last executing test programs: 5.66143346s ago: executing program 0 (id=8555): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000280)={0x1, 0xb3, "aa06b45dc1adbe342eeb2a0bd83c5509880a6c7dc0f8d16a9dbd97c937af84f1af196328079904e8a92f0d3de1554982834de08bbabb9347d77c760069d69924d2c323d6de638de19125138f61f3188c846e4bfa4a1f5ae22373f0c99bdf5c0b61d7045c02e6896d968162794c0665b006ce02cfb3c8036d32bc8032728645fbfd3c80058f04ea16407e10a84f5d09c763d64d5ebadca7e37d8b19f9f0ec47ec410ca7990d8b83d5d59952e6a2eb4aa4f3da66"}) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r2, 0x0, 0x0, 0xc806, &(0x7f0000000180)={0x2, 0x4e21, @multicast2}, 0x10) sendto$inet(r2, &(0x7f0000000100)='J', 0xfdbe, 0x4004084, 0x0, 0x11000a00) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x304}, "000000b72000", "0d07080d004fcfabd5e8ffff1a8600", "aba200fe", "865703b7e43b34e4"}, 0x28) writev(r3, &(0x7f0000000080), 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, 0x0, 0x0) close(r3) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'syz_tun\x00'}) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)=ANY=[@ANYBLOB="200000001100010125bd70000000000000000000", @ANYBLOB], 0x20}}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x2145, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) 5.61308762s ago: executing program 0 (id=8556): openat2$dir(0xffffffffffffff9c, &(0x7f0000001a40)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', &(0x7f0000000280)={0x84040, 0xf4, 0x8}, 0xfffffe25) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0xfffffffffffffbff}, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x8000) r3 = syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000002a40)=ANY=[@ANYRES16=r1], &(0x7f0000000500)={0xa, &(0x7f0000000440)={0xa, 0x6, 0x250, 0x4, 0x6f, 0x8, 0x8, 0xfa}, 0xc, &(0x7f0000000480)={0x5, 0xf, 0xc, 0x1, [@ext_cap={0x7, 0x10, 0x2, 0x2, 0xc, 0x1, 0x6}]}, 0x1, [{0x4, &(0x7f00000004c0)=@lang_id={0x4, 0x3, 0x405}}]}) syz_usb_control_io$hid(r3, &(0x7f0000000700)={0x24, &(0x7f0000000540)=ANY=[@ANYBLOB="20231600000016236dd51aea410e639f8d6180503c23933a2274951b33da50fae5cad719798f75efe400"], &(0x7f00000005c0)={0x0, 0x3, 0x7f, @string={0x7f, 0x3, "f831e6ccdd7ae32a64dbdde78f5aff049bc433fad2b2b2cc7a139cae4f6386ef6799a1a1c503eb9e3f9d46cd982ae83adf8049ff14e2350b170adcd0e308b81f2e49f6c30e588aa289a46225459d16f9e43dc1c9bf202cd757eed54eea91b480050f56bb3bf0e00ea84d14a7ce7351cf5a8d36cbf99be2a2adb8556ce0"}}, &(0x7f0000000680)={0x0, 0x22, 0x1, {[@global=@item_012={0x0, 0x1, 0x2}]}}, &(0x7f00000006c0)={0x0, 0x21, 0x9, {0x9, 0x21, 0xbcd0, 0x40, 0x1, {0x22, 0x5ec}}}}, &(0x7f0000000a00)={0x2c, &(0x7f0000000740)={0x0, 0x11, 0xee, "2b1c414705c3ac14afbc710e1475a62cdeb054a9c5f747ef30ce3f086e3a7d63ff1dd0e636e25298512985aa37c893ee64a5dd45f9a47faeffbc86e8d6a888f9684d57bffc6aac0efec8aeaf54b03febcfdc738218ebeca46f20a8c28e5b14dc1d3da39b145df38d2032d2de5dbbcf3d72bb5705d8a1ee558d7f910d3caaa8e67017108a79e87eee28aeea1610dd542ce1dbc8ad060ce557b2bc6771f266793bf677b9537b750f77dac304920511f6f32f1bc8790b6fe6f692ab2cf3409fd8cff32f045eac73b879f6af6bb837dab3895ff9bad16d3d0bd6c11f9ff4873accae2a26aca61e6d1238a4ba44cba0a5"}, &(0x7f0000000840)={0x0, 0xa, 0x1, 0xb}, &(0x7f0000000880)={0x0, 0x8, 0x1, 0x9}, &(0x7f00000008c0)={0x20, 0x1, 0xee, "2a9299822f0838b8351820b8a61ff61b658ddbcda14df72cc310c87be73896fedf66e1d56384670f5b0019d6ea10f9788cbd87c4e553da5079e4da774061990bfa9f96dcd8fd641b0491536013d977a71f38ce42fea45516aaa6a7667c4897a4eff96db5ef8767e5f7ebe6474ac51aacd53ce2dcf32015a86346366139ec1d007307f351d5c17d4118d26cbbcfffb6200ee1e5a1bf409a3b0281c492a641b68320762769155cf5d372b7edd112aa93a4755a1e6b9fe2c38b37f8c3d0aafff2dee74cce85ecab318f05d2d3a2a6e2d0d9bf0f67c95a365b20d07b554f63e558100a84d96fec07d9d307f7293b8edc"}, &(0x7f00000009c0)={0x20, 0x3, 0x1, 0x9}}) mount_setattr(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000080)={0x0, 0x87, 0x20000}, 0x20) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000040)=0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f00000083c0)={{0x1}}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000000)=@generic={&(0x7f0000000a40)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0, 0x18}, 0x18) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x15) move_pages(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000ff9000/0x2000)=nil], &(0x7f0000001180), 0x0, 0x0) readv(r2, &(0x7f0000000200)=[{&(0x7f0000000140)=""/138, 0x8a}], 0x1) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x0, 0xf}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000002b00)=ANY=[@ANYBLOB="1800000000000000000000000000000018040000", @ANYRES32, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x0) mbind(&(0x7f00005f7000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1, 0x31, 0xffffffffffffffff, 0x8871b000) 2.577278631s ago: executing program 0 (id=8615): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="4400000010000100"/20, @ANYRES32=r3, @ANYBLOB="00000000000000001c0012800b00010067656e65766500000c00028008000200ac14"], 0x44}, 0x1, 0x2}, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x4008090) r4 = dup(0xffffffffffffffff) write$P9_RLERRORu(r4, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r4, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) r5 = syz_io_uring_setup(0x4172, &(0x7f0000000780)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x4004, @fd_index=0x4, 0x0, &(0x7f0000000400)=[{&(0x7f0000000800)=""/4096, 0x1000}], 0x1}) bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b000000000000"], 0x48) io_uring_enter(r5, 0x567, 0x0, 0x0, 0x0, 0x0) r8 = socket$netlink(0x10, 0x3, 0x14) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[], 0x48) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000001080)={0x10, 0x1403, 0x1, 0x720, 0x25dfdbfe}, 0x10}}, 0x4008094) 2.163438132s ago: executing program 4 (id=8618): bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[], 0x48) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRES8=r0], 0x15) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) dup3(0xffffffffffffffff, r2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x5, 0x54) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) fremovexattr(0xffffffffffffffff, 0x0) r5 = timerfd_create(0x1, 0x800) timerfd_gettime(r5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) 2.161995892s ago: executing program 0 (id=8619): syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x2010480, &(0x7f0000000080), 0x1, 0x775, &(0x7f0000001cc0)="$eJzs3d9rW2UfAPDvSdt17fa+7Qsv6LwqCFoYS+2sm4IXEy9EcDDQa7eQZmU2bUaTjrUU3BDBG0HFC0Fvdu2PeeetP271v1CQjandcOKFVE6atOmadGltEqGfD5z2+5xzkud8c87znCc5hySAA2ss/ZOJOBYR7yURI7X5SUQMVKP+iDPr691fXcmnUxJra6/+mlTXube6ko+Gx6SO1AqPRsS3b0ccz2yvt7y0PJsrFgsLtfJEZe7yRHlp+cSludxMYaYwf2pyaurk6WdOn9q/XH//Yfno7fdfevKLM3++9cjNd79L4kwcrS1rzGO/jMVY7TUZSF/CLV7c78p6LOn1BrAnadPsW2/lcSxGoq8atTDUzS0DADrlzYhYAwAOmMT5HwAOmPrnAPdWV/L1qbefSHTXnRci4vB6/vXrm+tL+mvX7A5Xr4MO30u2XBlJImJ0H+ofi4hPvnr9s3SKDl2HBGjm2vWIuDA6tr3/T7bds7BbT7WxztgDZf0fdM/X6fjn2Wbjv8zG+CeajH8Gm7TdvXh4+8/c2odqWkrHf8833Nt2vyH/mtG+Wuk/1THfQHLxUrGQ9m3/jYjxGBhMy5M71DF+96+7W2YMbIaN47/fPnjj07T+9P/mGplb/YNbn286V8n907zr7lyPeKy/Wf7Jxv5PWox/z7VZx8vPvfNxq2Vp/mm+9Wl7/p21diPiiab7f/OOtmTH+xMnqofDRP2gaOLLHz8ablV/4/5Pp7T++nuBbkj3//DO+Y8mjfdrlndfx/c3Rr5ptezh+Tc//g8lr1XjQ7V5V3OVysJkxKHkle3zT24+tl6ur5/mP/548/a/0/GfNuELbebff/uXz/eef2el+U/vav+3F/xUe3A65+b92b5W9be3/6eq0XhtTjv9X7tbutfXDQAAAAAAAAAAAAAAAAAAAAAAAAB2IxMRRyPJZDfiTCabXf8N7//HcKZYKleOXywtzk9H9beyR2MgU/+qy5GG70OdrH0ffr188oHy0xHxv4j4cHCoWs7mS8XpXicPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADVHWvz+f+rnwV5vHQDQMYd7vQEAQNc5/wPAwbO78/9Qx7YDAOge7/8B4OBx/geAg8f5HwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgA47d/ZsOq39sbqST8vTV5YWZ0tXTkwXyrPZucV8Nl9auJydKZVmioVsvjTX8omurf8rlkqXp2J+8epEpVCuTJSXls/PlRbnK+cvzeVmCucLA13LDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADaV15ans0Vi4UFgUAg2Agae4mh3nVQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP9yfwcAAP//8p8oTQ==") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) pwrite64(r0, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) (fail_nth: 2) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x107842, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x298) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_NEWRULE={0x5c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @immediate={{0xe}, @val={0x18, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DATA={0xc, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x1, "c4"}]}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x9}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x84}}, 0x0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r4}, &(0x7f0000000540), &(0x7f0000000580)=r5}, 0x20) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, @ax25={0x3, @bcast, 0x1}, @can, @generic={0x25, "97e55c00822e8a106ee889e78ae8"}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7fff, 0x8, 0x749}) fremovexattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.posix_acl_access\x00') socket$vsock_stream(0x28, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x21885e, &(0x7f0000000440)={[{@grpquota}, {@min_batch_time={'min_batch_time', 0x3d, 0x2f}}, {@dioread_lock}]}, 0x5, 0x504, &(0x7f0000001480)="$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") acct(&(0x7f0000000200)='./file1\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000040)='jffs2\x00', 0x0, 0x0) r6 = inotify_init1(0x0) inotify_add_watch(r6, &(0x7f00000002c0)='./file0\x00', 0x600010c) setxattr$incfs_metadata(&(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0) removexattr(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)=ANY=[]) 2.159691412s ago: executing program 4 (id=8628): syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x2010480, &(0x7f0000000080), 0x1, 0x775, &(0x7f0000001cc0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000000200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x1, &(0x7f0000000240)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x2}], &(0x7f0000000200)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) pwrite64(r0, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x107842, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x298) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_NEWRULE={0x5c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @immediate={{0xe}, @val={0x18, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DATA={0xc, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x1, "c4"}]}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x9}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x84}}, 0x0) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000006c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0f80000000", @ANYRES32=0x0, @ANYRES64=0x0], 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000005c0)='./file1\x00', 0x1018ed8, &(0x7f0000000180)={[{@nogrpid}, {@noload}, {@nobh}, {@noload}, {@journal_dev={'journal_dev', 0x3d, 0x4}}, {@norecovery}, {@errors_continue}, {@quota}]}, 0x6, 0x644, &(0x7f00000006c0)="$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") rseq(0x0, 0x0, 0x0, 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r3}, &(0x7f0000000540), &(0x7f0000000580)=r4}, 0x20) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, @ax25={0x3, @bcast, 0x1}, @can, @generic={0x25, "97e55c00822e8a106ee889e78ae8"}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7fff, 0x8, 0x749}) fremovexattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.posix_acl_access\x00') socket$vsock_stream(0x28, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x21885e, &(0x7f0000000440)={[{@grpquota}, {@min_batch_time={'min_batch_time', 0x3d, 0x2f}}, {@dioread_lock}]}, 0x5, 0x504, &(0x7f0000001480)="$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") 1.883547863s ago: executing program 4 (id=8621): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = io_uring_setup(0x2e34, &(0x7f0000000180)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[], 0x68}}, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 1.860351433s ago: executing program 4 (id=8622): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='kmem_cache_free\x00') r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000400"/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) setgid(0x0) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}, 0x0, 0x0, r4, 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0xffff, 0x10}, 0xc) r5 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0xdd860600, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0xec, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0xb}, [@IFLA_AF_SPEC={0xcc, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}]}, @AF_INET={0xb0, 0x2, 0x0, 0x1, {0x9, 0x1, 0x0, 0x1, [{0xc}, {0x8}, {0xa}, {0x8}, {0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x9, 0xd}, {0x8}]}}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}]}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}}, @AF_MPLS={0x4}, @AF_INET6={0x0, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_MPLS={0x4}]}]}, 0xec}}, 0x0) 1.850477833s ago: executing program 0 (id=8623): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioprio_set$pid(0x3, 0x0, 0x4000) r0 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setreuid(0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x8401) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$USBDEVFS_SUBMITURB(r2, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x7995}, 0x8, 0x0, 0xffffff80, 0x48000000, 0x0, 0x0, 0x0}) 1.824354553s ago: executing program 0 (id=8624): openat2$dir(0xffffffffffffff9c, &(0x7f0000001a40)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', &(0x7f0000000280)={0x84040, 0xf4, 0x8}, 0xfffffe25) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0xfffffffffffffbff}, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x8000) r3 = syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000002a40)=ANY=[@ANYRES16=r1], &(0x7f0000000500)={0xa, &(0x7f0000000440)={0xa, 0x6, 0x250, 0x4, 0x6f, 0x8, 0x8, 0xfa}, 0xc, &(0x7f0000000480)={0x5, 0xf, 0xc, 0x1, [@ext_cap={0x7, 0x10, 0x2, 0x2, 0xc, 0x1, 0x6}]}, 0x1, [{0x4, &(0x7f00000004c0)=@lang_id={0x4, 0x3, 0x405}}]}) syz_usb_control_io$hid(r3, &(0x7f0000000700)={0x24, &(0x7f0000000540)=ANY=[@ANYBLOB="20231600000016236dd51aea410e639f8d6180503c23933a2274951b33da50fae5cad719798f75efe400"], &(0x7f00000005c0)={0x0, 0x3, 0x7f, @string={0x7f, 0x3, "f831e6ccdd7ae32a64dbdde78f5aff049bc433fad2b2b2cc7a139cae4f6386ef6799a1a1c503eb9e3f9d46cd982ae83adf8049ff14e2350b170adcd0e308b81f2e49f6c30e588aa289a46225459d16f9e43dc1c9bf202cd757eed54eea91b480050f56bb3bf0e00ea84d14a7ce7351cf5a8d36cbf99be2a2adb8556ce0"}}, &(0x7f0000000680)={0x0, 0x22, 0x1, {[@global=@item_012={0x0, 0x1, 0x2}]}}, &(0x7f00000006c0)={0x0, 0x21, 0x9, {0x9, 0x21, 0xbcd0, 0x40, 0x1, {0x22, 0x5ec}}}}, &(0x7f0000000a00)={0x2c, &(0x7f0000000740)={0x0, 0x11, 0xee, "2b1c414705c3ac14afbc710e1475a62cdeb054a9c5f747ef30ce3f086e3a7d63ff1dd0e636e25298512985aa37c893ee64a5dd45f9a47faeffbc86e8d6a888f9684d57bffc6aac0efec8aeaf54b03febcfdc738218ebeca46f20a8c28e5b14dc1d3da39b145df38d2032d2de5dbbcf3d72bb5705d8a1ee558d7f910d3caaa8e67017108a79e87eee28aeea1610dd542ce1dbc8ad060ce557b2bc6771f266793bf677b9537b750f77dac304920511f6f32f1bc8790b6fe6f692ab2cf3409fd8cff32f045eac73b879f6af6bb837dab3895ff9bad16d3d0bd6c11f9ff4873accae2a26aca61e6d1238a4ba44cba0a5"}, &(0x7f0000000840)={0x0, 0xa, 0x1, 0xb}, &(0x7f0000000880)={0x0, 0x8, 0x1, 0x9}, &(0x7f00000008c0)={0x20, 0x1, 0xee, "2a9299822f0838b8351820b8a61ff61b658ddbcda14df72cc310c87be73896fedf66e1d56384670f5b0019d6ea10f9788cbd87c4e553da5079e4da774061990bfa9f96dcd8fd641b0491536013d977a71f38ce42fea45516aaa6a7667c4897a4eff96db5ef8767e5f7ebe6474ac51aacd53ce2dcf32015a86346366139ec1d007307f351d5c17d4118d26cbbcfffb6200ee1e5a1bf409a3b0281c492a641b68320762769155cf5d372b7edd112aa93a4755a1e6b9fe2c38b37f8c3d0aafff2dee74cce85ecab318f05d2d3a2a6e2d0d9bf0f67c95a365b20d07b554f63e558100a84d96fec07d9d307f7293b8edc"}, &(0x7f00000009c0)={0x20, 0x3, 0x1, 0x9}}) mount_setattr(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, &(0x7f0000000080)={0x0, 0x87, 0x20000}, 0x20) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000040)=0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f00000083c0)={{0x1}}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000000)=@generic={&(0x7f0000000a40)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0, 0x18}, 0x18) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x15) move_pages(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000ff9000/0x2000)=nil], &(0x7f0000001180), 0x0, 0x0) readv(r2, &(0x7f0000000200)=[{&(0x7f0000000140)=""/138, 0x8a}], 0x1) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x0, 0xf}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000002b00)=ANY=[@ANYBLOB="1800000000000000000000000000000018040000", @ANYRES32, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x0) mbind(&(0x7f00005f7000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1, 0x31, 0xffffffffffffffff, 0x8871b000) 1.754884364s ago: executing program 4 (id=8625): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000700850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000300), 0xffffffffffffffff) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) r4 = syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000280)='./file0\x00', 0x88a, &(0x7f00000003c0)={[{@usrquota}, {@usrjquota, 0x22}, {@dax_inode}, {@noload}, {@data_err_ignore}, {@dax_always, 0x22}, {@errors_continue}, {@jqfmt_vfsold}, {@barrier}]}, 0xfe, 0x44e, &(0x7f0000000900)="$eJzs3M1vG0UbAPDHdpw0bfMmbykfDS0ECiLiI2nSD3rgUgQSB5CQ4FDEKSRpFeo2qAkSrSIIHMIRVeKOOCLxF3ChXBBwQuIKd4QUoVwonIzW3k3dxE7ixIlL/ftJm8x4xpp5dnfs8azXAXSsoeRPLuJgRPwaEf3V7J0Vhqr/bq0sTP69sjCZi3L5jT9zlXp/rSxMZlWz5x2oZsrlDdpdejtiolSavprmR+cvvzc6d+36czOXJy5OX5y+Mn727KmTx7rPjJ9uSZx9SV8HP5w9euSVt268Nnn+xjs/fp3092BaXhtHqwxV925dT7a6sTbrq0nnutrYEZpSiIjkcBUr478/CtG7WtYfL3/S1s4Bu6pczpd7GhcvloF7WDJRBzpR9kaffP7Ntj2aetwVls/F6jrGrXSrlnRFPq1TTD8j7YahiDi/+M8XyRa7tA4BAFDr5rmIeLbe/C8fD9TU+196bWggIv4fEYci4r6IOBwR90dU6j4YEQ812f7aKyTr5z/l/m0FtkXJ/O+F9NrWnfO/bPYXA4U011eJv5i7MFOaPpHuk+Eo9iT5sQ3a+O6lXz5rVFY7/0u2pP1sLpj244+uNQt0UxPzEzuJudbyxxGDXfXiz63OeZP58ZGIGNxmGzNPf3W0Udnm8W+gBZPy8pcRT1WP/2KsiT+Ta3h9cuz5M+OnR/dFafrEaHZWrPfTz0uvN2p/R/G3wPLNcuyve/6vxj+Q2xcxd+36pcr12rnm21j67dOGn2m2e/53596spLvTxz6YmJ+/OhbRnXt1/ePjt5+b5bP6yfk/fLz++D8Ut/fEwxGRnMTHIuKRiHg07ftjEfF4RBzfIP4fXnzi3ebj32BVvoWS+Kc2O/5Re/ybTxQuff9N8/FnkuN/qpIaTh/ZyuvfVju4k30HAAAA/xX5ynfgc/mR1XQ+PzJS/Q7/4difL83OzT9zYfb9K1PV78oPRDGfrXT116yHjqVrw1l+fE3+ZLpu/Hmht5IfmZwtTbU7eOhwBxqM/8TvhXb3Dth17teCzmX8Q+cy/qFzGf/QuYx/6Fz1xv9HbegHsPc2ef/v3at+AHvP/B86l/EPncv4h47U8N74/I5u+ZdoU+Lb7p39VsPWE5G/S0K+ZxLFqFvUteUfs9hmoqduUbtfmQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFrj3wAAAP//j57jFA==") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r5, 0x0, 0x15) dup(r5) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000440)={'filter\x00', 0x4}, 0x68) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x20c04, &(0x7f0000000580)=ANY=[@ANYRESHEX=r5, @ANYBLOB="2f71a728fb8508e0811de0807b2eac0adcab0e2a6a92f747e88dfa78e118e0117de0b89478c2616ce3418667dfb0863665526ee3bb49b7c9c80bddb6841b01d7656e3b07c8", @ANYRES64=r1, @ANYRESDEC=r3, @ANYRES8=r4]) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r6 = getpid() sched_setscheduler(r6, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r7, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r8, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r7, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x0, 0x3938700}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) sendmsg$NL802154_CMD_SET_CHANNEL(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01009de37a3d1f0d3b8450685a29bd7000fddbdf2509000000080001000000000005000800010005000700000000000000"], 0x2c}}, 0x802) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002a20702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xa2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r9}, 0x10) 1.059889036s ago: executing program 1 (id=8636): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000380)=0xff) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0x3f) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) connect$can_bcm(r2, &(0x7f00000000c0), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vxcan0\x00', 0x0}) sendmsg$can_bcm(r2, &(0x7f0000000500)={&(0x7f00000003c0)={0x1d, r4}, 0x10, &(0x7f00000004c0)={&(0x7f0000000440)={0x1, 0x0, 0x0, {}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "cbfc0b9af540340c"}}, 0x48}}, 0x0) sendmsg$can_bcm(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f0000000140)={&(0x7f0000001c40)=ANY=[@ANYBLOB="01000000370300"/16, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0000000002"], 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x9, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_SETPARAMS(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="01002dbd7000fcdbdf252500000005002a00e8f38472050029000100000008000200", @ANYRES8], 0x2c}, 0x1, 0x0, 0x0, 0x810}, 0x4000) syz_open_dev$usbmon(&(0x7f0000000380), 0x7, 0x0) syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x2c001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r8, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000600)={0x4c, r9, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x20, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x1c, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}]}]}]}, 0x4c}}, 0x0) keyctl$set_reqkey_keyring(0xe, 0x2) 951.193726ms ago: executing program 1 (id=8637): bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[], 0x48) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRES8=r0], 0x15) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) dup3(0xffffffffffffffff, r2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x5, 0x54) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) fremovexattr(0xffffffffffffffff, 0x0) r5 = timerfd_create(0x1, 0x800) timerfd_gettime(r5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) 818.174407ms ago: executing program 1 (id=8638): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='kmem_cache_free\x00') r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000400"/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) setgid(0x0) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}, 0x0, 0x0, r4, 0x3) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0xffff, 0x10}, 0xc) r5 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0xdd860600, &(0x7f0000000040)={&(0x7f0000000500)=@newlink={0xec, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r8, 0xb}, [@IFLA_AF_SPEC={0xcc, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @local}]}, @AF_INET={0xb0, 0x2, 0x0, 0x1, {0x9, 0x1, 0x0, 0x1, [{0xc}, {0x8}, {0xa}, {0x8}, {0x8}]}}, @AF_INET={0x18, 0x2, 0x0, 0x1, {0x14, 0x1, 0x0, 0x1, [{0x9, 0xd}, {0x8}]}}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}]}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}]}}, @AF_MPLS={0x4}, @AF_INET6={0x0, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_TOKEN={0x0, 0x7, @mcast2}, @IFLA_INET6_TOKEN={0x0, 0x7, @rand_addr=' \x01\x00'}, @IFLA_INET6_TOKEN={0x0, 0x7, @dev}, @IFLA_INET6_ADDR_GEN_MODE, @IFLA_INET6_ADDR_GEN_MODE]}, @AF_MPLS={0x4}]}]}, 0xec}}, 0x0) 649.677777ms ago: executing program 3 (id=8639): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = accept(0xffffffffffffffff, &(0x7f0000000200)=@l2tp={0x2, 0x0, @private}, &(0x7f0000000000)=0x80) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000280)={0x2, &(0x7f0000000080)=[{0xe00, 0x32, 0x2}, {0x3, 0x4, 0x5, 0x7}]}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) getpgrp(0x0) 574.923348ms ago: executing program 1 (id=8640): socket$kcm(0x21, 0x2, 0x2) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)={0x34, r1, 0x7, 0x70bd2c, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x80) syz_emit_ethernet(0x2a2, &(0x7f0000001240)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @void, {@ipv6={0x86dd, @udp={0x6, 0x6, "cad4bc", 0x26c, 0x11, 0xff, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, {[@hopopts={0x1, 0xa, '\x00', [@hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x38}}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x20, {0x3, 0x6, 0x2, 0xfff7, [0xc17, 0x7, 0x33b]}}, @hao={0xc9, 0x10, @local}, @jumbo={0xc2, 0x4, 0x465}]}, @routing={0x5c, 0x0, 0x1, 0x7f}, @fragment={0x3a, 0x0, 0x9, 0x0, 0x0, 0x4, 0x67}, @hopopts={0x2e, 0x15, '\x00', [@padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1, @calipso={0x7, 0x38, {0x2, 0xc, 0x6, 0x5, [0x100000001, 0xffffffffffff679b, 0x1, 0x8, 0x0, 0x2]}}, @hao={0xc9, 0x10, @private0}, @padn={0x1, 0x2, [0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x9}, @jumbo={0xc2, 0x4, 0x3}, @calipso={0x7, 0x48, {0x0, 0x10, 0xf, 0x8, [0xfffffffffffff4a0, 0x6, 0x0, 0x3, 0x9, 0xffffffffffffff7f, 0x6, 0x29]}}]}, @dstopts={0x7a, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0xffff}]}, @srh={0x88, 0x10, 0x4, 0x8, 0x3, 0x40, 0x7b8f, [@private1, @mcast2, @empty, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, @private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @dev={0xfe, 0x80, '\x00', 0x20}, @local]}], {0x4e23, 0x4e22, 0xac, 0x0, @gue={{0x2, 0x0, 0x0, 0x3}, "e77854862df385a700fefed41f34b81106bc6305d0e4cf2b667cc8521680b555c8afa81c256fd65b46e570585e0923e98d9c6a115f5c80bc291cf338abf46897523aa43a6b1d28f487bad6979981870a3449c5fb81f9c428bdc5b0512ba5042206e5ec36067058b9544c602b64b9f0ebb7964e81ba85b9c67ba95d38bd2d5d98ce4477cef2f2ffbb0d99afff7209fac3772b268d9d15c946040aa04d"}}}}}}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$procfs(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/slabinfo\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000ac0), r3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000e00), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r5, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000000a00)=ANY=[@ANYBLOB="2c010000", @ANYRES16=r6, @ANYBLOB="01000000000000000000170000000c00060001000000010000000c01308014000400976f1044852bca665354bd217b6b9037200001800c0005000400000000000000080001000300000005000200000000000500020008000000240003"], 0x12c}, 0x1, 0x0, 0x0, 0x20000020}, 0x0) sendmsg$IEEE802154_LLSEC_SETPARAMS(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000003c0)={0x20, r4, 0x5, 0x0, 0x0, {0x22}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x20}}, 0x4000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) r7 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)={0x38, 0x1403, 0x301, 0x0, 0x0, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'team_slave_0\x00'}}]}, 0x38}}, 0x0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0900000004000000e27f0000010000ed00000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000400)=ANY=[@ANYRESDEC=r2, @ANYRES8=0x0, @ANYBLOB="00000000000000f985000000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000826f0000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) io_setup(0x4, &(0x7f00000004c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000c"], 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) 476.557458ms ago: executing program 3 (id=8641): r0 = io_uring_setup(0x21e9, &(0x7f0000002400)={0x0, 0xffffffbc, 0x0, 0x2, 0x176}) close_range(r0, 0xffffffffffffffff, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r1, 0x0, 0x0) listen(r1, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @local}, 0x10) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000640)='E', 0x1}], 0x1) r3 = accept4$unix(r1, 0x0, 0x0, 0x0) recvmsg(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000480)=""/68, 0x44}], 0x1}, 0x4c2103a0) 473.926708ms ago: executing program 3 (id=8642): syz_open_dev$usbmon(&(0x7f0000000180), 0x0, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000300)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000540)={'syztnl2\x00', 0x0}) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$smc(&(0x7f00000005c0), 0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r4}, 0x10) rmdir(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r5, &(0x7f0000001240)=""/102400, 0x200000, 0x0) 283.699019ms ago: executing program 1 (id=8643): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f00000021c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r2, &(0x7f0000002180)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000001fc0)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f00000000c0)=[{&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/48, 0x30}], 0x2}}], 0x48}, 0x0) 269.637249ms ago: executing program 3 (id=8644): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioprio_set$pid(0x3, 0x0, 0x4000) r0 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setreuid(0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x8401) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$USBDEVFS_SUBMITURB(r2, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x7995}, 0x8, 0x0, 0xffffff80, 0x48000000, 0x0, 0x0, 0x0}) 267.613789ms ago: executing program 2 (id=8654): socket$kcm(0x21, 0x2, 0x2) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)={0x34, r1, 0x7, 0x70bd2c, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x80) syz_emit_ethernet(0x2a2, &(0x7f0000001240)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @void, {@ipv6={0x86dd, @udp={0x6, 0x6, "cad4bc", 0x26c, 0x11, 0xff, @mcast2, @ipv4={'\x00', '\xff\xff', @empty}, {[@hopopts={0x1, 0xa, '\x00', [@hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x38}}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x20, {0x3, 0x6, 0x2, 0xfff7, [0xc17, 0x7, 0x33b]}}, @hao={0xc9, 0x10, @local}, @jumbo={0xc2, 0x4, 0x465}]}, @routing={0x5c, 0x0, 0x1, 0x7f}, @fragment={0x3a, 0x0, 0x9, 0x0, 0x0, 0x4, 0x67}, @hopopts={0x2e, 0x15, '\x00', [@padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1, @calipso={0x7, 0x38, {0x2, 0xc, 0x6, 0x5, [0x100000001, 0xffffffffffff679b, 0x1, 0x8, 0x0, 0x2]}}, @hao={0xc9, 0x10, @private0}, @padn={0x1, 0x2, [0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x9}, @jumbo={0xc2, 0x4, 0x3}, @calipso={0x7, 0x48, {0x0, 0x10, 0xf, 0x8, [0xfffffffffffff4a0, 0x6, 0x0, 0x3, 0x9, 0xffffffffffffff7f, 0x6, 0x29]}}]}, @dstopts={0x7a, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0xffff}]}, @srh={0x88, 0x10, 0x4, 0x8, 0x3, 0x40, 0x7b8f, [@private1, @mcast2, @empty, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, @private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @dev={0xfe, 0x80, '\x00', 0x20}, @local]}], {0x4e23, 0x4e22, 0xac, 0x0, @gue={{0x2, 0x0, 0x0, 0x3}, "e77854862df385a700fefed41f34b81106bc6305d0e4cf2b667cc8521680b555c8afa81c256fd65b46e570585e0923e98d9c6a115f5c80bc291cf338abf46897523aa43a6b1d28f487bad6979981870a3449c5fb81f9c428bdc5b0512ba5042206e5ec36067058b9544c602b64b9f0ebb7964e81ba85b9c67ba95d38bd2d5d98ce4477cef2f2ffbb0d99afff7209fac3772b268d9d15c946040aa04d"}}}}}}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) socket$packet(0x11, 0x2, 0x300) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$procfs(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/slabinfo\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000ac0), r3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000e00), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r5, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000000a00)=ANY=[@ANYBLOB="2c010000", @ANYRES16=r6, @ANYBLOB="01000000000000000000170000000c00060001000000010000000c01308014000400976f1044852bca665354bd217b6b9037200001800c0005000400000000000000080001000300000005000200000000000500020008000000240003"], 0x12c}, 0x1, 0x0, 0x0, 0x20000020}, 0x0) sendmsg$IEEE802154_LLSEC_SETPARAMS(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f00000003c0)={0x20, r4, 0x5, 0x0, 0x0, {0x22}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x20}}, 0x4000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) r7 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)={0x38, 0x1403, 0x301, 0x0, 0x0, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'team_slave_0\x00'}}]}, 0x38}}, 0x0) r8 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0900000004000000e27f0000010000ed00000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000400)=ANY=[@ANYRESDEC=r2, @ANYRES8=0x0, @ANYBLOB="00000000000000f985000000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000826f0000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) io_setup(0x4, &(0x7f00000004c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000c"], 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) 237.742599ms ago: executing program 1 (id=8645): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a91c16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911040000000000000003c851", 0x72}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x16}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62458c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f00000025c0)="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", 0xcb3}, {&(0x7f00000006c0)="97b13f5cf9f584c87e0e637d2ff483a311bb412cb3b03c3d9e97e435f2fceb58ff0402ed7b96244b43386c222917662028d7a01206a1990722ccef1d8f39f7c8ae242e58359217b1c6161ea741445cf16b0c48eb18a6c72174dfb7cd1bd0f409dad5a432bed4afb470da3656dd30d70769e229dc91037321d618e1eff4a176ea46d5cd4d5da97f80356e46d9e8166bf2d97210b631654ece218a2a204a1786ab5a60a881a7a294cd2f92438350e6e3ec4439ebe06133ff65b1e32b809ba0482783b563ec8e5778285da5211e5821135433053a7921319c544d5e797f", 0xdc}, {&(0x7f00000007c0)="75c37714a0bada8343bceb64ccb6d95a2a37b020e0bf1f6a1de4584223a2f285aaca30a9554cd5cdc1659cb9fec462cc5c2220a7cd891ec3bad99fe3c06e15a109ec0fdb6aeeee5ef8e4bfc28e17984a3860b907d549492d47a447782b7357ea72f4b2c26512a6a33c0247b730a6182ea5a99aee25fcee07f9cb0a80595cd5f744fa6898fdffda5b34b19474b8e853467329e4aea36cfd0e00735d37beb0f895c5688259a8935194eefd3a96d55707133a08f03e14da563160a545396b93341f41c161c93687e28a", 0xc8}, {&(0x7f0000000b00)="1b080b7a30aec939ce8e26e0cbbe37fc064ceef965fd5e3b6739c966492dbdf71c04423d8a403e56dfd224e4e55918a5e31e683fec5cc9460882a0d1628d02d51a8da997073f856e2cd00586c6e8c89c71cf8be6121b0b3a85d597a1afb0cc311f30cc26183c8e594ce5ff62661c9e32cbc9dd9a72985e9857f3bddb52382b6c27ca85d5774cf17b92e2d2097f12a8687e70f90d46381a47706a9124a2cf61b84f26aae22fd4da84ae35b93f7be9fdfdfbf33c59f5c657e9f7e81b81b786082f88af4de07808ff3c954bae", 0xcb}], 0x8, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r1, &(0x7f0000001140)={0x0, 0x2, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) 236.888269ms ago: executing program 3 (id=8656): syz_open_dev$usbmon(&(0x7f0000000180), 0x0, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000300)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000540)={'syztnl2\x00', 0x0}) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$smc(&(0x7f00000005c0), 0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r4}, 0x10) rmdir(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r5, &(0x7f0000001240)=""/102400, 0x200000, 0x0) 172.709719ms ago: executing program 2 (id=8646): capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000280)='0', 0x1}], 0x1) request_key(&(0x7f0000001000)='dns_resolver\x00', &(0x7f0000001040)={'syz', 0x2}, &(0x7f0000001080)='\x00', 0x0) 134.202629ms ago: executing program 2 (id=8647): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000280)={0x1, 0xb3, "aa06b45dc1adbe342eeb2a0bd83c5509880a6c7dc0f8d16a9dbd97c937af84f1af196328079904e8a92f0d3de1554982834de08bbabb9347d77c760069d69924d2c323d6de638de19125138f61f3188c846e4bfa4a1f5ae22373f0c99bdf5c0b61d7045c02e6896d968162794c0665b006ce02cfb3c8036d32bc8032728645fbfd3c80058f04ea16407e10a84f5d09c763d64d5ebadca7e37d8b19f9f0ec47ec410ca7990d8b83d5d59952e6a2eb4aa4f3da66"}) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendto$inet(r2, 0x0, 0x0, 0xc806, &(0x7f0000000180)={0x2, 0x4e21, @multicast2}, 0x10) sendto$inet(r2, &(0x7f0000000100)='J', 0xfdbe, 0x4004084, 0x0, 0x11000a00) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x304}, "000000b72000", "0d07080d004fcfabd5e8ffff1a8600", "aba200fe", "865703b7e43b34e4"}, 0x28) writev(r3, &(0x7f0000000080), 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, 0x0, 0x0) close(r3) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRES32=r7, @ANYBLOB], 0x20}}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x2145, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) 61.328199ms ago: executing program 2 (id=8648): bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[], 0x48) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYRES8=r0], 0x15) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) dup3(0xffffffffffffffff, r2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x5, 0x54) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) fremovexattr(0xffffffffffffffff, 0x0) r5 = timerfd_create(0x1, 0x800) timerfd_gettime(r5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) 47.786639ms ago: executing program 3 (id=8649): syz_open_dev$usbmon(0x0, 0x0, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000300)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000540)={'syztnl2\x00', 0x0}) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$smc(&(0x7f00000005c0), 0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180100002100000000000000000000008500000075000000a50000002300000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) accept4$unix(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000400)=0x6e, 0x800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r4}, 0x10) rmdir(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r5, &(0x7f0000001240)=""/102400, 0x200000, 0x0) 21.40512ms ago: executing program 2 (id=8650): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f00000021c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r1, &(0x7f0000002180)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000001fc0)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f00000000c0)=[{&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/48, 0x30}], 0x2}}], 0x48}, 0x0) 1.264929ms ago: executing program 4 (id=8651): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='sched_switch\x00', r0, 0x0, 0xfffffffffffffff6}, 0x18) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1c, 0xb, &(0x7f0000000040)=ANY=[@ANYRES32=r0], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000500)=""/46) 0s ago: executing program 2 (id=8652): r0 = io_uring_setup(0x21e9, &(0x7f0000002400)={0x0, 