last executing test programs: 3m35.680332543s ago: executing program 3 (id=1882): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000080)=r0) close(r3) 3m35.636796504s ago: executing program 3 (id=1883): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) pread64(0xffffffffffffffff, &(0x7f00000013c0)=""/208, 0x31, 0x401) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r2 = fsopen(&(0x7f0000000400)='autofs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f0000000240)=',-\x10*\x00', &(0x7f0000000580)='$\x00\x19y\x01\xff\xb4\x9e\x95oQE\xc9\x1f|\bZ\xf44\x7f)\x03c\x9a\x85\x01V\xb8p+\x84\xfb\xe6?\x88\xe9\x98Y\x0e\xd5P\xa2\xcc\x01*\xcd%v!\x82\xf1\xaaB\x04-\x88\xeb-q8\x03\xadO\xa0F\xc5Z\x0f\xee\x94\xfcy\xa5\xa4L\xa1\xd7g\x8c\a#o\f\xdb\xcd_\x87\x1aM\xa6\xa8\xa2\xef\xb0\x9e\xa9d\xee\xacl\x9c\xcb\x03\x17\xbbG\x15\xba3\xa5r<]T\xc6R\x04\x00\x00\x00\x88\xc4\xd3\x02\xd1 @\r\x1cc\xe4|\x13H\xc2\x1fq\x88\xdd\x98\xe1~\xb0\xedK\x17x\v\x9b\xaa\xb4\a\xb6\x8b\x9e*=\x8f\x05\x8b\x88\xc9\x12\xa6\x8fs\x98\xf1\xfe\xcdX\xce,AD\xd2v\xf4\xe5\xd3\xf3\xf1TY\x1c\x8a\x98\xf8\xcf6\xc3>]l\xdaQ\xac\n{)\xc9\x95\xb4\x12j}8\x03\xba&\xe8p\xe8\xf0\xa4\xa6e\xbc\xef\x93%/x\x19\xaa\xb5\x97\x98A\\\x91\x9a \xa8\xf8\x00\x00\x00\x00\x00\x00\x00\x81', 0x0) read$ptp(r2, 0x0, 0x0) 3m35.636252353s ago: executing program 3 (id=1884): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x70bd2b, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x10000) 3m35.358203257s ago: executing program 3 (id=1889): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000012c0)=ANY=[@ANYBLOB="12000000040000000400000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r1 = socket$l2tp6(0xa, 0x2, 0x73) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x10, &(0x7f00000000c0)={[{@grpjquota, 0x4a}, {@debug}, {@jqfmt_vfsold}, {@noquota}, {@bsdgroups}, {@usrjquota, 0x22}], [], 0x2c}, 0x84, 0x4c2, &(0x7f0000000980)="$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") r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x101) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)=0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x60, &(0x7f0000000180)={'filter\x00', 0xfffffffffffff20, [{}, {0x0, 0x100000000000000}]}, 0x68) setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000180)=ANY=[], 0x18) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$eJzs3c9vFFUcAPDvbH/QUrSFGBUP0sQYSJSWFjDEeICrIQ3+iBcvVloQKdDQGi2aUBK8mBgvxph48iD+F0rkyklPHrx4MiREDUcT18x2pnTb2ZYubacyn0+y9M17O7w33X773r6+NxtAZQ2m/9Qi9kbEdBLRn8wvlnVGVji48Lx7f39yOn0kUa+/8WcSSZaXPz/JvvZlJ/dExM8/JbGnY2W9M3NXzo9PTU1ezo6HZy9MD8/MXTl47sL42cmzkxdHXxo9dvTI0WMjh9q6rqsFeSevv/9h/2djb3/3zT/JyPe/jSVxPF7Nnrj0OjbKYAw2vifJyqK+YxtdWUk6sp+TpS9x0llig1iX/PXrioinoj864v6L1x+fvlZq44BNVU8i6kBFJeIfKiofB+Tv7Ze/D66VMioBtsLdEwsTACvjv3NhbjB6GnMDO+8lsXRaJ4mI9mbmmu2KiNu3xq6fuTV2PTZpHg4oNn8tIp4uiv+kEf8D0RMDjfivNcV/Oi44lX1N819vs/7lU8XiH7bOQvz3rBr/0SL+31kS/++2Wf/g/eR7vU3x39vuJQEAAAAAAEBl3TwRES8W/f2/trj+JwrW//RFxPENqH9w2fHKv//X7mxANUCBuyciXilc/1vLV/8OdGSpxxrrAbqSM+emJg9FxOMRcSC6dqTHI6vUcfDzPV+3KhvM1v/lj7T+29lawKwddzp3NJ8zMT47/rDXDUTcvRbxTOH632Sx/08K+v/098H0A9ax5/kbp1qVrR3/wGapfxuxv7D/v3/XimT1+3MMN8YDw/moYKVnP/7ih1b1txv/bjEBDy/t/3euHv8DydL79cysv47Dc531VmXtjv+7kzcbt5zpzvI+Gp+dvTwS0Z2c7Ehzm/JH199meBTl8ZDHSxr/B55bff6vaPzfGxHzy/7v5K/mPcW5J//t+71Ve4z/oTxp/E+sq/9ff2L0xsCPrep/sP7/SKOvP5DlmP+DBV/lYdrdnF8Qjp1FRVvdXgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4FNQiYlcktaHFdK02NBTRFxFPxM7a1KWZ2RfOXPrg4kRa1vj8/1r+Sb/9C8dJ/vn/A0uOR5cdH46I3RHxZUdv43jo9KWpibIvHgAAAAAAAAAAAAAAAAAAALaJvhb7/1N/dJTdOmDTdZbdAKA0BfH/SxntALae/h+qS/xDdYl/qC7xD9Ul/qG6xD9Ul/iH6hL/AAAAAADwSNm97+avSUTMv9zbeKS6s7KuUlsGbLZa2Q0ASuMWP1Bdlv5AdXmPDyRrlPe0PGmtM1czffohTgYAAAAAAAAAAACAytm/1/5/qCr7/6G67P+H6sr3/+8ruR3A1vMeH4g1dvIX7v9f8ywAAAAAAAAAAAAAYCPNzF05Pz41NXlZ4q3t0YytTNTr9avpT8F2ac//PJEvhd8u7VmWyPf6PdhZ5f1OAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAmv0XAAD//xYSJMU=") r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r5}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000200)={'ip6_vti0\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x29, 0x4, 0x3, 0x6, 0x0, @dev={0xfe, 0x80, '\x00', 0x14}, @loopback, 0x20, 0x700, 0x1, 0x6}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x8, &(0x7f0000000040)=@raw=[@btf_id={0x18, 0xa, 0x3, 0x0, 0x2}, @map_idx={0x18, 0x9f4812ca5c5b571c, 0x5, 0x0, 0xc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @call={0x85, 0x0, 0x0, 0xb8}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x1}], &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x60, '\x00', r6, 0x0, r4, 0x8, &(0x7f0000000380)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, &(0x7f0000000400)=[{0x5, 0x4, 0x9, 0x3}, {0x3, 0x3, 0x6, 0x2}, {0x2, 0x2, 0xb, 0x7}, {0x0, 0x3, 0x4, 0xf}, {0x5, 0x3, 0x0, 0x7}, {0x0, 0x4, 0xd, 0xa}, {0x5, 0x1, 0xf}, {0x1, 0x2, 0x0, 0x2}, {0x5, 0x5, 0xd, 0x6}], 0x10, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1f, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="1820e5000000000000410102000000000085000000c9477d000000950000000000cb8589f11da69c8f3ac8310af92628776c9ae782b4a86999ea2ea951969e2a00f422bc25f62361fbf08a6b58a4f92596f133287ad139e09a5e6439548a71ad9d7a7cf15cc4a4046032f2536fd8aab38b3cc0140baa975d21c49217cbbc4fc997631366ded741b0575cf7f068f6d506b33609afca"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./bus\x00', &(0x7f00000001c0), &(0x7f0000000600)=ANY=[], 0x841, 0x1) sendto$inet6(r1, 0x0, 0x0, 0x4000000, &(0x7f0000000000)={0xa, 0xd9, 0xfffffffc, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x100000}, 0x1c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r0, &(0x7f00000002c0), 0x0}, 0x20) 3m34.260273143s ago: executing program 3 (id=1897): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x70bd2b, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x10000) 3m34.161746724s ago: executing program 3 (id=1899): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x10, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}]}, 0x24}}, 0x0) 3m34.161634484s ago: executing program 32 (id=1899): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x10, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}]}, 0x24}}, 0x0) 4.191073002s ago: executing program 4 (id=5149): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa4000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01030000000000000000010000000800010012000000080003"], 0x30}}, 0x40) 4.112650273s ago: executing program 4 (id=5151): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r2 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0xc) fchdir(r3) ioctl$PTP_PIN_SETFUNC2(r3, 0x40603d10, &(0x7f00000001c0)={'\x00', 0x7f, 0x1, 0x2}) r4 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r4, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[], 0x44f0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x6, 0xa5d4}, 0x4c58, 0x5, 0x0, 0x1, 0x5, 0x20002, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f0000000040)='asymmetric\x00', &(0x7f0000000000)=@chain) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6, 0x0, 0x1}, 0x18) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x80000000) mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x9, &(0x7f0000000000)={[{@nombcache}, {@jqfmt_vfsv0}, {@abort}, {}, {@noquota}, {@usrjquota, 0x2e}], [], 0x2e}, 0x6, 0x48d, &(0x7f0000000980)="$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") openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x80) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) creat(&(0x7f00000000c0)='./file1\x00', 0xe5596fea1b53af2b) r7 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000240)='reno\x00', 0x5) sendmmsg$inet(r0, &(0x7f0000000cc0)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="5453b4b759f9d4f4f33bda880b70e0dadde06223919f4585429ef69078a4956f646ea03bfd4c090a003c01f32b1a175baf38c1eb4572c8b372a4cf9128062e58ff575546876a2804144c3aea98c4a3533396f87e860de8c66bceb0e6b387ec853b7e91c57587d38436637e702ae18eeccefdcd7a3cdd7bfc327b5d619b57d56afe1628b65e2948af5ee0e3f52746a5aff58bb7c6d253a58bf745584d1bc19fe5e42b5534eab9e9d2587b413e81f68b60f56130f82b327f5fe900e3e107bc6b783d1d23a056426d6502133386b51e657046c1c43a2a2c4a7611ee6592a5ee08700d24d832163b3def1f", 0xe9}, {&(0x7f0000000b40)="d48c8225ddfdf2c06c27763617468581389d34126760ba3dd0fe077a7c2ce378dd62cafeeb4ba1493766d09fd561d69a5bf8109ffcd3e43d8c16b9c3fa92d4439c5af1fa4775d01dcf0748a24ab51b52fbe75287a4b9aaa18fd479bdd154b4efe531a242d90a1ca2799c242bfd4ddd8271448d3415bd3a907ad340dc2fa2471393212d02eb25242808cffdc4e7a646211c18ac8602f5fc1e4f82b72871a8d42f37988365ff226c1523bf01617976641421438e16378094c94f2e55a44150d9a358d92606afb12f21a63daadbb143d6ccdae88d53521b9fe51ffabb08ff67cb98266eeb1fbf81ec1e", 0xe8}, {&(0x7f0000000740)="f52ec22aafecc37a6d9995f1afb5c1727f223f9b84451a110b1dfbf19cc7ed183ba93f6d55645001887fc999262b9c938e22ef5ec46b4b1b535060dcca5cff1f0e5a1d9b32cef2b6e0a61af7968dc1759c", 0x51}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001180)="acc870bde54caaeacb0000108cef4fa7bf44702b284b2e80cb32d33a86853c8c28797cd14c72c87f849f6ccbf3198d11a0b1ef000006000200000088e0e022b04dbd50d36f3c028c27ba1d00000000000000000005000033abe805fe6cdcd4386304aee926d10982f6054c0e49c4a6be676d07a9d61ab465cc070000004726d0d2e39543237c93424a344146f9c3be104f7366c812776c6c4eeb4d588b56567e030386dcf93b1791134001339faf9200879546070198310212788008b3f8e768a7bf3340bcd8536d4ed3026a1bd5", 0xce}, {&(0x7f0000000840)="b1f56ee29c433328d3b2a83bd97e37007087acae7568edff43ed556d76770122635aea1dc48755381c71590cd542e796cc2669e2af442a03760c5cdfc691b3da35ad6a8d2ef9c2baa53a8dec36a2e434d46e643a1277b1dd932f3ef2cf46c257d6a19523b8b789ef34b46e461725b5e437323385b88c368f8bb5b933aa9169f5f7b51dd5319b8016623d1863d70581691a79a6678db1e5e7fa1c98c5b9e4a87272e9c4a1bd98dbb2ab76919ba5c1020e80bd0659e82d861dc6fe4c62639134c504aa438689d28748c22ebfe2772d64", 0xcf}, {&(0x7f0000000e80)="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", 0x16b}], 0x3}}], 0x2, 0xc0) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="002200ea0000"], 0x0}, 0x0) 3.292489654s ago: executing program 4 (id=5161): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x101a40, 0x0) fchown(r1, 0x0, 0xffffffffffffffff) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newtaction={0x14, 0x1d, 0x1, 0x70bd2c, 0x25dfdbfd}, 0x14}}, 0x20000040) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x19}, 0x7}, 0x1c) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$mptcp(&(0x7f00000002c0), 0xffffffffffffffff) r5 = syz_usb_connect$hid(0x6, 0x3f, &(0x7f0000000080)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x10, 0x46d, 0xc537, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0x8, 0xb0, 0x7f, [{{0x9, 0x4, 0x0, 0x3, 0x1, 0x3, 0x1, 0x2, 0x6, {0x9, 0x21, 0xff5d, 0x7, 0x1, {0x22, 0xcf8}}, {{{0x9, 0x5, 0x81, 0x3, 0x200, 0x1, 0x0, 0x73}}, [{{0x9, 0x5, 0x2, 0x3, 0x3ff, 0x2, 0xd6, 0x53}}]}}}]}}]}}, &(0x7f00000005c0)={0xa, &(0x7f00000000c0)={0xa, 0x6, 0x250, 0x2, 0x1, 0x5, 0x10, 0x3}, 0x35, &(0x7f0000000140)={0x5, 0xf, 0x35, 0x4, [@ext_cap={0x7, 0x10, 0x2, 0x12, 0x0, 0x5, 0x1ff}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x8, 0x3, 0x8, 0x9}, @wireless={0xb, 0x10, 0x1, 0x2, 0xaa, 0x4, 0x8, 0x7b6, 0x1}, @ss_container_id={0x14, 0x10, 0x4, 0x40, "c281a21b2555d2360f858a3da73fe4c3"}]}, 0x5, [{0xf5, &(0x7f00000004c0)=@string={0xf5, 0x3, "ec24325f72d266a2c04f61d27f302c7c2e9fc16d4bd24dd8eecf87416788c0f0ac93ad7c5b7e820844d4733d1b822c08ab6e8a9d4a4ac01427d8c2154705c4a23a1b60565ee3737c0c625ccebb0e6f65ce8852fe982190f9b6394a4fe93c7f819e831d44f028b310caad1ed22aa1cb426eed730f43f63b057e3d6f8554cf0c332e34c99b4b2702c8fd5a3832a0206121465886b3814d54c3861318e42b0196625ae7a83bf22d09416dea23288f212c5c3bde6d7fd034b85af42f1019ad84ed23dffe7484f6a530fdf0d905a7c4578f708b7844332cba71b06304b5ccf96751cfe44fe2dc5bef358bcf4c7d7013fc77a72f050b"}}, {0x4, &(0x7f0000000180)=@lang_id={0x4, 0x3, 0x40f}}, {0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x200a}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x1c09}}, {0xab, &(0x7f0000000380)=@string={0xab, 0x3, "b052225877d58864eda6bee03790190325e2d04d7b76477a99726e27d744c7f731268802d40d7e4b60325fd1d5e6726590f807f0f5fae971ca8bf187e55ace80f6a95f6991f2db0510f4296b4ad78e45f98518b48b3cea6087e53ff25513c2afbe3c03a8b3783875a5872d0c5eedb0d1d752ca4bc5b2c2edebd2158e79237fcbffa097752d65b25e2cb5385b26b7d735d50321409f25d3b3fe18458f1fd52d16862efdb2f2805388a0"}}]}) syz_usb_control_io$hid(r5, &(0x7f0000000840)={0x24, &(0x7f0000000640)={0x20, 0x23, 0xd8, {0xd8, 0x3, "855de2d5fbae524aa613d9e23a6cce2909453c50a0523b0bc0dc34e7c0cc5d9b83e4a9ff34b0ffbabd28613b9abeef4fd4f6c0a330f075af75061a2641af47d2172731a842465ebfe481114400427e303fe188ae7843238fd43ae78f59655f217b2f270f420747b1941001cf36a036ac214daa1e59cabe735814d1d4a46e1c0e1de382c348c2da9583b3769c04961f5d27976be50c28368d232a7741ae31fd185ccabcaaf4e7b9d57a870b6d16dcb585005fa1e50f88ad0c8ae91b01f965521bdb88ba6b32da1c263e89e034eef59641a02bc36d40e0"}}, &(0x7f0000000740)={0x0, 0x3, 0x47, @string={0x47, 0x3, "6a770166d098b2859a4ab1e2657e0e5b334319cca1988eb8f6bd0f3d674702dbbdd20a3f84a67e9066bf6ce1c4d40a79f45de1c1312d95a1d810012d90ba2c67a9ef6d9b03"}}, &(0x7f00000007c0)={0x0, 0x22, 0x14, {[@local=@item_012={0x2, 0x2, 0x3, 'TI'}, @global=@item_012={0x0, 0x1, 0x9}, @local=@item_4={0x3, 0x2, 0x3, "d6f80fe9"}, @main=@item_012={0x2, 0x0, 0x8, "529d"}, @local=@item_012={0x0, 0x2, 0x4}, @global=@item_4={0x3, 0x1, 0xa, "a4c3d72e"}, @main=@item_012={0x1, 0x0, 0x9, "ca"}]}}, &(0x7f0000000800)={0x0, 0x21, 0x9, {0x9, 0x21, 0x3, 0x6, 0x1, {0x22, 0xa8d}}}}, &(0x7f00000009c0)={0x2c, &(0x7f0000000880)={0x40, 0x13, 0x1a, "9e211a32fbc9aabaf4f487a75561ce556a028be0f095955e4a8f"}, &(0x7f00000008c0)={0x0, 0xa, 0x1}, &(0x7f0000000900)={0x0, 0x8, 0x1, 0xa}, &(0x7f0000000940)={0x20, 0x1, 0x10, "51f0ce8506894add5d452799173510af"}, &(0x7f0000000980)={0x20, 0x3, 0x1, 0x81}}) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0xf34) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r6}, 0x18) semtimedop(0x0, 0x0, 0x0, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=@newlink={0x48, 0x10, 0x401, 0x70bd2a, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_PROTOCOL={0x6}]}}}, @IFLA_ADDRESS={0xa, 0x1, @local}]}, 0x48}}, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000040)={'veth1_to_bond\x00', {0x2, 0x0, @empty}}) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="09000000000000000000020000001400018005000200"], 0x28}}, 0x0) eventfd2(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r9 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r9, 0x6, 0x0, 0x0, 0x0) r10 = fsmount(r9, 0x0, 0x0) fchdir(r10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r11}, 0x10) open(&(0x7f0000000140)='.