T3821] hsr_slave_0: left promiscuous mode Apr 20 17:05:48 syzkaller kern.info kernel: [ 121.435236][ T3821] hsr_slave_1: left promiscuous mode Apr 20 17:05:48 syzkaller kern.info kernel: [ 121.440897][ T3821] batman_adv: batadv0: Interface deactivated: batadv_slave_0 Apr 20 17:05:48 syzkaller kern.info kernel: [ 121.448472][ T3821] batman_adv: batadv0: Removing interface: batadv_slave_0 Apr 20 17:05:48 syzkaller kern.info kernel: [ 121.448980][ T3821] batman_adv: batadv0: Interface deactivated: batadv_slave_1 Apr 20 17:05:48 syzkaller kern.info kernel: [ 121.449004][ T3821] batman_adv: batadv0: [ 121.551570][ T3821] team0 (unregistering): Port device team_slave_1 removed Removing interface: batadv_slave_1 Apr 20 17:05:48 syzkaller kern.info kernel: [ 121.565760][ T3821] team0 (unregistering): Port device team_slave_0 removed [ 121.457955][ T3821] veth1_macvtap: left promiscuous mode Apr 20 17:05:48 syzkaller kern.info kernel: [ 121.478246][ T3821] veth0_macvtap: left promiscuous mode Apr 20 17:05:48 syzkaller kern.info kernel: [ 121.484059][ T3821] veth1_vlan: left promiscuous mode Apr 20 17:05:48 syzkaller kern.info kernel: [ 121.491531][ T3821] veth0_vlan: left promiscuous mode Apr 20 17:05:48 syzkaller kern.info kernel: [ 121.551570][ T3821] team0 (unregistering): Port device team_slave_1 removed Apr 20 17:05:48 syzkaller kern.info kernel: [ 121.565760][ T3821] team0 (unregistering): Port device team_slave_0 removed [ 121.801623][T10177] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10177 comm=syz.0.2750 Apr 20 17:05:48 syzkaller kern.warn kernel: [ 121.801623][T10177] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10177 comm=syz.0.2750 [ 122.423074][ T29] kauditd_printk_skb: 1330 callbacks suppressed [ 122.423092][ T29] audit: type=1400 audit(1745168749.243:32341): avc: denied { execmem } for pid=10180 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Apr 20 17:05:49 syzkaller kern.w[ 122.453578][ T29] audit: type=1400 audit(1745168749.263:32342): avc: denied { open } for pid=10183 comm="syz.3.2757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 arn kernel: [ 1[ 122.474073][ T29] audit: type=1400 audit(1745168749.273:32343): avc: denied { read write } for pid=10183 comm="syz.3.2757" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 22.423074][ T2[ 122.500393][ T29] audit: type=1400 audit(1745168749.273:32344): avc: denied { read write } for pid=10183 comm="syz.3.2757" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 9] kauditd_print[ 122.526080][ T29] audit: type=1400 audit(1745168749.273:32345): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 1330 call[ 122.548834][ T29] audit: type=1400 audit(1745168749.273:32346): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 122.548871][ T29] audit: type=1400 audit(1745168749.273:32347): avc: denied { create } for pid=10183 comm="syz.3.2757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 backs suppressed[ 122.593763][ T29] audit: type=1400 audit(1745168749.273:32349): avc: denied { map_create } for pid=10181 comm="syz.0.2754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Apr 20 17:05:4[ 122.613736][ T29] audit: type=1400 audit(1745168749.273:32348): avc: denied { map_create } for pid=10182 comm="syz.2.2756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 9 syzkaller kern.notice kernel: [ 122.423092][ [ 122.637540][ T29] audit: type=1400 audit(1745168749.303:32350): avc: denied { load_policy } for pid=10183 comm="syz.3.2757" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=0 T29] audit: ty[ 122.647581][T10187] x_tables: duplicate underflow at hook 2 pe=1400 audit(1745168749.243:32341): avc: denied { execmem } for pid=10180 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Apr 20 17:05:49 syzkaller kern.notice kernel: [ 122.453578][ T29] audit: type=1400 audit(1745168749.263:32342): avc: denied { open } for pid=10183 comm="syz.3.2757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 Apr 20 17:05:49 syzkaller kern.notice kernel: [ 122.474073][ T29] audit: type=1400 audit(1745168749.273:32343): avc: denied { read write } for pid=10183 comm="syz.3.2757" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Apr 20 17:05:49 syzkaller kern.notice kernel: [ 122.500393][ T29] audit: type=1400 audit(1745168749.273:32344): avc: denied { read write } for pid=10183 comm="syz.3.2757" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Apr 20 17:05:49 syzkaller kern.notice kernel: [ 122.526080][ T29] audit: type=1400 audit(1745168749.273:32345): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Apr 20 17:05:49 syzkaller kern.notice kernel: [ 122.548834][ T29] audit: type=1400 audit(1745168749.273:32346): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Apr 20 17:05:49 syzkaller kern.notice kernel: [ 122.548871][ T29] audit: type=1400 audit(1745168749.273:32347): avc: denied { create } for pid=10183 comm="syz.3.2757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permiss