0xffffffbc, 0x0, 0x2, 0x176}) close_range(r0, 0xffffffffffffffff, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r1, 0x0, 0x0) listen(r1, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000100)={0x28, 0x0, 0x0, @local}, 0x10) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000640)='E', 0x1}], 0x1) r3 = accept4$unix(r1, 0x0, 0x0, 0x0) recvmsg(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000480)=""/68, 0x44}], 0x1}, 0x4c2103a0) kernel console output (not intermixed with test programs): 0000000000040 RSI: 0000000000000029 RDI: 0000000000000005 [ 557.799797][T29937] RBP: 00007f67187e70a0 R08: 00000000000014c8 R09: 0000000000000000 [ 557.807819][T29937] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 557.815966][T29937] R13: 0000000000000000 R14: 00007f671a335fa0 R15: 00007ffd9eeae718 [ 557.823964][T29937] [ 557.911688][T20818] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 558.166328][T29966] bpf_get_probe_write_proto: 8 callbacks suppressed [ 558.166369][T29966] syz.1.7911[29966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 558.180850][T29966] syz.1.7911[29966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 558.206453][T29966] syz.1.7911[29966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 558.220146][T29966] FAULT_INJECTION: forcing a failure. [ 558.220146][T29966] name failslab, interval 1, probability 0, space 0, times 0 [ 558.244251][T29966] CPU: 1 UID: 0 PID: 29966 Comm: syz.1.7911 Not tainted 6.13.0-rc2-syzkaller #0 [ 558.253304][T29966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 558.263378][T29966] Call Trace: [ 558.266714][T29966] [ 558.269660][T29966] dump_stack_lvl+0xf2/0x150 [ 558.274308][T29966] dump_stack+0x15/0x1a [ 558.278486][T29966] should_fail_ex+0x223/0x230 [ 558.283175][T29966] should_failslab+0x8f/0xb0 [ 558.287835][T29966] kmem_cache_alloc_noprof+0x52/0x320 [ 558.293296][T29966] ? security_inode_alloc+0x37/0x100 [ 558.298605][T29966] security_inode_alloc+0x37/0x100 [ 558.303774][T29966] inode_init_always_gfp+0x4a2/0x4f0 [ 558.309091][T29966] ? __pfx_hugetlbfs_alloc_inode+0x10/0x10 [ 558.314977][T29966] alloc_inode+0x82/0x160 [ 558.319311][T29966] new_inode+0x1e/0x100 [ 558.323624][T29966] hugetlbfs_get_inode+0x7d/0x380 [ 558.328665][T29966] hugetlb_file_setup+0x188/0x3c0 [ 558.333767][T29966] ksys_mmap_pgoff+0x172/0x330 [ 558.338598][T29966] x64_sys_call+0x1940/0x2dc0 [ 558.343303][T29966] do_syscall_64+0xc9/0x1c0 [ 558.347811][T29966] ? clear_bhb_loop+0x55/0xb0 [ 558.352497][T29966] ? clear_bhb_loop+0x55/0xb0 [ 558.357179][T29966] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 558.363175][T29966] RIP: 0033:0x7fa7d6d5fed9 [ 558.367593][T29966] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 558.387240][T29966] RSP: 002b:00007fa7d53d7058 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 558.395729][T29966] RAX: ffffffffffffffda RBX: 00007fa7d6f25fa0 RCX: 00007fa7d6d5fed9 [ 558.403704][T29966] RDX: 0000000000000000 RSI: 0000000000c00008 RDI: 0000000020400000 [ 558.411681][T29966] RBP: 00007fa7d53d70a0 R08: ffffffffffffffff R09: 0000000000000000 [ 558.419662][T29966] R10: 0000000000050032 R11: 0000000000000246 R12: 0000000000000001 [ 558.427725][T29966] R13: 0000000000000000 R14: 00007fa7d6f25fa0 R15: 00007fff35c3e888 [ 558.435777][T29966] [ 558.439076][ T3377] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 558.651087][T22606] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 558.916577][T29993] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 558.991193][T20818] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 558.999164][T20818] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 559.255445][T30018] FAULT_INJECTION: forcing a failure. [ 559.255445][T30018] name failslab, interval 1, probability 0, space 0, times 0 [ 559.268246][T30018] CPU: 1 UID: 0 PID: 30018 Comm: syz.2.7931 Not tainted 6.13.0-rc2-syzkaller #0 [ 559.277370][T30018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 559.287522][T30018] Call Trace: [ 559.290822][T30018] [ 559.293833][T30018] dump_stack_lvl+0xf2/0x150 [ 559.298525][T30018] dump_stack+0x15/0x1a [ 559.302724][T30018] should_fail_ex+0x223/0x230 [ 559.307507][T30018] should_failslab+0x8f/0xb0 [ 559.312179][T30018] kmem_cache_alloc_node_noprof+0x59/0x320 [ 559.318007][T30018] ? __alloc_skb+0x10b/0x310 [ 559.322629][T30018] __alloc_skb+0x10b/0x310 [ 559.327104][T30018] netlink_alloc_large_skb+0xad/0xe0 [ 559.332420][T30018] netlink_sendmsg+0x3b4/0x6e0 [ 559.337236][T30018] ? __pfx_netlink_sendmsg+0x10/0x10 [ 559.342557][T30018] __sock_sendmsg+0x140/0x180 [ 559.347282][T30018] ____sys_sendmsg+0x312/0x410 [ 559.352140][T30018] __sys_sendmsg+0x19d/0x230 [ 559.356760][T30018] __x64_sys_sendmsg+0x46/0x50 [ 559.361538][T30018] x64_sys_call+0x2734/0x2dc0 [ 559.366299][T30018] do_syscall_64+0xc9/0x1c0 [ 559.370897][T30018] ? clear_bhb_loop+0x55/0xb0 [ 559.375587][T30018] ? clear_bhb_loop+0x55/0xb0 [ 559.380348][T30018] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 559.386374][T30018] RIP: 0033:0x7fd5031bfed9 [ 559.390849][T30018] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 559.410510][T30018] RSP: 002b:00007fd501837058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 559.418984][T30018] RAX: ffffffffffffffda RBX: 00007fd503385fa0 RCX: 00007fd5031bfed9 [ 559.426998][T30018] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000005 [ 559.435032][T30018] RBP: 00007fd5018370a0 R08: 0000000000000000 R09: 0000000000000000 [ 559.443083][T30018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 559.451060][T30018] R13: 0000000000000000 R14: 00007fd503385fa0 R15: 00007ffe2009b578 [ 559.459055][T30018] [ 559.471140][ T3372] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 559.593272][T30029] netlink: 8 bytes leftover after parsing attributes in process `syz.2.7935'. [ 559.625035][T30029] 9pnet_fd: Insufficient options for proto=fd [ 559.651078][T30037] netlink: 140 bytes leftover after parsing attributes in process `kmem_cache_free'. [ 559.662069][T30037] netlink: 140 bytes leftover after parsing attributes in process `kmem_cache_free'. [ 559.663587][T30029] rdma_rxe: rxe_newlink: failed to add syzkaller0 [ 559.678577][T30035] FAULT_INJECTION: forcing a failure. [ 559.678577][T30035] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 559.691734][T30035] CPU: 1 UID: 0 PID: 30035 Comm: syz.4.7938 Not tainted 6.13.0-rc2-syzkaller #0 [ 559.700778][T30035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 559.710836][T30035] Call Trace: [ 559.714219][T30035] [ 559.717203][T30035] dump_stack_lvl+0xf2/0x150 [ 559.721807][T30035] dump_stack+0x15/0x1a [ 559.726120][T30035] should_fail_ex+0x223/0x230 [ 559.730803][T30035] should_fail+0xb/0x10 [ 559.735000][T30035] should_fail_usercopy+0x1a/0x20 [ 559.740045][T30035] _copy_from_user+0x1e/0xb0 [ 559.744684][T30035] bpf_obj_get_info_by_fd+0x2cd/0x1cb0 [ 559.750207][T30035] ? kstrtoull+0x110/0x140 [ 559.754626][T30035] ? kstrtouint+0x77/0xc0 [ 559.758969][T30035] __sys_bpf+0x613/0x7a0 [ 559.763280][T30035] __x64_sys_bpf+0x43/0x50 [ 559.767842][T30035] x64_sys_call+0x2914/0x2dc0 [ 559.772527][T30035] do_syscall_64+0xc9/0x1c0 [ 559.777054][T30035] ? clear_bhb_loop+0x55/0xb0 [ 559.781754][T30035] ? clear_bhb_loop+0x55/0xb0 [ 559.786444][T30035] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 559.792378][T30035] RIP: 0033:0x7f671a16fed9 [ 559.796866][T30035] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 559.816487][T30035] RSP: 002b:00007f67187e7058 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 559.824976][T30035] RAX: ffffffffffffffda RBX: 00007f671a335fa0 RCX: 00007f671a16fed9 [ 559.832948][T30035] RDX: 0000000000000010 RSI: 0000000020000340 RDI: 000000000000000f [ 559.840920][T30035] RBP: 00007f67187e70a0 R08: 0000000000000000 R09: 0000000000000000 [ 559.848898][T30035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 559.856934][T30035] R13: 0000000000000000 R14: 00007f671a335fa0 R15: 00007ffd9eeae718 [ 559.864918][T30035] [ 559.901197][T22606] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 560.423396][T26956] udevd[26956]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 560.719812][T30081] netlink: 8 bytes leftover after parsing attributes in process `syz.3.7956'. [ 560.737617][T30081] 9pnet_fd: Insufficient options for proto=fd [ 560.756951][T30081] rdma_rxe: rxe_newlink: failed to add syzkaller0 [ 560.856016][T30088] netlink: 48 bytes leftover after parsing attributes in process `syz.4.7960'. [ 561.111097][T30105] netlink: 16 bytes leftover after parsing attributes in process `syz.0.7966'. [ 561.216240][ T29] kauditd_printk_skb: 288 callbacks suppressed [ 561.216259][ T29] audit: type=1326 audit(1733757841.572:17969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30111 comm="syz.3.7970" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 561.252058][ T29] audit: type=1326 audit(1733757841.572:17970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30111 comm="syz.3.7970" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 561.275777][ T29] audit: type=1326 audit(1733757841.572:17971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30111 comm="syz.3.7970" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 561.299669][ T29] audit: type=1326 audit(1733757841.572:17972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30111 comm="syz.3.7970" exe="/root/syz-executor" sig=0 arch=c000003e syscall=325 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 561.323294][ T29] audit: type=1326 audit(1733757841.572:17973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30111 comm="syz.3.7970" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 561.347031][ T29] audit: type=1326 audit(1733757841.572:17974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30111 comm="syz.3.7970" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 561.374243][ T29] audit: type=1326 audit(1733757841.612:17975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30112 comm="syz.1.7967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa7d6d5fed9 code=0x7ffc0000 [ 561.398013][ T29] audit: type=1326 audit(1733757841.612:17976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30112 comm="syz.1.7967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa7d6d5fed9 code=0x7ffc0000 [ 561.412510][T30117] lo speed is unknown, defaulting to 1000 [ 561.421599][ T29] audit: type=1326 audit(1733757841.612:17977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30112 comm="syz.1.7967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fa7d6d5fed9 code=0x7ffc0000 [ 561.451069][ T29] audit: type=1326 audit(1733757841.612:17978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30112 comm="syz.1.7967" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa7d6d5fed9 code=0x7ffc0000 [ 561.519740][T30117] lo speed is unknown, defaulting to 1000 [ 562.225514][T30150] lo speed is unknown, defaulting to 1000 [ 562.266407][T30150] lo speed is unknown, defaulting to 1000 [ 562.425408][T30161] netlink: 12 bytes leftover after parsing attributes in process `syz.1.7987'. [ 562.467448][T30161] veth0_vlan: entered allmulticast mode [ 562.485409][T30167] netlink: 16 bytes leftover after parsing attributes in process `syz.0.7990'. [ 562.502592][T30165] netlink: 8 bytes leftover after parsing attributes in process `syz.4.7989'. [ 562.538443][T30165] 9pnet_fd: Insufficient options for proto=fd [ 562.546396][T30161] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 562.553882][T30165] rdma_rxe: rxe_newlink: failed to add syzkaller0 [ 562.557953][T30161] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 562.619303][T30173] FAULT_INJECTION: forcing a failure. [ 562.619303][T30173] name failslab, interval 1, probability 0, space 0, times 0 [ 562.628796][T30176] FAULT_INJECTION: forcing a failure. [ 562.628796][T30176] name failslab, interval 1, probability 0, space 0, times 0 [ 562.632103][T30173] CPU: 1 UID: 0 PID: 30173 Comm: syz.1.7992 Not tainted 6.13.0-rc2-syzkaller #0 [ 562.653674][T30173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 562.663872][T30173] Call Trace: [ 562.667196][T30173] [ 562.670133][T30173] dump_stack_lvl+0xf2/0x150 [ 562.674760][T30173] dump_stack+0x15/0x1a [ 562.678956][T30173] should_fail_ex+0x223/0x230 [ 562.683665][T30173] should_failslab+0x8f/0xb0 [ 562.688304][T30173] kmem_cache_alloc_noprof+0x52/0x320 [ 562.693769][T30173] ? audit_log_start+0x34c/0x6b0 [ 562.698780][T30173] audit_log_start+0x34c/0x6b0 [ 562.703640][T30173] audit_seccomp+0x4b/0x130 [ 562.708165][T30173] __seccomp_filter+0x6fa/0x1180 [ 562.713214][T30173] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 562.718910][T30173] ? vfs_write+0x596/0x920 [ 562.723371][T30173] ? __schedule+0x6fa/0x930 [ 562.727902][T30173] __secure_computing+0x9f/0x1c0 [ 562.732891][T30173] syscall_trace_enter+0xd1/0x1f0 [ 562.737976][T30173] do_syscall_64+0xaa/0x1c0 [ 562.742582][T30173] ? clear_bhb_loop+0x55/0xb0 [ 562.747284][T30173] ? clear_bhb_loop+0x55/0xb0 [ 562.752013][T30173] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 562.757973][T30173] RIP: 0033:0x7fa7d6d5fed9 [ 562.762397][T30173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 562.782244][T30173] RSP: 002b:00007fa7d53d7058 EFLAGS: 00000246 ORIG_RAX: 000000000000014d [ 562.790667][T30173] RAX: ffffffffffffffda RBX: 00007fa7d6f25fa0 RCX: 00007fa7d6d5fed9 [ 562.798645][T30173] RDX: 0000000000000003 RSI: 0000000000000003 RDI: 00007fa7d7a64000 [ 562.806677][T30173] RBP: 00007fa7d53d70a0 R08: 0000000020000500 R09: 0000000000000000 [ 562.814655][T30173] R10: 0000000020000380 R11: 0000000000000246 R12: 0000000000000001 [ 562.822700][T30173] R13: 0000000000000000 R14: 00007fa7d6f25fa0 R15: 00007fff35c3e888 [ 562.830685][T30173] [ 562.833755][T30176] CPU: 0 UID: 0 PID: 30176 Comm: syz.3.7993 Not tainted 6.13.0-rc2-syzkaller #0 [ 562.842862][T30176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 562.852995][T30176] Call Trace: [ 562.856276][T30176] [ 562.859213][T30176] dump_stack_lvl+0xf2/0x150 [ 562.863832][T30176] dump_stack+0x15/0x1a [ 562.868007][T30176] should_fail_ex+0x223/0x230 [ 562.872752][T30176] should_failslab+0x8f/0xb0 [ 562.877368][T30176] kmem_cache_alloc_noprof+0x52/0x320 [ 562.882778][T30176] ? getname_flags+0x81/0x3b0 [ 562.887509][T30176] getname_flags+0x81/0x3b0 [ 562.892022][T30176] getname+0x17/0x20 [ 562.895924][T30176] do_sys_openat2+0x67/0x120 [ 562.900584][T30176] __x64_sys_creat+0x66/0x90 [ 562.905321][T30176] x64_sys_call+0x1084/0x2dc0 [ 562.910010][T30176] do_syscall_64+0xc9/0x1c0 [ 562.914520][T30176] ? clear_bhb_loop+0x55/0xb0 [ 562.919202][T30176] ? clear_bhb_loop+0x55/0xb0 [ 562.923906][T30176] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 562.929848][T30176] RIP: 0033:0x7f9a8b8afed9 [ 562.934273][T30176] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 562.953970][T30176] RSP: 002b:00007f9a89f27058 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 562.962394][T30176] RAX: ffffffffffffffda RBX: 00007f9a8ba75fa0 RCX: 00007f9a8b8afed9 [ 562.970424][T30176] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000e00 [ 562.978400][T30176] RBP: 00007f9a89f270a0 R08: 0000000000000000 R09: 0000000000000000 [ 562.986401][T30176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 562.994393][T30176] R13: 0000000000000000 R14: 00007f9a8ba75fa0 R15: 00007ffd465cb8c8 [ 563.002420][T30176] [ 563.116362][T30186] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 563.126239][T30186] netlink: 3 bytes leftover after parsing attributes in process `syz.3.7998'. [ 563.137261][T30186] 0ªX¹¦À: renamed from caif0 [ 563.146215][T30186] 0ªX¹¦À: entered allmulticast mode [ 563.151533][T30186] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 563.178919][T30186] hub 9-0:1.0: USB hub found [ 563.184622][T30186] hub 9-0:1.0: 8 ports detected [ 563.401078][ C1] ip6_tnl_xmit_ctl: 2 callbacks suppressed [ 563.401099][ C1] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 563.602303][T30221] FAULT_INJECTION: forcing a failure. [ 563.602303][T30221] name failslab, interval 1, probability 0, space 0, times 0 [ 563.615015][T30221] CPU: 1 UID: 0 PID: 30221 Comm: syz.3.8011 Not tainted 6.13.0-rc2-syzkaller #0 [ 563.624131][T30221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 563.634352][T30221] Call Trace: [ 563.637647][T30221] [ 563.640595][T30221] dump_stack_lvl+0xf2/0x150 [ 563.645232][T30221] dump_stack+0x15/0x1a [ 563.649426][T30221] should_fail_ex+0x223/0x230 [ 563.654227][T30221] should_failslab+0x8f/0xb0 [ 563.658855][T30221] kmem_cache_alloc_noprof+0x52/0x320 [ 563.664277][T30221] ? audit_log_start+0x34c/0x6b0 [ 563.669234][T30221] audit_log_start+0x34c/0x6b0 [ 563.674035][T30221] audit_seccomp+0x4b/0x130 [ 563.678566][T30221] __seccomp_filter+0x6fa/0x1180 [ 563.683595][T30221] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 563.689266][T30221] ? vfs_write+0x596/0x920 [ 563.693708][T30221] ? putname+0xcf/0xf0 [ 563.697817][T30221] __secure_computing+0x9f/0x1c0 [ 563.702786][T30221] syscall_trace_enter+0xd1/0x1f0 [ 563.707862][T30221] ? fpregs_assert_state_consistent+0x83/0xa0 [ 563.713967][T30221] do_syscall_64+0xaa/0x1c0 [ 563.718494][T30221] ? clear_bhb_loop+0x55/0xb0 [ 563.723277][T30221] ? clear_bhb_loop+0x55/0xb0 [ 563.728058][T30221] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 563.733995][T30221] RIP: 0033:0x7f9a8b8afed9 [ 563.738460][T30221] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 563.758235][T30221] RSP: 002b:00007f9a89f27058 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 563.766682][T30221] RAX: ffffffffffffffda RBX: 00007f9a8ba75fa0 RCX: 00007f9a8b8afed9 [ 563.774671][T30221] RDX: 000000000000006e RSI: 0000000020000280 RDI: 000000000000000c [ 563.782662][T30221] RBP: 00007f9a89f270a0 R08: 0000000000000000 R09: 0000000000000000 [ 563.790703][T30221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 563.798698][T30221] R13: 0000000000000000 R14: 00007f9a8ba75fa0 R15: 00007ffd465cb8c8 [ 563.806779][T30221] [ 563.810084][T22606] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 564.372006][T30255] 9pnet_fd: Insufficient options for proto=fd [ 564.380780][T30255] rdma_rxe: rxe_newlink: failed to add syzkaller0 [ 564.416059][T30257] FAULT_INJECTION: forcing a failure. [ 564.416059][T30257] name failslab, interval 1, probability 0, space 0, times 0 [ 564.428754][T30257] CPU: 0 UID: 0 PID: 30257 Comm: syz.3.8025 Not tainted 6.13.0-rc2-syzkaller #0 [ 564.437813][T30257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 564.447973][T30257] Call Trace: [ 564.451265][T30257] [ 564.454285][T30257] dump_stack_lvl+0xf2/0x150 [ 564.458916][T30257] dump_stack+0x15/0x1a [ 564.463118][T30257] should_fail_ex+0x223/0x230 [ 564.467842][T30257] should_failslab+0x8f/0xb0 [ 564.472464][T30257] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 564.478288][T30257] ? shmem_alloc_inode+0x34/0x50 [ 564.483321][T30257] shmem_alloc_inode+0x34/0x50 [ 564.488141][T30257] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 564.493704][T30257] alloc_inode+0x3c/0x160 [ 564.498054][T30257] new_inode+0x1e/0x100 [ 564.502228][T30257] shmem_get_inode+0x24e/0x730 [ 564.507080][T30257] __shmem_file_setup+0x127/0x1f0 [ 564.512194][T30257] shmem_file_setup+0x3b/0x50 [ 564.516896][T30257] __se_sys_memfd_create+0x31d/0x5c0 [ 564.522271][T30257] __x64_sys_memfd_create+0x31/0x40 [ 564.527501][T30257] x64_sys_call+0x2d4c/0x2dc0 [ 564.532280][T30257] do_syscall_64+0xc9/0x1c0 [ 564.536795][T30257] ? clear_bhb_loop+0x55/0xb0 [ 564.541491][T30257] ? clear_bhb_loop+0x55/0xb0 [ 564.546174][T30257] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 564.552118][T30257] RIP: 0033:0x7f9a8b8afed9 [ 564.556564][T30257] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 564.576261][T30257] RSP: 002b:00007f9a89f26e38 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 564.584774][T30257] RAX: ffffffffffffffda RBX: 00000000000004bf RCX: 00007f9a8b8afed9 [ 564.592769][T30257] RDX: 00007f9a89f26f10 RSI: 0000000000000000 RDI: 00007f9a8b92461b [ 564.600746][T30257] RBP: 0000000020000740 R08: 00007f9a89f26bd7 R09: 00007f9a89f26e60 [ 564.608774][T30257] R10: 000000000000000a R11: 0000000000000202 R12: 0000000020000080 [ 564.616751][T30257] R13: 00007f9a89f26f10 R14: 00007f9a89f26ed0 R15: 0000000020000500 [ 564.624743][T30257] [ 564.655862][T30259] tipc: Started in network mode [ 564.660773][T30259] tipc: Node identity cac089f40514, cluster identity 4711 [ 564.668078][T30259] tipc: Enabled bearer , priority 10 [ 564.681660][T30261] __nla_validate_parse: 2 callbacks suppressed [ 564.681677][T30261] netlink: 36 bytes leftover after parsing attributes in process `syz.2.8027'. [ 564.696940][T30261] netlink: 36 bytes leftover after parsing attributes in process `syz.2.8027'. [ 564.716327][T30261] netlink: 36 bytes leftover after parsing attributes in process `syz.2.8027'. [ 564.942658][T30288] netlink: 40 bytes leftover after parsing attributes in process `syz.2.8036'. [ 564.965242][T30288] syz.2.8036[30288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 564.965371][T30288] syz.2.8036[30288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 564.988784][T30288] syz.2.8036[30288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 565.015624][T30288] Cannot find set identified by id 0 to match [ 565.060061][T30290] lo speed is unknown, defaulting to 1000 [ 565.065990][T14382] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 565.084978][T30296] netlink: 32 bytes leftover after parsing attributes in process `syz.0.8039'. [ 565.094125][T30296] netem: unknown loss type 13 [ 565.098883][T30296] netem: change failed [ 565.118453][T30290] lo speed is unknown, defaulting to 1000 [ 565.131212][T30299] FAULT_INJECTION: forcing a failure. [ 565.131212][T30299] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 565.144322][T30299] CPU: 1 UID: 0 PID: 30299 Comm: syz.1.8040 Not tainted 6.13.0-rc2-syzkaller #0 [ 565.153448][T30299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 565.163522][T30299] Call Trace: [ 565.166816][T30299] [ 565.169767][T30299] dump_stack_lvl+0xf2/0x150 [ 565.174446][T30299] dump_stack+0x15/0x1a [ 565.178658][T30299] should_fail_ex+0x223/0x230 [ 565.183433][T30299] should_fail+0xb/0x10 [ 565.187620][T30299] should_fail_usercopy+0x1a/0x20 [ 565.192840][T30299] _copy_to_user+0x20/0xa0 [ 565.197285][T30299] simple_read_from_buffer+0xa0/0x110 [ 565.202772][T30299] proc_fail_nth_read+0xf9/0x140 [ 565.207805][T30299] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 565.213469][T30299] vfs_read+0x1a2/0x700 [ 565.217659][T30299] ? __rcu_read_unlock+0x4e/0x70 [ 565.222713][T30299] ? __fget_files+0x17c/0x1c0 [ 565.227456][T30299] ksys_read+0xe8/0x1b0 [ 565.231717][T30299] __x64_sys_read+0x42/0x50 [ 565.236259][T30299] x64_sys_call+0x2874/0x2dc0 [ 565.241036][T30299] do_syscall_64+0xc9/0x1c0 [ 565.245564][T30299] ? clear_bhb_loop+0x55/0xb0 [ 565.250267][T30299] ? clear_bhb_loop+0x55/0xb0 [ 565.255140][T30299] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 565.261095][T30299] RIP: 0033:0x7fa7d6d5e8ec [ 565.265530][T30299] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 565.282327][T30305] netlink: 16 bytes leftover after parsing attributes in process `syz.0.8043'. [ 565.285192][T30299] RSP: 002b:00007fa7d53d7050 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 565.302649][T30299] RAX: ffffffffffffffda RBX: 00007fa7d6f25fa0 RCX: 00007fa7d6d5e8ec [ 565.310648][T30299] RDX: 000000000000000f RSI: 00007fa7d53d70b0 RDI: 0000000000000007 [ 565.318714][T30299] RBP: 00007fa7d53d70a0 R08: 0000000000000000 R09: 0000000000000000 [ 565.326764][T30299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 565.334926][T30299] R13: 0000000000000000 R14: 00007fa7d6f25fa0 R15: 00007fff35c3e888 [ 565.342932][T30299] [ 565.591989][T30330] lo speed is unknown, defaulting to 1000 [ 565.606773][T30332] IPv6: Can't replace route, no match found [ 565.621507][T30332] x_tables: ip_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 565.634578][T30330] lo speed is unknown, defaulting to 1000 [ 565.641986][T30336] FAULT_INJECTION: forcing a failure. [ 565.641986][T30336] name failslab, interval 1, probability 0, space 0, times 0 [ 565.654695][T30336] CPU: 1 UID: 0 PID: 30336 Comm: syz.1.8055 Not tainted 6.13.0-rc2-syzkaller #0 [ 565.663742][T30336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 565.673832][T30336] Call Trace: [ 565.677195][T30336] [ 565.680189][T30336] dump_stack_lvl+0xf2/0x150 [ 565.684807][T30336] dump_stack+0x15/0x1a [ 565.689105][T30336] should_fail_ex+0x223/0x230 [ 565.693796][T30336] should_failslab+0x8f/0xb0 [ 565.698421][T30336] kmem_cache_alloc_node_noprof+0x59/0x320 [ 565.704240][T30336] ? dup_task_struct+0x6c/0x710 [ 565.709105][T30336] dup_task_struct+0x6c/0x710 [ 565.713823][T30336] ? kstrtoull+0x110/0x140 [ 565.718295][T30336] copy_process+0x3a9/0x1f90 [ 565.722900][T30336] ? 0xffffffff81000000 [ 565.727126][T30336] ? selinux_file_permission+0x22a/0x360 [ 565.732772][T30336] ? __rcu_read_unlock+0x4e/0x70 [ 565.737881][T30336] kernel_clone+0x167/0x5e0 [ 565.742426][T30336] ? vfs_write+0x596/0x920 [ 565.746866][T30336] __x64_sys_clone+0xe8/0x120 [ 565.751572][T30336] x64_sys_call+0x2d7e/0x2dc0 [ 565.756288][T30336] do_syscall_64+0xc9/0x1c0 [ 565.760836][T30336] ? clear_bhb_loop+0x55/0xb0 [ 565.765606][T30336] ? clear_bhb_loop+0x55/0xb0 [ 565.770345][T30336] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 565.776311][T30336] RIP: 0033:0x7fa7d6d5fed9 [ 565.780771][T30336] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 565.800466][T30336] RSP: 002b:00007fa7d53d7008 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 565.808966][T30336] RAX: ffffffffffffffda RBX: 00007fa7d6f25fa0 RCX: 00007fa7d6d5fed9 [ 565.817032][T30336] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 565.825101][T30336] RBP: 00007fa7d53d70a0 R08: 0000000000000000 R09: 0000000000000000 [ 565.833077][T30336] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 565.841144][T30336] R13: 0000000000000000 R14: 00007fa7d6f25fa0 R15: 00007fff35c3e888 [ 565.849135][T30336] [ 565.852403][ T3377] tipc: Node number set to 3486812660 [ 565.947035][T30339] lo speed is unknown, defaulting to 1000 [ 565.959845][T30344] lo speed is unknown, defaulting to 1000 [ 566.006250][T30339] lo speed is unknown, defaulting to 1000 [ 566.017275][T30342] lo speed is unknown, defaulting to 1000 [ 566.076408][T30344] lo speed is unknown, defaulting to 1000 [ 566.222476][T30363] FAULT_INJECTION: forcing a failure. [ 566.222476][T30363] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 566.235641][T30363] CPU: 1 UID: 0 PID: 30363 Comm: syz.1.8065 Not tainted 6.13.0-rc2-syzkaller #0 [ 566.244703][T30363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 566.254860][T30363] Call Trace: [ 566.258159][T30363] [ 566.261239][T30363] dump_stack_lvl+0xf2/0x150 [ 566.265909][T30363] dump_stack+0x15/0x1a [ 566.270158][T30363] should_fail_ex+0x223/0x230 [ 566.274940][T30363] should_fail+0xb/0x10 [ 566.279166][T30363] should_fail_usercopy+0x1a/0x20 [ 566.284294][T30363] _copy_from_user+0x1e/0xb0 [ 566.287721][T30342] lo speed is unknown, defaulting to 1000 [ 566.288952][T30363] memdup_user+0x64/0xc0 [ 566.295595][T20818] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 566.298892][T30363] strndup_user+0x68/0xa0 [ 566.311043][T30363] perf_uprobe_init+0x49/0x140 [ 566.315846][T30363] perf_uprobe_event_init+0xe2/0x140 [ 566.321186][T30363] perf_try_init_event+0xcb/0x4f0 [ 566.326277][T30363] ? perf_event_alloc+0xac6/0x12e0 [ 566.331425][T30363] perf_event_alloc+0xad1/0x12e0 [ 566.336509][T30363] __se_sys_perf_event_open+0x5ac/0x2230 [ 566.342174][T30363] ? proc_fail_nth_write+0x12a/0x150 [ 566.347510][T30363] ? vfs_write+0x4e1/0x920 [ 566.352017][T30363] __x64_sys_perf_event_open+0x67/0x80 [ 566.357514][T30363] x64_sys_call+0x1deb/0x2dc0 [ 566.362312][T30363] do_syscall_64+0xc9/0x1c0 [ 566.366846][T30363] ? clear_bhb_loop+0x55/0xb0 [ 566.371576][T30363] ? clear_bhb_loop+0x55/0xb0 [ 566.376328][T30363] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 566.382265][T30363] RIP: 0033:0x7fa7d6d5fed9 [ 566.386703][T30363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 566.406543][T30363] RSP: 002b:00007fa7d53d7058 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 566.415027][T30363] RAX: ffffffffffffffda RBX: 00007fa7d6f25fa0 RCX: 00007fa7d6d5fed9 [ 566.423035][T30363] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000000 [ 566.431038][T30363] RBP: 00007fa7d53d70a0 R08: 000000000000000a R09: 0000000000000000 [ 566.439032][T30363] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 566.447026][T30363] R13: 0000000000000000 R14: 00007fa7d6f25fa0 R15: 00007fff35c3e888 [ 566.455118][T30363] [ 566.490834][ T29] kauditd_printk_skb: 855 callbacks suppressed [ 566.490849][ T29] audit: type=1326 audit(1733757846.842:18830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30369 comm="syz.3.8066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 566.516059][T30372] pim6reg1: entered promiscuous mode [ 566.526129][T30372] pim6reg1: entered allmulticast mode [ 566.536344][ T29] audit: type=1326 audit(1733757846.842:18831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30369 comm="syz.3.8066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 566.536747][T30375] 9pnet_fd: Insufficient options for proto=fd [ 566.560052][ T29] audit: type=1326 audit(1733757846.842:18832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30369 comm="syz.3.8066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=289 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 566.581566][T30375] FAULT_INJECTION: forcing a failure. [ 566.581566][T30375] name failslab, interval 1, probability 0, space 0, times 0 [ 566.589752][ T29] audit: type=1326 audit(1733757846.842:18833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30369 comm="syz.3.8066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 566.602333][T30375] CPU: 1 UID: 0 PID: 30375 Comm: syz.1.8068 Not tainted 6.13.0-rc2-syzkaller #0 [ 566.602361][T30375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 566.602374][T30375] Call Trace: [ 566.602381][T30375] [ 566.651609][T30375] dump_stack_lvl+0xf2/0x150 [ 566.651653][T30375] dump_stack+0x15/0x1a [ 566.651685][T30375] should_fail_ex+0x223/0x230 [ 566.651751][T30375] should_failslab+0x8f/0xb0 [ 566.651784][T30375] kmem_cache_alloc_noprof+0x52/0x320 [ 566.651808][T30375] ? __break_lease+0x7a/0xf60 [ 566.651897][T30375] __break_lease+0x7a/0xf60 [ 566.651923][T30375] ? may_link+0x31d/0x3a0 [ 566.651953][T30375] ? selinux_inode_unlink+0x22/0x30 [ 566.651980][T30375] vfs_unlink+0x1ef/0x430 [ 566.652012][T30375] do_unlinkat+0x237/0x4d0 [ 566.652054][T30375] __x64_sys_unlink+0x2e/0x40 [ 566.652113][T30375] x64_sys_call+0x2329/0x2dc0 [ 566.652135][T30375] do_syscall_64+0xc9/0x1c0 [ 566.652155][T30375] ? clear_bhb_loop+0x55/0xb0 [ 566.652196][T30375] ? clear_bhb_loop+0x55/0xb0 [ 566.652216][T30375] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 566.652258][T30375] RIP: 0033:0x7fa7d6d5fed9 [ 566.652275][T30375] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 566.652383][T30375] RSP: 002b:00007fa7d53d7058 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 566.652532][T30375] RAX: ffffffffffffffda RBX: 00007fa7d6f25fa0 RCX: 00007fa7d6d5fed9 [ 566.652546][T30375] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200000c0 [ 566.652626][T30375] RBP: 00007fa7d53d70a0 R08: 0000000000000000 R09: 0000000000000000 [ 566.652640][T30375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 566.652653][T30375] R13: 0000000000000000 R14: 00007fa7d6f25fa0 R15: 00007fff35c3e888 [ 566.652674][T30375] [ 566.807052][T30358] bond2: entered promiscuous mode [ 566.807146][T30358] bond2: entered allmulticast mode [ 566.807327][T30358] 8021q: adding VLAN 0 to HW filter on device bond2 [ 566.816006][T30358] bond2 (unregistering): Released all slaves [ 566.940240][T30392] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 566.948922][T30392] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 567.039318][T30402] FAULT_INJECTION: forcing a failure. [ 567.039318][T30402] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 567.052476][T30402] CPU: 1 UID: 0 PID: 30402 Comm: syz.3.8079 Not tainted 6.13.0-rc2-syzkaller #0 [ 567.061605][T30402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 567.071718][T30402] Call Trace: [ 567.075011][T30402] [ 567.077963][T30402] dump_stack_lvl+0xf2/0x150 [ 567.082653][T30402] dump_stack+0x15/0x1a [ 567.086963][T30402] should_fail_ex+0x223/0x230 [ 567.091678][T30402] should_fail+0xb/0x10 [ 567.095946][T30402] should_fail_usercopy+0x1a/0x20 [ 567.101002][T30402] _copy_to_user+0x20/0xa0 [ 567.105503][T30402] simple_read_from_buffer+0xa0/0x110 [ 567.110968][T30402] proc_fail_nth_read+0xf9/0x140 [ 567.115953][T30402] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 567.121659][T30402] vfs_read+0x1a2/0x700 [ 567.125834][T30402] ? __rcu_read_unlock+0x4e/0x70 [ 567.130840][T30402] ? __fget_files+0x17c/0x1c0 [ 567.135668][T30402] ksys_read+0xe8/0x1b0 [ 567.139907][T30402] __x64_sys_read+0x42/0x50 [ 567.144425][T30402] x64_sys_call+0x2874/0x2dc0 [ 567.149113][T30402] do_syscall_64+0xc9/0x1c0 [ 567.153630][T30402] ? clear_bhb_loop+0x55/0xb0 [ 567.158321][T30402] ? clear_bhb_loop+0x55/0xb0 [ 567.163081][T30402] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 567.169111][T30402] RIP: 0033:0x7f9a8b8ae8ec [ 567.173534][T30402] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 567.193217][T30402] RSP: 002b:00007f9a89f27050 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 567.201653][T30402] RAX: ffffffffffffffda RBX: 00007f9a8ba75fa0 RCX: 00007f9a8b8ae8ec [ 567.209633][T30402] RDX: 000000000000000f RSI: 00007f9a89f270b0 RDI: 0000000000000005 [ 567.217612][T30402] RBP: 00007f9a89f270a0 R08: 0000000000000000 R09: 0000000000000000 [ 567.225619][T30402] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 567.233634][T30402] R13: 0000000000000000 R14: 00007f9a8ba75fa0 R15: 00007ffd465cb8c8 [ 567.241694][T30402] [ 567.305885][T30399] lo speed is unknown, defaulting to 1000 [ 567.320207][ T29] audit: type=1400 audit(1733757847.672:18834): avc: denied { write } for pid=30409 comm="syz.0.8082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 567.348422][ T29] audit: type=1326 audit(1733757847.692:18835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30406 comm="syz.3.8081" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 567.372172][ T29] audit: type=1326 audit(1733757847.692:18836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30406 comm="syz.3.8081" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 567.395797][ T29] audit: type=1326 audit(1733757847.702:18837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30406 comm="syz.3.8081" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 567.419573][ T29] audit: type=1326 audit(1733757847.702:18838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30406 comm="syz.3.8081" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 567.424974][T30413] netlink: 8 bytes leftover after parsing attributes in process `syz.4.8083'. [ 567.443293][ T29] audit: type=1326 audit(1733757847.702:18839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30406 comm="syz.3.8081" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 567.475514][T30416] 9pnet_fd: Insufficient options for proto=fd [ 567.547255][T30399] lo speed is unknown, defaulting to 1000 [ 567.558211][T30413] rdma_rxe: rxe_newlink: failed to add syzkaller0 [ 567.593076][T14428] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 567.655757][T30427] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8086'. [ 568.007627][T30440] block device autoloading is deprecated and will be removed. [ 568.185762][T30440] x_tables: duplicate underflow at hook 1 [ 568.446815][T30462] lo speed is unknown, defaulting to 1000 [ 568.576027][T30462] lo speed is unknown, defaulting to 1000 [ 568.654762][T30480] netlink: 24 bytes leftover after parsing attributes in process `syz.4.8106'. [ 568.712423][T14396] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 568.792974][T30497] netlink: 12 bytes leftover after parsing attributes in process `syz.4.8111'. [ 568.865155][T30506] loop0: detected capacity change from 0 to 256 [ 568.983882][T30506] loop0: detected capacity change from 0 to 512 [ 569.006778][T30506] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 569.041302][T30506] EXT4-fs (loop0): 1 truncate cleaned up [ 569.059493][T30506] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 569.167254][T30522] lo speed is unknown, defaulting to 1000 [ 569.217684][T30526] FAULT_INJECTION: forcing a failure. [ 569.217684][T30526] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 569.230914][T30526] CPU: 1 UID: 0 PID: 30526 Comm: syz.4.8121 Not tainted 6.13.0-rc2-syzkaller #0 [ 569.239971][T30526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 569.250130][T30526] Call Trace: [ 569.253441][T30526] [ 569.256375][T30526] dump_stack_lvl+0xf2/0x150 [ 569.261053][T30526] dump_stack+0x15/0x1a [ 569.265271][T30526] should_fail_ex+0x223/0x230 [ 569.269966][T30526] should_fail+0xb/0x10 [ 569.274130][T30526] should_fail_usercopy+0x1a/0x20 [ 569.279171][T30526] _copy_to_user+0x20/0xa0 [ 569.283663][T30526] simple_read_from_buffer+0xa0/0x110 [ 569.289173][T30526] proc_fail_nth_read+0xf9/0x140 [ 569.294130][T30526] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 569.299692][T30526] vfs_read+0x1a2/0x700 [ 569.303947][T30526] ? __rcu_read_unlock+0x4e/0x70 [ 569.308958][T30526] ? __fget_files+0x17c/0x1c0 [ 569.313742][T30526] ksys_read+0xe8/0x1b0 [ 569.317934][T30526] __x64_sys_read+0x42/0x50 [ 569.322449][T30526] x64_sys_call+0x2874/0x2dc0 [ 569.327215][T30526] do_syscall_64+0xc9/0x1c0 [ 569.331726][T30526] ? clear_bhb_loop+0x55/0xb0 [ 569.336481][T30526] ? clear_bhb_loop+0x55/0xb0 [ 569.341224][T30526] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 569.347154][T30526] RIP: 0033:0x7f671a16e8ec [ 569.351604][T30526] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 569.371306][T30526] RSP: 002b:00007f67187e7050 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 569.379737][T30526] RAX: ffffffffffffffda RBX: 00007f671a335fa0 RCX: 00007f671a16e8ec [ 569.387813][T30526] RDX: 000000000000000f RSI: 00007f67187e70b0 RDI: 0000000000000005 [ 569.395875][T30526] RBP: 