\x00', 0x800, 0x0) close_range(r8, 0xffffffffffffffff, 0x0) 1.828299754s ago: executing program 1 (id=5189): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0) 1.778032345s ago: executing program 1 (id=5191): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioperm(0x1, 0x9, 0xfffffffffffffff8) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) socket$nl_generic(0x10, 0x3, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000440), 0x900) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r6, 0x4058534c, &(0x7f0000000180)={0x80, 0x2a, 0x3}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r6, 0x4058534c, &(0x7f0000000040)={0x80, 0x18, 0x2, 0xfffffff7, 0x0, 0x9}) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r7 = mq_open(&(0x7f0000000040)='!se\xf7ih,\x17i\xacP\xe6lNnuxselinux\x00', 0x6e93ebbbcc0884f2, 0x2, &(0x7f0000000300)={0x0, 0x1, 0x6}) mq_timedsend(r7, 0x0, 0x0, 0x0, 0x0) r8 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2c}, 0x1, 0x0, 0x0, 0x24000891}, 0x40000c0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000c80)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000001300)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x29000000}, 0xc, &(0x7f00000012c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="00022abd7000fddbdf258900000008000300", @ANYRES32=r10, @ANYBLOB="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"], 0x13c}, 0x1, 0x0, 0x0, 0x804}, 0x11) mq_timedsend(r7, 0x0, 0x0, 0x0, 0x0) r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x8, 0xdd, 0xff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000880)={{r1}, 0x0, &(0x7f0000000840)='%pi6 \x00'}, 0x20) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r11, 0x80489439, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.575548308s ago: executing program 0 (id=5194): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000)=0x1a, 0x4) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xfffffffffffffffc) sendfile(r0, r1, &(0x7f0000000040)=0x5, 0x2) 1.556666568s ago: executing program 0 (id=5196): r0 = syz_io_uring_setup(0x1104, &(0x7f0000000300)={0x0, 0x0, 0x1000, 0xfffffffe, 0x21e}, &(0x7f00000003c0)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000380)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1fc, 0x0, 0x1}) io_uring_enter(r0, 0x47fa, 0x0, 0x0, 0x0, 0x0) (fail_nth: 5) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x20, 0x2, r3, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0, 0x40032043, 0x1}) 1.070596865s ago: executing program 0 (id=5199): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14105, 0x2e, 0xfffffc00, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0xfffff, 0xc, 0xc, 0x4, [@typedef={0x2}]}, {0x0, [0x0, 0x61]}}, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) 1.032385785s ago: executing program 0 (id=5201): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000003d91f68d6566d9b118110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r0, 0x0, 0x10000}, 0x18) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000640)='kfree\x00', r2, 0x0, 0x4}, 0x18) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f00000005c0)=@usbdevfs_disconnect={0x3}) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000400000041000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03400100010000fe00"/28], 0x48) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) read(r4, &(0x7f0000032440)=""/102364, 0x18fdc) 1.031711685s ago: executing program 2 (id=5202): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0) 970.176596ms ago: executing program 2 (id=5203): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x7, 0x10000, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='inet_sock_set_state\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) listen(r1, 0x3) 969.820096ms ago: executing program 2 (id=5204): r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_mount_image$vfat(&(0x7f00000005c0), &(0x7f00000002c0)='./file0\x00', 0xc80, &(0x7f0000020100)=ANY=[@ANYBLOB="00631dda01aef2456795dd9b26209f1c0f624854ea3dd5a00bd6df44035f5c3ae796fec6d633a0ffad0569794acfef7da01767fd4175f2cd82df769aa2ee7bfe3640554507d2e660c9f9e222a72e1e3e71145c480657d2864e5e276f028d64701ae31cde0ceaf408fdb05c0f4142da00e900000100000149e6d308cbe315789f4baffe39bbced9b1d421d2e290e9fc563b62225f002ee310e1fa7321000000000000d6231001a4b2d467825f3abb0c167e129cf1fa0e7854103f4bf2d3a0194983bc86cbd3d75ccef3c8ac4516dac102"], 0x1, 0x27c, &(0x7f0000000600)="$eJzs281qE1EYxvGnH9ov20Sr1VbEF93oZmjjFYTSghhQaiN+gDC1Ew2ZJiUTKhGx3bn1LoTi0p0g3kA3XoELd9247EIc6UxskzaiFXRs8/9tzhvOPOGcnDPhLGY2775aKhUCp+DW1N1l6pX6tSWl1a0exboabXdUH1ezNV0dzX26cPve/RvZXG5mzmw2O38tY2YjF98/ff7m0ofa0J23I+/6tJF+uPkl83ljbGN889v8k2JgxcDKlZq5tlCp1NwF37PFYlByzG75nht4ViwHXrWlv+BXlpfr5pYXhweXq14QmFuuW8mrW61itWrd3MdusWyO49jwoPAr+fW5OTeb9Cjwd1WrWXda0sS+nvx6IgMCAACJanP+X+P83yk4/3eC7fP/g8b924rzPwAAAAAAAAAAAAAAAAAAAAAAh8FWGKbCMEz9aI9J0Rs+YePzgKRBSUOSTkgaljQiKSUpLemkpFOSRiWdlnRG0piks5LOSRpv+q6k54r9kln/gSSnjCbc/52N9e9sTS/u9ktLL1fyK/m4jfuzBRXly9OkUvoarWVDXM9ez81MWiSt80urjfzqSr6nNT+l1PaGaZefivPWmu+L9t1OPqPU9gZrl8+0zffryuWmvKOUPj5SRb4Woz25m38xZTZ9M7cnPxFdd9Q5tqPt+jnOz/rj/AH2x57ft1cTvcnOHVJQf1Zyfd+rUlAcheK1/othHP4i6X8m/Au7i570SAAAAAAAAAAAAAAAAAAAB/GnTwiGq3H+dy5Oeo4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOz1PQAA//+5gF2o") r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x84042, 0x1fb) write$P9_RUNLINKAT(r2, &(0x7f0000000000)={0xfffffffffffffecb, 0x4d, 0x1}, 0xffffffd7) ioctl$USBDEVFS_ALLOC_STREAMS(r2, 0x8008551c, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x3500, 0x5dd8, 0x0, 0x9, 0x5, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) faccessat2(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x2, 0x1100) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x20000600) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000bc0), 0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup(r3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r5, @ANYRES64=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r5}, &(0x7f0000000000), &(0x7f00000005c0)=r6}, 0x20) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x4, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, 0x0, 0x0) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r7}, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_NAME(0xf, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={0x0, r6, 0x0, 0x1000000005}, 0x18) pwritev(r9, &(0x7f0000000280), 0x31, 0x804, 0x8001) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="d8000000180081054e81f783db4cb9040a1d080006007c09e8fc55a10a0015000600142603600e1208000f00fff00401a80008000800104004080000055c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb71b14d6d930dfe144ecc447c65e206d25b4084121d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad9e3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd4e1ffffffffc1c9b6278754ca397c388b0dd6e4edef3d9300fc0d15", 0xd8}], 0x1}, 0x4000000) 964.793796ms ago: executing program 1 (id=5205): openat$pidfd(0xffffffffffffff9c, 0x0, 0x58900, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0xb6e1}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x200}}}, 0x108) socket(0x400000000010, 0x3, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) pread64(0xffffffffffffffff, &(0x7f00000013c0)=""/208, 0x31, 0x401) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) io_setup(0x2, 0x0) r1 = fsopen(&(0x7f0000000400)='autofs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000240)=',-\x10*\x00', &(0x7f0000000580)='$\x00\x19y\x01\xff\xb4\x9e\x95oQE\xc9\x1f|\bZ\xf44\x7f)\x03c\x9a\x85\x01V\xb8p+\x84\xfb\xe6?\x88\xe9\x98Y\x0e\xd5P\xa2\xcc\x01*\xcd%v!\x82\xf1\xaaB\x04-\x88\xeb-q8\x03\xadO\xa0F\xc5Z\x0f\xee\x94\xfcy\xa5\xa4L\xa1\xd7g\x8c\a#o\f\xdb\xcd_\x87\x1aM\xa6\xa8\xa2\xef\xb0\x9e\xa9d\xee\xacl\x9c\xcb\x03\x17\xbbG\x15\xba3\xa5r<]T\xc6R\x04\x00\x00\x00\x88\xc4\xd3\x02\xd1 @\r\x1cc\xe4|\x13H\xc2\x1fq\x88\xdd\x98\xe1~\xb0\xedK\x17x\v\x9b\xaa\xb4\a\xb6\x8b\x9e*=\x8f\x05\x8b\x88\xc9\x12\xa6\x8fs\x98\xf1\xfe\xcdX\xce,AD\xd2v\xf4\xe5\xd3\xf3\xf1TY\x1c\x8a\x98\xf8\xcf6\xc3>]l\xdaQ\xac\n{)\xc9\x95\xb4\x12j}8\x03\xba&\xe8p\xe8\xf0\xa4\xa6e\xbc\xef\x93%/x\x19\xaa\xb5\x97\x98A\\\x91\x9a \xa8\xf8\x00\x00\x00\x00\x00\x00\x00\x81', 0x0) read$ptp(r1, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) socket(0x40000000015, 0x5, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x2c41, 0x0) flock(r2, 0x5) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) flock(r4, 0x2) 762.141099ms ago: executing program 2 (id=5209): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = socket$kcm(0x10, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x89f5, &(0x7f00000000c0)={'bond_slave_0\x00', @random="0135014010ff"}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) socket$key(0xf, 0x3, 0x2) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1000000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000000000000000003682ef00000000005f5e7ea8fa5209266b0e3719fca349177faf90fd840655717e9dc8e1b4c16844e0694750c149c0e9dde31018102578d46a78943d6e517f1419d9c306252fbe4d416c85626da7d515e5161ff9653279c5840c868f464d502397a4714ad7628aaf4bd4788ca0d8226e9787b7a6936e6209b75e39a242d5fd1bd2c5a648bc5da94f937548fe0fca43f49fad436d4eb55f", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r5}, &(0x7f0000000a00), &(0x7f0000000a40)=r4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) socket$inet6(0xa, 0x80002, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e000f000000e8bd6efb250314000e000300240248ff050005001200", 0x2e}], 0x1}, 0x0) 743.360419ms ago: executing program 2 (id=5210): syz_mount_image$ext4(&(0x7f0000000ac0)='ext4\x00', &(0x7f0000000440)='./file1\x00', 0x3810744, &(0x7f0000000100)={[{@noauto_da_alloc}, {@dioread_lock}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}, {}, {@nodiscard}, {@sysvgroups}, {@nojournal_checksum}, {@noauto_da_alloc}, {@minixdf}]}, 0x1, 0x492, &(0x7f0000000fc0)="$eJzs3MtvVFUYAPDv3k55ibQiPkDUKhobH5QWVBYuxKhxoYmJLnBZ20KQQg2tRgiRagwuDYl7Ylz5L7hyZYwrE7e6NYaEKDHhsWHMnXsv7bwKlGmntL9fMvScmXPuOV/PPTPn3sM0gDVrIPsnidgcEX9ERF+erS8wkP+4cun02NVLp8eSqFbf+yeplbt86fRYWbSsd0+RGUwj0q+SopF60ydPHR2dnJw4UeSHZo59PDR98tQLR46NHp44PHF8ZP/+fXuHX35p5MWOxJn16fKOz6d2bn/rg3PvjB089+GGutfnx9EpA1ng/1ZrGl97utONddn16lycSaXbveFW9URENly9tfnfFz0xN3h98caXXe0csKSy9+y/Gp/svZGarQKrWBKLqhaLqwasHOUHfXb9Wz6WcfnRdRcP5BdAWdxXikf+SiXS4hfUu4TtD0TEwdlr57NHNNyHqL75adN9AwCAO/XTgaj2PN+8/ksi4sF55ZJib6g/Iu6LiK0RcX9EbIuIB4qyD0XEwy3a2LhA+41bQ83rz/TCXLrzK7Fs/fdKsbdVv/5LyyL9PUXu3lr8vcmhI5MTeyJiS0QMRu/6LD/c6uDlIV7//Zt27c9f/x2czftRrgWLg1yorJ9X4cz3+c8O/SoufhGxo9Iq/qS2E5BEtZqN/faI2HF7h95SJo48+8POdoXq4792vjn+BXRgn6n6XcQz+fjPRkP8pWTh/cmhDTE5sWeoPCua/frb2XfbtX9H8XdANv6b6s//hhJ9/yXz92unb7+Ns39+3faasnLT+BvO/4gYH50ZXZe8X9uzXlc899nozMyJ4Yh1ydu1fN3zI3N1y3xZPot/cFfr+b+1qJPF/0hEZCfxoxHxWEQ8XozdExHxZETsahVcscX8y2tPfdQu/pUw/uMt3/9unP/99eN/+4meoz//2K79BeOvvYNk47+vlh0s6mTjn6c2tI2rfXfKOos9mwEAAODuk0bE5kjS3TfSabp7d/7/5bfFpnRyanrmuUNTnxwfz78j0B+9aXmnq2/e/dDhZLY4Yp4fKe4Vl6/vLe4bf1veVhibmhzvYtxAPs9bzf/M3z3d7h2w5HxfC9auxvmfdqkfwPK71c9/1wOw+ix2/W+dAHc/1/+wdrWa/2ca8tb+sBpt9PkPa9hN5/+ry9MPYPk1z//karUvWvzZWmC1sf6HNelOvte/VInKAt/eX2Qirq+AuFZXItIla2J2RQR4FycqHZjdXX5jAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6JD/AwAA//8KB/bK") mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) fcntl$setpipe(r0, 0x407, 0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000100)="eb", 0x20000101}], 0x1, 0x0) rename(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file1\x00') r1 = open(&(0x7f0000001b80)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)=0x20000008) 718.97614ms ago: executing program 2 (id=5211): socket(0x40000000015, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2d, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000800)={0x114, 0x0, 0x1, 0x4, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xc4, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xfc94448}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfb}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x10480d90}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6ad12d69}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x18}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x14a9b540}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1d85713a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x68fc04b7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xed}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x11}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfff}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x76}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xad94af2}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x626d3a48}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3a9c5373}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x30a883fa}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x455747a8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x89}]}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x9f5aac8d75d5dcda}, 0x20040004) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="2400000076001f03000000000000000008000000ffffffff0c000d80080003"], 0x24}], 0x1}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x1f00, 0xe, '\x00', 0x0, @fallback=0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='afs_protocol_error\x00', r1}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) getpid() ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'veth0_vlan\x00'}) io_setup(0x2004, &(0x7f0000000680)) io_setup(0xf447, &(0x7f0000000280)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000202300800000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x49, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) r4 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x56) connect$inet(r4, &(0x7f0000000380)={0x2, 0x4e25, @dev={0xac, 0x14, 0x14, 0x3e}}, 0x10) sendmmsg(r4, &(0x7f0000006140)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="65c6d96326a838047976a77611d4c4ecc94b3585c42786716ad7c93fd3a228e9a1cd93801f5b4033ea9ae2b561f18c2893aba2af73f86ac4a65917672e186b297cada86c7b329c4831efa7228c040c757e6ce437d7853ac2cca9605a2e18bf6553fac161511f4483dc8b5294583cc78cd79fb68fb57bd8697ac1639517070e92cd2d36932b0e26cf8fdd87e817f08f7d", 0x90}, {&(0x7f00000002c0)="b16b5d1ddcad4b5eedb9593060ada4a1778939f40388ef540871ce291c1010f3310edf7028093cf8709632cad4866d5e448d5385c80db3518564b1194247acfb3b463ee97c794123a991311e51e1790748a23c3301974b905bbd18b3e54cb3cc90c180fba7461df205130349d430083d2c66828f43a4f66e274175218e8e3f", 0x7f}], 0x2}}, {{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000002880)="13d0dc432d3d3391fafe26160c215d30a476f4ac80d634079b6b579bb04ade2653f8c0f6b1a55451ddad18f6d9a81e8bc2121377f7a87a5e076ea2c1e4b0094d472684241faf30ebff5e58a61ba1c2ce470b99036209", 0x56}], 0x1}}], 0x2, 0x4000) close(r4) 539.577042ms ago: executing program 5 (id=5216): r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200), 0x60400, 0x0) close_range(r0, r1, 0x0) (fail_nth: 2) 478.093633ms ago: executing program 5 (id=5217): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x8, &(0x7f0000000280)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) io_setup(0x1000, &(0x7f0000000180)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "0062ba7d82000000000000000000f7ffffff00"}) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r1, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32, @ANYBLOB="00000000000000f2ffffffffffffff0000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001900)={0x1b, 0x0, 0x0, 0xfffffffa, 0x0, 0x1, 0x4, '\x00', 0x0, r3, 0x4, 0x0, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000940)=@framed={{0x18, 0x9}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r6}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001980)=ANY=[@ANYBLOB="200000001000010700000000000000000a0000000c0002006e6c3830323131"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x40050) r8 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) close_range(r8, 0xffffffffffffffff, 0x100000000000000) 273.132906ms ago: executing program 4 (id=5218): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0}, 0x2, 0xffffffff, 0x6, 0x6, 0x4, 0x5, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r2) sendmsg$NLBL_MGMT_C_ADDDEF(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01000000000000000000040000e41300050003030000000a0000005dc000000000010800020005000000140006"], 0x4c}, 0x1, 0x0, 0x0, 0x8004}, 0x4040000) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x3, 0x0, 0x0, 0x0, 0x7, 0x590, 0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xc}, 0x4c58, 0x3, 0x0, 0x6, 0x8, 0x20020001, 0xb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0xa) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000003, 0x13, r4, 0x0) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) lseek(r5, 0x1, 0x0) getdents(r5, &(0x7f0000001fc0)=""/184, 0xb8) 223.643277ms ago: executing program 5 (id=5219): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=@newtaction={0x88c, 0x30, 0xffff, 0x3, 0x0, {}, [{0x878, 0x1, [@m_police={0x874, 0x1, 0x0, 0x0, {{0xb}, {0x848, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x1, 0x4, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x8000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x9, 0x3, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffc, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x4, 0x20000000, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7fff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x7, 0x0, 0x0, 0xfffffffe, {0x3, 0x0, 0x0, 0x0, 0xb, 0x3}, {0x4, 0x2, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x3, 0x2}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0xfffffffe, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x6, 0x2, 0x4, 0xfffffffe, 0x0, 0x0, 0x1, 0x25d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x2, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x80000, 0x0, 0x0, 0x0, 0xf7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffe, 0x0, 0x0, 0x76, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x1bde, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff81, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x10, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x8]}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x1}}}}]}]}, 0x88c}}, 0x0) 207.881407ms ago: executing program 5 (id=5220): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000054850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000540)={0xea, 0x0}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x5, 0x4, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0xf, 0x0, 0x2, 0xffffffffffffffe0, 0xfffffffffffffffc}]}, &(0x7f0000000340)='GPL\x00', 0x8, 0xf9, &(0x7f0000000380)=""/249, 0x41100, 0x41, '\x00', 0x0, @fallback=0xb, r1, 0x8, &(0x7f00000004c0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x3, 0xe, 0xc7, 0x80000001}, 0x10, r2, r3, 0x8, &(0x7f0000000580), &(0x7f00000005c0)=[{0x5, 0x5, 0x10, 0x2}, {0x2, 0x1, 0x6, 0x9}, {0x0, 0x3, 0x1, 0x8}, {0x4, 