Apr 20 17:05:49 syzkaller kern.notice kernel: [ 122.593763][ T29] audit: type=1400 audit(1745168749.273:32349): avc: denied { map_create } for pid=10181 comm="syz.0.2754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Apr 20 17:05:49 syzkaller kern.notice kernel: [ 122.613736][ T29] audit: type=1400 audit(1745168749.273:32348): avc: denied { map_create } for pid=10182 comm="syz.2.2756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Apr 20 17:05:49 syzkaller kern.notice kernel: [ 122.637540][ T29] audit: type=1400 audit(1745168749.303:32350): avc: denied { load_policy } for pid=10183 comm="syz.3.2757" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive Apr 20 17:05:49 syzkaller kern.err kernel: [ 122.647581][T10187] x_tables: duplicate underflow at hook 2 [ 123.974664][T10203] FAULT_INJECTION: forcing a failure. [ 123.974664][T10203] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 123.988489][T10203] CPU: 1 UID: 0 PID: 10203 Comm: syz.3.2762 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) [ 123.988552][T10203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 123.988563][T10203] Call Trace: [ 123.988570][T10203] [ 123.988578][T10203] dump_stack_lvl+0xf6/0x150 [ 123.988616][T10203] dump_stack+0x15/0x1a [ 123.988637][T10203] should_fail_ex+0x261/0x270 [ 123.988675][T10203] should_fail+0xb/0x10 [ 123.988700][T10203] should_fail_usercopy+0x1a/0x20 [ 123.988810][T10203] _copy_to_user+0x20/0xa0 [ 123.988846][T10203] simple_read_from_buffer+0xb2/0x130 [ 123.988903][T10203] proc_fail_nth_read+0x103/0x140 [ 123.988936][T10203] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 123.989026][T10203] vfs_read+0x1b2/0x710 [ 123.989047][T10203] ? __rcu_read_unlock+0x4e/0x70 [ 123.989072][T10203] ? __fget_files+0x186/0x1c0 [ 123.989098][T10203] ksys_read+0xeb/0x1b0 [ 123.989116][T10203] __x64_sys_read+0x42/0x50 [ 123.989133][T10203] x64_sys_call+0x2a3b/0x2e10 [ 123.989174][T10203] do_syscall_64+0xc9/0x1a0 [ 123.989198][T10203] ? clear_bhb_loop+0x25/0x80 [ 123.989218][T10203] ? clear_bhb_loop+0x25/0x80 [ 123.989239][T10203] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 123.989264][T10203] RIP: 0033:0x7fb625a4cb7c [ 123.989281][T10203] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 123.989323][T10203] RSP: 002b:00007fb6240b7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 123.989347][T10203] RAX: ffffffffffffffda RBX: 00007fb625c75fa0 RCX: 00007fb625a4cb7c [ 123.989362][T10203] RDX: 000000000000000f RSI: 00007fb6240b70a0 RDI: 0000000000000003 [ 123.989376][T10203] RBP: 00007fb6240b7090 R08: 0000000000000000 R09: 0000000000000000 [ 123.989388][T10203] R10: 00002000000002c0 R11: 0000000000000246 R12: 0000000000000001 [ 123.989399][T10203] R13: 0000000000000000 R14: 00007fb625c75fa0 R15: 00007ffc91d29bf8 [ 123.989459][T10203] Apr 20 17:05:51 syzkaller kern.notice kernel: [ 123.974664][T10203] FAULT_INJECTION: forcing a failure. Apr 20 17:05:51 syzkaller kern.notice kernel: [ 123.974664][T10203] name fail_usercopy, interval 1, probability 0, space 0, times 0 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.988489][T10203] CPU: 1 UID: 0 PID: 10203 Comm: syz.3.2762 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.988552][T10203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.988563][T10203] Call Trace: Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.988570][T10203] Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.988578][T10203] dump_stack_lvl+0xf6/0x150 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.988616][T10203] dump_stack+0x15/0x1a Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.988637][T10203] should_fail_ex+0x261/0x270 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.988675][T10203] should_fail+0xb/0x10 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.988700][T10203] should_fail_usercopy+0x1a/0x20 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.988810][T10203] _copy_to_user+0x20/0xa0 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.988846][T10203] simple_read_from_buffer+0xb2/0x130 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.988903][T10203] proc_fail_nth_read+0x103/0x140 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.988936][T10203] ? __pfx_proc_fail_nth_read+0x10/0x10 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.989026][T10203] vfs_read+0x1b2/0x710 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.989047][T10203] ? __rcu_read_unlock+0x4e/0x70 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.989072][T10203] ? __fget_files+0x186/0x1c0 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.989098][T10203] ksys_read+0xeb/0x1b0 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.989116][T10203] __x64_sys_read+0x42/0x50 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.989133][T10203] x64_sys_call+0x2a3b/0x2e10 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.989174][T10203] do_syscall_64+0xc9/0x1a0 