00007f67187e70a0 R08: 0000000000000000 R09: 0000000000000000 [ 569.403864][T30526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 569.411929][T30526] R13: 0000000000000000 R14: 00007f671a335fa0 R15: 00007ffd9eeae718 [ 569.419923][T30526] [ 569.438029][T30522] lo speed is unknown, defaulting to 1000 [ 569.467105][T30504] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 569.588664][T30532] lo speed is unknown, defaulting to 1000 [ 569.660676][T30532] lo speed is unknown, defaulting to 1000 [ 569.751333][T30556] FAULT_INJECTION: forcing a failure. [ 569.751333][T30556] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 569.764578][T30556] CPU: 0 UID: 0 PID: 30556 Comm: syz.3.8130 Not tainted 6.13.0-rc2-syzkaller #0 [ 569.773705][T30556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 569.783770][T30556] Call Trace: [ 569.787066][T30556] [ 569.790004][T30556] dump_stack_lvl+0xf2/0x150 [ 569.794623][T30556] dump_stack+0x15/0x1a [ 569.798902][T30556] should_fail_ex+0x223/0x230 [ 569.803663][T30556] should_fail+0xb/0x10 [ 569.807921][T30556] should_fail_usercopy+0x1a/0x20 [ 569.813014][T30556] _copy_to_user+0x20/0xa0 [ 569.817472][T30556] simple_read_from_buffer+0xa0/0x110 [ 569.822893][T30556] proc_fail_nth_read+0xf9/0x140 [ 569.827909][T30556] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 569.833539][T30556] vfs_read+0x1a2/0x700 [ 569.837719][T30556] ? __rcu_read_unlock+0x4e/0x70 [ 569.842674][T30556] ? __fget_files+0x17c/0x1c0 [ 569.847393][T30556] ksys_read+0xe8/0x1b0 [ 569.851605][T30556] __x64_sys_read+0x42/0x50 [ 569.856191][T30556] x64_sys_call+0x2874/0x2dc0 [ 569.860922][T30556] do_syscall_64+0xc9/0x1c0 [ 569.865429][T30556] ? clear_bhb_loop+0x55/0xb0 [ 569.870255][T30556] ? clear_bhb_loop+0x55/0xb0 [ 569.874958][T30556] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 569.880921][T30556] RIP: 0033:0x7f9a8b8ae8ec [ 569.885346][T30556] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 569.905076][T30556] RSP: 002b:00007f9a89f27050 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 569.913501][T30556] RAX: ffffffffffffffda RBX: 00007f9a8ba75fa0 RCX: 00007f9a8b8ae8ec [ 569.921516][T30556] RDX: 000000000000000f RSI: 00007f9a89f270b0 RDI: 0000000000000005 [ 569.929497][T30556] RBP: 00007f9a89f270a0 R08: 0000000000000000 R09: 0000000000000000 [ 569.937476][T30556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 569.945457][T30556] R13: 0000000000000000 R14: 00007f9a8ba75fa0 R15: 00007ffd465cb8c8 [ 569.953535][T30556] [ 570.127900][T30578] lo speed is unknown, defaulting to 1000 [ 570.133785][T30578] lo speed is unknown, defaulting to 1000 [ 570.148684][T30578] lo speed is unknown, defaulting to 1000 [ 570.159552][T30578] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 570.180768][T30583] FAULT_INJECTION: forcing a failure. [ 570.180768][T30583] name failslab, interval 1, probability 0, space 0, times 0 [ 570.193692][T30583] CPU: 1 UID: 0 PID: 30583 Comm: syz.1.8142 Not tainted 6.13.0-rc2-syzkaller #0 [ 570.202953][T30583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 570.213037][T30583] Call Trace: [ 570.216337][T30583] [ 570.219384][T30583] dump_stack_lvl+0xf2/0x150 [ 570.224161][T30583] dump_stack+0x15/0x1a [ 570.228399][T30583] should_fail_ex+0x223/0x230 [ 570.233114][T30583] should_failslab+0x8f/0xb0 [ 570.237781][T30583] kmem_cache_alloc_node_noprof+0x59/0x320 [ 570.243706][T30583] ? __alloc_skb+0x10b/0x310 [ 570.248327][T30583] __alloc_skb+0x10b/0x310 [ 570.252895][T30583] netlink_alloc_large_skb+0xad/0xe0 [ 570.258285][T30583] netlink_sendmsg+0x3b4/0x6e0 [ 570.263076][T30583] ? __pfx_netlink_sendmsg+0x10/0x10 [ 570.268450][T30583] __sock_sendmsg+0x140/0x180 [ 570.269787][T14382] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 570.273185][T30583] ____sys_sendmsg+0x312/0x410 [ 570.273253][T30583] __sys_sendmsg+0x19d/0x230 [ 570.290355][T30583] __x64_sys_sendmsg+0x46/0x50 [ 570.295158][T30583] x64_sys_call+0x2734/0x2dc0 [ 570.299913][T30583] do_syscall_64+0xc9/0x1c0 [ 570.304543][T30583] ? clear_bhb_loop+0x55/0xb0 [ 570.309304][T30583] ? clear_bhb_loop+0x55/0xb0 [ 570.313985][T30583] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 570.319935][T30583] RIP: 0033:0x7fa7d6d5fed9 [ 570.324436][T30583] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 570.344075][T30583] RSP: 002b:00007fa7d53d7058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 570.352659][T30583] RAX: ffffffffffffffda RBX: 00007fa7d6f25fa0 RCX: 00007fa7d6d5fed9 [ 570.360647][T30583] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000003 [ 570.368716][T30583] RBP: 00007fa7d53d70a0 R08: 0000000000000000 R09: 0000000000000000 [ 570.376740][T30583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 570.384717][T30583] R13: 0000000000000000 R14: 00007fa7d6f25fa0 R15: 00007fff35c3e888 [ 570.392704][T30583] [ 570.402398][T30585] __nla_validate_parse: 1 callbacks suppressed [ 570.402419][T30585] netlink: 116 bytes leftover after parsing attributes in process `syz.4.8138'. [ 570.430047][T30585] smc: net device bond0 erased user defined pnetid SYZ0 [ 570.430471][T30578] lo speed is unknown, defaulting to 1000 [ 570.437540][T30585] smc: ib device syz1 ibport 1 erased user defined pnetid SYZ0 [ 570.455556][T30578] lo speed is unknown, defaulting to 1000 [ 570.461705][T30578] lo speed is unknown, defaulting to 1000 [ 570.491517][T30578] lo speed is unknown, defaulting to 1000 [ 570.497624][T30578] lo speed is unknown, defaulting to 1000 [ 570.534597][T30578] lo speed is unknown, defaulting to 1000 [ 570.540748][T30578] lo speed is unknown, defaulting to 1000 [ 570.718401][T30578] lo speed is unknown, defaulting to 1000 [ 570.724650][T30578] lo speed is unknown, defaulting to 1000 [ 570.743687][T30600] loop0: detected capacity change from 0 to 2048 [ 570.791960][T30600] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 570.809624][T30600] netlink: 28 bytes leftover after parsing attributes in process `gtp'. [ 570.858927][T30610] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8151'. [ 570.917752][T30610] rdma_rxe: rxe_newlink: failed to add syzkaller0 [ 570.930394][T30613] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8153'. [ 570.970354][T30613] 9pnet_fd: Insufficient options for proto=fd [ 570.985003][T21991] EXT4-fs error (device loop0): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 571.012249][T30613] rdma_rxe: rxe_newlink: failed to add syzkaller0 [ 571.048453][T21991] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 571.398902][T22606] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 571.774505][ T29] kauditd_printk_skb: 98 callbacks suppressed [ 571.774523][ T29] audit: type=1400 audit(1733757852.132:18938): avc: denied { write } for pid=30643 comm="syz.4.8164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 571.821023][ T29] audit: type=1400 audit(1733757852.132:18939): avc: denied { remount } for pid=30644 comm="syz.2.8165" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 571.841105][ T29] audit: type=1400 audit(1733757852.162:18940): avc: denied { nlmsg_read } for pid=30643 comm="syz.4.8164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 571.936998][T30651] FAULT_INJECTION: forcing a failure. [ 571.936998][T30651] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 571.950311][T30651] CPU: 0 UID: 0 PID: 30651 Comm: syz.2.8167 Not tainted 6.13.0-rc2-syzkaller #0 [ 571.959406][T30651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 571.969537][T30651] Call Trace: [ 571.972833][T30651] [ 571.975778][T30651] dump_stack_lvl+0xf2/0x150 [ 571.980443][T30651] dump_stack+0x15/0x1a [ 571.984758][T30651] should_fail_ex+0x223/0x230 [ 571.989532][T30651] should_fail+0xb/0x10 [ 571.993770][T30651] should_fail_usercopy+0x1a/0x20 [ 571.998925][T30651] strncpy_from_user+0x25/0x210 [ 572.003801][T30651] ? selinux_file_permission+0x22a/0x360 [ 572.009462][T30651] ? __rcu_read_unlock+0x4e/0x70 [ 572.014436][T30651] path_removexattrat+0x81/0x4b0 [ 572.019395][T30651] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 572.025058][T30651] __x64_sys_removexattr+0x38/0x50 [ 572.030236][T30651] x64_sys_call+0x3ea/0x2dc0 [ 572.034836][T30651] do_syscall_64+0xc9/0x1c0 [ 572.039352][T30651] ? clear_bhb_loop+0x55/0xb0 [ 572.044117][T30651] ? clear_bhb_loop+0x55/0xb0 [ 572.048806][T30651] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 572.054790][T30651] RIP: 0033:0x7fd5031bfed9 [ 572.059225][T30651] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 572.078995][T30651] RSP: 002b:00007fd501837058 EFLAGS: 00000246 ORIG_RAX: 00000000000000c5 [ 572.087435][T30651] RAX: ffffffffffffffda RBX: 00007fd503385fa0 RCX: 00007fd5031bfed9 [ 572.095441][T30651] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 00000000200000c0 [ 572.103479][T30651] RBP: 00007fd5018370a0 R08: 0000000000000000 R09: 0000000000000000 [ 572.111518][T30651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 572.119514][T30651] R13: 0000000000000000 R14: 00007fd503385fa0 R15: 00007ffe2009b578 [ 572.127537][T30651] [ 572.261730][ T29] audit: type=1400 audit(1733757852.612:18941): avc: denied { bind } for pid=30666 comm="syz.3.8172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 572.326499][ T29] audit: type=1400 audit(1733757852.682:18942): avc: denied { write } for pid=30666 comm="syz.3.8172" path="socket:[89830]" dev="sockfs" ino=89830 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 572.352480][ T29] audit: type=1400 audit(1733757852.712:18943): avc: denied { read } for pid=30673 comm="syz.4.8174" path="socket:[90302]" dev="sockfs" ino=90302 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 572.490948][T30667] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8172'. [ 572.546754][ T29] audit: type=1400 audit(1733757852.902:18944): avc: denied { append } for pid=30671 comm="syz.2.8175" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 572.570697][ T29] audit: type=1400 audit(1733757852.902:18945): avc: denied { open } for pid=30671 comm="syz.2.8175" path="/dev/sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 572.671114][ C1] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 572.701671][T20818] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 572.764727][ T29] audit: type=1400 audit(1733757852.952:18946): avc: denied { recv } for pid=29 comm="kauditd" saddr=10.128.0.163 src=30030 daddr=10.128.1.13 dest=42674 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 572.789888][ T29] audit: type=1400 audit(1733757852.952:18947): avc: denied { append } for pid=2981 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 572.861649][T30686] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8179'. [ 572.874239][T30686] 9pnet_fd: Insufficient options for proto=fd [ 572.886215][T30686] rdma_rxe: rxe_newlink: failed to add syzkaller0 [ 573.253578][T30706] loop0: detected capacity change from 0 to 512 [ 573.260211][T30707] syz.2.8186[30707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 573.260320][T30707] syz.2.8186[30707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 573.284400][T30707] syz.2.8186[30707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 573.286353][T30708] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8185'. [ 573.316236][T30708] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8185'. [ 573.328499][T30706] EXT4-fs error (device loop0): ext4_xattr_ibody_find:2240: inode #15: comm syz.0.8187: corrupted in-inode xattr: invalid ea_ino [ 573.341161][T30708] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8185'. [ 573.343979][T30706] EXT4-fs error (device loop0): ext4_orphan_get:1394: comm syz.0.8187: couldn't read orphan inode 15 (err -117) [ 573.365525][T30706] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 573.394200][T30707] syz.2.8186[30707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 573.394810][T30707] syz.2.8186[30707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 573.414816][T30707] syz.2.8186[30707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 573.427018][T21991] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 573.524664][T30711] ebtables: ebtables: counters copy to user failed while replacing table [ 573.721687][T30733] lo speed is unknown, defaulting to 1000 [ 573.841466][T14396] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 573.937591][T30733] lo speed is unknown, defaulting to 1000 [ 573.966627][T30733] lo speed is unknown, defaulting to 1000 [ 575.771524][T14382] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 575.784538][T30785] loop0: detected capacity change from 0 to 164 [ 575.810020][T30789] netlink: 44 bytes leftover after parsing attributes in process `+}[@'. [ 575.833357][T30785] syz.0.8201: attempt to access beyond end of device [ 575.833357][T30785] loop0: rw=524288, sector=263328, nr_sectors = 4 limit=164 [ 575.907264][T30785] syz.0.8201: attempt to access beyond end of device [ 575.907264][T30785] loop0: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 575.981055][T30785] syz.0.8201: attempt to access beyond end of device [ 575.981055][T30785] loop0: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 576.007585][T30785] syz.0.8201: attempt to access beyond end of device [ 576.007585][T30785] loop0: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 576.053458][T30785] syz.0.8201: attempt to access beyond end of device [ 576.053458][T30785] loop0: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 576.122561][T30785] syz.0.8201: attempt to access beyond end of device [ 576.122561][T30785] loop0: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 576.178774][T30785] syz.0.8201: attempt to access beyond end of device [ 576.178774][T30785] loop0: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 576.261014][T30785] syz.0.8201: attempt to access beyond end of device [ 576.261014][T30785] loop0: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 576.291108][T30785] syz.0.8201: attempt to access beyond end of device [ 576.291108][T30785] loop0: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 576.358804][T30785] syz.0.8201: attempt to access beyond end of device [ 576.358804][T30785] loop0: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 576.702943][T30812] FAULT_INJECTION: forcing a failure. [ 576.702943][T30812] name failslab, interval 1, probability 0, space 0, times 0 [ 576.715708][T30812] CPU: 0 UID: 0 PID: 30812 Comm: syz.4.8219 Not tainted 6.13.0-rc2-syzkaller #0 [ 576.724950][T30812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 576.735031][T30812] Call Trace: [ 576.738369][T30812] [ 576.741326][T30812] dump_stack_lvl+0xf2/0x150 [ 576.746015][T30812] dump_stack+0x15/0x1a [ 576.750270][T30812] should_fail_ex+0x223/0x230 [ 576.754979][T30812] should_failslab+0x8f/0xb0 [ 576.759598][T30812] kmem_cache_alloc_node_noprof+0x59/0x320 [ 576.765539][T30812] ? __alloc_skb+0x10b/0x310 [ 576.770170][T30812] __alloc_skb+0x10b/0x310 [ 576.774726][T30812] netlink_ack+0xef/0x4f0 [ 576.779133][T30812] ? slow_avc_audit+0xf9/0x140 [ 576.783967][T30812] audit_receive+0x1b2/0x2a20 [ 576.788709][T30812] ? avc_has_perm+0x129/0x160 [ 576.793529][T30812] ? __netlink_lookup+0x253/0x290 [ 576.798594][T30812] netlink_unicast+0x599/0x670 [ 576.803416][T30812] netlink_sendmsg+0x5cc/0x6e0 [ 576.808249][T30812] ? __pfx_netlink_sendmsg+0x10/0x10 [ 576.813566][T30812] __sock_sendmsg+0x140/0x180 [ 576.818550][T30812] ____sys_sendmsg+0x312/0x410 [ 576.823372][T30812] __sys_sendmsg+0x19d/0x230 [ 576.827992][T30812] __x64_sys_sendmsg+0x46/0x50 [ 576.832765][T30812] x64_sys_call+0x2734/0x2dc0 [ 576.837461][T30812] do_syscall_64+0xc9/0x1c0 [ 576.842025][T30812] ? clear_bhb_loop+0x55/0xb0 [ 576.846709][T30812] ? clear_bhb_loop+0x55/0xb0 [ 576.851392][T30812] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 576.857385][T30812] RIP: 0033:0x7f671a16fed9 [ 576.861870][T30812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 576.881602][T30812] RSP: 002b:00007f67187e7058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 576.890034][T30812] RAX: ffffffffffffffda RBX: 00007f671a335fa0 RCX: 00007f671a16fed9 [ 576.898013][T30812] RDX: 0000000020000000 RSI: 0000000020000480 RDI: 0000000000000003 [ 576.906013][T30812] RBP: 00007f67187e70a0 R08: 0000000000000000 R09: 0000000000000000 [ 576.913989][T30812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 576.922094][T30812] R13: 0000000000000000 R14: 00007f671a335fa0 R15: 00007ffd9eeae718 [ 576.930080][T30812] [ 577.002841][ T29] kauditd_printk_skb: 204 callbacks suppressed [ 577.002858][ T29] audit: type=1326 audit(1733757857.332:19152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30815 comm="syz.3.8220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 577.032823][ T29] audit: type=1326 audit(1733757857.332:19153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30815 comm="syz.3.8220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 577.056574][ T29] audit: type=1326 audit(1733757857.332:19154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30815 comm="syz.3.8220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 577.080242][ T29] audit: type=1326 audit(1733757857.332:19155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30815 comm="syz.3.8220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 577.103883][ T29] audit: type=1326 audit(1733757857.332:19156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30815 comm="syz.3.8220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 577.127566][ T29] audit: type=1326 audit(1733757857.332:19157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30815 comm="syz.3.8220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 577.152058][ T29] audit: type=1326 audit(1733757857.332:19158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30815 comm="syz.3.8220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 577.176291][ T29] audit: type=1326 audit(1733757857.332:19159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30815 comm="syz.3.8220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 577.181067][T14404] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 577.199878][ T29] audit: type=1326 audit(1733757857.332:19160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30815 comm="syz.3.8220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=325 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 577.231225][ T29] audit: type=1326 audit(1733757857.332:19161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30815 comm="syz.3.8220" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 577.333066][T30826] tipc: Started in network mode [ 577.338053][T30826] tipc: Node identity ac14140f, cluster identity 4711 [ 577.345903][T30836] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8225'. [ 577.361629][T30826] tipc: New replicast peer: 255.255.255.255 [ 577.367793][T30826] tipc: Enabled bearer , priority 10 [ 577.386166][T30836] 9pnet_fd: Insufficient options for proto=fd [ 577.401574][T30839] loop0: detected capacity change from 0 to 128 [ 577.427534][T30836] rdma_rxe: rxe_newlink: failed to add syzkaller0 [ 577.448187][T30839] netlink: 'syz.0.8226': attribute type 4 has an invalid length. [ 577.594194][T30845] FAULT_INJECTION: forcing a failure. [ 577.594194][T30845] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 577.607378][T30845] CPU: 0 UID: 0 PID: 30845 Comm: syz.4.8227 Not tainted 6.13.0-rc2-syzkaller #0 [ 577.616419][T30845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 577.626487][T30845] Call Trace: [ 577.629769][T30845] [ 577.632711][T30845] dump_stack_lvl+0xf2/0x150 [ 577.637345][T30845] dump_stack+0x15/0x1a [ 577.641606][T30845] should_fail_ex+0x223/0x230 [ 577.646308][T30845] should_fail+0xb/0x10 [ 577.650524][T30845] should_fail_usercopy+0x1a/0x20 [ 577.655574][T30845] _copy_from_user+0x1e/0xb0 [ 577.660267][T30845] usbdev_ioctl+0x101b/0x3e00 [ 577.664993][T30845] ? do_vfs_ioctl+0x96e/0x1530 [ 577.669781][T30845] ? selinux_file_ioctl+0x2f7/0x380 [ 577.675034][T30845] ? __fget_files+0x17c/0x1c0 [ 577.679811][T30845] ? __pfx_usbdev_ioctl+0x10/0x10 [ 577.684911][T30845] __se_sys_ioctl+0xc9/0x140 [ 577.689572][T30845] __x64_sys_ioctl+0x43/0x50 [ 577.694239][T30845] x64_sys_call+0x1690/0x2dc0 [ 577.698932][T30845] do_syscall_64+0xc9/0x1c0 [ 577.703490][T30845] ? clear_bhb_loop+0x55/0xb0 [ 577.708179][T30845] ? clear_bhb_loop+0x55/0xb0 [ 577.712862][T30845] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 577.718815][T30845] RIP: 0033:0x7f671a16fed9 [ 577.723290][T30845] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 577.742930][T30845] RSP: 002b:00007f67187a5058 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 577.751353][T30845] RAX: ffffffffffffffda RBX: 00007f671a336160 RCX: 00007f671a16fed9 [ 577.759465][T30845] RDX: 0000000020000000 RSI: 000000008038550a RDI: 0000000000000004 [ 577.767759][T30845] RBP: 00007f67187a50a0 R08: 0000000000000000 R09: 0000000000000000 [ 577.775805][T30845] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 577.783796][T30845] R13: 0000000000000000 R14: 00007f671a336160 R15: 00007ffd9eeae718 [ 577.791785][T30845] [ 577.818087][T30848] syz.3.8228[30848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 577.818226][T30848] syz.3.8228[30848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 577.833515][T30848] syz.3.8228[30848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 577.905799][T30850] vhci_hcd: default hub control req: 0000 v0000 i0000 l31125 [ 578.133503][T30869] FAULT_INJECTION: forcing a failure. [ 578.133503][T30869] name failslab, interval 1, probability 0, space 0, times 0 [ 578.146243][T30869] CPU: 0 UID: 0 PID: 30869 Comm: syz.1.8237 Not tainted 6.13.0-rc2-syzkaller #0 [ 578.155369][T30869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 578.165439][T30869] Call Trace: [ 578.168767][T30869] [ 578.171713][T30869] dump_stack_lvl+0xf2/0x150 [ 578.176397][T30869] dump_stack+0x15/0x1a [ 578.180682][T30869] should_fail_ex+0x223/0x230 [ 578.185403][T30869] should_failslab+0x8f/0xb0 [ 578.190058][T30869] kmem_cache_alloc_node_noprof+0x59/0x320 [ 578.195893][T30869] ? __alloc_skb+0x10b/0x310 [ 578.200601][T30869] __alloc_skb+0x10b/0x310 [ 578.205103][T30869] netlink_alloc_large_skb+0xad/0xe0 [ 578.210431][T30869] netlink_sendmsg+0x3b4/0x6e0 [ 578.215233][T30869] ? __pfx_netlink_sendmsg+0x10/0x10 [ 578.220606][T30869] __sock_sendmsg+0x140/0x180 [ 578.225317][T30869] ____sys_sendmsg+0x312/0x410 [ 578.230111][T30869] __sys_sendmsg+0x19d/0x230 [ 578.234751][T30869] __x64_sys_sendmsg+0x46/0x50 [ 578.239548][T30869] x64_sys_call+0x2734/0x2dc0 [ 578.244244][T30869] do_syscall_64+0xc9/0x1c0 [ 578.248793][T30869] ? clear_bhb_loop+0x55/0xb0 [ 578.253497][T30869] ? clear_bhb_loop+0x55/0xb0 [ 578.258262][T30869] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 578.264285][T30869] RIP: 0033:0x7fa7d6d5fed9 [ 578.268712][T30869] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 578.288375][T30869] RSP: 002b:00007fa7d53d7058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 578.296870][T30869] RAX: ffffffffffffffda RBX: 00007fa7d6f25fa0 RCX: 00007fa7d6d5fed9 [ 578.304886][T30869] RDX: 0000000024008840 RSI: 0000000020000200 RDI: 0000000000000006 [ 578.312894][T30869] RBP: 00007fa7d53d70a0 R08: 0000000000000000 R09: 0000000000000000 [ 578.320941][T30869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 578.328935][T30869] R13: 0000000000000000 R14: 00007fa7d6f25fa0 R15: 00007fff35c3e888 [ 578.336937][T30869] [ 578.370085][T30874] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8239'. [ 578.381784][T30874] 9pnet_fd: Insufficient options for proto=fd [ 578.406924][T30874] rdma_rxe: rxe_newlink: failed to add syzkaller0 [ 578.471044][ T3377] tipc: Node number set to 2886997007 [ 578.682391][T14428] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 578.830317][T30904] FAULT_INJECTION: forcing a failure. [ 578.830317][T30904] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 578.843486][T30904] CPU: 1 UID: 0 PID: 30904 Comm: syz.1.8248 Not tainted 6.13.0-rc2-syzkaller #0 [ 578.852530][T30904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 578.862604][T30904] Call Trace: [ 578.865978][T30904] [ 578.868941][T30904] dump_stack_lvl+0xf2/0x150 [ 578.873572][T30904] dump_stack+0x15/0x1a [ 578.877764][T30904] should_fail_ex+0x223/0x230 [ 578.882600][T30904] should_fail+0xb/0x10 [ 578.886771][T30904] should_fail_usercopy+0x1a/0x20 [ 578.891885][T30904] _copy_from_user+0x1e/0xb0 [ 578.896565][T30904] sk_getsockopt+0xbd/0x1690 [ 578.901175][T30904] ? selinux_socket_getsockopt+0x185/0x1c0 [ 578.907079][T30904] ? should_fail_ex+0xd7/0x230 [ 578.911890][T30904] do_sock_getsockopt+0x14a/0x260 [ 578.916940][T30904] __x64_sys_getsockopt+0x18c/0x200 [ 578.922177][T30904] x64_sys_call+0x1288/0x2dc0 [ 578.927033][T30904] do_syscall_64+0xc9/0x1c0 [ 578.931556][T30904] ? clear_bhb_loop+0x55/0xb0 [ 578.936317][T30904] ? clear_bhb_loop+0x55/0xb0 [ 578.941092][T30904] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 578.947047][T30904] RIP: 0033:0x7fa7d6d5fed9 [ 578.951483][T30904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 578.971195][T30904] RSP: 002b:00007fa7d53d7058 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 578.979661][T30904] RAX: ffffffffffffffda RBX: 00007fa7d6f25fa0 RCX: 00007fa7d6d5fed9 [ 578.987745][T30904] RDX: 0000000000000041 RSI: 0000000000000001 RDI: 0000000000000003 [ 578.995769][T30904] RBP: 00007fa7d53d70a0 R08: 00000000200003c0 R09: 0000000000000000 [ 579.003768][T30904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 579.011949][T30904] R13: 0000000000000000 R14: 00007fa7d6f25fa0 R15: 00007fff35c3e888 [ 579.020064][T30904] [ 579.185557][T30909] hub 9-0:1.0: USB hub found [ 579.194194][T30909] hub 9-0:1.0: 8 ports detected [ 579.357980][T30918] netlink: 16 bytes leftover after parsing attributes in process `syz.1.8254'. [ 579.440527][T30922] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8256'. [ 579.452950][T30922] 9pnet_fd: Insufficient options for proto=fd [ 579.483134][T30922] rdma_rxe: rxe_newlink: failed to add syzkaller0 [ 580.035561][T14404] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 580.260393][T30961] syz.2.8265[30961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 580.260535][T30961] syz.2.8265[30961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 580.297844][T30961] syz.2.8265[30961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 580.876599][T30981] FAULT_INJECTION: forcing a failure. [ 580.876599][T30981] name failslab, interval 1, probability 0, space 0, times 0 [ 580.900875][T30981] CPU: 1 UID: 0 PID: 30981 Comm: syz.1.8271 Not tainted 6.13.0-rc2-syzkaller #0 [ 580.910059][T30981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 580.920171][T30981] Call Trace: [ 580.923548][T30981] [ 580.926499][T30981] dump_stack_lvl+0xf2/0x150 [ 580.931183][T30981] dump_stack+0x15/0x1a [ 580.935429][T30981] should_fail_ex+0x223/0x230 [ 580.940170][T30981] should_failslab+0x8f/0xb0 [ 580.944957][T30981] kmem_cache_alloc_noprof+0x52/0x320 [ 580.950385][T30981] ? audit_log_start+0x34c/0x6b0 [ 580.955521][T30981] audit_log_start+0x34c/0x6b0 [ 580.960331][T30981] audit_seccomp+0x4b/0x130 [ 580.964860][T30981] __seccomp_filter+0x6fa/0x1180 [ 580.969839][T30981] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 580.975678][T30981] ? vfs_write+0x596/0x920 [ 580.980127][T30981] ? __schedule+0x6fa/0x930 [ 580.984749][T30981] __secure_computing+0x9f/0x1c0 [ 580.989740][T30981] syscall_trace_enter+0xd1/0x1f0 [ 580.994808][T30981] do_syscall_64+0xaa/0x1c0 [ 580.999382][T30981] ? clear_bhb_loop+0x55/0xb0 [ 581.004157][T30981] ? clear_bhb_loop+0x55/0xb0 [ 581.008927][T30981] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 581.014877][T30981] RIP: 0033:0x7fa7d6d5fed9 [ 581.019321][T30981] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 581.039057][T30981] RSP: 002b:00007fa7d53d7058 EFLAGS: 00000246 ORIG_RAX: 0000000000000145 [ 581.047517][T30981] RAX: ffffffffffffffda RBX: 00007fa7d6f25fa0 RCX: 00007fa7d6d5fed9 [ 581.055572][T30981] RDX: 0000000000000000 RSI: 0000000000004000 RDI: 00000000200df000 [ 581.063607][T30981] RBP: 00007fa7d53d70a0 R08: 0000000000000000 R09: 0000000000000000 [ 581.071605][T30981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 581.079595][T30981] R13: 0000000000000000 R14: 00007fa7d6f25fa0 R15: 00007fff35c3e888 [ 581.087620][T30981] [ 581.301281][T14382] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 581.460542][T30986] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8272'. [ 581.502919][T30986] 9pnet_fd: Insufficient options for proto=fd [ 581.526325][T30986] rdma_rxe: rxe_newlink: failed to add syzkaller0 [ 581.709585][T31003] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 581.719031][T31003] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 581.860239][T31015] lo speed is unknown, defaulting to 1000 [ 581.903229][T31015] lo speed is unknown, defaulting to 1000 [ 581.913841][T31015] lo speed is unknown, defaulting to 1000 [ 582.031200][ T29] kauditd_printk_skb: 384 callbacks suppressed [ 582.031219][ T29] audit: type=1326 audit(1733757862.392:19544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31024 comm="syz.4.8286" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671a16fed9 code=0x7ffc0000 [ 582.059745][T31027] netlink: 8 bytes leftover after parsing attributes in process `syz.4.8287'. [ 582.069520][ T29] audit: type=1326 audit(1733757862.392:19545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31024 comm="syz.4.8286" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f671a16fed9 code=0x7ffc0000 [ 582.093712][ T29] audit: type=1326 audit(1733757862.392:19546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31024 comm="syz.4.8286" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671a16fed9 code=0x7ffc0000 [ 582.117415][ T29] audit: type=1326 audit(1733757862.392:19547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31024 comm="syz.4.8286" exe="/root/syz-executor" sig=0 arch=c000003e syscall=292 compat=0 ip=0x7f671a16fed9 code=0x7ffc0000 [ 582.120494][T31029] 9pnet_fd: Insufficient options for proto=fd [ 582.141082][ T29] audit: type=1326 audit(1733757862.392:19548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31024 comm="syz.4.8286" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671a16fed9 code=0x7ffc0000 [ 582.141121][ T29] audit: type=1326 audit(1733757862.392:19549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31024 comm="syz.4.8286" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f671a16fed9 code=0x7ffc0000 [ 582.141153][ T29] audit: type=1326 audit(1733757862.392:19550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31024 comm="syz.4.8286" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671a16fed9 code=0x7ffc0000 [ 582.174136][T31029] rdma_rxe: rxe_newlink: failed to add syzkaller0 [ 582.194389][ T29] audit: type=1326 audit(1733757862.392:19551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31024 comm="syz.4.8286" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f671a16fed9 code=0x7ffc0000 [ 582.194427][ T29] audit: type=1326 audit(1733757862.392:19552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31024 comm="syz.4.8286" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f671a16fed9 code=0x7ffc0000 [ 582.194480][ T29] audit: type=1326 audit(1733757862.392:19553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31024 comm="syz.4.8286" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f671a16fed9 code=0x7ffc0000 [ 582.431147][T20818] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 582.718051][T31051] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 582.739445][T31051] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 582.974183][T31055] lo speed is unknown, defaulting to 1000 [ 583.088420][T31055] lo speed is unknown, defaulting to 1000 [ 583.101344][T31055] lo speed is unknown, defaulting to 1000 [ 583.305437][T31066] netlink: 8 bytes leftover after parsing attributes in process `syz.4.8299'. [ 583.317040][T31064] FAULT_INJECTION: forcing a failure. [ 583.317040][T31064] name failslab, interval 1, probability 0, space 0, times 0 [ 583.329769][T31064] CPU: 1 UID: 0 PID: 31064 Comm: syz.0.8298 Not tainted 6.13.0-rc2-syzkaller #0 [ 583.338952][T31064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 583.349044][T31064] Call Trace: [ 583.352333][T31064] [ 583.355275][T31064] dump_stack_lvl+0xf2/0x150 [ 583.359946][T31064] dump_stack+0x15/0x1a [ 583.364139][T31064] should_fail_ex+0x223/0x230 [ 583.368835][T31064] should_failslab+0x8f/0xb0 [ 583.373526][T31064] __kmalloc_node_noprof+0xad/0x410 [ 583.378779][T31064] ? crypto_create_tfm_node+0x57/0x230 [ 583.384273][T31064] crypto_create_tfm_node+0x57/0x230 [ 583.389606][T31064] crypto_spawn_tfm2+0x43/0x70 [ 583.394442][T31064] crypto_gcm_init_tfm+0x56/0x100 [ 583.399675][T31064] ? __pfx_crypto_gcm_init_tfm+0x10/0x10 [ 583.405481][T31064] crypto_aead_init_tfm+0x9a/0xb0 [ 583.410558][T31064] crypto_create_tfm_node+0xe7/0x230 [ 583.416038][T31064] crypto_alloc_tfm_node+0xd1/0x250 [ 583.421450][T31064] crypto_alloc_aead+0x2f/0x40 [ 583.426262][T31064] tls_set_sw_offload+0x57f/0x810 [ 583.431308][T31064] tls_setsockopt+0x8b3/0xcb0 [ 583.436094][T31064] sock_common_setsockopt+0x64/0x80 [ 583.441385][T31064] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 583.447350][T31064] __sys_setsockopt+0x187/0x200 [ 583.452247][T31064] __x64_sys_setsockopt+0x66/0x80 [ 583.457312][T31064] x64_sys_call+0x282e/0x2dc0 [ 583.462025][T31064] do_syscall_64+0xc9/0x1c0 [ 583.466572][T31064] ? clear_bhb_loop+0x55/0xb0 [ 583.471256][T31064] ? clear_bhb_loop+0x55/0xb0 [ 583.475941][T31064] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 583.481931][T31064] RIP: 0033:0x7f1447e8fed9 [ 583.486343][T31064] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 583.505963][T31064] RSP: 002b:00007f1446507058 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 583.514424][T31064] RAX: ffffffffffffffda RBX: 00007f1448055fa0 RCX: 00007f1447e8fed9 [ 583.522409][T31064] RDX: 0000000000000001 RSI: 000000000000011a RDI: 0000000000000004 [ 583.530471][T31064] RBP: 00007f14465070a0 R08: 0000000000000028 R09: 0000000000000000 [ 583.538479][T31064] R10: 0000000020000180 R11: 0000000000000246 R12: 0000000000000001 [ 583.546629][T31064] R13: 0000000000000000 R14: 00007f1448055fa0 R15: 00007ffc4852b028 [ 583.554658][T31064] [ 583.559731][T31067] 9pnet_fd: Insufficient options for proto=fd [ 583.587379][T31066] rdma_rxe: rxe_newlink: failed to add syzkaller0 [ 583.772877][T20818] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 584.226222][T31096] lo speed is unknown, defaulting to 1000 [ 584.264732][T31096] lo speed is unknown, defaulting to 1000 [ 584.271454][T31096] lo speed is unknown, defaulting to 1000 [ 584.397880][T31105] netlink: 8 bytes leftover after parsing attributes in process `syz.4.8312'. [ 584.417310][T31105] 9pnet_fd: Insufficient options for proto=fd [ 584.430663][T31105] rdma_rxe: rxe_newlink: failed to add syzkaller0 [ 584.482680][T31108] netlink: 16 bytes leftover after parsing attributes in process `syz.4.8313'. [ 584.881638][T14428] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 585.176055][T31120] FAULT_INJECTION: forcing a failure. [ 585.176055][T31120] name failslab, interval 1, probability 0, space 0, times 0 [ 585.188762][T31120] CPU: 0 UID: 0 PID: 31120 Comm: syz.0.8316 Not tainted 6.13.0-rc2-syzkaller #0 [ 585.197808][T31120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 585.207931][T31120] Call Trace: [ 585.211239][T31120] [ 585.214189][T31120] dump_stack_lvl+0xf2/0x150 [ 585.218817][T31120] dump_stack+0x15/0x1a [ 585.223039][T31120] should_fail_ex+0x223/0x230 [ 585.227766][T31120] should_failslab+0x8f/0xb0 [ 585.232395][T31120] kmem_cache_alloc_node_noprof+0x59/0x320 [ 585.238297][T31120] ? __alloc_skb+0x10b/0x310 [ 585.242932][T31120] __alloc_skb+0x10b/0x310 [ 585.247380][T31120] ? audit_log_start+0x34c/0x6b0 [ 585.252346][T31120] audit_log_start+0x368/0x6b0 [ 585.257268][T31120] audit_seccomp+0x4b/0x130 [ 585.261787][T31120] __seccomp_filter+0x6fa/0x1180 [ 585.266799][T31120] ? __perf_event_task_sched_out+0x138/0x1010 [ 585.272896][T31120] __secure_computing+0x9f/0x1c0 [ 585.277911][T31120] syscall_trace_enter+0xd1/0x1f0 [ 585.282969][T31120] do_syscall_64+0xaa/0x1c0 [ 585.287506][T31120] ? clear_bhb_loop+0x55/0xb0 [ 585.292258][T31120] ? clear_bhb_loop+0x55/0xb0 [ 585.296949][T31120] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 585.302917][T31120] RIP: 0033:0x7f1447e8fed9 [ 585.307412][T31120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 585.327034][T31120] RSP: 002b:00007f1446507058 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 585.335496][T31120] RAX: ffffffffffffffda RBX: 00007f1448055fa0 RCX: 00007f1447e8fed9 [ 585.343489][T31120] RDX: 0000000020ff9000 RSI: 0000000000000006 RDI: 0000000000000023 [ 585.351589][T31120] RBP: 00007f14465070a0 R08: 0000000000000000 R09: 0000000000000000 [ 585.359579][T31120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 585.367610][T31120] R13: 0000000000000000 R14: 00007f1448055fa0 R15: 00007ffc4852b028 [ 585.375701][T31120] [ 585.629346][T31136] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8323'. [ 585.650332][T31136] 9pnet_fd: Insufficient options for proto=fd [ 585.683453][T31136] rdma_rxe: rxe_newlink: failed to add syzkaller0 [ 585.739392][T31140] lo speed is unknown, defaulting to 1000 [ 585.774794][T31148] netlink: 16 bytes leftover after parsing attributes in process `syz.3.8327'. [ 585.854590][T31140] lo speed is unknown, defaulting to 1000 [ 585.860726][T31140] lo speed is unknown, defaulting to 1000 [ 586.149303][T14382] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 586.179721][T31172] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8334'. [ 586.420400][T31177] FAULT_INJECTION: forcing a failure. [ 586.420400][T31177] name failslab, interval 1, probability 0, space 0, times 0 [ 586.433160][T31177] CPU: 1 UID: 0 PID: 31177 Comm: syz.4.8335 Not tainted 6.13.0-rc2-syzkaller #0 [ 586.442305][T31177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 586.452442][T31177] Call Trace: [ 586.455737][T31177] [ 586.458708][T31177] dump_stack_lvl+0xf2/0x150 [ 586.463364][T31177] dump_stack+0x15/0x1a [ 586.467626][T31177] should_fail_ex+0x223/0x230 [ 586.472393][T31177] should_failslab+0x8f/0xb0 [ 