0x3, 0x0, 0xc}, {0x5, 0x1, 0xc, 0x8}, {0x1, 0x3, 0xf, 0x9}, {0x3, 0x3, 0xb, 0x5}, {0x2, 0x4, 0x0, 0x7}], 0x10, 0x101, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, r0, 0x0, 0x0, 0x0, 0x0, 0x7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000c80)='kmem_cache_free\x00', r4}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd42"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_opts(r5, 0x29, 0x4d, &(0x7f0000000000)=ANY=[@ANYRES16=r5], 0x8) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) recvmsg(r5, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/22, 0x16, 0x2000000}, 0x105aa) sendto$inet6(r6, &(0x7f0000000300), 0x5aa, 0x0, 0x0, 0xfffffffffffffdfd) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r7, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 194.842397ms ago: executing program 0 (id=5221): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = socket$kcm(0x10, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x89f5, &(0x7f00000000c0)={'bond_slave_0\x00', @random="0135014010ff"}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) socket$key(0xf, 0x3, 0x2) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1000000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000000000000000003682ef00000000005f5e7ea8fa5209266b0e3719fca349177faf90fd840655717e9dc8e1b4c16844e0694750c149c0e9dde31018102578d46a78943d6e517f1419d9c306252fbe4d416c85626da7d515e5161ff9653279c5840c868f464d502397a4714ad7628aaf4bd4788ca0d8226e9787b7a6936e6209b75e39a242d5fd1bd2c5a648bc5da94f937548fe0fca43f49fad436d4eb55f", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r5}, &(0x7f0000000a00), &(0x7f0000000a40)=r4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) socket$inet6(0xa, 0x80002, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008108040f80ecdb4cb92e0a480e000f000000e8bd6efb250314000e000300240248ff050005001200", 0x2e}], 0x1}, 0x0) 170.547467ms ago: executing program 0 (id=5222): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000001c0)=@filter={'filter\x00', 0x42, 0x4, 0x300, 0xffffffff, 0xf8, 0x0, 0x1b8, 0xffffffff, 0xffffffff, 0x1b8, 0x2d8, 0x2d8, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @dev={0xac, 0x14, 0x14, 0x25}, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth0_to_batadv\x00', {}, {}, 0x11}, 0x0, 0xd0, 0xf8, 0x0, {0x100000000000000}, [@common=@inet=@l2tp={{0x30}, {0xffffffff, 0x0, 0x2, 0x0, 0xf}}, @common=@unspec=@connmark={{0x30}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@unspec=@state={{0x28}, {0x7}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@ip={@multicast2, @private=0xa010102, 0x0, 0x0, 'veth1_to_hsr\x00', '\x00', {}, {}, 0x0, 0x1}, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x360) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x20000000000002b8, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x8000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000012c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEAUTHENTICATE(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="c50f00000000000000001100000008000300", @ANYRES32=0x0, @ANYBLOB="08002a01"], 0x24}}, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030097850000007b00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r6}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x9, 0x0, 0x7ffc0002}]}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) r9 = msgget$private(0x0, 0x10c) msgctl$IPC_SET(r9, 0x1, &(0x7f0000258f88)) msgsnd(r9, &(0x7f0000000380)=ANY=[@ANYBLOB="03"], 0x0, 0x0) msgctl$IPC_SET(r9, 0x1, &(0x7f0000258f88)={{0x1}, 0x0, 0x0, 0x800000000000000, 0x7, 0x2, 0x630000000000, 0x3, 0xe8, 0x0, 0x0, 0x0, 0xffffffffffffffff}) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xd, &(0x7f0000000180)=ANY=[], &(0x7f0000001b80)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r10}, 0x10) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r11, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r12, @ANYBLOB="0100000000000000000001000000280001801400040000000000000000000000ffffac1414aa060001000a"], 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r11) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='freezer.state\x00', 0x275a, 0x0) fcntl$lock(r13, 0x24, &(0x7f0000000000)) 135.212978ms ago: executing program 4 (id=5223): mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) 134.567578ms ago: executing program 4 (id=5224): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0600000004000000ff0f"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = syz_open_dev$usbfs(&(0x7f0000000000), 0x1ff, 0x402) r3 = dup(r2) r4 = mq_open(&(0x7f00000004c0)='\r\x00elinu\xef\xe3elinux\x00\x96\xf6\x92\n#*\xac\x05\xce\xf8D\\\x9a\xe6[]L+\xf6\v\xe8\xf2\xd3\b\x15\n\xb8F!Q9o\x1f#\xbdt\r\xfb\"\x18%\xfdM\xaf_t\xd2\xdcJ\x10\a\xbab\x1a\xdf\xb1\xbdU\xd7Lo\xe7\xac\x81\x10k\xce-\xf5@\xbb\x9d;\xe8\xf6\xffQ\x04\xaai\x92k\x1b;\xddM\xa2\xe1-\x0e\xd8\xde\x00\xff\x18\xdd\bL\xfb\xa2.\xb6{\xb5\x85#\x88\xdc\xf0\x0f\x05\xf1\xc4 \xdeV\x80q\xf7\x04\xf5\x85T\x1f\xc2S]*\xc9lw\xd3J\xc5\xe8\x02\xcb\xbbAHxr\xac\xb77F\xdf\x1c\xcb\xd4\xce\x88L\xf1\xf9[\x98\xd4+pTx\x95\xb5\x1b]x\x1a\x95\xe1c6\xe7`83\xb7n#\xe0\xc1_\xec\xba\xde\a\x8b\xc5\x86woo\xbc\x1c\xa3r\x82\xf3enq-\x90/\xed\xff\xad+\x03\x10\t\xda\xfd\xa2\xd0\xef4\n%\xf1\xd8', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x4}) mq_timedreceive(r4, 0x0, 0x0, 0x0, 0x0) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000040)={0x20, 0x3, 0x0, 0x4, 0x0, 0x3057, 0x0}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x20000000ec071, 0xffffffffffffffff, 0xffffd000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x6, 0xe, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7b216198}, [@generic={0x2, 0x5, 0x1, 0x0, 0x5d81}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x4}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0xb3}, @generic={0x1, 0x3, 0x7, 0x2, 0xfffffffd}, @map_val={0x18, 0xb, 0x2, 0x0, r3}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x4}]}, &(0x7f0000000640)='syzkaller\x00', 0xb18, 0x39, &(0x7f0000000680)=""/57, 0x1f00, 0x42, '\x00', 0x0, 0x25, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x1, 0x10, 0x8, 0x6}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000740)=[r0, r3], &(0x7f0000000780)=[{0x2, 0x1, 0x0, 0xb}, {0x2, 0x1, 0xb}, {0x2, 0x3, 0x7, 0xc}, {0x4, 0x1, 0x5, 0x9}], 0x10, 0x1, @void, @value}, 0x94) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r6 = getpid() sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r7, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r8, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r7, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000480), 0x1a1040, 0x0) ioctl$AUTOFS_IOC_FAIL(r9, 0x4c80, 0x7000000) syz_open_dev$loop(&(0x7f0000000140), 0x75f, 0xa382) 108.006998ms ago: executing program 1 (id=5225): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0) 43.578519ms ago: executing program 1 (id=5226): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x7, 0x10000, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) listen(r1, 0x3) 43.256169ms ago: executing program 5 (id=5227): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000000000000001000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1, 0x4, 0x523, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000010000000900010073797a300000000078000000030a01010000000000000000010000000900030073797a310000000028000480080002400000000208000140000000051400030076657468315f746f5f626174616476000900010073797a300000000008000a4000000002"], 0xc0}}, 0x8000) 6.107369ms ago: executing program 5 (id=5228): mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec8500000050000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='dlm_recv\x00', r0, 0x0, 0x200}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) rt_sigaction(0x19, &(0x7f0000000000)={0xfffffffffffffffc, 0x44000006, 0x0}, 0x0, 0x8, &(0x7f0000000440)) r1 = memfd_create(&(0x7f00000006c0)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\xf2\xed\x04\x00\x00\x00\xd4N\x12\x9b\x1f\t\xd1Z+\x86T\x16\xf8\x01\x00\x00\x00\x9f+\x8d!\x0fG\xab\xc2\xdc\xa3\xb3\xae8\x9f9?\xefo\xa4k\x01\xb2>\xa1\x9c\x86xm\xe6\x9bZ4\x91\x1a\xdb\xdd\x89\xb9\xc0LF;\xd6\x84\x195\x06\x00\x00\x00~\xf3S\x12\"p^\xc1jP\x8a\xc6[\xbd\xe7q]\xdd\r\x1aZS\x01*\x1b\xfd\xbcMA\xdcq\xa1\x00\xb3\xf9\x91r\x7f\xdc\xf1\xc3G,\xdb\xccS\x15\x95b\x17\xab\xe4?\x96\x95\xa4kP\x99YO\xb8V\xd5p\x90X\xaaf', 0x0) fallocate(r1, 0x0, 0x400000000000000, 0x2) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f00000003c0)='kmem_cache_free\x00', r2}, 0x10) open_tree(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x101) lsetxattr$security_capability(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@v1={0x1000000, [{0x3, 0x6}]}, 0xc, 0x3) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pipe2$9p(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RVERSION(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffbf018000000800395032303030"], 0x15) r6 = dup(r4) write$P9_RLERRORu(r6, &(0x7f0000000500)=ANY=[@ANYBLOB='S\x00\x00\x00\a'], 0x53) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r6]) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000080)=ANY=[]) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec8500000050000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='dlm_recv\x00', r0, 0x0, 0x200}, 0x18) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) (async) rt_sigaction(0x19, &(0x7f0000000000)={0xfffffffffffffffc, 0x44000006, 0x0}, 0x0, 0x8, &(0x7f0000000440)) (async) memfd_create(&(0x7f00000006c0)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\xf2\xed\x04\x00\x00\x00\xd4N\x12\x9b\x1f\t\xd1Z+\x86T\x16\xf8\x01\x00\x00\x00\x9f+\x8d!\x0fG\xab\xc2\xdc\xa3\xb3\xae8\x9f9?\xefo\xa4k\x01\xb2>\xa1\x9c\x86xm\xe6\x9bZ4\x91\x1a\xdb\xdd\x89\xb9\xc0LF;\xd6\x84\x195\x06\x00\x00\x00~\xf3S\x12\"p^\xc1jP\x8a\xc6[\xbd\xe7q]\xdd\r\x1aZS\x01*\x1b\xfd\xbcMA\xdcq\xa1\x00\xb3\xf9\x91r\x7f\xdc\xf1\xc3G,\xdb\xccS\x15\x95b\x17\xab\xe4?\x96\x95\xa4kP\x99YO\xb8V\xd5p\x90X\xaaf', 0x0) (async) fallocate(r1, 0x0, 0x400000000000000, 0x2) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x52) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f00000003c0)='kmem_cache_free\x00', r2}, 0x10) (async) open_tree(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x101) (async) lsetxattr$security_capability(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@v1={0x1000000, [{0x3, 0x6}]}, 0xc, 0x3) (async) pipe2$9p(&(0x7f0000000240), 0x0) (async) pipe2$9p(&(0x7f0000000200), 0x80000) (async) write$P9_RVERSION(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffbf018000000800395032303030"], 0x15) (async) dup(r4) (async) write$P9_RLERRORu(r6, &(0x7f0000000500)=ANY=[@ANYBLOB='S\x00\x00\x00\a'], 0x53) (async) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r6]) (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000080)=ANY=[]) (async) 0s ago: executing program 1 (id=5229): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) kernel console output (not intermixed with test programs): [T16973] netlink: 56 bytes leftover after parsing attributes in process `syz.5.4407'. [ 295.583894][T16973] syz1: rxe_newlink: already configured on syz_tun [ 295.624417][T16982] smc: net device bond0 applied user defined pnetid SYZ2 [ 295.631960][T16982] smc: net device bond0 erased user defined pnetid SYZ2 [ 295.666332][T16984] ip6gretap2: entered allmulticast mode [ 295.728018][T16986] 9pnet: p9_errstr2errno: server reported unknown error @þLì²¼ O€!ÝëL [ 295.745707][T16991] veth1_to_bond: entered allmulticast mode [ 295.753000][T16991] veth1_to_bond: left allmulticast mode [ 295.772056][T16986] netlink: 36 bytes leftover after parsing attributes in process `syz.5.4412'. [ 295.814546][T16995] veth1_to_bond: entered allmulticast mode [ 295.822533][T16995] veth1_to_bond: left allmulticast mode [ 295.883092][T17003] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4418'. [ 295.955115][T17012] smc: net device bond0 applied user defined pnetid SYZ2 [ 295.965653][T17012] smc: net device bond0 erased user defined pnetid SYZ2 [ 296.004011][T17017] 9pnet: p9_errstr2errno: server reported unknown error [ 296.009251][T17018] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4424'. [ 296.074895][T17022] veth1_to_bond: entered allmulticast mode [ 296.081390][T17022] veth1_to_bond: left allmulticast mode [ 296.103022][T17024] FAULT_INJECTION: forcing a failure. [ 296.103022][T17024] name failslab, interval 1, probability 0, space 0, times 0 [ 296.115818][T17024] CPU: 0 UID: 0 PID: 17024 Comm: syz.4.4427 Not tainted 6.15.0-syzkaller-11173-g546b1c9e93c2 #0 PREEMPT(voluntary) [ 296.115898][T17024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 296.115913][T17024] Call Trace: [ 296.115921][T17024] [ 296.115930][T17024] __dump_stack+0x1d/0x30 [ 296.115958][T17024] dump_stack_lvl+0xe8/0x140 [ 296.115983][T17024] dump_stack+0x15/0x1b [ 296.116007][T17024] should_fail_ex+0x265/0x280 [ 296.116029][T17024] should_failslab+0x8c/0xb0 [ 296.116054][T17024] kmem_cache_alloc_noprof+0x50/0x310 [ 296.116175][T17024] ? security_file_alloc+0x32/0x100 [ 296.116207][T17024] security_file_alloc+0x32/0x100 [ 296.116234][T17024] init_file+0x5c/0x1d0 [ 296.116270][T17024] alloc_empty_file+0x8b/0x200 [ 296.116326][T17024] path_openat+0x68/0x2170 [ 296.116348][T17024] ? _parse_integer_limit+0x170/0x190 [ 296.116394][T17024] ? _parse_integer+0x27/0x40 [ 296.116444][T17024] ? kstrtoull+0x111/0x140 [ 296.116475][T17024] ? strnchr+0x1e/0x40 [ 296.116508][T17024] ? bpf_bprintf_prepare+0xc42/0xd50 [ 296.116585][T17024] do_filp_open+0x109/0x230 [ 296.116613][T17024] do_sys_openat2+0xa6/0x110 [ 296.116646][T17024] __x64_sys_creat+0x65/0x90 [ 296.116759][T17024] x64_sys_call+0x114d/0x2fb0 [ 296.116787][T17024] do_syscall_64+0xd2/0x200 [ 296.116817][T17024] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 296.116859][T17024] ? clear_bhb_loop+0x40/0x90 [ 296.116880][T17024] ? clear_bhb_loop+0x40/0x90 [ 296.116901][T17024] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 296.116925][T17024] RIP: 0033:0x7f18133ee969 [ 296.116947][T17024] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 296.116979][T17024] RSP: 002b:00007f1811a57038 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 296.116998][T17024] RAX: ffffffffffffffda RBX: 00007f1813615fa0 RCX: 00007f18133ee969 [ 296.117010][T17024] RDX: 0000000000000000 RSI: 0000000000000090 RDI: 0000200000000200 [ 296.117022][T17024] RBP: 00007f1811a57090 R08: 0000000000000000 R09: 0000000000000000 [ 296.117100][T17024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 296.117116][T17024] R13: 0000000000000000 R14: 00007f1813615fa0 R15: 00007ffd7db92968 [ 296.117144][T17024] [ 296.348141][T17028] FAULT_INJECTION: forcing a failure. [ 296.348141][T17028] name failslab, interval 1, probability 0, space 0, times 0 [ 296.360939][T17028] CPU: 1 UID: 0 PID: 17028 Comm: syz.5.4429 Not tainted 6.15.0-syzkaller-11173-g546b1c9e93c2 #0 PREEMPT(voluntary) [ 296.360985][T17028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 296.361002][T17028] Call Trace: [ 296.361010][T17028] [ 296.361020][T17028] __dump_stack+0x1d/0x30 [ 296.361048][T17028] dump_stack_lvl+0xe8/0x140 [ 296.361074][T17028] dump_stack+0x15/0x1b [ 296.361132][T17028] should_fail_ex+0x265/0x280 [ 296.361161][T17028] should_failslab+0x8c/0xb0 [ 296.361195][T17028] kmem_cache_alloc_node_noprof+0x57/0x320 [ 296.361235][T17028] ? __alloc_skb+0x101/0x320 [ 296.361305][T17028] __alloc_skb+0x101/0x320 [ 296.361406][T17028] netlink_alloc_large_skb+0xba/0xf0 [ 296.361439][T17028] netlink_sendmsg+0x3cf/0x6b0 [ 296.361475][T17028] ? __pfx_netlink_sendmsg+0x10/0x10 [ 296.361509][T17028] __sock_sendmsg+0x142/0x180 [ 296.361547][T17028] ____sys_sendmsg+0x31e/0x4e0 [ 296.361583][T17028] ___sys_sendmsg+0x17b/0x1d0 [ 296.361750][T17028] __x64_sys_sendmsg+0xd4/0x160 [ 296.361844][T17028] x64_sys_call+0x2999/0x2fb0 [ 296.361867][T17028] do_syscall_64+0xd2/0x200 [ 296.361921][T17028] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 296.361957][T17028] ? clear_bhb_loop+0x40/0x90 [ 296.362049][T17028] ? clear_bhb_loop+0x40/0x90 [ 296.362072][T17028] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 296.362095][T17028] RIP: 0033:0x7fd43e25e969 [ 296.362145][T17028] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 296.362165][T17028] RSP: 002b:00007fd43c8c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 296.362279][T17028] RAX: ffffffffffffffda RBX: 00007fd43e485fa0 RCX: 00007fd43e25e969 [ 296.362337][T17028] RDX: 0000000004008000 RSI: 0000200000000100 RDI: 0000000000000005 [ 296.362350][T17028] RBP: 00007fd43c8c7090 R08: 0000000000000000 R09: 0000000000000000 [ 296.362363][T17028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 296.362376][T17028] R13: 0000000000000000 R14: 00007fd43e485fa0 R15: 