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.989198][T10203] ? clear_bhb_loop+0x25/0x80 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.989218][T10203] ? clear_bhb_loop+0x25/0x80 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.989239][T10203] entry_SYSCALL_64_after_hwframe+0x77/0x7f Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.989264][T10203] RIP: 0033:0x7fb625a4cb7c Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.989281][T10203] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.989323][T10203] RSP: 002b:00007fb6240b7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.989347][T10203] RAX: ffffffffffffffda RBX: 00007fb625c75fa0 RCX: 00007fb625a4cb7c Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.989362][T10203] RDX: 000000000000000f RSI: 00007fb6240b70a0 RDI: 0000000000000003 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.989376][T10203] RBP: 00007fb6240b7090 R08: 0000000000000000 R09: 0000000000000000 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.989388][T10203] R10: 00002000000002c0 R11: 0000000000000246 R12: 0000000000000001 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.989399][T10203] R13: 0000000000000000 R14: 00007fb625c75fa0 R15: 00007ffc91d29bf8 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 123.989459][T10203] [ 124.897922][T10211] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10211 comm=syz.2.2765 Apr 20 17:05:51 syzkaller kern.warn kernel: [ 124.897922][T10211] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10211 comm=syz.2.2765 [ 125.933033][T10224] syzkaller0: entered promiscuous mode [ 125.938833][T10224] syzkaller0: entered allmulticast mode Apr 20 17:05:52 syzkaller kern.info kernel: [ 125.933033][T10224] syzkaller0: entered promiscuous mode Apr 20 17:05:52 syzkaller kern.info kernel: [ 125.938833][T10224] syzkaller0: entered allmulticast mode [ 128.218519][ T29] kauditd_printk_skb: 241 callbacks suppressed [ 128.218537][ T29] audit: type=1400 audit(1745168755.043:32592): avc: denied { execmem } for pid=10235 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Apr 20 17:05:55 syzkaller kern.w[ 128.249115][ T29] audit: type=1400 audit(1745168755.053:32593): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 128.272974][ T29] audit: type=1400 audit(1745168755.073:32594): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 28.218519][ T2[ 128.295650][ T29] audit: type=1400 audit(1745168755.073:32595): avc: denied { map_create } for pid=10236 comm="syz.0.2775" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 9] kauditd_print[ 128.311767][ T29] audit: type=1400 audit(1745168755.073:32596): avc: denied { prog_load } for pid=10236 comm="syz.0.2775" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 k_skb: 241 callb[ 128.337449][ T29] audit: type=1400 audit(1745168755.073:32597): avc: denied { prog_load } for pid=10236 comm="syz.0.2775" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 acks suppressed[ 128.357354][ T29] audit: type=1400 audit(1745168755.073:32598): avc: denied { prog_load } for pid=10236 comm="syz.0.2775" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Apr 20 17:05:55[ 128.378703][ T29] audit: type=1400 audit(1745168755.073:32599): avc: denied { read } for pid=10236 comm="syz.0.2775" dev="nsfs" ino=4026532741 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 syzkaller kern.[ 128.400555][ T29] audit: type=1400 audit(1745168755.093:32600): avc: denied { prog_load } for pid=10238 comm="syz.5.2776" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 notice kernel: [[ 128.421853][ T29] audit: type=1400 audit(1745168755.103:32601): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 128.218537][ T29] audit: type=1400 audit(1745168755.043:32592): avc: denied { execmem } for pid=10235 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Apr 20 17:05:55 syzkaller kern.notice kernel: [ 128.249115][ T29] audit: type=1400 audit(1745168755.053:32593): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Apr 20 17:05:55 syzkaller kern.notice kernel: [ 128.272974][ T29] audit: type=1400 audit(1745168755.073:32594): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Apr 20 17:05:55 syzkaller kern.notice kernel: [ 128.295650][ T29] audit: type=1400 audit(1745168755.073:32595): avc: denied { map_create } for pid=10236 comm="syz.0.2775" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Apr 20 17:05:55 syzkaller kern.notice kernel: [ 128.311767][ T29] audit: type=1400 audit(1745168755.073:32596): avc: denied { prog_load } for pid=10236 comm="syz.0.2775" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Apr 20 17:05:55 syzkaller kern.notice kernel: [ 128.337449][ T29] audit: type=1400 audit(1745168755.073:32597): avc: denied { prog_load } for pid=10236 comm="syz.0.2775" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Apr 20 17:05:55 syzkaller kern.notice kernel: [ 128.357354][ T29] audit: type=1400 audit(1745168755.073:32598): avc: denied { prog_load } for pid=10236 