586.477148][T31177] kmem_cache_alloc_noprof+0x52/0x320 [ 586.482659][T31177] ? audit_log_start+0x34c/0x6b0 [ 586.487808][T31177] audit_log_start+0x34c/0x6b0 [ 586.492780][T31177] audit_seccomp+0x4b/0x130 [ 586.497348][T31177] __seccomp_filter+0x6fa/0x1180 [ 586.502364][T31177] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 586.508019][T31177] ? vfs_write+0x596/0x920 [ 586.512501][T31177] ? __schedule+0x6fa/0x930 [ 586.517033][T31177] __secure_computing+0x9f/0x1c0 [ 586.521994][T31177] syscall_trace_enter+0xd1/0x1f0 [ 586.527221][T31177] do_syscall_64+0xaa/0x1c0 [ 586.531738][T31177] ? clear_bhb_loop+0x55/0xb0 [ 586.536502][T31177] ? clear_bhb_loop+0x55/0xb0 [ 586.541260][T31177] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 586.547193][T31177] RIP: 0033:0x7f671a16fed9 [ 586.551636][T31177] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 586.571348][T31177] RSP: 002b:00007f67187e7058 EFLAGS: 00000246 ORIG_RAX: 00000000000000f7 [ 586.579852][T31177] RAX: ffffffffffffffda RBX: 00007f671a335fa0 RCX: 00007f671a16fed9 [ 586.587833][T31177] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000000000003 [ 586.595901][T31177] RBP: 00007f67187e70a0 R08: 0000000000000000 R09: 0000000000000000 [ 586.603880][T31177] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 [ 586.611856][T31177] R13: 0000000000000000 R14: 00007f671a335fa0 R15: 00007ffd9eeae718 [ 586.619903][T31177] [ 586.720844][T31191] lo speed is unknown, defaulting to 1000 [ 586.860405][T31191] lo speed is unknown, defaulting to 1000 [ 586.885103][T31191] lo speed is unknown, defaulting to 1000 [ 586.990001][T31211] FAULT_INJECTION: forcing a failure. [ 586.990001][T31211] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 587.003164][T31211] CPU: 1 UID: 0 PID: 31211 Comm: syz.1.8347 Not tainted 6.13.0-rc2-syzkaller #0 [ 587.012288][T31211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 587.022417][T31211] Call Trace: [ 587.025711][T31211] [ 587.028710][T31211] dump_stack_lvl+0xf2/0x150 [ 587.033352][T31211] dump_stack+0x15/0x1a [ 587.037529][T31211] should_fail_ex+0x223/0x230 [ 587.042327][T31211] should_fail+0xb/0x10 [ 587.046493][T31211] should_fail_usercopy+0x1a/0x20 [ 587.051599][T31211] _copy_from_iter+0xd5/0xd00 [ 587.056293][T31211] ? kmalloc_reserve+0x16e/0x190 [ 587.061264][T31211] ? __build_skb_around+0x196/0x1f0 [ 587.066487][T31211] ? __alloc_skb+0x21f/0x310 [ 587.071155][T31211] ? __virt_addr_valid+0x1ed/0x250 [ 587.076386][T31211] ? __check_object_size+0x364/0x520 [ 587.081688][T31211] netlink_sendmsg+0x460/0x6e0 [ 587.086537][T31211] ? __pfx_netlink_sendmsg+0x10/0x10 [ 587.091835][T31211] __sock_sendmsg+0x140/0x180 [ 587.096533][T31211] ____sys_sendmsg+0x312/0x410 [ 587.101313][T31211] __sys_sendmsg+0x19d/0x230 [ 587.105937][T31211] __x64_sys_sendmsg+0x46/0x50 [ 587.110820][T31211] x64_sys_call+0x2734/0x2dc0 [ 587.115534][T31211] do_syscall_64+0xc9/0x1c0 [ 587.120055][T31211] ? clear_bhb_loop+0x55/0xb0 [ 587.124736][T31211] ? clear_bhb_loop+0x55/0xb0 [ 587.129426][T31211] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 587.135341][T31211] RIP: 0033:0x7fa7d6d5fed9 [ 587.139759][T31211] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 587.159375][T31211] RSP: 002b:00007fa7d53d7058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 587.167863][T31211] RAX: ffffffffffffffda RBX: 00007fa7d6f25fa0 RCX: 00007fa7d6d5fed9 [ 587.175839][T31211] RDX: 0000000020000000 RSI: 0000000020000480 RDI: 0000000000000003 [ 587.183872][T31211] RBP: 00007fa7d53d70a0 R08: 0000000000000000 R09: 0000000000000000 [ 587.191851][T31211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 587.199853][T31211] R13: 0000000000000000 R14: 00007fa7d6f25fa0 R15: 00007fff35c3e888 [ 587.207880][T31211] [ 587.334208][T31215] netlink: 16 bytes leftover after parsing attributes in process `syz.1.8349'. [ 587.377989][ T29] kauditd_printk_skb: 428 callbacks suppressed [ 587.378006][ T29] audit: type=1400 audit(1733757867.732:19978): avc: denied { create } for pid=31214 comm="syz.1.8349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 587.452498][ T29] audit: type=1400 audit(1733757867.752:19979): avc: denied { egress } for pid=31207 comm="syz.2.8346" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 587.476507][ T29] audit: type=1400 audit(1733757867.752:19980): avc: denied { sendto } for pid=31207 comm="syz.2.8346" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 587.500102][ T29] audit: type=1400 audit(1733757867.762:19981): avc: denied { write } for pid=31214 comm="syz.1.8349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 587.520833][ T29] audit: type=1400 audit(1733757867.782:19982): avc: denied { prog_load } for pid=31216 comm="syz.4.8350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 587.540059][ T29] audit: type=1400 audit(1733757867.782:19983): avc: denied { bpf } for pid=31216 comm="syz.4.8350" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 587.678524][ T29] audit: type=1400 audit(1733757867.922:19984): avc: denied { create } for pid=31214 comm="syz.1.8349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 587.685464][T14404] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 587.698974][ T29] audit: type=1400 audit(1733757867.922:19985): avc: denied { write } for pid=31214 comm="syz.1.8349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 587.727312][ T29] audit: type=1400 audit(1733757867.922:19986): avc: denied { nlmsg_write } for pid=31214 comm="syz.1.8349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 587.727412][ T29] audit: type=1400 audit(1733757867.922:19987): avc: denied { append } for pid=2981 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=14 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 587.933573][T31237] netlink: 96 bytes leftover after parsing attributes in process `syz.2.8357'. [ 587.943615][T31240] FAULT_INJECTION: forcing a failure. [ 587.943615][T31240] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 587.956982][T31240] CPU: 0 UID: 0 PID: 31240 Comm: syz.3.8358 Not tainted 6.13.0-rc2-syzkaller #0 [ 587.966178][T31240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 587.976255][T31240] Call Trace: [ 587.979575][T31240] [ 587.980004][T31245] netlink: 8 bytes leftover after parsing attributes in process `syz.4.8361'. [ 587.982506][T31240] dump_stack_lvl+0xf2/0x150 [ 587.996063][T31240] dump_stack+0x15/0x1a [ 588.000310][T31240] should_fail_ex+0x223/0x230 [ 588.004994][T31240] should_fail+0xb/0x10 [ 588.009168][T31240] should_fail_usercopy+0x1a/0x20 [ 588.014268][T31240] _copy_to_user+0x20/0xa0 [ 588.018702][T31240] simple_read_from_buffer+0xa0/0x110 [ 588.024109][T31240] proc_fail_nth_read+0xf9/0x140 [ 588.029062][T31240] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 588.031021][T31246] 9pnet_fd: Insufficient options for proto=fd [ 588.034608][T31240] vfs_read+0x1a2/0x700 [ 588.034648][T31240] ? kmem_cache_free+0xdc/0x2d0 [ 588.047510][T31246] rdma_rxe: rxe_newlink: failed to add syzkaller0 [ 588.049694][T31240] ? putname+0xcf/0xf0 [ 588.060275][T31240] ksys_read+0xe8/0x1b0 [ 588.064447][T31240] __x64_sys_read+0x42/0x50 [ 588.068996][T31240] x64_sys_call+0x2874/0x2dc0 [ 588.073688][T31240] do_syscall_64+0xc9/0x1c0 [ 588.078340][T31240] ? clear_bhb_loop+0x55/0xb0 [ 588.083032][T31240] ? clear_bhb_loop+0x55/0xb0 [ 588.087732][T31240] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 588.093675][T31240] RIP: 0033:0x7f9a8b8ae8ec [ 588.098157][T31240] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 588.117787][T31240] RSP: 002b:00007f9a89f27050 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 588.126232][T31240] RAX: ffffffffffffffda RBX: 00007f9a8ba75fa0 RCX: 00007f9a8b8ae8ec [ 588.134218][T31240] RDX: 000000000000000f RSI: 00007f9a89f270b0 RDI: 0000000000000003 [ 588.142240][T31240] RBP: 00007f9a89f270a0 R08: 0000000000000000 R09: 0000000000000000 [ 588.150271][T31240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 588.158324][T31240] R13: 0000000000000000 R14: 00007f9a8ba75fa0 R15: 00007ffd465cb8c8 [ 588.166333][T31240] [ 588.518565][T31273] netlink: 133492 bytes leftover after parsing attributes in process `+}[@'. [ 588.818855][T31289] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 588.861309][T31289] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 588.870255][T31291] netlink: 8 bytes leftover after parsing attributes in process `syz.0.8379'. [ 588.899187][T31291] 9pnet_fd: Insufficient options for proto=fd [ 588.946869][T31291] rdma_rxe: rxe_newlink: failed to add syzkaller0 [ 588.962722][T14382] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 589.169682][T31300] devtmpfs: Unknown parameter 'di¼CÆ5F\LÑž' [ 589.951130][ C1] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 590.239483][T31311] syz.2.8384[31311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 590.239622][T31311] syz.2.8384[31311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 590.251266][T31311] syz.2.8384[31311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 590.894840][T31330] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8387'. [ 590.942433][T20818] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 590.976010][T31314] can0: slcan on ttyS3. [ 591.017819][T31332] lo speed is unknown, defaulting to 1000 [ 591.051445][T31332] lo speed is unknown, defaulting to 1000 [ 591.054459][T31314] can0 (unregistered): slcan off ttyS3. [ 591.057619][T31332] lo speed is unknown, defaulting to 1000 [ 591.074108][T31314] Falling back ldisc for ttyS3. [ 591.681880][T31369] syz.1.8404[31369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 591.682026][T31369] syz.1.8404[31369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 591.703832][T31369] syz.1.8404[31369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 592.012194][T31369] can0: slcan on ttyS3. [ 592.064865][T31379] syzkaller0: entered allmulticast mode [ 592.073734][T31379] syzkaller0 (unregistering): left allmulticast mode [ 592.091145][T31369] can0 (unregistered): slcan off ttyS3. [ 592.091682][T22606] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 592.097006][T31369] Falling back ldisc for ttyS3. [ 592.331224][T31389] FAULT_INJECTION: forcing a failure. [ 592.331224][T31389] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 592.344362][T31389] CPU: 0 UID: 0 PID: 31389 Comm: syz.0.8413 Not tainted 6.13.0-rc2-syzkaller #0 [ 592.353460][T31389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 592.363537][T31389] Call Trace: [ 592.366845][T31389] [ 592.369786][T31389] dump_stack_lvl+0xf2/0x150 [ 592.374462][T31389] dump_stack+0x15/0x1a [ 592.378730][T31389] should_fail_ex+0x223/0x230 [ 592.383496][T31389] should_fail+0xb/0x10 [ 592.387665][T31389] should_fail_usercopy+0x1a/0x20 [ 592.392742][T31389] _copy_from_iter+0xd5/0xd00 [ 592.397436][T31389] ? kmalloc_reserve+0x16e/0x190 [ 592.402382][T31389] ? __build_skb_around+0x196/0x1f0 [ 592.407612][T31389] ? __alloc_skb+0x21f/0x310 [ 592.412225][T31389] ? __virt_addr_valid+0x1ed/0x250 [ 592.417413][T31389] ? __check_object_size+0x364/0x520 [ 592.422721][T31389] netlink_sendmsg+0x460/0x6e0 [ 592.427630][T31389] ? __pfx_netlink_sendmsg+0x10/0x10 [ 592.433006][T31389] __sock_sendmsg+0x140/0x180 [ 592.437832][T31389] ____sys_sendmsg+0x312/0x410 [ 592.442753][T31389] __sys_sendmsg+0x19d/0x230 [ 592.447541][T31389] __x64_sys_sendmsg+0x46/0x50 [ 592.452378][T31389] x64_sys_call+0x2734/0x2dc0 [ 592.457080][T31389] do_syscall_64+0xc9/0x1c0 [ 592.461602][T31389] ? clear_bhb_loop+0x55/0xb0 [ 592.466295][T31389] ? clear_bhb_loop+0x55/0xb0 [ 592.471038][T31389] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 592.476959][T31389] RIP: 0033:0x7f1447e8fed9 [ 592.481447][T31389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 592.501150][T31389] RSP: 002b:00007f1446507058 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 592.509717][T31389] RAX: ffffffffffffffda RBX: 00007f1448055fa0 RCX: 00007f1447e8fed9 [ 592.517693][T31389] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000006 [ 592.525676][T31389] RBP: 00007f14465070a0 R08: 0000000000000000 R09: 0000000000000000 [ 592.533666][T31389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 592.541650][T31389] R13: 0000000000000000 R14: 00007f1448055fa0 R15: 00007ffc4852b028 [ 592.549858][T31389] [ 592.563674][T31399] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 592.573254][T31399] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 592.633324][ T29] kauditd_printk_skb: 959 callbacks suppressed [ 592.633343][ T29] audit: type=1326 audit(1733757872.992:20947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31406 comm="syz.0.8417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1447e8fed9 code=0x7ffc0000 [ 592.691328][ T29] audit: type=1326 audit(1733757873.022:20948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31406 comm="syz.0.8417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=289 compat=0 ip=0x7f1447e8fed9 code=0x7ffc0000 [ 592.715070][ T29] audit: type=1326 audit(1733757873.022:20949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31406 comm="syz.0.8417" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1447e8fed9 code=0x7ffc0000 [ 592.738698][ T29] audit: type=1400 audit(1733757873.032:20950): avc: denied { create } for pid=31409 comm="syz.1.8419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 592.758600][ T29] audit: type=1400 audit(1733757873.032:20951): avc: denied { connect } for pid=31409 comm="syz.1.8419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 592.778652][ T29] audit: type=1400 audit(1733757873.032:20952): avc: denied { getopt } for pid=31409 comm="syz.1.8419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 592.807665][ T29] audit: type=1400 audit(1733757873.162:20953): avc: denied { create } for pid=31414 comm="syz.0.8421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 592.830827][ T29] audit: type=1326 audit(1733757873.182:20954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31416 comm="syz.1.8422" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa7d6d5fed9 code=0x7ffc0000 [ 592.854529][ T29] audit: type=1400 audit(1733757873.182:20955): avc: denied { write } for pid=31414 comm="syz.0.8421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 592.875085][ T29] audit: type=1400 audit(1733757873.182:20956): avc: denied { nlmsg_read } for pid=31414 comm="syz.0.8421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 593.029212][T31431] netlink: 'syz.0.8428': attribute type 1 has an invalid length. [ 593.140260][T31439] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 593.148878][T31439] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 593.323939][T14382] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 594.471072][T14382] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 594.904639][T29814] udevd[29814]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 595.206521][T31504] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8454'. [ 595.217347][T31504] 9pnet_fd: Insufficient options for proto=fd [ 595.227797][T31504] rdma_rxe: rxe_newlink: failed to add syzkaller0 [ 595.581670][T22606] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 595.594963][T31513] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 595.603735][T31513] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 595.918650][T31520] netlink: 16 bytes leftover after parsing attributes in process `syz.4.8459'. [ 596.078021][T31530] netlink: 332 bytes leftover after parsing attributes in process `syz.3.8463'. [ 596.135564][T31535] netlink: 140 bytes leftover after parsing attributes in process `kmem_cache_free'. [ 596.149420][T31535] netlink: 140 bytes leftover after parsing attributes in process `kmem_cache_free'. [ 596.491925][T31559] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 596.731604][T20818] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 596.816927][T31574] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 596.833002][T31574] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 597.064586][T31594] netlink: 140 bytes leftover after parsing attributes in process `kmem_cache_free'. [ 597.083650][T31594] netlink: 140 bytes leftover after parsing attributes in process `kmem_cache_free'. [ 597.105764][T31597] netlink: 16 bytes leftover after parsing attributes in process `syz.4.8488'. [ 597.219628][T31609] netlink: 'syz.2.8492': attribute type 13 has an invalid length. [ 597.230181][T31609] gretap0: refused to change device tx_queue_len [ 597.237808][T31609] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 597.278610][T31612] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8493'. [ 597.289380][T31612] 9pnet_fd: Insufficient options for proto=fd [ 597.300479][T31612] rdma_rxe: rxe_newlink: failed to add syzkaller0 [ 597.349970][T31620] loop0: detected capacity change from 0 to 164 [ 597.358663][T31620] Unable to read rock-ridge attributes [ 597.372556][T31620] Unable to read rock-ridge attributes [ 597.378787][T31620] Unable to read rock-ridge attributes [ 597.384903][T31620] iso9660: Corrupted directory entry in block 4 of inode 1792 [ 597.386470][T31622] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 597.404974][T31622] netlink: 3 bytes leftover after parsing attributes in process `syz.2.8498'. [ 597.414124][T31622] 0ªX¹¦À: renamed from caif0 [ 597.420305][T31622] 0ªX¹¦À: entered allmulticast mode [ 597.425739][T31622] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 597.448949][T31622] hub 9-0:1.0: USB hub found [ 597.454062][T31622] hub 9-0:1.0: 8 ports detected [ 597.781025][ T29] kauditd_printk_skb: 422 callbacks suppressed [ 597.781044][ T29] audit: type=1400 audit(1733757878.132:21379): avc: denied { prog_load } for pid=31632 comm="syz.3.8501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 597.806790][ T29] audit: type=1400 audit(1733757878.132:21380): avc: denied { bpf } for pid=31632 comm="syz.3.8501" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 597.827601][ T29] audit: type=1400 audit(1733757878.132:21381): avc: denied { perfmon } for pid=31632 comm="syz.3.8501" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 597.865579][ T29] audit: type=1400 audit(1733757878.212:21382): avc: denied { prog_run } for pid=31632 comm="syz.3.8501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 597.884902][ T29] audit: type=1400 audit(1733757878.212:21383): avc: denied { map_create } for pid=31632 comm="kmem_cache_free" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 597.904877][ T29] audit: type=1400 audit(1733757878.212:21384): avc: denied { open } for pid=31632 comm="kmem_cache_free" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 597.924775][ T29] audit: type=1400 audit(1733757878.212:21385): avc: denied { kernel } for pid=31632 comm="kmem_cache_free" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 597.944815][ T29] audit: type=1326 audit(1733757878.222:21386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31632 comm="kmem_cache_free" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 597.968991][ T29] audit: type=1326 audit(1733757878.222:21387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31632 comm="kmem_cache_free" exe="/root/syz-executor" sig=0 