00007ffc8f4eef98 [ 296.362396][T17028] [ 296.588395][T17034] FAULT_INJECTION: forcing a failure. [ 296.588395][T17034] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 296.601669][T17034] CPU: 0 UID: 0 PID: 17034 Comm: syz.5.4431 Not tainted 6.15.0-syzkaller-11173-g546b1c9e93c2 #0 PREEMPT(voluntary) [ 296.601705][T17034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 296.601721][T17034] Call Trace: [ 296.601730][T17034] [ 296.601740][T17034] __dump_stack+0x1d/0x30 [ 296.601810][T17034] dump_stack_lvl+0xe8/0x140 [ 296.601835][T17034] dump_stack+0x15/0x1b [ 296.601856][T17034] should_fail_ex+0x265/0x280 [ 296.601884][T17034] should_fail+0xb/0x20 [ 296.601970][T17034] should_fail_usercopy+0x1a/0x20 [ 296.601999][T17034] _copy_from_user+0x1c/0xb0 [ 296.602032][T17034] memdup_user+0x5e/0xd0 [ 296.602070][T17034] strndup_user+0x68/0xb0 [ 296.602099][T17034] __se_sys_mount+0x4d/0x2e0 [ 296.602124][T17034] ? __bpf_trace_sys_enter+0x10/0x30 [ 296.602152][T17034] ? trace_sys_enter+0xd0/0x110 [ 296.602177][T17034] __x64_sys_mount+0x67/0x80 [ 296.602207][T17034] x64_sys_call+0xd36/0x2fb0 [ 296.602234][T17034] do_syscall_64+0xd2/0x200 [ 296.602307][T17034] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 296.602342][T17034] ? clear_bhb_loop+0x40/0x90 [ 296.602375][T17034] ? clear_bhb_loop+0x40/0x90 [ 296.602404][T17034] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 296.602478][T17034] RIP: 0033:0x7fd43e25e969 [ 296.602543][T17034] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 296.602567][T17034] RSP: 002b:00007fd43c8c7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 296.602591][T17034] RAX: ffffffffffffffda RBX: 00007fd43e485fa0 RCX: 00007fd43e25e969 [ 296.602606][T17034] RDX: 0000200000000100 RSI: 0000200000000040 RDI: 0000000000000000 [ 296.602621][T17034] RBP: 00007fd43c8c7090 R08: 0000200000000200 R09: 0000000000000000 [ 296.602696][T17034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 296.602712][T17034] R13: 0000000000000000 R14: 00007fd43e485fa0 R15: 00007ffc8f4eef98 [ 296.602739][T17034] [ 296.833541][T17039] smc: net device bond0 applied user defined pnetid SYZ2 [ 296.843926][T17039] smc: net device bond0 erased user defined pnetid SYZ2 [ 296.960295][T17059] veth1_to_bond: entered allmulticast mode [ 296.977402][T17059] veth1_to_bond: left allmulticast mode [ 297.066458][T17075] smc: net device bond0 applied user defined pnetid SYZ2 [ 297.074025][T17075] smc: net device bond0 erased user defined pnetid SYZ2 [ 297.114883][T17082] vlan2: entered promiscuous mode [ 297.120036][T17082] bridge0: entered promiscuous mode [ 297.129282][T17080] netlink: 'syz.5.4448': attribute type 1 has an invalid length. [ 297.175035][T17096] FAULT_INJECTION: forcing a failure. [ 297.175035][T17096] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 297.188354][T17096] CPU: 0 UID: 0 PID: 17096 Comm: syz.1.4452 Not tainted 6.15.0-syzkaller-11173-g546b1c9e93c2 #0 PREEMPT(voluntary) [ 297.188390][T17096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 297.188405][T17096] Call Trace: [ 297.188412][T17096] [ 297.188465][T17096] __dump_stack+0x1d/0x30 [ 297.188580][T17096] dump_stack_lvl+0xe8/0x140 [ 297.188604][T17096] dump_stack+0x15/0x1b [ 297.188623][T17096] should_fail_ex+0x265/0x280 [ 297.188671][T17096] should_fail+0xb/0x20 [ 297.188695][T17096] should_fail_usercopy+0x1a/0x20 [ 297.188780][T17096] _copy_from_user+0x1c/0xb0 [ 297.188809][T17096] memdup_user+0x5e/0xd0 [ 297.188845][T17096] strndup_user+0x68/0xb0 [ 297.188874][T17096] __se_sys_mount+0x4d/0x2e0 [ 297.188898][T17096] ? fput+0x8f/0xc0 [ 297.188929][T17096] ? ksys_write+0x192/0x1a0 [ 297.188954][T17096] __x64_sys_mount+0x67/0x80 [ 297.189078][T17096] x64_sys_call+0xd36/0x2fb0 [ 297.189102][T17096] do_syscall_64+0xd2/0x200 [ 297.189134][T17096] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 297.189223][T17096] ? clear_bhb_loop+0x40/0x90 [ 297.189271][T17096] ? clear_bhb_loop+0x40/0x90 [ 297.189294][T17096] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 297.189317][T17096] RIP: 0033:0x7eff214de969 [ 297.189333][T17096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 297.189416][T17096] RSP: 002b:00007eff1fb47038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 297.189458][T17096] RAX: ffffffffffffffda RBX: 00007eff21705fa0 RCX: 00007eff214de969 [ 297.189472][T17096] RDX: 0000200000000100 RSI: 0000200000000040 RDI: 0000000000000000 [ 297.189485][T17096] RBP: 00007eff1fb47090 R08: 0000200000000200 R09: 0000000000000000 [ 297.189509][T17096] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 297.189522][T17096] R13: 0000000000000000 R14: 00007eff21705fa0 R15: 00007ffe32cdf208 [ 297.189645][T17096] [ 297.410397][T17100] FAULT_INJECTION: forcing a failure. [ 297.410397][T17100] name failslab, interval 1, probability 0, space 0, times 0 [ 297.423154][T17100] CPU: 1 UID: 0 PID: 17100 Comm: syz.5.4454 Not tainted 6.15.0-syzkaller-11173-g546b1c9e93c2 #0 PREEMPT(voluntary) [ 297.423190][T17100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 297.423207][T17100] Call Trace: [ 297.423215][T17100] [ 297.423224][T17100] __dump_stack+0x1d/0x30 [ 297.423251][T17100] dump_stack_lvl+0xe8/0x140 [ 297.423298][T17100] dump_stack+0x15/0x1b [ 297.423319][T17100] should_fail_ex+0x265/0x280 [ 297.423347][T17100] should_failslab+0x8c/0xb0 [ 297.423380][T17100] kmem_cache_alloc_node_noprof+0x57/0x320 [ 297.423419][T17100] ? __alloc_skb+0x101/0x320 [ 297.423497][T17100] __alloc_skb+0x101/0x320 [ 297.423533][T17100] netlink_alloc_large_skb+0xba/0xf0 [ 297.423572][T17100] netlink_sendmsg+0x3cf/0x6b0 [ 297.423626][T17100] ? __pfx_netlink_sendmsg+0x10/0x10 [ 297.423675][T17100] __sock_sendmsg+0x142/0x180 [ 297.423704][T17100] ____sys_sendmsg+0x31e/0x4e0 [ 297.423747][T17100] ___sys_sendmsg+0x17b/0x1d0 [ 297.423853][T17100] __x64_sys_sendmsg+0xd4/0x160 [ 297.423899][T17100] x64_sys_call+0x2999/0x2fb0 [ 297.423927][T17100] do_syscall_64+0xd2/0x200 [ 297.424034][T17100] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 297.424095][T17100] ? clear_bhb_loop+0x40/0x90 [ 297.424202][T17100] ? clear_bhb_loop+0x40/0x90 [ 297.424252][T17100] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 297.424279][T17100] RIP: 0033:0x7fd43e25e969 [ 297.424373][T17100] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 297.424398][T17100] RSP: 002b:00007fd43c8c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 297.424423][T17100] RAX: ffffffffffffffda RBX: 00007fd43e485fa0 RCX: 00007fd43e25e969 [ 297.424504][T17100] RDX: 0000000000000000 RSI: 00002000000074c0 RDI: 000000000000000b [ 297.424520][T17100] RBP: 00007fd43c8c7090 R08: 0000000000000000 R09: 0000000000000000 [ 297.424591][T17100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 297.424614][T17100] R13: 0000000000000000 R14: 00007fd43e485fa0 R15: 00007ffc8f4eef98 [ 297.424640][T17100] [ 297.644426][T17082] __nla_validate_parse: 3 callbacks suppressed [ 297.644442][T17082] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4449'. [ 297.659710][T17082] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4449'. [ 297.663771][T17104] 9pnet: p9_errstr2errno: server reported unknown error [ 297.677129][T17082] wireguard0: entered promiscuous mode [ 297.682718][T17082] wireguard0: entered allmulticast mode [ 297.711919][T17109] FAULT_INJECTION: forcing a failure. [ 297.711919][T17109] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 297.725117][T17109] CPU: 0 UID: 0 PID: 17109 Comm: syz.1.4458 Not tainted 6.15.0-syzkaller-11173-g546b1c9e93c2 #0 PREEMPT(voluntary) [ 297.725218][T17109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 297.725236][T17109] Call Trace: [ 297.725244][T17109] [ 297.725253][T17109] __dump_stack+0x1d/0x30 [ 297.725282][T17109] dump_stack_lvl+0xe8/0x140 [ 297.725369][T17109] dump_stack+0x15/0x1b [ 297.725392][T17109] should_fail_ex+0x265/0x280 [ 297.725422][T17109] should_fail+0xb/0x20 [ 297.725445][T17109] should_fail_usercopy+0x1a/0x20 [ 297.725475][T17109] _copy_from_user+0x1c/0xb0 [ 297.725618][T17109] memdup_user+0x5e/0xd0 [ 297.725659][T17109] strndup_user+0x68/0xb0 [ 297.725693][T17109] __se_sys_mount+0x4d/0x2e0 [ 297.725722][T17109] ? fput+0x8f/0xc0 [ 297.725763][T17109] ? ksys_write+0x192/0x1a0 [ 297.725794][T17109] __x64_sys_mount+0x67/0x80 [ 297.725823][T17109] x64_sys_call+0xd36/0x2fb0 [ 297.725884][T17109] do_syscall_64+0xd2/0x200 [ 297.725923][T17109] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 297.726002][T17109] ? clear_bhb_loop+0x40/0x90 [ 297.726031][T17109] ? clear_bhb_loop+0x40/0x90 [ 297.726060][T17109] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 297.726087][T17109] RIP: 0033:0x7eff214de969 [ 297.726106][T17109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 297.726208][T17109] RSP: 002b:00007eff1fb47038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 297.726233][T17109] RAX: ffffffffffffffda RBX: 00007eff21705fa0 RCX: 00007eff214de969 [ 297.726249][T17109] RDX: 0000200000000100 RSI: 0000200000000040 RDI: 0000000000000000 [ 297.726265][T17109] RBP: 00007eff1fb47090 R08: 0000200000000200 R09: 0000000000000000 [ 297.726281][T17109] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 297.726296][T17109] R13: 0000000000000000 R14: 00007eff21705fa0 R15: 00007ffe32cdf208 [ 297.726400][T17109] [ 297.938363][T17115] smc: net device bond0 applied user defined pnetid SYZ2 [ 297.949854][T17115] smc: net device bond0 erased user defined pnetid SYZ2 [ 298.002109][T17124] net_ratelimit: 4270 callbacks suppressed [ 298.002125][T17124] netlink: zone id is out of range [ 298.013267][T17124] netlink: zone id is out of range [ 298.018401][T17124] netlink: zone id is out of range [ 298.023622][T17124] netlink: zone id is out of range [ 298.028747][T17124] netlink: zone id is out of range [ 298.033936][T17124] netlink: zone id is out of range [ 298.039334][T17124] netlink: zone id is out of range [ 298.044711][T17124] netlink: zone id is out of range [ 298.049988][T17124] netlink: zone id is out of range [ 298.055174][T17124] netlink: zone id is out of range [ 298.067403][T17124] netlink: 20 bytes leftover after parsing attributes in process `syz.0.4463'. [ 298.191656][T17127] lo speed is unknown, defaulting to 1000 [ 298.248519][T17137] bond1: entered promiscuous mode [ 298.253730][T17137] bond1: entered allmulticast mode [ 298.261121][T17137] 8021q: adding VLAN 0 to HW filter on device bond1 [ 298.272921][T17137] bond1 (unregistering): Released all slaves [ 298.496245][T17169] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4474'. [ 298.568764][T17182] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4475'. [ 298.605580][ T10] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 298.620779][ T10] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz1] on syz0 [ 298.846145][T17215] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4479'. [ 298.855299][ T29] kauditd_printk_skb: 683 callbacks suppressed [ 298.855316][ T29] audit: type=1326 audit(1748996180.232:38527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17164 comm="syz.1.4473" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7eff214d5927 code=0x7ffc0000 [ 298.885139][ T29] audit: type=1326 audit(1748996180.232:38528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17164 comm="syz.1.4473" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7eff2147ab39 code=0x7ffc0000 [ 298.908680][ T29] audit: type=1326 audit(1748996180.232:38529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17164 comm="syz.1.4473" exe="/root/syz-executor" sig=0 arch=c000003e syscall=73 compat=0 ip=0x7eff214de969 code=0x7ffc0000 [ 298.939265][ T29] audit: type=1326 audit(1748996180.242:38530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17164 comm="syz.1.4473" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7eff214d5927 code=0x7ffc0000 [ 298.962946][ T29] audit: type=1326 audit(1748996180.242:38531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17164 comm="syz.1.4473" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7eff2147ab39 code=0x7ffc0000 [ 298.986559][ T29] audit: type=1326 audit(1748996180.242:38532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17164 comm="syz.1.4473" exe="/root/syz-executor" sig=0 arch=c000003e syscall=73 compat=0 ip=0x7eff214de969 code=0x7ffc0000 [ 299.010379][ T29] audit: type=1326 audit(1748996180.252:38533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17164 comm="syz.1.4473" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7eff214d5927 code=0x7ffc0000 [ 299.034071][ T29] audit: type=1326 audit(1748996180.252:38534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17164 comm="syz.1.4473" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7eff2147ab39 code=0x7ffc0000 [ 299.057697][ T29] audit: type=1326 audit(1748996180.252:38535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17164 comm="syz.1.4473" exe="/root/syz-executor" sig=0 arch=c000003e syscall=73 compat=0 ip=0x7eff214de969 code=0x7ffc0000 [ 299.081247][ T29] audit: type=1326 audit(1748996180.262:38536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17164 comm="syz.1.4473" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7eff214d5927 code=0x7ffc0000 [ 299.122134][T17225] lo speed is unknown, defaulting to 1000 [ 299.123384][T17220] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4481'. [ 299.323381][T17251] FAULT_INJECTION: forcing a failure. [ 299.323381][T17251] name failslab, interval 1, probability 0, space 0, times 0 [ 299.336139][T17251] CPU: 0 UID: 0 PID: 17251 Comm: syz.1.4491 Not tainted 6.15.0-syzkaller-11173-g546b1c9e93c2 #0 PREEMPT(voluntary) [ 299.336210][T17251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 299.336228][T17251] Call Trace: [ 299.336244][T17251] [ 299.336252][T17251] __dump_stack+0x1d/0x30 [ 299.336274][T17251] dump_stack_lvl+0xe8/0x140 [ 299.336375][T17251] dump_stack+0x15/0x1b [ 299.336393][T17251] should_fail_ex+0x265/0x280 [ 299.336416][T17251] should_failslab+0x8c/0xb0 [ 299.336522][T17251] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 299.336554][T17251] ? shmem_alloc_inode+0x34/0x50 [ 299.336620][T17251] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 299.336649][T17251] shmem_alloc_inode+0x34/0x50 [ 299.336745][T17251] alloc_inode+0x3d/0x170 [ 299.336823][T17251] new_inode+0x1d/0xe0 [ 299.336854][T17251] shmem_get_inode+0x244/0x750 [ 299.336885][T17251] __shmem_file_setup+0x113/0x210 [ 299.336928][T17251] shmem_file_setup+0x3b/0x50 [ 299.336986][T17251] __se_sys_memfd_create+0x2c3/0x590 [ 299.337015][T17251] __x64_sys_memfd_create+0x31/0x40 [ 299.337043][T17251] x64_sys_call+0x122f/0x2fb0 [ 299.337117][T17251] do_syscall_64+0xd2/0x200 [ 299.337155][T17251] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 299.337272][T17251] ? clear_bhb_loop+0x40/0x90 [ 299.337374][T17251] ? clear_bhb_loop+0x40/0x90 [ 299.337396][T17251] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 299.337451][T17251] RIP: 0033:0x7eff214de969 [ 299.337471][T17251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 299.337496][T17251] RSP: 002b:00007eff1fb46e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 299.337520][T17251] RAX: ffffffffffffffda RBX: 00000000000004ea RCX: 00007eff214de969 [ 299.337536][T17251] RDX: 00007eff1fb46ef0 RSI: 0000000000000000 RDI: 00007eff21561444 [ 299.337553][T17251] RBP: 00002000000006c0 R08: 00007eff1fb46bb7 R09: 00007eff1fb46e40 [ 299.337565][T17251] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000140 [ 299.337604][T17251] R13: 00007eff1fb46ef0 R14: 00007eff1fb46eb0 R15: 0000200000002240 [ 299.337623][T17251] [ 299.368426][T17249] lo speed is unknown, defaulting to 1000 [ 299.559240][T17253] random: crng reseeded on system resumption [ 299.574301][T17257] (unnamed net_device) (uninitialized): Unable to set peer notification delay as MII monitoring is disabled [ 299.590873][T17259] veth1_to_bond: entered allmulticast mode [ 299.619144][T17259] veth1_to_bond: left allmulticast mode [ 299.654244][T17262] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4495'. [ 299.713561][T17267] FAULT_INJECTION: forcing a failure. [ 299.713561][T17267] name failslab, interval 1, probability 0, space 0, times 0 [ 299.726425][T17267] CPU: 1 UID: 0 PID: 17267 Comm: syz.1.4497 Not tainted 6.15.0-syzkaller-11173-g546b1c9e93c2 #0 PREEMPT(voluntary) [ 299.726459][T17267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 299.726474][T17267] Call Trace: [ 299.726555][T17267] [ 299.726564][T17267] __dump_stack+0x1d/0x30 [ 299.726587][T17267] dump_stack_lvl+0xe8/0x140 [ 299.726612][T17267] dump_stack+0x15/0x1b [ 299.726680][T17267] should_fail_ex+0x265/0x280 [ 299.726708][T17267] should_failslab+0x8c/0xb0 [ 299.726737][T17267] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 299.726777][T17267] ? sidtab_sid2str_get+0xa0/0x130 [ 