comm="syz.0.2775" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Apr 20 17:05:55 syzkaller kern.notice kernel: [ 128.378703][ T29] audit: type=1400 audit(1745168755.073:32599): avc: denied { read } for pid=10236 comm="syz.0.2775" dev="nsfs" ino=4026532741 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file Apr 20 17:05:55 syzkaller kern.notice kernel: [ 128.400555][ T29] audit: type=1400 audit(1745168755.093:32600): avc: denied { prog_load } for pid=10238 comm="syz.5.2776" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Apr 20 17:05:55 syzkaller kern.notice kernel: [ 128.421853][ T29] audit: type=1400 audit(1745168755.103:32601): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 129.565461][T10247] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10247 comm=syz.2.2780 [ 129.579008][T10248] ================================================================== [ 129.587113][T10248] BUG: KCSAN: data-race in mas_walk / mas_wmb_replace [ 129.593912][T10248] [ 129.596244][T10248] write to 0xffff8881049d3d00 of 8 bytes by task 10250 on cpu 0: [ 129.603967][T10248] mas_wmb_replace+0x224/0x1510 [ 129.608849][T10248] mas_wr_store_entry+0x158c/0x2460 [ 129.614083][T10248] mas_store_prealloc+0x6d5/0x960 [ 129.619123][T10248] vma_iter_store_new+0x1d3/0x210 [ 129.624165][T10248] vma_complete+0x12b/0x570 [ 129.628678][T10248] __split_vma+0x5b6/0x630 [ 129.633104][T10248] vms_gather_munmap_vmas+0x2a5/0x790 [ 129.638484][T10248] mmap_region+0x46f/0x1490 [ 129.642995][T10248] do_mmap+0x9ef/0xc80 [ 129.647063][T10248] vm_mmap_pgoff+0x16d/0x2d0 [ 129.651665][T10248] ksys_mmap_pgoff+0x2e2/0x340 [ 129.656431][T10248] x64_sys_call+0x1945/0x2e10 [ 129.661123][T10248] do_syscall_64+0xc9/0x1a0 [ 129.665637][T10248] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 129.671533][T10248] [ 129.673855][T10248] read to 0xffff8881049d3d00 of 8 bytes by task 10248 on cpu 1: [ 129.681483][T10248] mas_walk+0x123/0x320 [ 129.685644][T10248] lock_vma_under_rcu+0xa7/0x340 [ 129.690591][T10248] exc_page_fault+0x150/0x6a0 [ 129.695357][T10248] asm_exc_page_fault+0x26/0x30 [ 129.700210][T10248] [ 129.702531][T10248] value changed: 0xffff888119473cc1 -> 0xffff8881049d3d00 [ 129.709647][T10248] [ 129.711972][T10248] Reported by Kernel Concurrency Sanitizer on: [ 129.718149][T10248] CPU: 1 UID: 0 PID: 10248 Comm: syz.3.2781 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) [ 129.730655][T10248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 129.740712][T10248] ================================================================== Apr 20 17:05:56 syzkaller kern.warn kernel: [ 129.565461][T10247] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10247 comm=syz.2.2780 Apr 20 17:05:56 syzkaller kern.err kernel: [ 129.579008][T10248] ================================================================== Apr 20 17:05:56 syzkaller kern.err kernel: [ 129.587113][T10248] BUG: KCSAN: data-race in mas_walk / mas_wmb_replace Apr 20 17:05:56 syzkaller kern.err kernel: [ 129.593912][T10248] Apr 20 17:05:56 syzkaller kern.err kernel: [ 129.596244][T10248] write to 0xffff8881049d3d00 of 8 bytes by task 10250 on cpu 0: Apr 20 17:05:56 syzkaller kern.warn kernel: [ 129.603967][T10248] mas_wmb_replace+0x224/0x1510 Apr 20 17:05:56 syzkaller kern.warn kernel: [ 129.608849][T10248] mas_wr_store_entry+0x158c/0x2460 Apr 20 17:05:56 syzkaller kern.warn kernel: [ 129.614083][T10248] mas_store_prealloc+0x6d5/0x960 Apr 20 17:05:56 syzkaller kern.warn kernel: [ 129.619123][T10248] vma_iter_store_new+0x1d3/0x210 Apr 20 17:05:56 syzkaller kern.warn kernel: [ 129.624165][T10248] vma_complete+0x12b/0x570 Apr 20 17:05:56 syzkaller kern.warn kernel: [ 129.628678][T10248] __split_vma+0x5b6/0x630 Apr 20 17:05:56 syzkaller kern.warn kernel: [ 129.633104][T10248] vms_gather_munmap_vmas+0x2a5/0x790 Apr 20 17:05:56 syzkaller kern.warn kernel: [ 129.638484][T10248] mmap_region+0x46f/0x1490 Apr 20 17:05:56 syzkaller kern.warn kernel: [ 129.642995][T10248] do_mmap+0x9ef/0xc80 Apr 20 17:05:56 syzkaller kern.warn kernel: [ 129.647063][T10248] vm_mmap_pgoff+0x16d/0x2d0 Apr 20 17:05:56 syzkaller kern.warn kernel: [ 129.651665][T10248] ksys_mmap_pgoff+0x2e2/0x340 Apr 20 17:05:56 syzkaller kern.warn kernel: [ 129.656431][T10248] x64_sys_call+0x1945/0x2e10 Apr 20 17:05:56 syzkaller kern.warn kernel: [ 129.661123][T10248] do_syscall_64+0xc9/0x1a0 Apr 20 17:05:56 syzkaller kern.warn kernel: [ 129.665637][T10248] entry_SYSCALL_64_after_hwframe+0x77/0x7f Apr 20 17:05:56 syzkaller kern.err kernel: [ 129.671533][T10248] Apr 20 17:05:56 syzkaller kern.err kernel: [ 129.673855][T10248] read to 0xffff8881049d3d00 of 8 bytes by task 10248 on cpu 1: Apr 20 17:05:56 syzkaller kern.warn kernel: [ 129.681483][T10248] mas_walk+0x123/0x320 Apr 20 17:05:56 syzkaller kern.warn kernel: [ 129.685644][T10248] lock_vma_under_rcu+0xa7/0x340 Apr 20 17:05:56 syzkaller kern.warn kernel: [ 129.690591][T10248] exc_page_fault+0x150/0x6a0 Apr 20 17:05:56 