arch=c000003e syscall=123 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 597.990502][T22606] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 597.993093][ T29] audit: type=1326 audit(1733757878.222:21388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31632 comm="kmem_cache_free" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a8b8afed9 code=0x7ffc0000 [ 598.058222][T31635] lo speed is unknown, defaulting to 1000 [ 598.091640][T31635] lo speed is unknown, defaulting to 1000 [ 598.097778][T31635] lo speed is unknown, defaulting to 1000 [ 598.426181][T31669] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 598.466407][T31672] lo speed is unknown, defaulting to 1000 [ 598.476077][T31675] 9pnet_fd: Insufficient options for proto=fd [ 598.509306][T31672] lo speed is unknown, defaulting to 1000 [ 598.532766][T31672] lo speed is unknown, defaulting to 1000 [ 598.613486][T31684] IPv6: NLM_F_CREATE should be specified when creating new route [ 598.727732][T31694] lo speed is unknown, defaulting to 1000 [ 598.766188][T31694] lo speed is unknown, defaulting to 1000 [ 598.773638][T31694] lo speed is unknown, defaulting to 1000 [ 598.910551][T31705] loop0: detected capacity change from 0 to 512 [ 598.934721][T31705] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 598.949364][T31705] ext4 filesystem being mounted at /537/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 598.962457][T31712] 9pnet_fd: Insufficient options for proto=fd [ 599.111084][T14404] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 599.548593][T31739] lo speed is unknown, defaulting to 1000 [ 599.599196][T31739] lo speed is unknown, defaulting to 1000 [ 599.611403][T31739] lo speed is unknown, defaulting to 1000 [ 599.820690][T21991] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 600.058922][T31766] loop0: detected capacity change from 0 to 512 [ 600.073003][T31766] EXT4-fs (loop0): can't mount with journal_async_commit, fs mounted w/o journal [ 600.185405][T31779] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 600.196081][T31779] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 600.282122][T14396] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 600.424000][T31788] lo speed is unknown, defaulting to 1000 [ 600.459350][T31788] lo speed is unknown, defaulting to 1000 [ 600.465467][T31788] lo speed is unknown, defaulting to 1000 [ 600.583137][T31799] __nla_validate_parse: 11 callbacks suppressed [ 600.583157][T31799] netlink: 140 bytes leftover after parsing attributes in process `kmem_cache_free'. [ 600.599609][T31799] netlink: 140 bytes leftover after parsing attributes in process `kmem_cache_free'. [ 600.610881][T31801] FAULT_INJECTION: forcing a failure. [ 600.610881][T31801] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 600.624131][T31801] CPU: 0 UID: 0 PID: 31801 Comm: syz.4.8565 Not tainted 6.13.0-rc2-syzkaller #0 [ 600.633180][T31801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 600.643239][T31801] Call Trace: [ 600.646522][T31801] [ 600.649457][T31801] dump_stack_lvl+0xf2/0x150 [ 600.654147][T31801] dump_stack+0x15/0x1a [ 600.658327][T31801] should_fail_ex+0x223/0x230 [ 600.663097][T31801] should_fail+0xb/0x10 [ 600.667269][T31801] should_fail_usercopy+0x1a/0x20 [ 600.672327][T31801] _copy_from_user+0x1e/0xb0 [ 600.676974][T31801] __se_sys_mount+0x119/0x2d0 [ 600.681713][T31801] ? ksys_write+0x176/0x1b0 [ 600.686289][T31801] __x64_sys_mount+0x67/0x80 [ 600.690912][T31801] x64_sys_call+0x2c84/0x2dc0 [ 600.695604][T31801] do_syscall_64+0xc9/0x1c0 [ 600.700123][T31801] ? clear_bhb_loop+0x55/0xb0 [ 600.704847][T31801] ? clear_bhb_loop+0x55/0xb0 [ 600.709658][T31801] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 600.715615][T31801] RIP: 0033:0x7f671a16fed9 [ 600.720039][T31801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 600.739792][T31801] RSP: 002b:00007f67187e7058 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 600.748347][T31801] RAX: ffffffffffffffda RBX: 00007f671a335fa0 RCX: 00007f671a16fed9 [ 600.756371][T31801] RDX: 00000000200002c0 RSI: 0000000020000080 RDI: 0000000000000000 [ 600.764353][T31801] RBP: 00007f67187e70a0 R08: 0000000020000400 R09: 0000000000000000 [ 600.772375][T31801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 600.780414][T31801] R13: 0000000000000000 R14: 00007f671a335fa0 R15: 00007ffd9eeae718 [ 600.788462][T31801] [ 600.905028][T31815] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8571'. [ 600.944300][T31815] 9pnet_fd: Insufficient options for proto=fd [ 601.007110][T31831] netlink: 16 bytes leftover after parsing attributes in process `syz.1.8579'. [ 601.038937][T31836] netlink: 32 bytes leftover after parsing attributes in process `syz.2.8581'. [ 601.048564][T31833] lo speed is unknown, defaulting to 1000 [ 601.094985][T31833] lo speed is unknown, defaulting to 1000 [ 601.107610][T31833] lo speed is unknown, defaulting to 1000 [ 601.123416][T31839] lo speed is unknown, defaulting to 1000 [ 601.172189][T31839] lo speed is unknown, defaulting to 1000 [ 601.178523][T31839] lo speed is unknown, defaulting to 1000 [ 601.448068][T31869] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8591'. [ 601.460799][T31869] 9pnet_fd: Insufficient options for proto=fd [ 601.571503][T20818] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 601.789338][T31877] lo speed is unknown, defaulting to 1000 [ 601.822207][T31877] lo speed is unknown, defaulting to 1000 [ 601.828378][T31877] lo speed is unknown, defaulting to 1000 [ 601.925185][T31877] chnl_net:caif_netlink_parms(): no params data found [ 601.966822][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::ffff:172.20.20.170]:2. Sending cookies. [ 602.003734][T31913] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8603'. [ 602.014145][T31877] bridge0: port 1(bridge_slave_0) entered blocking state [ 602.014943][T31913] 9pnet_fd: Insufficient options for proto=fd [ 602.021249][T31877] bridge0: port 1(bridge_slave_0) entered disabled state [ 602.036268][T31877] bridge_slave_0: entered allmulticast mode [ 602.042920][T31877] bridge_slave_0: entered promiscuous mode [ 602.051510][T31877] bridge0: port 2(bridge_slave_1) entered blocking state [ 602.058712][T31877] bridge0: port 2(bridge_slave_1) entered disabled state [ 602.065998][T31877] bridge_slave_1: entered allmulticast mode [ 602.072497][T31877] bridge_slave_1: entered promiscuous mode [ 602.089425][T31877] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 602.100374][T31877] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 602.124152][T31877] team0: Port device team_slave_0 added [ 602.131490][T31877] team0: Port device team_slave_1 added [ 602.150197][T31877] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 602.157298][T31877] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 602.183270][T31877] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 602.197566][T31877] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 602.204625][T31877] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 602.230685][T31877] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 602.261947][T31877] hsr_slave_0: entered promiscuous mode [ 602.268248][T31877] hsr_slave_1: entered promiscuous mode [ 602.277749][T31877] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 602.285867][T31877] Cannot create hsr debugfs directory [ 602.379597][T31925] netlink: 16 bytes leftover after parsing attributes in process `syz.1.8607'. [ 602.622953][T31877] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 602.634361][T31877] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 602.644204][T31877] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 602.663911][T31877] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 602.708634][T31877] 8021q: adding VLAN 0 to HW filter on device bond0 [ 602.720160][T31877] 8021q: adding VLAN 0 to HW filter on device team0 [ 602.731656][T14378] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 602.743212][T20818] bridge0: port 1(bridge_slave_0) entered blocking state [ 602.750414][T20818] bridge0: port 1(bridge_slave_0) entered forwarding state [ 602.760162][T20818] bridge0: port 2(bridge_slave_1) entered blocking state [ 602.767260][T20818] bridge0: port 2(bridge_slave_1) entered forwarding state [ 602.793891][T31877] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 602.804373][T31877] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 602.856053][ T29] kauditd_printk_skb: 551 callbacks suppressed [ 602.856075][ T29] audit: type=1400 audit(1733757883.182:21940): avc: denied { egress } for pid=3372 comm="kworker/1:3" daddr=ff02::16 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 602.884926][ T29] audit: type=1400 audit(1733757883.182:21941): avc: denied { sendto } for pid=3372 comm="kworker/1:3" daddr=ff02::16 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 602.923410][T31941] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 602.958346][T31877] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 602.988398][ T29] audit: type=1400 audit(1733757883.342:21942): avc: denied { read } for pid=31945 comm="syz.4.8613" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 603.011937][ T29] audit: type=1400 audit(1733757883.342:21943): avc: denied { open } for pid=31945 comm="syz.4.8613" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 603.044610][T31877] veth0_vlan: entered promiscuous mode [ 603.044815][ T29] audit: type=1400 audit(1733757883.402:21944): avc: denied { ioctl } for pid=31945 comm="syz.4.8613" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 603.057424][T31877] veth1_vlan: entered promiscuous mode [ 603.075371][ T29] audit: type=1400 audit(1733757883.402:21945): avc: denied { write } for pid=31945 comm="syz.4.8613" name="rt_acct" dev="proc" ino=4026532450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 603.093728][T31877] veth0_macvtap: entered promiscuous mode [ 603.116486][T31877] veth1_macvtap: entered promiscuous mode [ 603.127666][T31877] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 603.138247][T31877] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 603.138270][T31877] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 603.138286][T31877] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 603.138374][T31877] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 603.138472][T31877] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 603.138485][T31877] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 603.138501][T31877] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 603.138516][T31877] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 603.138532][T31877] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 603.138613][T31877] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 603.138628][T31877] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 603.139593][T31877] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 603.151441][T31877] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 603.257077][ T29] audit: type=1400 audit(1733757883.612:21946): avc: denied { create } for pid=31953 comm="syz.4.8614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 603.262331][T31877] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 603.262349][T31877] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 603.262368][T31877] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 603.262385][T31877] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 603.272841][ T29] audit: type=1400 audit(1733757883.612:21947): avc: denied { connect } for pid=31953 comm="syz.4.8614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 603.272870][ T29] audit: type=1400 audit(1733757883.612:21948): avc: denied { ioctl } for pid=31953 comm="syz.4.8614" path="socket:[94093]" dev="sockfs" ino=94093 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 603.292577][T31877] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 603.302326][ T29] audit: type=1400 audit(1733757883.612:21949): avc: denied { write } for pid=31953 comm="syz.4.8614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 603.312740][T31877] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 603.312829][T31877] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 603.312845][T31877] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 603.312862][T31877] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 603.312879][T31877] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 603.312905][T31877] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 603.312920][T31877] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 603.312936][T31877] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 603.329311][T31959] netlink: 8 bytes leftover after parsing attributes in process `syz.0.8615'. [ 603.361072][T31877] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 603.420292][T31962] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 603.485360][T31964] 9pnet_fd: Insufficient options for proto=fd [ 603.490511][T31877] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 603.499485][T31962] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 603.505248][T31877] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 603.545252][T31877] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 603.545291][T31877] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 603.694746][T31975] lo speed is unknown, defaulting to 1000 [ 603.777452][T31975] lo speed is unknown, defaulting to 1000 [ 603.791563][T31975] lo speed is unknown, defaulting to 1000 [ 603.915459][T31969] Process accounting resumed [ 603.920484][T20818] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 603.958252][T31984] netlink: 140 bytes leftover after parsing attributes in process `kmem_cache_free'. [ 603.969221][T31989] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 603.978539][T31989] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 604.017599][T31985] lo speed is unknown, defaulting to 1000 [ 604.164996][T31985] lo speed is unknown, defaulting to 1000 [ 604.171472][T31985] lo speed is unknown, defaulting to 1000 [ 604.199647][T31996] syz.1.8626[31996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 604.199713][T31996] syz.1.8626[31996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 604.309883][T32005] 9pnet_fd: Insufficient options for proto=fd [ 604.529508][T32011] lo speed is unknown, defaulting to 1000 [ 604.674122][T32011] lo speed is unknown, defaulting to 1000 [ 604.680362][T32011] lo speed is unknown, defaulting to 1000 [ 605.078219][T14378] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 605.564342][T26956] udevd[26956]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 606.231161][T14382] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 607.331334][T14396] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 608.238782][T14378] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 608.283967][T14378] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 608.343717][T14378] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 608.403995][T14378] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 608.441123][T14382] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 608.466074][T14378] bridge_slave_1: left allmulticast mode [ 608.471886][T14378] bridge_slave_1: left promiscuous mode [ 608.477589][T14378] bridge0: port 2(bridge_slave_1) entered disabled state [ 608.485525][T14378] bridge_slave_0: left allmulticast mode [ 608.491251][T14378] bridge_slave_0: left promiscuous mode [ 608.496912][T14378] bridge0: port 1(bridge_slave_0) entered disabled state [ 608.583938][T14378] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 608.594083][T14378] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 608.604029][T14378] bond0 (unregistering): Released all slaves [ 608.671338][T14378] hsr_slave_0: left promiscuous mode [ 608.677392][T14378] hsr_slave_1: left promiscuous mode [ 608.683495][T14378] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 608.690990][T14378] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 608.698510][T14378] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 608.706018][T14378] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 608.715714][T14378] veth1_macvtap: left promiscuous mode [ 608.721265][T14378] veth0_macvtap: left promiscuous mode [ 608.726804][T14378] veth1_vlan: left promiscuous mode [ 608.732105][T14378] veth0_vlan: left promiscuous mode [ 608.795427][T14378] team0 (unregistering): Port device team_slave_1 removed [ 608.805733][T14378] team0 (unregistering): Port device team_slave_0 removed [ 609.551455][T22606] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 610.651098][T22606] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 611.751148][T22606] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 612.861120][T14396] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 613.971092][T22606] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 614.721139][ C1] ================================================================== [ 614.729268][ C1] BUG: KCSAN: data-race in __tmigr_cpu_activate / tmigr_handle_remote [ 614.737439][ C1] [ 614.739759][ C1] write to 0xffff888237c205dc of 1 bytes by task 0 on cpu 0: [ 614.747152][ C1] __tmigr_cpu_activate+0x55/0x200 [ 614.752358][ C1] tmigr_cpu_activate+0x8a/0xc0 [ 614.757236][ C1] timer_clear_idle+0x28/0x100 [ 614.762092][ C1] tick_nohz_restart_sched_tick+0x22/0x110 [ 614.767910][ C1] tick_nohz_idle_exit+0xfe/0x1d0 [ 614.772958][ C1] do_idle+0x1eb/0x230 [ 614.777056][ C1] cpu_startup_entry+0x25/0x30 [ 614.781828][ C1] rest_init+0xef/0xf0 [ 614.785894][ C1] start_kernel+0x586/0x5e0 [ 614.790408][ C1] x86_64_start_reservations+0x2a/0x30 [ 614.795882][ C1] x86_64_start_kernel+0x9a/0xa0 [ 614.800855][ C1] common_startup_64+0x12c/0x137 [ 614.805808][ C1] [ 614.808125][ C1] read to 0xffff888237c205dc of 1 bytes by interrupt on cpu 1: [ 614.815841][ C1] tmigr_handle_remote+0x26e/0x940 [ 614.820993][ C1] run_timer_softirq+0x5f/0x70 [ 614.825788][ C1] handle_softirqs+0xbf/0x280 [ 614.830476][ C1] __irq_exit_rcu+0x3a/0xc0 [ 614.834986][ C1] sysvec_apic_timer_interrupt+0x73/0x80 [ 614.840627][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 614.846645][ C1] acpi_safe_halt+0x21/0x30 [ 614.851146][ C1] acpi_idle_do_entry+0x1d/0x30 [ 614.855993][ C1] acpi_idle_enter+0x96/0xb0 [ 614.860581][ C1] cpuidle_enter_state+0xc5/0x260 [ 614.865718][ C1] cpuidle_enter+0x40/0x70 [ 614.870159][ C1] do_idle+0x192/0x230 [ 614.874324][ C1] cpu_startup_entry+0x25/0x30 [ 614.879183][ C1] start_secondary+0x96/0xa0 [ 614.883772][ C1] common_startup_64+0x12c/0x137 [ 614.888735][ C1] [ 614.891050][ C1] value changed: 0x00 -> 0x01 [ 614.895716][ C1] [ 614.898031][ C1] Reported by Kernel Concurrency Sanitizer on: [ 614.904176][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.13.0-rc2-syzkaller #0 [ 614.912782][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 614.922845][ C1] ================================================================== [ 615.141349][T22606] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured! [ 616.241109][T14404] ip6_tunnel: ip6gretap1 xmit: Local address not yet configured!