299.726821][T17267] kmemdup_noprof+0x2b/0x70 [ 299.726855][T17267] sidtab_sid2str_get+0xa0/0x130 [ 299.726925][T17267] security_sid_to_context_core+0x1eb/0x2e0 [ 299.726963][T17267] security_sid_to_context+0x27/0x40 [ 299.726997][T17267] selinux_lsmprop_to_secctx+0x67/0xf0 [ 299.727048][T17267] security_lsmprop_to_secctx+0x43/0x80 [ 299.727094][T17267] audit_log_task_context+0x77/0x190 [ 299.727161][T17267] audit_log_task+0xf4/0x250 [ 299.727199][T17267] audit_seccomp+0x61/0x100 [ 299.727279][T17267] ? __seccomp_filter+0x68c/0x10d0 [ 299.727309][T17267] __seccomp_filter+0x69d/0x10d0 [ 299.727338][T17267] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 299.727476][T17267] ? vfs_write+0x75e/0x8e0 [ 299.727510][T17267] __secure_computing+0x82/0x150 [ 299.727540][T17267] syscall_trace_enter+0xcf/0x1e0 [ 299.727652][T17267] do_syscall_64+0xac/0x200 [ 299.727690][T17267] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 299.727724][T17267] ? clear_bhb_loop+0x40/0x90 [ 299.727753][T17267] ? clear_bhb_loop+0x40/0x90 [ 299.727781][T17267] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 299.727863][T17267] RIP: 0033:0x7eff214de969 [ 299.727883][T17267] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 299.727905][T17267] RSP: 002b:00007eff1fb47038 EFLAGS: 00000246 ORIG_RAX: 00000000000000e0 [ 299.727974][T17267] RAX: ffffffffffffffda RBX: 00007eff21705fa0 RCX: 00007eff214de969 [ 299.727989][T17267] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 299.728004][T17267] RBP: 00007eff1fb47090 R08: 0000000000000000 R09: 0000000000000000 [ 299.728018][T17267] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 299.728033][T17267] R13: 0000000000000000 R14: 00007eff21705fa0 R15: 00007ffe32cdf208 [ 299.728058][T17267] [ 299.742699][T12656] cgroup: fork rejected by pids controller in [ 299.901553][T17275] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4496'. [ 299.920099][T12656] /syz4 [ 300.034817][T17279] FAULT_INJECTION: forcing a failure. [ 300.034817][T17279] name failslab, interval 1, probability 0, space 0, times 0 [ 300.047935][T17279] CPU: 0 UID: 0 PID: 17279 Comm: syz.2.4502 Not tainted 6.15.0-syzkaller-11173-g546b1c9e93c2 #0 PREEMPT(voluntary) [ 300.047974][T17279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 300.047991][T17279] Call Trace: [ 300.047999][T17279] [ 300.048008][T17279] __dump_stack+0x1d/0x30 [ 300.048074][T17279] dump_stack_lvl+0xe8/0x140 [ 300.048172][T17279] dump_stack+0x15/0x1b [ 300.048213][T17279] should_fail_ex+0x265/0x280 [ 300.048242][T17279] should_failslab+0x8c/0xb0 [ 300.048278][T17279] kmem_cache_alloc_noprof+0x50/0x310 [ 300.048343][T17279] ? security_file_alloc+0x32/0x100 [ 300.048378][T17279] security_file_alloc+0x32/0x100 [ 300.048418][T17279] init_file+0x5c/0x1d0 [ 300.048490][T17279] alloc_empty_file+0x8b/0x200 [ 300.048529][T17279] path_openat+0x68/0x2170 [ 300.048553][T17279] ? _parse_integer_limit+0x170/0x190 [ 300.048618][T17279] ? _parse_integer+0x27/0x40 [ 300.048657][T17279] ? kstrtoull+0x111/0x140 [ 300.048695][T17279] ? kstrtouint+0x76/0xc0 [ 300.048813][T17279] do_filp_open+0x109/0x230 [ 300.048909][T17279] do_sys_openat2+0xa6/0x110 [ 300.048942][T17279] __x64_sys_creat+0x65/0x90 [ 300.048982][T17279] x64_sys_call+0x114d/0x2fb0 [ 300.049067][T17279] do_syscall_64+0xd2/0x200 [ 300.049105][T17279] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 300.049139][T17279] ? clear_bhb_loop+0x40/0x90 [ 300.049162][T17279] ? clear_bhb_loop+0x40/0x90 [ 300.049318][T17279] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 300.049345][T17279] RIP: 0033:0x7f6e3b45e969 [ 300.049364][T17279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 300.049395][T17279] RSP: 002b:00007f6e39ac7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 300.049422][T17279] RAX: ffffffffffffffda RBX: 00007f6e3b685fa0 RCX: 00007f6e3b45e969 [ 300.049438][T17279] RDX: 0000000000000000 RSI: 00000000000000c0 RDI: 0000200000000100 [ 300.049476][T17279] RBP: 00007f6e39ac7090 R08: 0000000000000000 R09: 0000000000000000 [ 300.049488][T17279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 300.049549][T17279] R13: 0000000000000000 R14: 00007f6e3b685fa0 R15: 00007ffca8154bb8 [ 300.049572][T17279] [ 300.316419][T17290] veth1_to_bond: entered allmulticast mode [ 300.323018][T17290] veth1_to_bond: left allmulticast mode [ 300.392524][T17299] FAULT_INJECTION: forcing a failure. [ 300.392524][T17299] name failslab, interval 1, probability 0, space 0, times 0 [ 300.405195][T17299] CPU: 0 UID: 0 PID: 17299 Comm: syz.5.4509 Not tainted 6.15.0-syzkaller-11173-g546b1c9e93c2 #0 PREEMPT(voluntary) [ 300.405221][T17299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 300.405233][T17299] Call Trace: [ 300.405238][T17299] [ 300.405245][T17299] __dump_stack+0x1d/0x30 [ 300.405264][T17299] dump_stack_lvl+0xe8/0x140 [ 300.405281][T17299] dump_stack+0x15/0x1b [ 300.405302][T17299] should_fail_ex+0x265/0x280 [ 300.405322][T17299] should_failslab+0x8c/0xb0 [ 300.405345][T17299] kmem_cache_alloc_noprof+0x50/0x310 [ 300.405371][T17299] ? mas_alloc_nodes+0x265/0x520 [ 300.405400][T17299] mas_alloc_nodes+0x265/0x520 [ 300.405429][T17299] mas_preallocate+0x32b/0x510 [ 300.405460][T17299] mmap_region+0xb75/0x1560 [ 300.405505][T17299] do_mmap+0x9b3/0xbe0 [ 300.405525][T17299] vm_mmap_pgoff+0x17a/0x2e0 [ 300.405555][T17299] ksys_mmap_pgoff+0xc2/0x310 [ 300.405571][T17299] ? __x64_sys_mmap+0x49/0x70 [ 300.405591][T17299] x64_sys_call+0x1602/0x2fb0 [ 300.405610][T17299] do_syscall_64+0xd2/0x200 [ 300.405636][T17299] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 300.405660][T17299] ? clear_bhb_loop+0x40/0x90 [ 300.405679][T17299] ? clear_bhb_loop+0x40/0x90 [ 300.405698][T17299] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 300.405717][T17299] RIP: 0033:0x7fd43e25e9a3 [ 300.405730][T17299] Code: f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 41 89 ca 41 f7 c1 ff 0f 00 00 75 14 b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 25 c3 0f 1f 40 00 48 c7 c0 a8 ff ff ff 64 c7 [ 300.405746][T17299] RSP: 002b:00007fd43c8c6e18 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 300.405764][T17299] RAX: ffffffffffffffda RBX: 00000000000005ab RCX: 00007fd43e25e9a3 [ 300.405775][T17299] RDX: 0000000000000003 RSI: 0000000008400000 RDI: 0000000000000000 [ 300.405787][T17299] RBP: 0000200000000182 R08: 00000000ffffffff R09: 0000000000000000 [ 300.405798][T17299] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000007 [ 300.405809][T17299] R13: 00007fd43c8c6ef0 R14: 00007fd43c8c6eb0 R15: 0000200000000940 [ 300.405827][T17299] [ 300.765418][T12102] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 300.879002][T12102] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 301.033653][T12102] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 301.204736][T12102] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 301.261109][T17315] lo speed is unknown, defaulting to 1000 [ 301.496359][T12102] bridge_slave_0: left allmulticast mode [ 301.502180][T12102] bridge_slave_0: left promiscuous mode [ 301.507893][T12102] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.752726][T17364] FAULT_INJECTION: forcing a failure. [ 301.752726][T17364] name failslab, interval 1, probability 0, space 0, times 0 [ 301.765478][T17364] CPU: 0 UID: 0 PID: 17364 Comm: syz.1.4527 Not tainted 6.15.0-syzkaller-11173-g546b1c9e93c2 #0 PREEMPT(voluntary) [ 301.765517][T17364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 301.765535][T17364] Call Trace: [ 301.765544][T17364] [ 301.765603][T17364] __dump_stack+0x1d/0x30 [ 301.765625][T17364] dump_stack_lvl+0xe8/0x140 [ 301.765645][T17364] dump_stack+0x15/0x1b [ 301.765727][T17364] should_fail_ex+0x265/0x280 [ 301.765755][T17364] should_failslab+0x8c/0xb0 [ 301.765781][T17364] kmem_cache_alloc_noprof+0x50/0x310 [ 301.765814][T17364] ? security_file_alloc+0x32/0x100 [ 301.765920][T17364] security_file_alloc+0x32/0x100 [ 301.765950][T17364] init_file+0x5c/0x1d0 [ 301.766056][T17364] alloc_empty_file+0x8b/0x200 [ 301.766103][T17364] path_openat+0x68/0x2170 [ 301.766204][T17364] ? mntput+0x4b/0x80 [ 301.766243][T17364] ? terminate_walk+0x27f/0x2a0 [ 301.766345][T17364] ? path_openat+0x1bf8/0x2170 [ 301.766417][T17364] ? _parse_integer_limit+0x170/0x190 [ 301.766464][T17364] do_filp_open+0x109/0x230 [ 301.766574][T17364] do_open_execat+0xd8/0x260 [ 301.766601][T17364] alloc_bprm+0x25/0x350 [ 301.766624][T17364] do_execveat_common+0x12e/0x750 [ 301.766647][T17364] ? getname_flags+0x154/0x3b0 [ 301.766675][T17364] __x64_sys_execveat+0x73/0x90 [ 301.766759][T17364] x64_sys_call+0x2dae/0x2fb0 [ 301.766781][T17364] do_syscall_64+0xd2/0x200 [ 301.766818][T17364] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 301.766904][T17364] ? clear_bhb_loop+0x40/0x90 [ 301.766926][T17364] ? clear_bhb_loop+0x40/0x90 [ 301.767007][T17364] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 301.767031][T17364] RIP: 0033:0x7eff214de969 [ 301.767046][T17364] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 301.767065][T17364] RSP: 002b:00007eff1fb47038 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 301.767086][T17364] RAX: ffffffffffffffda RBX: 00007eff21705fa0 RCX: 00007eff214de969 [ 301.767123][T17364] RDX: 0000000000000000 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 301.767136][T17364] RBP: 00007eff1fb47090 R08: 0000000000001000 R09: 0000000000000000 [ 301.767153][T17364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 301.767170][T17364] R13: 0000000000000000 R14: 00007eff21705fa0 R15: 00007ffe32cdf208 [ 301.767215][T17364] [ 302.100685][T12102] dvmrp1 (unregistering): left allmulticast mode [ 302.164776][T12102] bond0 (unregistering): left promiscuous mode [ 302.171156][T12102] bond_slave_0: left promiscuous mode [ 302.176648][T12102] bond_slave_1: left promiscuous mode [ 302.227635][T12102] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 302.250220][T12102] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 302.264167][T12102] bond0 (unregistering): Released all slaves [ 302.285394][T17378] smc: net device bond0 applied user defined pnetid SYZ2 [ 302.293608][T17380] smc: net device bond0 erased user defined pnetid SYZ2 [ 302.385219][T12102] hsr_slave_0: left promiscuous mode [ 302.403533][T12102] hsr_slave_1: left promiscuous mode [ 302.415340][T12102] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 302.423017][T12102] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 302.504912][T12102] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 302.512413][T12102] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 302.565706][T12102] veth1_vlan: left promiscuous mode [ 302.571338][T12102] veth0_vlan: left promiscuous mode [ 302.644112][T12102] team0 (unregistering): Port device team_slave_1 removed [ 302.654631][T12102] team0 (unregistering): Port device C removed [ 302.718350][T17315] chnl_net:caif_netlink_parms(): no params data found [ 302.781375][T17315] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.788611][T17315] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.797544][T17315] bridge_slave_0: entered allmulticast mode [ 302.806028][T17315] bridge_slave_0: entered promiscuous mode [ 302.814599][T17315] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.821801][T17315] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.829465][T17315] bridge_slave_1: entered allmulticast mode [ 302.838019][T17315] bridge_slave_1: entered promiscuous mode [ 302.875649][T17315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 302.887772][T17315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 302.914076][T17315] team0: Port device team_slave_0 added [ 302.922590][T17315] team0: Port device team_slave_1 added [ 302.953966][T17315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 302.961016][T17315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 302.987139][T17315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 303.000585][T17315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 303.007668][T17315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 303.033966][T17315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 303.063340][T17315] hsr_slave_0: entered promiscuous mode [ 303.069596][T17315] hsr_slave_1: entered promiscuous mode [ 303.075471][T17315] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 303.083133][T17315] Cannot create hsr debugfs directory [ 303.321696][T17315] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 303.331326][T17315] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 303.340568][T17315] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 303.354485][T17315] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 303.400725][T17315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 303.422560][T17315] 8021q: adding VLAN 0 to HW filter on device team0 [ 303.442351][T12073] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.449478][T12073] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.552223][T12073] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.559426][T12073] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.583851][T17315] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 303.594359][T17315] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 303.605776][T17492] smc: net device bond0 applied user defined pnetid SYZ2 [ 303.614668][T17492] smc: net device bond0 erased user defined pnetid SYZ2 [ 303.847394][T17315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 303.882269][T17509] FAULT_INJECTION: forcing a failure. [ 303.882269][T17509] name failslab, interval 1, probability 0, space 0, times 0 [ 303.895084][T17509] CPU: 1 UID: 0 PID: 17509 Comm: syz.2.4549 Not tainted 6.15.0-syzkaller-11173-g546b1c9e93c2 #0 PREEMPT(voluntary) [ 303.895116][T17509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 303.895206][T17509] Call Trace: [ 303.895211][T17509] [ 303.895220][T17509] __dump_stack+0x1d/0x30 [ 303.895242][T17509] dump_stack_lvl+0xe8/0x140 [ 303.895268][T17509] dump_stack+0x15/0x1b [ 303.895289][T17509] should_fail_ex+0x265/0x280 [ 303.895336][T17509] should_failslab+0x8c/0xb0 [ 303.895445][T17509] kmem_cache_alloc_noprof+0x50/0x310 [ 303.895534][T17509] ? security_inode_alloc+0x37/0x100 [ 303.895556][T17509] security_inode_alloc+0x37/0x100 [ 303.895649][T17509] inode_init_always_gfp+0x4b7/0x500 [ 303.895681][T17509] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 303.895717][T17509] alloc_inode+0x58/0x170 [ 303.895740][T17509] new_inode+0x1d/0xe0 [ 303.895820][T17509] shmem_get_inode+0x244/0x750 [ 303.895912][T17509] shmem_mknod+0x46/0x180 [ 303.895945][T17509] shmem_mkdir+0x33/0x70 [ 303.895978][T17509] vfs_mkdir+0x213/0x340 [ 303.896087][T17509] do_mkdirat+0x132/0x3f0 [ 303.896189][T17509] __x64_sys_mkdirat+0x4c/0x60 [ 303.896216][T17509] x64_sys_call+0x2be0/0x2fb0 [ 303.896245][T17509] do_syscall_64+0xd2/0x200 [ 303.896353][T17509] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 303.896443][T17509] ? clear_bhb_loop+0x40/0x90 [ 303.896472][T17509] ? clear_bhb_loop+0x40/0x90 [ 303.896502][T17509] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 303.896534][T17509] RIP: 0033:0x7f6e3b45e969 [ 303.896550][T17509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 303.896568][T17509] RSP: 002b:00007f6e39ac7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 303.896613][T17509] RAX: ffffffffffffffda RBX: 00007f6e3b685fa0 RCX: 00007f6e3b45e969 [ 303.896630][T17509] RDX: 0000000000000000 RSI: 0000200000000180 RDI: ffffffffffffff9c [ 303.896647][T17509] RBP: 00007f6e39ac7090 R08: 0000000000000000 R09: 0000000000000000 [ 303.896663][T17509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 303.896677][T17509] R13: 0000000000000000 R14: 00007f6e3b685fa0 R15: 00007ffca8154bb8 [ 303.896763][T17509] [ 304.429821][T17517] netlink: 16 bytes leftover after parsing attributes in process `syz.2.4550'. [ 304.450360][ T29] kauditd_printk_skb: 556 callbacks suppressed [ 304.450381][ T29] audit: type=1400 audit(1748996185.792:39092): avc: denied { cpu } for pid=17516 comm="syz.2.4550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 304.476037][ T29] audit: type=1326 audit(1748996185.832:39093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17528 comm="syz.5.4552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd43e25e969 code=0x7ffc0000 [ 304.499631][ T29] audit: type=1326 audit(1748996185.832:39094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17528 comm="syz.5.4552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd43e25e969 code=0x7ffc0000 [ 304.523347][ T29] audit: type=1326 audit(1748996185.832:39095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17528 comm="syz.5.4552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd43e25e969 code=0x7ffc0000 [ 304.546991][ T29] audit: type=1326 