syzkaller kern.warn kernel: [ 129.695357][T10248] asm_exc_page_fault+0x26/0x30 Apr 20 17:05:56 syzkaller kern.err kernel: [ 129.700210][T10248] Apr 20 17:05:56 syzkaller kern.err kernel: [ 129.702531][T10248] value changed: 0xffff888119473cc1 -> 0xffff8881049d3d00 Apr 20 17:05:56 syzkaller kern.err kernel: [ 129.709647][T10248] Apr 20 17:05:56 syzkaller kern.err kernel: [ 129.711972][T10248] Reported by Kernel Concurrency Sanitizer on: Apr 20 17:05:56 syzkaller kern.warn kernel: [ 129.718149][T10248] CPU: 1 UID: 0 PID: 10248 Comm: syz.3.2781 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT(voluntary) Apr 20 17:05:56 syzkaller kern.warn kernel: [ 129.730655][T10248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 20 17:05:56 syzkaller kern.err kernel: [ 129.740712][T10248] ================================================================== Apr 20 17:05:57 syzkaller auth.info sshd[3287]: Received disconnect from 10.128.0.163 port 40392:11: disconnected by user Apr 20 17:05:57 syzkaller auth.info sshd[3287]: Disconnected from user root 10.128.0.163 port 40392 [ 131.114157][ T9821] tipc: Resetting bearer [ 131.123422][ T9821] tipc: Disabling bearer Apr 20 17:05:57 syzkaller kern.info kernel: [ 131.114157][ T9821] tipc: Resetti[ 131.136199][ T1305] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 ng bearer Apr 20 17:05:57 syzkaller kern.info kernel: [ 131.123422][ T9821] tipc: Disabling bearer Apr 20 17:05:57 syzkaller kern.info kernel: [ 131.136199][ T1305] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 131.257522][ T1305] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 Apr 20 17:05:58 syzkaller kern.info kernel: [ 131.257522][ T1305] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 131.307848][ T1305] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 Apr 20 17:05:58 syzkaller kern.info kernel: [ 131.307848][ T1305] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 131.357599][ T1305] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 Apr 20 17:05:58 syzkaller kern.info kernel: [ 131.357599][ T1305] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 131.398464][ T1305] bridge_slave_1: left allmulticast mode [ 131.404146][ T1305] bridge_slave_1: left promiscuous mode [ 131.410414][ T1305] bridge0: port 2(bridge_slave_1) entered disabled state Apr 20 17:05:58 syzkaller kern.i[ 131.419189][ T1305] bridge_slave_0: left allmulticast mode nfo kernel: [ 1[ 131.425923][ T1305] bridge_slave_0: left promiscuous mode 31.398464][ T130[ 131.432892][ T1305] bridge0: port 1(bridge_slave_0) entered disabled state 5] bridge_slave_1: left allmulticast mode Apr 20 17:05:58 syzkaller kern.info kernel: [ 131.404146][ T1305] bridge_slave_1: left promiscuous mode Apr 20 17:05:58 syzkaller kern.info kernel: [ 131.410414][ T1305] bridge0: port 2(bridge_slave_1) entered disabled state Apr 20 17:05:58 syzkaller kern.info kernel: [ 131.419189][ T1305] bridge_slave_0: left allmulticast mode Apr 20 17:05:58 syzkaller kern.info kernel: [ 131.425923][ T1305] bridge_slave_0: left promiscuous mode Apr 20 17:05:58 syzkaller kern.info kernel: [ 131.432892][ T1305] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.556137][ T1305] bond1 (unregistering): (slave bridge2): Releasing backup interface [ 131.564243][ T1305] bridge2 (unregistering): left promiscuous mode Apr 20 17:05:58 syzkaller kern.info kernel: [ 131.556137][ T1305] bond1 (unregistering): (slave bridge2): Releasing backup interface Apr 20 17:05:58 syzkaller kern.info kernel: [ 131.564243][ T1305] bridge2 (unregistering): left promiscuous mode [ 131.646808][ T1305] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 131.657412][ T1305] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface Apr 20 17:05:58 [ 131.667049][ T1305] bond0 (unregistering): Released all slaves syzkaller kern.info kernel: [ 1[ 131.676485][ T1305] bond1 (unregistering): Released all slaves 31.646808][ T1305] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface Apr 20 17:05:58 syzkaller kern.info kernel: [ 131.657412][ T1305] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface Apr 20 17:05:58 syzkaller kern.info kernel: [ 131.667049][ T1305] bond0 (unregistering): Released all slaves Apr 20 17:05:58 syzkaller kern.info kernel: [ 131.676485][ T1305] bond1 (unregistering): Released all slaves [ 131.749807][ T1305] hsr_slave_0: left promiscuous mode [ 131.755732][ T1305] hsr_slave_1: left promiscuous mode [ 131.761361][ T1305] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 131.768899][ T1305] batman_adv: batadv0: Removing interface: batadv_slave_0 Apr 20 17:05:58 syzkaller kern.i[ 131.778660][ T1305] batman_adv: batadv0: Interface deactivated: batadv_slave_1 nfo kernel: [ 1[ 131.787282][ T1305] batman_adv: batadv0: Removing interface: batadv_slave_1 31.749807][ T1305] hsr_slave_0: left promiscuous mode Apr 20 17[ 131.800224][ T1305] veth1_macvtap: left promiscuous mode :05:58 syzkaller[ 131.807546][ T1305] veth0_macvtap: left promiscuous mode kern.info kerne[ 131.813651][ T1305] veth1_vlan: left promiscuous mode l: [ 131.755732[ 131.820283][ T1305] veth0_vlan: left promiscuous mode ][ T1305] hsr_slave_1: left promiscuous mode Apr 20 17:05:58 syzkaller kern.info kernel: [ 131.761361][ T1305] batman_adv: batadv0: Interface deactivated: batadv_slave_0 Apr 20 17:05:58 syzkaller kern.info kernel: [ 131.768899][ T1305] batman_adv: batadv0: Removing interface: batadv_slave_0 Apr 20 17:05:58 syzkaller kern.info kernel: [ 131.778660][ T1305] batman_adv: batadv0: Interface deactivated: batadv_slave_1 Apr 20 17:05:58 syzkaller kern.info kernel: [ 131.787282][ T1305] batman_adv: batadv0: Removing interface: batadv_slave_1 Apr 20 17:05:58 syzkaller kern.info kernel: [ 131.800224][ T1305] veth1_macvtap: left promiscuous mode Apr 20 17:05:58 syzkaller kern.info kernel: [ 131.[ 131.887534][ T1305] team0 (unregistering): Port device team_slave_1 removed 807546][ T1305] veth0_macvtap: left promiscuous [ 131.898658][ T1305] team0 (unregistering): Port device team_slave_0 removed mode Apr 20 17:05:58 syzkaller kern.info kernel: [ 131.813651][ T1305] veth1_vlan: left promiscuous mode Apr 20 17:05:58 syzkaller kern.info kernel: [ 131.820283][ T1305] veth0_vlan: left promiscuous mode Apr 20 17:05:58 syzkaller kern.info kernel: [ 131.887534][ T1305] team0 (unregistering): Port device team_slave_1 removed Apr 20 17:05:58 syzkaller kern.info kernel: [ 131.898658][ T1305] team0 (unregistering): Port device team_slave_0 removed [ 132.150514][ T1305] IPVS: stop unused estimator thread 0... Apr 20 17:05:58 syzkaller kern.info kernel: [ 132.150514][ T1305] IPVS: stop unused estimator thread 0... [ 132.199120][ T1305] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 Apr 20 17:05:59 syzkaller kern.info kernel: [ 132.199120][ T1305] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 132.258087][ T1305] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 Apr 20 17:05:59 syzkaller kern.info kernel: [ 132.258087][ T1305] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 132.327140][ T1305] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 Apr 20 17:05:59 syzkaller kern.info kernel: [ 132.327140][ T1305] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 132.367938][ T1305] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 Apr 20 17:05:59 syzkaller kern.info kernel: [ 132.367938][ T1305] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 132.440339][ T1305] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 Apr 20 17:05:59 syzkaller kern.info kernel: [ 132.440339][ T1305] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 132.507229][ T1305] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 Apr 20 17:05:59 syzkaller kern.info kernel: [ 132.507229][ T1305] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 132.547376][ T1305] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 Apr 20 17:05:59 syzkaller kern.info kernel: [ 132.547376][ T1305] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 132.587687][ T1305] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 Apr 20 17:05:59 syzkaller kern.info kernel: [ 132.587687][ T1305] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 132.638666][ T1305] bridge_slave_1: left allmulticast mode [ 132.644326][ T1305] bridge_slave_1: left promiscuous mode [ 132.650092][ T1305] bridge0: port 2(bridge_slave_1) entered disabled state Apr 20 17:05:59 [ 132.658537][ T1305] bridge_slave_0: left allmulticast mode syzkaller kern.i[ 132.664273][ T1305] bridge_slave_0: left promiscuous mode nfo kernel: [ 1[ 132.671351][ T1305] bridge0: port 1(bridge_slave_0) entered disabled state 32.638666][ T1305] bridge_slave_[ 132.681372][ T1305] bridge_slave_1: left allmulticast mode 1: left allmulti[ 132.688921][ T1305] bridge_slave_1: left promiscuous mode cast mode Apr 2[ 132.695422][ T1305] bridge0: port 2(bridge_slave_1) entered disabled state 0 17:05:59 syzka[ 132.704398][ T1305] bridge_slave_0: left allmulticast mode ller kern.info k[ 132.710869][ T1305] bridge_slave_0: left promiscuous mode [ 132.711053][ T1305] bridge0: port 1(bridge_slave_0) entered disabled state ernel: [ 132.644326][ T1305] bridge_slave_1: left promiscuous mode Apr 20 17:05:59 syzkaller kern.info kernel: [ 132.650092][ T1305] bridge0: port 2(bridge_slave_1) entered disabled state Apr 20 17:05:59 syzkaller kern.info kernel: [ 132.658537][ T1305] bridge_slave_0: left allmulticast mode Apr 20 17:05:59 syzkaller kern.info kernel: [ 132.664273][ T1305] bridge_slave_0: left promiscuous mode Apr 20 17:05:59 syzkaller kern.info kernel: [ 132.671351][ T1305] bridge0: port 1(bridge_slave_0) entered disabled state Apr 20 17:05:59 syzkaller kern.info kernel: [ 132.681372][ T1305] bridge_slave_1: left allmulticast mode Apr 20 17:05:59 syzkaller kern.info kernel: [ 132.688921][ T1305] bridge_slave_1: left promiscuous mode Apr 20 17:05:59 syzkaller kern.info kernel: [ 132.695422][ T1305] bridge0: port 2(bridge_slave_1) entered disabled state Apr 20 17:05:59 syzkaller kern.info kernel: [ 132.704398][ T1305] bridge_slave_0: left allmulticast mode Apr 20 17:05:59 syzkaller kern.info kernel: [ 132.710869][ T1305] bridge_slave_0: left promiscuous mode Apr 20 17:05:59 syzkaller kern.info kernel: [ 132.711053][ T1305] bridge0: port 1(bridge_slave_0) entered disabled state [ 132.987011][ T1305] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 132.996804][ T1305] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface Apr 20 17:05:59 [ 133.006491][ T1305] bond0 (unregistering): Released all slaves syzkaller kern.info kernel: [ 132.987011][ T130[ 133.016459][ T1305] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 5] bond0 (unregistering): (slave[ 133.027333][ T1305] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface bond_slave_0): [ 133.038584][ T1305] bond0 (unregistering): Released all slaves Releasing backup interface Apr 20 17:05:59 syzkaller kern.info kernel: [ 132.996804][ T1305] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface Apr 20 17:05:59 syzkaller kern.info kernel: [ 133.006491][ T1305] bond0 (unregistering)[ 133.066748][ T1305] tipc: Left network mode : Released all s[ 133.072629][ T1305] IPVS: stopping master sync thread 5351 ... laves Apr 20 17:05:59 syzkaller kern.info kerne[ 133.081939][ T1305] hsr_slave_0: left promiscuous mode l: [ 133.016459[ 133.089088][ T1305] hsr_slave_1: left promiscuous mode ][ T1305] bond0 [ 133.095373][ T1305] batman_adv: batadv0: Interface deactivated: batadv_slave_0 (unregistering):[ 133.103858][ T1305] batman_adv: batadv0: Removing interface: batadv_slave_0 (slave bond_sla[ 133.113663][ T1305] batman_adv: batadv0: Interface deactivated: batadv_slave_1 ve_0): Releasing[ 133.121312][ T1305] batman_adv: batadv0: Removing interface: batadv_slave_1 backup interface Apr 20 17:05:[ 133.131767][ T1305] hsr_slave_0: left promiscuous mode 59 syzkaller ker[ 133.138317][ T1305] hsr_slave_1: left promiscuous mode n.info kernel: [[ 133.144994][ T1305] batman_adv: batadv0: Interface deactivated: batadv_slave_0 133.027333][ T[ 133.153469][ T1305] batman_adv: batadv0: Removing interface: batadv_slave_0 1305] bond0 (unr[ 133.162541][ T1305] batman_adv: batadv0: Interface deactivated: batadv_slave_1 egistering): (sl[ 133.170887][ T1305] batman_adv: batadv0: Removing interface: batadv_slave_1 ave bond_slave_1): Releasing backup interface Apr 20 17:05:59 syzkaller kern.info kernel: [ 13[ 133.186373][ T1305] veth1_macvtap: left promiscuous mode 3.038584][ T1305[ 133.193141][ T1305] veth0_macvtap: left promiscuous mode ] bond0 (unregis[ 133.200054][ T1305] veth1_vlan: left promiscuous mode tering): Release[ 133.206650][ T1305] veth0_vlan: left promiscuous mode d all slaves Ap[ 133.213515][ T1305] veth1_macvtap: left promiscuous mode r 20 17:05:59 sy[ 133.220735][ T1305] veth0_macvtap: left promiscuous mode zkaller kern.inf[ 133.227248][ T29] kauditd_printk_skb: 161 callbacks suppressed o kernel: [ 133[ 133.227262][ T29] audit: type=1400 audit(1745168760.053:32763): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .066748][ T1305][ 133.227301][ T1305] veth1_vlan: left promiscuous mode tipc: Left netw[ 133.265200][ T1305] veth0_vlan: left promiscuous mode ork mode Apr 20[ 133.265729][ T29] audit: type=1400 audit(1745168760.093:32764): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 17:05:59 syzkal[ 133.295919][ T29] audit: type=1400 audit(1745168760.123:32765): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ler kern.info ke[ 133.318334][ T29] audit: type=1400 audit(1745168760.123:32766): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 rnel: [ 133.072[ 133.341707][ T29] audit: type=1400 audit(1745168760.123:32767): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 629][ T1305] IPV[ 133.341739][ T29] audit: type=1400 audit(1745168760.123:32768): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 S: stopping mast[ 133.388799][ T29] audit: type=1400 audit(1745168760.123:32769): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 er sync thread 5[ 133.412362][ T29] audit: type=1400 audit(1745168760.143:32770): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 351 ... Apr 20 [ 133.436860][ T29] audit: type=1400 audit(1745168760.263:32771): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 17:05:59 syzkall[ 133.459182][ T29] audit: type=1400 audit(1745168760.263:32772): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 er kern.info kernel: [ 133.081939][ T1305] hsr_slave_0: left promiscuous mode Apr 20 17:05:59 syzkaller kern.info kernel: [ 133.089088][ T1305] hsr_slave_1: left promiscuous mode Apr 20 17:05:59 syzkaller kern.info kernel: [ 133.095373][ T1305] batman_adv: batadv0: Interface deactivated: batadv_slave_0 Apr 20 17:05:59 syzkaller kern.info kernel: [ 133.103858][ T1305] batman_adv: batadv0: Removing interface: batadv_slave_0 Apr 20 17:05:59 syzkaller kern.info kernel: [ 133.113663][ T1305] batman_adv: batadv0: Interface deactivated: batadv_slave_1 Apr 20 17:05:59 syzkaller kern.info kernel: [ 133.121312][ T1305] batman_adv: batadv0: Removing interface: batadv_slave_1 Apr 20 17:05:59 syzkaller kern.info kernel: [ 133.131767][ T1305] hsr_slave_0: left promiscuous mode Apr 20 17:05:59 syzkaller kern.info kernel: [ 133.138317][ T1305] hsr_slave_1: left promiscuous mode Apr 20 17:05:59 syzkaller kern.info kernel: [ 133.144994][ T1305] batman_adv: batadv[ 133.566567][ T1305] team0 (unregistering): Port device team_slave_1 removed 0: Interface deactivated: batadv_slave_0 Apr 20 17:05:59 syzkal[ 133.579305][ T1305] team0 (unregistering): Port device team_slave_0 removed ler kern.info kernel: [ 133.153469][ T1305] batman_adv: batadv0: Removing interface: batadv_slave_0 Apr 20 17:06:00 syzkaller kern.info kernel: [ 133.162541][ T1305] batman_adv: batadv0: Interface deactivated: batadv_slave_1 Apr 20 17:06:00 syzkaller kern.info kernel: [ 133.170887][ T1305] batman_adv: batadv0: Removing interface: batadv_slave_1 Apr 20 17:06:00 syzkaller kern.info kernel: [ 133.186373][ T1305] veth1_macvtap: left promiscuous mode Apr 20 17:06:00 syzkaller kern.info kernel: [ 133.193141][ T1305] vet[ 133.633260][ T1305] team0 (unregistering): Port device team_slave_1 removed h0_macvtap: left promiscuous mod[ 133.642648][ T1305] team0 (unregistering): Port device team_slave_0 removed e Apr 20 17:06:00 syzkaller kern.info kernel: [ 133.200054][ T1305] veth1_vlan: left promiscuous mode Apr 20 17:06:00 syzkaller kern.info kernel: [ 133.206650][ T1305] veth0_vlan: left promiscuous mode Apr 20 17:06:00 syzkaller kern.info kernel: [ 133.213515][ T1305] veth1_macvtap: left promiscuous mode Apr 20 1[ 133.678027][ T9] dummy0 speed is unknown, defaulting to 1000 7:06:00 syzkalle[ 133.684566][ T9] infiniband syz2: ib_query_port failed (-19) r kern.info kernel: [ 133.220735][ T1305] veth0_macvtap: left promiscuous mode Apr 20 17:06:00 syzkaller kern.warn kernel: [ 133.227248][ T29] kauditd_printk_skb: 161 callbacks suppressed Apr 20 17:06:00 syzkaller kern.notice kernel: [ 133.227262][ T29] audit: type=1400 audit(1745168760.053:32763): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Apr 20 17:06:00 syzkaller kern.info kernel: [ 133.227301][ T1305] veth1_vlan: left promiscuous mode Apr 20 17:06:00 syzkaller kern.info kernel: [ 133.265200][ T1305] veth0_vlan: left promiscuous mode Apr 20 17:06:00 syzkaller kern.notice kernel: [ 133.265729][ T29] audit: type=1400 audit(1745168760.093:32764): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Apr 20 17:06:00 syzkaller kern.notice kernel: [ 133.295919][ T29] audit: type=1400 audit(1745168760.123:32765): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Apr 20 17:06:00 syzkaller kern.notice kernel: [ 133.318334][ T29] audit: type=1400 audit(1745168760.123:32766): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Apr 20 17:06:00 syzkaller kern.notice kernel: [ 133.341707][ T29] audit: type=1400 audit(1745168760.123:32767): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Apr 20 17:06:00 syzkaller kern.notice kernel: [ 133.341739][ T29] audit: type=1400 audit(1745168760.123:32768): avc: denied { read } for pid=2986 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Apr 20 17:06:00 syzkaller kern.notice kernel: [ 133.388799][ T29] audit: type=1400 audit(1745168760.123:32769): avc: dApr 20 17:06:00 syzkaller kern.info kernel: [ 133.566567][ T1305] team0 (unregistering): Port device team_slave_1 removed Apr 20 17:06:00 syzkaller kern.info kernel: [ 133.579305][ T1305] team0 (unregistering): Port device team_slave_0 removed Apr 20 17:06:00 syzkaller kern.info kernel: [ 133.633260][ T1305] team0 (unregistering): Port device team_slave_1 removed Apr 20 17:06:00 syzkaller kern.info kernel: [ 133.642648][ T1305] team0 (unregistering): Port device team_slave_0 removed Apr 20 17:06:00 syzkaller kern.warn kernel: [ 133.678027][ T9] dummy0 speed is unknown, defaulting to 1000 Apr 20 17:06:00 syzkaller kern.warn kernel: [ 133.684566][ T9] infiniband syz2: ib_query_port failed (-19) Apr 20 17:06:01 syzkaller daemon.err dhcpcd[3042]: ps_sendpsmmsg: Connection refused Apr 20 17:06:01 syzkaller daemon.err dhcpcd[3042]: ps_root_recvmsgcb: failed to send message to pid 6357: Connection refused Apr 20 17:06:02 syzkaller daemon.err dhcpcd[3042]: ps_sendpsmmsg: Connection refused Apr 20 17:06:02 syzkaller daemon.err dhcpcd[3042]: ps_root_recvmsgcb: failed to send message to pid 6346: Connection refused Apr 20 17:06:03 syzkaller daemon.err dhcpcd[3042]: ps_sendpsmmsg: Connection refused Apr 20 17:06:03 syzkaller daemon.err dhcpcd[3042]: ps_root_recvmsgcb: failed to send message to pid 6350: Connection refused Apr 20 17:06:03 syzkaller daemon.err dhcpcd[3042]: ps_sendpsmmsg: Connection refused Apr 20 17:06:03 syzkaller daemon.err dhcpcd[3042]: ps_root_recvmsgcb: failed to send message to pid 6486: Connection refused