audit(1748996185.832:39096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17528 comm="syz.5.4552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd43e25e969 code=0x7ffc0000 [ 304.570592][ T29] audit: type=1326 audit(1748996185.832:39097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17528 comm="syz.5.4552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd43e25e969 code=0x7ffc0000 [ 304.594302][ T29] audit: type=1326 audit(1748996185.832:39098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17528 comm="syz.5.4552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd43e25e969 code=0x7ffc0000 [ 304.618096][ T29] audit: type=1326 audit(1748996185.832:39099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17528 comm="syz.5.4552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd43e25e969 code=0x7ffc0000 [ 304.641724][ T29] audit: type=1326 audit(1748996185.832:39100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17528 comm="syz.5.4552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd43e25e969 code=0x7ffc0000 [ 304.665300][ T29] audit: type=1326 audit(1748996185.832:39101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17528 comm="syz.5.4552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd43e25e969 code=0x7ffc0000 [ 304.778091][T17538] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4554'. [ 304.787116][T17538] netlink: 20 bytes leftover after parsing attributes in process `syz.5.4554'. [ 305.293607][T17315] veth0_vlan: entered promiscuous mode [ 305.301712][T17315] veth1_vlan: entered promiscuous mode [ 305.339371][T17315] veth0_macvtap: entered promiscuous mode [ 305.351746][T17315] veth1_macvtap: entered promiscuous mode [ 305.367369][T17315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 305.375781][T17559] netlink: 56 bytes leftover after parsing attributes in process `syz.2.4557'. [ 305.397441][T17559] rdma_rxe: rxe_newlink: failed to add syz_tun [ 305.431387][T17315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 305.450303][T17315] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 305.459143][T17315] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 305.468091][T17315] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 305.476925][T17315] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 305.669588][T17579] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4513'. [ 305.681263][T17579] vcan0: entered promiscuous mode [ 305.686359][T17579] vcan0: entered allmulticast mode [ 305.728900][T17588] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4560'. [ 306.217576][T17624] netlink: 'syz.1.4567': attribute type 1 has an invalid length. [ 306.295818][T17626] team0: Port device team_slave_1 removed [ 306.353016][T17624] netlink: 'syz.1.4567': attribute type 7 has an invalid length. [ 306.361056][T17624] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4567'. [ 306.488240][T17635] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4571'. [ 306.652387][T17654] smc: net device bond0 applied user defined pnetid SYZ2 [ 306.659814][T17654] smc: net device bond0 erased user defined pnetid SYZ2 [ 306.714065][T17662] netlink: 'syz.5.4581': attribute type 1 has an invalid length. [ 306.729909][T17662] 8021q: adding VLAN 0 to HW filter on device bond1 [ 306.751678][T17662] bond1: (slave gretap1): making interface the new active one [ 306.761265][T17662] bond1: (slave gretap1): Enslaving as an active interface with an up link [ 306.776819][T17662] vlan2: entered allmulticast mode [ 306.782138][T17662] bond1: entered allmulticast mode [ 306.787258][T17662] gretap1: entered allmulticast mode [ 306.793547][T17662] bond1: (slave vlan2): the slave hw address is in use by the bond; couldn't find a slave with a free hw address to give it (this should not have happened) [ 306.812992][T17660] lo speed is unknown, defaulting to 1000 [ 306.900548][T17671] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4583'. [ 306.988388][T17683] smc: net device bond0 applied user defined pnetid SYZ2 [ 307.003999][T17683] smc: net device bond0 erased user defined pnetid SYZ2 [ 307.070794][T17687] netlink: 'syz.4.4591': attribute type 1 has an invalid length. [ 307.080506][T17689] FAULT_INJECTION: forcing a failure. [ 307.080506][T17689] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 307.093940][T17689] CPU: 0 UID: 0 PID: 17689 Comm: syz.0.4592 Not tainted 6.15.0-syzkaller-11173-g546b1c9e93c2 #0 PREEMPT(voluntary) [ 307.094049][T17689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 307.094066][T17689] Call Trace: [ 307.094074][T17689] [ 307.094084][T17689] __dump_stack+0x1d/0x30 [ 307.094111][T17689] dump_stack_lvl+0xe8/0x140 [ 307.094205][T17689] dump_stack+0x15/0x1b [ 307.094227][T17689] should_fail_ex+0x265/0x280 [ 307.094254][T17689] should_fail_alloc_page+0xf2/0x100 [ 307.094322][T17689] alloc_pages_bulk_noprof+0xef/0x540 [ 307.094344][T17689] copy_splice_read+0xf3/0x5f0 [ 307.094461][T17689] ? __pfx_copy_splice_read+0x10/0x10 [ 307.094580][T17689] splice_direct_to_actor+0x26f/0x680 [ 307.094601][T17689] ? __pfx_direct_splice_actor+0x10/0x10 [ 307.094628][T17689] do_splice_direct+0xda/0x150 [ 307.094699][T17689] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 307.094791][T17689] do_sendfile+0x380/0x650 [ 307.094829][T17689] __x64_sys_sendfile64+0x105/0x150 [ 307.094895][T17689] x64_sys_call+0xb39/0x2fb0 [ 307.094995][T17689] do_syscall_64+0xd2/0x200 [ 307.095031][T17689] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 307.095059][T17689] ? clear_bhb_loop+0x40/0x90 [ 307.095085][T17689] ? clear_bhb_loop+0x40/0x90 [ 307.095169][T17689] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 307.095196][T17689] RIP: 0033:0x7f490cfde969 [ 307.095211][T17689] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 307.095230][T17689] RSP: 002b:00007f490b647038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 307.095249][T17689] RAX: ffffffffffffffda RBX: 00007f490d205fa0 RCX: 00007f490cfde969 [ 307.095299][T17689] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000007 [ 307.095316][T17689] RBP: 00007f490b647090 R08: 0000000000000000 R09: 0000000000000000 [ 307.095331][T17689] R10: 000000007ffff000 R11: 0000000000000246 R12: 0000000000000001 [ 307.095347][T17689] R13: 0000000000000000 R14: 00007f490d205fa0 R15: 00007ffc60488628 [ 307.095371][T17689] [ 307.331798][T17692] team0: Port device team_slave_1 removed [ 307.352282][T17695] smc: net device bond0 applied user defined pnetid SYZ2 [ 307.369390][T17695] smc: net device bond0 erased user defined pnetid SYZ2 [ 307.379505][T17687] netlink: 'syz.4.4591': attribute type 7 has an invalid length. [ 307.387279][T17687] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4591'. [ 307.671654][T17712] lo speed is unknown, defaulting to 1000 [ 307.834502][T17706] lo speed is unknown, defaulting to 1000 [ 308.178235][T17721] vhci_hcd: default hub control req: 0000 v0000 i0000 l31125 [ 309.304507][T17761] rdma_rxe: rxe_newlink: failed to add syz_tun [ 309.692554][ T29] kauditd_printk_skb: 657 callbacks suppressed [ 309.692573][ T29] audit: type=1326 audit(1748996191.082:39759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17777 comm="syz.0.4622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f490cfde969 code=0x7ffc0000 [ 309.724611][ T29] audit: type=1326 audit(1748996191.112:39760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17777 comm="syz.0.4622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=94 compat=0 ip=0x7f490cfde969 code=0x7ffc0000 [ 309.748239][ T29] audit: type=1326 audit(1748996191.112:39761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17777 comm="syz.0.4622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f490cfde969 code=0x7ffc0000 [ 309.771880][ T29] audit: type=1326 audit(1748996191.112:39762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17777 comm="syz.0.4622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7f490cfde969 code=0x7ffc0000 [ 309.795520][ T29] audit: type=1326 audit(1748996191.112:39763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17777 comm="syz.0.4622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f490cfde969 code=0x7ffc0000 [ 309.819162][ T29] audit: type=1326 audit(1748996191.112:39764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17777 comm="syz.0.4622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=223 compat=0 ip=0x7f490cfde969 code=0x7ffc0000 [ 309.842922][ T29] audit: type=1326 audit(1748996191.112:39765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17777 comm="syz.0.4622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f490cfde969 code=0x7ffc0000 [ 309.866570][ T29] audit: type=1326 audit(1748996191.112:39766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17777 comm="syz.0.4622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f490cfde969 code=0x7ffc0000 [ 310.004446][T17786] rdma_rxe: rxe_newlink: failed to add syz_tun [ 310.032718][T17788] __nla_validate_parse: 2 callbacks suppressed [ 310.032739][T17788] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4626'. [ 310.232815][T17801] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4631'. [ 310.282439][T17801] netlink: 'syz.2.4631': attribute type 21 has an invalid length. [ 310.290365][T17801] netlink: 128 bytes leftover after parsing attributes in process `syz.2.4631'. [ 310.299691][T17801] netlink: 'syz.2.4631': attribute type 5 has an invalid length. [ 310.307468][T17801] netlink: 'syz.2.4631': attribute type 6 has an invalid length. [ 310.315624][T17801] netlink: 3 bytes leftover after parsing attributes in process `syz.2.4631'. [ 310.356823][ T29] audit: type=1326 audit(1748996191.742:39767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17805 comm="syz.5.4633" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd43e25e969 code=0x7ffc0000 [ 310.380539][ T29] audit: type=1326 audit(1748996191.742:39768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17805 comm="syz.5.4633" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd43e25e969 code=0x7ffc0000 [ 310.493227][T17813] sctp: [Deprecated]: syz.4.4636 (pid 17813) Use of int in maxseg socket option. [ 310.493227][T17813] Use struct sctp_assoc_value instead [ 310.536929][T17817] netlink: 24 bytes leftover after parsing attributes in process `syz.0.4637'. [ 310.555879][T17817] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4637'. [ 310.657241][T17823] rdma_rxe: rxe_newlink: failed to add syz_tun [ 310.754532][T17829] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 310.784758][T17834] veth1_to_bond: entered allmulticast mode [ 310.792034][T17832] veth1_to_bond: left allmulticast mode [ 311.136807][T17853] SELinux: policydb version -1545030876 does not match my version range 15-34 [ 311.153944][T17853] SELinux: failed to load policy [ 311.165341][T17851] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 311.179840][T17853] @ÿ: renamed from veth0_vlan [ 311.234280][T17857] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4651'. [ 311.337670][T17864] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 311.522366][T17864] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 311.631717][T17864] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 311.701830][T17864] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 311.821430][T17864] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 311.864631][T17864] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 311.899536][T17864] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 311.937176][T17864] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 312.303672][T17893] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4664'. [ 312.524772][T17900] FAULT_INJECTION: forcing a failure. [ 312.524772][T17900] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 312.538198][T17900] CPU: 1 UID: 0 PID: 17900 Comm: syz.4.4667 Not tainted 6.15.0-syzkaller-11173-g546b1c9e93c2 #0 PREEMPT(voluntary) [ 312.538334][T17900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 312.538347][T17900] Call Trace: [ 312.538355][T17900] [ 312.538398][T17900] __dump_stack+0x1d/0x30 [ 312.538426][T17900] dump_stack_lvl+0xe8/0x140 [ 312.538451][T17900] dump_stack+0x15/0x1b [ 312.538473][T17900] should_fail_ex+0x265/0x280 [ 312.538502][T17900] should_fail_alloc_page+0xf2/0x100 [ 312.538569][T17900] alloc_pages_bulk_noprof+0xef/0x540 [ 312.538591][T17900] copy_splice_read+0xf3/0x5f0 [ 312.538631][T17900] ? __pfx_copy_splice_read+0x10/0x10 [ 312.538699][T17900] splice_direct_to_actor+0x26f/0x680 [ 312.538720][T17900] ? __pfx_direct_splice_actor+0x10/0x10 [ 312.538746][T17900] do_splice_direct+0xda/0x150 [ 312.538770][T17900] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 312.538803][T17900] do_sendfile+0x380/0x650 [ 312.538847][T17900] __x64_sys_sendfile64+0x105/0x150 [ 312.538886][T17900] x64_sys_call+0xb39/0x2fb0 [ 312.538915][T17900] do_syscall_64+0xd2/0x200 [ 312.538951][T17900] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 312.539011][T17900] ? clear_bhb_loop+0x40/0x90 [ 312.539040][T17900] ? clear_bhb_loop+0x40/0x90 [ 312.539069][T17900] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 312.539169][T17900] RIP: 0033:0x7f68fb63e969 [ 312.539189][T17900] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 312.539266][T17900] RSP: 002b:00007f68f9ca7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 312.539310][T17900] RAX: ffffffffffffffda RBX: 00007f68fb865fa0 RCX: 00007f68fb63e969 [ 312.539325][T17900] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000008 [ 312.539337][T17900] RBP: 00007f68f9ca7090 R08: 0000000000000000 R09: 0000000000000000 [ 312.539382][T17900] R10: 000000007ffff000 R11: 0000000000000246 R12: 0000000000000001 [ 312.539394][T17900] R13: 0000000000000000 R14: 00007f68fb865fa0 R15: 00007ffc0ed58048 [ 312.539430][T17900] [ 312.822823][T17904] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4669'. [ 313.414430][ T3005] udevd[3005]: worker [16964] terminated by signal 33 (Unknown signal 33) [ 313.635288][T17920] smc: net device bond0 applied user defined pnetid SYZ2 [ 313.655219][T17920] smc: net device bond0 erased user defined pnetid SYZ2 [ 313.707892][T17922] netlink: 'syz.0.4677': attribute type 1 has an invalid length. [ 313.788285][T17922] team0: Port device team_slave_1 removed [ 313.832775][T17923] netlink: 'syz.0.4677': attribute type 7 has an invalid length. [ 313.840581][T17923] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4677'. [ 314.229649][T17929] ALSA: seq fatal error: cannot create timer (-16) [ 314.357553][T17931] lo speed is unknown, defaulting to 1000 [ 314.571440][T17944] netlink: 'syz.2.4685': attribute type 1 has an invalid length. [ 314.643141][T17944] team0: Port device team_slave_1 removed [ 314.703424][T17945] netlink: 'syz.2.4685': attribute type 7 has an invalid length. [ 314.833487][T17952] smc: net device bond0 applied user defined pnetid SYZ2 [ 314.854191][T17952] smc: net device bond0 erased user defined pnetid SYZ2 [ 315.182303][ T29] kauditd_printk_skb: 146 callbacks suppressed [ 315.182321][ T29] audit: type=1400 audit(1748996196.572:39913): avc: denied { setattr } for pid=17967 comm="syz.1.4692" name="" dev="pipefs" ino=54781 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 315.246559][ T29] audit: type=1326 audit(1748996196.632:39914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17973 comm="syz.1.4694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7eff214de969 code=0x7ffc0000 [ 315.270382][ T29] audit: type=1326 audit(1748996196.632:39915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17973 comm="syz.1.4694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7eff214de969 code=0x7ffc0000 [ 315.294744][ T29] audit: type=1326 audit(1748996196.682:39916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17973 comm="syz.1.4694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=94 compat=0 ip=0x7eff214de969 code=0x7ffc0000 [ 315.297321][T17972] __nla_validate_parse: 2 callbacks suppressed [ 315.297340][T17972] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4693'. [ 315.318403][ T29] audit: type=1326 audit(1748996196.682:39917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17973 comm="syz.1.4694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7eff214de969 code=0x7ffc0000 [ 315.357985][ T29] audit: type=1326 audit(1748996196.682:39918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17973 comm="syz.1.4694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7eff214de969 code=0x7ffc0000 [ 315.382564][ T29] audit: type=1400 audit(1748996196.682:39919): avc: denied { read } for pid=17971 comm="syz.4.4693" name="file0" dev="tmpfs" ino=220 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 315.405144][ T29] audit: type=1326 audit(1748996196.772:39920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17973 comm="syz.1.4694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7eff214de969 code=0x7ffc0000 [ 315.428863][ T29] audit: type=1326 audit(1748996196.772:39921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17973 comm="syz.1.4694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7eff214de969 code=0x7ffc0000 [ 315.452564][ T29] audit: type=1326 audit(1748996196.772:39922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17973 comm="syz.1.4694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7eff214de969 code=0x7ffc0000 [ 315.556643][T17981] netlink: 'syz.1.4696': attribute type 4 has an invalid length. [ 315.568525][T17981] netlink: 'syz.1.4696': attribute type 4 has an invalid length. [ 315.632184][T17985] smc: net device bond0 applied user defined pnetid SYZ2 [ 315.641551][T17985] smc: net device bond0 erased user defined pnetid SYZ2 [ 315.889510][T18000] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4703'. [ 316.403794][T18020] smc: net device bond0 applied user defined pnetid SYZ2 [ 316.412991][T18020] smc: net device bond0 erased user defined pnetid SYZ2 [ 316.789618][T18035] netlink: 56 bytes leftover after parsing attributes in process `syz.2.4715'. [ 316.801700][T18035] rdma_rxe: rxe_newlink: failed to add syz_tun [ 316.911746][T18047] hub 1-0:1.0: USB hub found [ 316.916496][T18047] hub 1-0:1.0: 8 ports detected [ 317.308549][T18051] smc: net device bond0 applied user defined pnetid SYZ2 [ 317.316174][T18051] smc: net device bond0 erased user defined pnetid SYZ2 [ 317.753652][T18067] lo speed is unknown, defaulting to 1000 [ 317.864587][T18076] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4729'. [ 318.411250][T18085] smc: net device bond0 applied user defined pnetid SYZ2 [ 318.419369][T18085] smc: net device bond0 erased user defined pnetid SYZ2 [ 318.452971][T18087] netlink: 56 bytes leftover after parsing attributes in process `syz.4.4734'. [ 318.465387][T18087] rdma_rxe: rxe_newlink: failed to add syz_tun [ 318.909645][T18103] SELinux: Context system_u:object_r:hwdata_t:s0 is not valid (left unmapped). [ 318.940572][T18107] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4742'. [ 319.824488][T18120] FAULT_INJECTION: forcing a failure. [ 319.824488][T18120] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 319.837938][T18120] CPU: 0 UID: 0 PID: 18120 Comm: syz.4.4745 Not tainted 6.15.0-syzkaller-11173-g546b1c9e93c2 #0 PREEMPT(voluntary) [ 319.837970][T18120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 319.837987][T18120] Call Trace: [ 319.838004][T18120] [ 319.838014][T18120] __dump_stack+0x1d/0x30 [ 319.838042][T18120] dump_stack_lvl+0xe8/0x140 [ 319.838062][T18120] dump_stack+0x15/0x1b [ 319.838079][T18120] should_fail_ex+0x265/0x280 [ 319.838105][T18120] should_fail+0xb/0x20 [ 319.838199][T18120] should_fail_usercopy+0x1a/0x20 [ 319.838222][T18120] _copy_to_user+0x20/0xa0 [ 319.838258][T18120] simple_read_from_buffer+0xb5/0x130 [ 319.838308][T18120] proc_fail_nth_read+0x100/0x140 [ 319.838335][T18120] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 319.838358][T18120] vfs_read+0x1a0/0x6f0 [ 319.838383][T18120] ? __rcu_read_unlock+0x4f/0x70 [ 319.838413][T18120] ? __fget_files+0x184/0x1c0 [ 319.838461][T18120] ksys_read+0xda/0x1a0 [ 319.838484][T18120] __x64_sys_read+0x40/0x50 [ 319.838510][T18120] x64_sys_call+0x2d77/0x2fb0 [ 319.838539][T18120] do_syscall_64+0xd2/0x200 [ 319.838622][T18120] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 319.838668][T18120] ? clear_bhb_loop+0x40/0x90 [ 319.838698][T18120] ? clear_bhb_loop+0x40/0x90 [ 319.838724][T18120] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 319.838752][T18120] RIP: 0033:0x7f68fb63d37c [ 319.838773][T18120] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 319.838837][T18120] RSP: 002b:00007f68f9ca7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 319.838866][T18120] RAX: ffffffffffffffda RBX: 00007f68fb865fa0 RCX: 00007f68fb63d37c [ 319.838884][T18120] RDX: 000000000000000f RSI: 00007f68f9ca70a0 RDI: 0000000000000003 [ 319.838899][T18120] RBP: 00007f68f9ca7090 R08: 0000000000000000 R09: 0000000000000000 [ 319.838914][T18120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 319.838926][T18120] R13: 0000000000000000 R14: 00007f68fb865fa0 R15: 00007ffc0ed58048 [ 319.838986][T18120] [ 320.400130][ T29] kauditd_printk_skb: 999 callbacks suppressed [ 320.400148][ T29] audit: type=1400 audit(1748996201.792:40922): avc: denied { ioctl } for pid=18138 comm="syz.0.4751" path="socket:[55066]" dev="sockfs" ino=55066 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 320.448705][ T29] audit: type=1400 audit(1748996201.822:40923): avc: denied { setattr } for pid=18138 comm="syz.0.4751" name="SCTPv6" dev="sockfs" ino=55066 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 320.554546][ T29] audit: type=1400 audit(1748996201.942:40924): avc: denied { name_bind } for pid=18142 comm="syz.0.4752" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 320.629502][T18145] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4752'. [ 320.644539][T18145] netlink: 28 bytes leftover after parsing attributes in process `syz.0.4752'. [ 321.163285][T18145] TCP: TCP_TX_DELAY enabled [ 321.241009][T18151] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4754'. [ 321.253508][ T29] audit: type=1326 audit(1748996202.642:40925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18148 comm="syz.4.4755" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68fb63e969 code=0x7ffc0000 [ 321.277273][ T29] audit: type=1326 audit(1748996202.642:40926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18148 comm="syz.4.4755" exe="/root/syz-executor" sig=0 arch=c000003e syscall=94 compat=0 ip=0x7f68fb63e969 code=0x7ffc0000 [ 321.300908][ T29] audit: type=1326 audit(1748996202.642:40927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18148 comm="syz.4.4755" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68fb63e969 code=0x7ffc0000 [ 321.324798][ T29] audit: type=1326 audit(1748996202.642:40928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18148 comm="syz.4.4755" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7f68fb63e969 code=0x7ffc0000 [ 321.348498][ T29] audit: type=1326 audit(1748996202.642:40929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18148 comm="syz.4.4755" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68fb63e969 code=0x7ffc0000 [ 321.372405][ T29] audit: type=1326 audit(1748996202.642:40930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18148 comm="syz.4.4755" exe="/root/syz-executor" sig=0 arch=c000003e syscall=223 compat=0 ip=0x7f68fb63e969 code=0x7ffc0000 [ 321.396223][ T29] audit: type=1326 audit(1748996202.642:40931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18148 comm="syz.4.4755" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f68fb635927 code=0x7ffc0000 [ 321.568270][T18160] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4759'. [ 322.198524][T18172] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4764'. [ 322.352753][T18186] net_ratelimit: 703 callbacks suppressed [ 322.352775][T18186] ip6_vti0: mtu greater than device maximum [ 322.372623][T18186] netlink: 28 bytes leftover after parsing attributes in process `syz.5.4769'. [ 322.399660][T18192] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(12) [ 322.406330][T18192] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 322.413957][T18192] vhci_hcd vhci_hcd.0: Device attached [ 322.429452][T18192] vhci_hcd vhci_hcd.0: pdev(2) rhport(1) sockfd(14) [ 322.436114][T18192] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 322.443903][T18192] vhci_hcd vhci_hcd.0: Device attached [ 322.450334][T18192] vhci_hcd vhci_hcd.0: pdev(2) rhport(2) sockfd(16) [ 322.456961][T18192] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 322.464564][T18192] vhci_hcd vhci_hcd.0: Device attached [ 322.471195][T18192] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(18) [ 322.477806][T18192] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 322.485617][T18192] vhci_hcd vhci_hcd.0: Device attached [ 322.496134][T18192] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 322.505135][T18192] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 322.518610][T18203] vhci_hcd: connection closed [ 322.518676][T18193] vhci_hcd: connection closed [ 322.518764][T18201] vhci_hcd: connection closed [ 322.524980][T18199] vhci_hcd: connection closed [ 322.530510][T12102] vhci_hcd: stop threads [ 322.542096][T12102] vhci_hcd: release socket [ 322.542107][T12102] vhci_hcd: disconnect device [ 322.542348][T12102] vhci_hcd: stop threads [ 322.555648][T12102] vhci_hcd: release socket [ 322.560189][T12102] vhci_hcd: disconnect device [ 322.565186][T12102] vhci_hcd: stop threads [ 322.569504][T12102] vhci_hcd: release socket [ 322.573926][T12102] vhci_hcd: disconnect device [ 322.578735][T12102] vhci_hcd: stop threads [ 322.583052][T12102] vhci_hcd: release socket [ 322.587556][T12102] vhci_hcd: disconnect device [ 322.598933][ T1075] vhci_hcd: vhci_device speed not set [ 323.039351][T18210] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4776'. [ 323.298477][T18225] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4782'. [ 323.307957][T18225] FAULT_INJECTION: forcing a failure. [ 323.307957][T18225] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 323.321072][T18225] CPU: 0 UID: 0 PID: 18225 Comm: syz.4.4782 Not tainted 6.15.0-syzkaller-11173-g546b1c9e93c2 #0 PREEMPT(voluntary) [ 323.321109][T18225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 323.321179][T18225] Call Trace: [ 323.321207][T18225] [ 323.321217][T18225] __dump_stack+0x1d/0x30 [ 323.321245][T18225] dump_stack_lvl+0xe8/0x140 [ 323.321272][T18225] dump_stack+0x15/0x1b [ 323.321327][T18225] should_fail_ex+0x265/0x280 [ 323.321357][T18225] should_fail+0xb/0x20 [ 323.321381][T18225] should_fail_usercopy+0x1a/0x20 [ 323.321412][T18225] _copy_from_user+0x1c/0xb0 [ 323.321447][T18225] proc_submiturb+0x43/0xa0 [ 323.321515][T18225] usbdev_ioctl+0xcc2/0x1710 [ 323.321586][T18225] ? __pfx_usbdev_ioctl+0x10/0x10 [ 323.321613][T18225] __se_sys_ioctl+0xcb/0x140 [ 323.321639][T18225] __x64_sys_ioctl+0x43/0x50 [ 323.321664][T18225] x64_sys_call+0x19a8/0x2fb0 [ 323.321766][T18225] do_syscall_64+0xd2/0x200 [ 323.321806][T18225] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 323.321897][T18225] ? clear_bhb_loop+0x40/0x90 [ 323.321933][T18225] ? clear_bhb_loop+0x40/0x90 [ 323.322033][T18225] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 323.322059][T18225] RIP: 0033:0x7f68fb63e969 [ 323.322131][T18225] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 323.322219][T18225] RSP: 002b:00007f68f9c86038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 323.322247][T18225] RAX: ffffffffffffffda RBX: 00007f68fb866080 RCX: 00007f68fb63e969 [ 323.322275][T18225] RDX: 0000200000000000 RSI: 000000008038550a RDI: 0000000000000007 [ 323.322287][T18225] RBP: 00007f68f9c86090 R08: 0000000000000000 R09: 0000000000000000 [ 323.322300][T18225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 323.322315][T18225] R13: 0000000000000000 R14: 00007f68fb866080 R15: 00007ffc0ed58048 [ 323.322342][T18225] [ 323.594297][T18240] x_tables: ip6_tables: mh match: only valid for protocol 135 [ 324.306257][T18260] netlink: 28 bytes leftover after parsing attributes in process `syz.4.4795'. [ 324.418014][T18268] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4800'. [ 324.487665][T18277] FAULT_INJECTION: forcing a failure. [ 324.487665][T18277] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 324.500831][T18277] CPU: 1 UID: 0 PID: 18277 Comm: syz.1.4803 Not tainted 6.15.0-syzkaller-11173-g546b1c9e93c2 #0 PREEMPT(voluntary) [ 324.500918][T18277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 324.500934][T18277] Call Trace: [ 324.500942][T18277] [ 324.500951][T18277] __dump_stack+0x1d/0x30 [ 324.500977][T18277] dump_stack_lvl+0xe8/0x140 [ 324.501075][T18277] dump_stack+0x15/0x1b [ 324.501176][T18277] should_fail_ex+0x265/0x280 [ 324.501200][T18277] should_fail+0xb/0x20 [ 324.501219][T18277] should_fail_usercopy+0x1a/0x20 [ 324.501245][T18277] _copy_from_user+0x1c/0xb0 [ 324.501294][T18277] ___sys_sendmsg+0xc1/0x1d0 [ 324.501348][T18277] __sys_sendmmsg+0x178/0x300 [ 324.501397][T18277] __x64_sys_sendmmsg+0x57/0x70 [ 324.501442][T18277] x64_sys_call+0x2f2f/0x2fb0 [ 324.501467][T18277] do_syscall_64+0xd2/0x200 [ 324.501500][T18277] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 324.501547][T18277] ? clear_bhb_loop+0x40/0x90 [ 324.501571][T18277] ? clear_bhb_loop+0x40/0x90 [ 324.501596][T18277] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 324.501620][T18277] RIP: 0033:0x7eff214de969 [ 324.501667][T18277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 324.501688][T18277] RSP: 002b:00007eff1fb47038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 324.501709][T18277] RAX: ffffffffffffffda RBX: 00007eff21705fa0 RCX: 00007eff214de969 [ 324.501723][T18277] RDX: 040000000000009f RSI: 00002000000002c0 RDI: 0000000000000007 [ 324.501806][T18277] RBP: 00007eff1fb47090 R08: 0000000000000000 R09: 0000000000000000 [ 324.501820][T18277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 324.501834][T18277] R13: 0000000000000000 R14: 00007eff21705fa0 R15: 00007ffe32cdf208 [ 324.501855][T18277] [ 324.709740][T18281] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 324.718343][T18281] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 324.757289][T18281] random: crng reseeded on system resumption [ 325.031660][T18305] netlink: 'syz.1.4815': attribute type 1 has an invalid length. [ 325.093174][T18305] netlink: 'syz.1.4815': attribute type 7 has an invalid length. [ 325.228633][T18311] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 325.620968][T18331] netlink: 'syz.0.4826': attribute type 1 has an invalid length. [ 325.648756][T18333] smc: net device bond0 applied user defined pnetid SYZ2 [ 325.656469][T18333] smc: net device bond0 erased user defined pnetid SYZ2 [ 325.676002][T18331] netlink: 'syz.0.4826': attribute type 7 has an invalid length. [ 325.683807][T18331] __nla_validate_parse: 6 callbacks suppressed [ 325.683819][T18331] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4826'. [ 325.716666][ T29] kauditd_printk_skb: 1000 callbacks suppressed [ 325.716684][ T29] audit: type=1326 audit(1748996207.102:41932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18336 comm="syz.4.4829" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68fb63e969 code=0x7ffc0000 [ 325.762687][ T29] audit: type=1326 audit(1748996207.142:41933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18336 comm="syz.4.4829" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68fb63e969 code=0x7ffc0000 [ 325.786440][ T29] audit: type=1326 audit(1748996207.152:41934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18336 comm="syz.4.4829" exe="/root/syz-executor" sig=0 arch=c000003e syscall=94 compat=0 ip=0x7f68fb63e969 code=0x7ffc0000 [ 325.810046][ T29] audit: type=1326 audit(1748996207.152:41935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18336 comm="syz.4.4829" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68fb63e969 code=0x7ffc0000 [ 325.833655][ T29] audit: type=1326 audit(1748996207.152:41936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18336 comm="syz.4.4829" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7f68fb63e969 code=0x7ffc0000 [ 325.857314][ T29] audit: type=1326 audit(1748996207.152:41937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18336 comm="syz.4.4829" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68fb63e969 code=0x7ffc0000 [ 325.880958][ T29] audit: type=1326 audit(1748996207.152:41938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18336 comm="syz.4.4829" exe="/root/syz-executor" sig=0 arch=c000003e syscall=223 compat=0 ip=0x7f68fb63e969 code=0x7ffc0000 [ 325.904595][ T29] audit: type=1326 audit(1748996207.152:41939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18336 comm="syz.4.4829" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f68fb635927 code=0x7ffc0000 [ 325.928576][ T29] audit: type=1326 audit(1748996207.152:41940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18336 comm="syz.4.4829" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f68fb5dab39 code=0x7ffc0000 [ 325.952344][ T29] audit: type=1326 audit(1748996207.152:41941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18336 comm="syz.4.4829" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68fb63e969 code=0x7ffc0000 [ 325.965399][T18349] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 325.986915][T18349] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 326.016060][T18357] $Hÿ: renamed from bond0 [ 326.063806][T18361] smc: net device bond0 applied user defined pnetid SYZ2 [ 326.071826][T18361] smc: net device bond0 erased user defined pnetid SYZ2 [ 326.177530][T18371] netlink: 56 bytes leftover after parsing attributes in process `syz.1.4838'. [ 326.202513][T18371] rdma_rxe: rxe_newlink: failed to add syz_tun [ 326.348935][T18379] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4842'. [ 326.666263][T18400] smc: net device bond0 applied user defined pnetid SYZ2 [ 326.676110][T18400] smc: net device bond0 erased user defined pnetid SYZ2 [ 326.686162][T18401] FAULT_INJECTION: forcing a failure. [ 326.686162][T18401] name failslab, interval 1, probability 0, space 0, times 0 [ 326.698921][T18401] CPU: 0 UID: 0 PID: 18401 Comm: syz.0.4845 Not tainted 6.15.0-syzkaller-11173-g546b1c9e93c2 #0 PREEMPT(voluntary) [ 326.698958][T18401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 326.698990][T18401] Call Trace: [ 326.698998][T18401] [ 326.699008][T18401] __dump_stack+0x1d/0x30 [ 326.699036][T18401] dump_stack_lvl+0xe8/0x140 [ 326.699063][T18401] dump_stack+0x15/0x1b [ 326.699086][T18401] should_fail_ex+0x265/0x280 [ 326.699166][T18401] should_failslab+0x8c/0xb0 [ 326.699203][T18401] kmem_cache_alloc_noprof+0x50/0x310 [ 326.699242][T18401] ? __inet_bhash2_update_saddr+0x12f/0xd40 [ 326.699288][T18401] __inet_bhash2_update_saddr+0x12f/0xd40 [ 326.699409][T18401] ? tcp_write_queue_purge+0x6f8/0x720 [ 326.699580][T18401] inet_bhash2_reset_saddr+0x48/0x60 [ 326.699615][T18401] tcp_disconnect+0x51a/0xdf0 [ 326.699694][T18401] ? __mptcp_close_ssk+0x272/0xa30 [ 326.699779][T18401] __mptcp_close_ssk+0x285/0xa30 [ 326.699823][T18401] mptcp_destroy_common+0xfa/0x220 [ 326.699932][T18401] ? mptcp_pm_connection_closed+0x4d/0x60 [ 326.699964][T18401] mptcp_disconnect+0x1bd/0x380 [ 326.700014][T18401] __inet_stream_connect+0x203/0x7e0 [ 326.700046][T18401] ? _raw_spin_unlock_bh+0x36/0x40 [ 326.700074][T18401] ? release_sock+0x116/0x150 [ 326.700136][T18401] ? _raw_spin_unlock_bh+0x36/0x40 [ 326.700223][T18401] ? lock_sock_nested+0x112/0x140 [ 326.700251][T18401] ? selinux_netlbl_socket_connect+0x115/0x130 [ 326.700355][T18401] inet_stream_connect+0x44/0x70 [ 326.700395][T18401] ? __pfx_inet_stream_connect+0x10/0x10 [ 326.700477][T18401] __sys_connect+0x1ef/0x2b0 [ 326.700597][T18401] __x64_sys_connect+0x3f/0x50 [ 326.700628][T18401] x64_sys_call+0x1daa/0x2fb0 [ 326.700691][T18401] do_syscall_64+0xd2/0x200 [ 326.700729][T18401] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 326.700826][T18401] ? clear_bhb_loop+0x40/0x90 [ 326.700900][T18401] ? clear_bhb_loop+0x40/0x90 [ 326.700928][T18401] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 326.700951][T18401] RIP: 0033:0x7f490cfde969 [ 326.700967][T18401] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 326.700986][T18401] RSP: 002b:00007f490b605038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 326.701056][T18401] RAX: ffffffffffffffda RBX: 00007f490d206160 RCX: 00007f490cfde969 [ 326.701071][T18401] RDX: 000000000000001c RSI: 0000200000000200 RDI: 0000000000000005 [ 326.701084][T18401] RBP: 00007f490b605090 R08: 0000000000000000 R09: 0000000000000000 [ 326.701097][T18401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 326.701109][T18401] R13: 0000000000000000 R14: 00007f490d206160 R15: 00007ffc60488628 [ 326.701215][T18401] [ 326.988599][T18405] $Hÿ: renamed from bond0 (while UP) [ 327.671113][T18420] lo speed is unknown, defaulting to 1000 [ 327.849922][T12097] smc: removing ib device syz1 [ 327.856841][ T23] syz1: Port: 1 Link DOWN [ 327.867746][T18420] chnl_net:caif_netlink_parms(): no params data found [ 327.991104][T18420] bridge0: port 1(bridge_slave_0) entered blocking state [ 327.998259][T18420] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.025518][T18420] bridge_slave_0: entered allmulticast mode [ 328.036025][T18420] bridge_slave_0: entered promiscuous mode [ 328.053375][T18420] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.060526][T18420] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.112857][T18420] bridge_slave_1: entered allmulticast mode [ 328.150182][T18420] bridge_slave_1: entered promiscuous mode [ 328.174583][T18447] netlink: 'syz.4.4860': attribute type 4 has an invalid length. [ 328.186507][T18447] netlink: 'syz.4.4860': attribute type 1 has an invalid length. [ 328.230317][T18420] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 328.232966][T18449] netlink: 56 bytes leftover after parsing attributes in process `syz.0.4859'. [ 328.250560][T18420] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 328.287116][T18452] rdma_rxe: rxe_newlink: failed to add syz_tun [ 328.318615][T18451] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4860'. [ 328.345208][T18451] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 328.352833][T18451] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 328.362556][T18451] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 328.370081][T18451] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 328.400223][T18420] team0: Port device team_slave_0 added [ 328.407101][T18420] team0: Port device team_slave_1 added [ 328.420024][T12073] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 328.464168][T18420] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 328.471345][T18420] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 328.497471][T18420] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 328.509172][T18420] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 328.516188][T18420] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 328.542182][T18420] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 328.585129][T12073] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 328.598431][T18420] hsr_slave_0: entered promiscuous mode [ 328.609360][T18420] hsr_slave_1: entered promiscuous mode [ 328.615352][T18420] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 328.639461][T18420] Cannot create hsr debugfs directory [ 328.646171][T12073] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 328.700828][T12073] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 328.829475][T12073] bridge_slave_1: left allmulticast mode [ 328.835229][T12073] bridge_slave_1: left promiscuous mode [ 328.841075][T12073] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.879462][T12073] bridge_slave_0: left allmulticast mode [ 328.885231][T12073] bridge_slave_0: left promiscuous mode [ 328.890970][T12073] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.011435][T12073] bond1 (unregistering): (slave gretap1): Releasing active interface [ 329.022897][T12073] gretap1 (unregistering): left allmulticast mode [ 329.173074][T18466] netlink: 3 bytes leftover after parsing attributes in process `syz.4.4865'. [ 329.254754][T12073] $Hÿ (unregistering): (slave bond_slave_0): Releasing backup interface [ 329.264343][T12073] bond_slave_0: left promiscuous mode [ 329.284333][T12073] $Hÿ (unregistering): (slave bond_slave_1): Releasing backup interface [ 329.300948][T12073] bond_slave_1: left promiscuous mode [ 329.318132][T12073] $Hÿ (unregistering): Released all slaves [ 329.338559][T12073] bond1 (unregistering): Released all slaves [ 329.358126][T18462] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4863'. [ 329.367357][T18466] 0ªX¹¦À: renamed from caif0 [ 329.379525][T18466] 0ªX¹¦À: entered allmulticast mode [ 329.384792][T18466] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 329.422661][T18469] lo speed is unknown, defaulting to 1000 [ 329.435358][T12073] tipc: Disabling bearer [ 329.440792][T12073] tipc: Left network mode [ 329.465360][T12073] hsr_slave_0: left promiscuous mode [ 329.475214][T12073] hsr_slave_1: left promiscuous mode [ 329.488428][T12073] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 329.495933][T12073] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 329.519847][T12073] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 329.528007][T12073] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 329.556677][T12073] veth1_macvtap: left promiscuous mode [ 329.564387][T12073] veth0_macvtap: left promiscuous mode [ 329.571146][T12073] veth1_vlan: left promiscuous mode [ 329.576444][T12073] veth0_vlan: left promiscuous mode [ 329.679144][T12073] team0 (unregistering): Port device team_slave_1 removed [ 329.690069][T12073] team0 (unregistering): Port device team_slave_0 removed [ 329.776714][T18485] lo speed is unknown, defaulting to 1000 [ 329.928561][T18420] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 329.951636][T18420] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 329.964592][T18420] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 329.975794][T18499] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4875'. [ 329.985447][T18420] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 330.043414][T12073] IPVS: stop unused estimator thread 0... [ 330.053600][T18420] 8021q: adding VLAN 0 to HW filter on device bond0 [ 330.091174][T18420] 8021q: adding VLAN 0 to HW filter on device team0 [ 330.101200][T12059] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.108324][T12059] bridge0: port 1(bridge_slave_0) entered forwarding state [ 330.122376][T12066] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.129713][T12066] bridge0: port 2(bridge_slave_1) entered forwarding state [ 330.191138][T18420] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 330.201771][T18420] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 330.299997][T18420] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 330.402890][T18525] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4883'. [ 330.463537][T18537] netlink: 28 bytes leftover after parsing attributes in process `syz.2.4885'. [ 330.575266][T18420] veth0_vlan: entered promiscuous mode [ 330.601438][T18420] veth1_vlan: entered promiscuous mode [ 330.641764][T18420] veth0_macvtap: entered promiscuous mode [ 330.671571][T18420] veth1_macvtap: entered promiscuous mode [ 330.691725][T18420] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 330.700385][T18562] $Hÿ: renamed from bond0 (while UP) [ 330.721500][ T29] kauditd_printk_skb: 1425 callbacks suppressed [ 330.721531][ T29] audit: type=1326 audit(1748996212.112:43367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18560 comm="syz.1.4894" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7eff214de969 code=0x7ffc0000 [ 330.751550][ T29] audit: type=1326 audit(1748996212.112:43368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18560 comm="syz.1.4894" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7eff214de969 code=0x7ffc0000 [ 330.777820][T18420] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 330.785750][ T29] audit: type=1326 audit(1748996212.112:43369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18543 comm="syz.2.4887" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f6e3b45e969 code=0x7ffc0000 [ 330.809321][ T29] audit: type=1326 audit(1748996212.112:43370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18543 comm="syz.2.4887" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6e3b45e969 code=0x7ffc0000 [ 330.833071][ T29] audit: type=1326 audit(1748996212.112:43371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18543 comm="syz.2.4887" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f6e3b45e969 code=0x7ffc0000 [ 330.856717][ T29] audit: type=1326 audit(1748996212.112:43372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18543 comm="syz.2.4887" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6e3b45e969 code=0x7ffc0000 [ 330.880809][ T29] audit: type=1326 audit(1748996212.112:43373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18543 comm="syz.2.4887" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6e3b455927 code=0x7ffc0000 [ 330.904411][ T29] audit: type=1326 audit(1748996212.112:43374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18543 comm="syz.2.4887" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f6e3b3fab39 code=0x7ffc0000 [ 330.928085][ T29] audit: type=1326 audit(1748996212.112:43375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18543 comm="syz.2.4887" exe="/root/syz-executor" sig=0 arch=c000003e syscall=307 compat=0 ip=0x7f6e3b45e969 code=0x7ffc0000 [ 330.951752][ T29] audit: type=1326 audit(1748996212.112:43376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18543 comm="syz.2.4887" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6e3b45e969 code=0x7ffc0000 [ 330.976524][T18420] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.985422][T18420] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.994261][T18420] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 331.003060][T18420] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 331.081817][T18574] netlink: 'syz.5.4855': attribute type 1 has an invalid length. [ 331.137922][T18574] team0: Port device team_slave_1 removed [ 331.188732][T18585] netlink: 'syz.5.4855': attribute type 7 has an invalid length. [ 331.197128][T18585] __nla_validate_parse: 1 callbacks suppressed [ 331.197146][T18585] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4855'. [ 331.493684][T18609] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4909'. [ 331.615276][T18616] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 331.696173][T18626] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4917'. [ 331.713708][T18632] ip6_vti0: mtu greater than device maximum [ 331.726112][T18634] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4920'. [ 331.763211][T18641] FAULT_INJECTION: forcing a failure. [ 331.763211][T18641] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 331.776562][T18641] CPU: 0 UID: 0 PID: 18641 Comm: syz.1.4923 Not tainted 6.15.0-syzkaller-11173-g546b1c9e93c2 #0 PREEMPT(voluntary) [ 331.776597][T18641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 331.776610][T18641] Call Trace: [ 331.776616][T18641] [ 331.776624][T18641] __dump_stack+0x1d/0x30 [ 331.776646][T18641] dump_stack_lvl+0xe8/0x140 [ 331.776668][T18641] dump_stack+0x15/0x1b [ 331.776705][T18641] should_fail_ex+0x265/0x280 [ 331.776742][T18641] should_fail+0xb/0x20 [ 331.776831][T18641] should_fail_usercopy+0x1a/0x20 [ 331.776863][T18641] _copy_from_iter+0xcf/0xe40 [ 331.776890][T18641] ? __build_skb_around+0x1a0/0x200 [ 331.776920][T18641] ? __alloc_skb+0x223/0x320 [ 331.777029][T18641] netlink_sendmsg+0x471/0x6b0 [ 331.777077][T18641] ? __pfx_netlink_sendmsg+0x10/0x10 [ 331.777186][T18641] __sock_sendmsg+0x142/0x180 [ 331.777240][T18641] ____sys_sendmsg+0x31e/0x4e0 [ 331.777280][T18641] ___sys_sendmsg+0x17b/0x1d0 [ 331.777336][T18641] __x64_sys_sendmsg+0xd4/0x160 [ 331.777413][T18641] x64_sys_call+0x2999/0x2fb0 [ 331.777510][T18641] do_syscall_64+0xd2/0x200 [ 331.777551][T18641] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 331.777587][T18641] ? clear_bhb_loop+0x40/0x90 [ 331.777622][T18641] ? clear_bhb_loop+0x40/0x90 [ 331.777652][T18641] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 331.777679][T18641] RIP: 0033:0x7eff214de969 [ 331.777730][T18641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 331.777794][T18641] RSP: 002b:00007eff1fb47038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 331.777815][T18641] RAX: ffffffffffffffda RBX: 00007eff21705fa0 RCX: 00007eff214de969 [ 331.777829][T18641] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000007 [ 331.777842][T18641] RBP: 00007eff1fb47090 R08: 0000000000000000 R09: 0000000000000000 [ 331.777855][T18641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 331.777868][T18641] R13: 0000000000000000 R14: 00007eff21705fa0 R15: 00007ffe32cdf208 [ 331.777923][T18641] [ 332.027415][T18644] netlink: 56 bytes leftover after parsing attributes in process `syz.1.4924'. [ 332.038219][T18647] $Hÿ: renamed from bond0 (while UP) [ 332.094342][T18644] infiniband syz1: set active [ 332.099269][T18644] infiniband syz1: added syz_tun [ 332.111979][T18644] RDS/IB: syz1: added [ 332.116150][T18644] smc: adding ib device syz1 with port count 1 [ 332.122524][T18644] smc: ib device syz1 port 1 has pnetid [ 332.171103][T18660] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4931'. [ 332.172210][T18659] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4932'. [ 332.207961][T18656] 9pnet_fd: Insufficient options for proto=fd [ 332.235954][T18663] ip6_vti0: mtu greater than device maximum [ 332.522334][T18682] vhci_hcd: invalid port number 16 [ 332.527539][T18682] vhci_hcd: default hub control req: 0000 v0008 i0010 l0 [ 332.538730][T18682] SELinux: security_context_str_to_sid () failed with errno=-22 [ 332.547363][T18682] FAULT_INJECTION: forcing a failure. [ 332.547363][T18682] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 332.560692][T18682] CPU: 0 UID: 0 PID: 18682 Comm: syz.0.4940 Not tainted 6.15.0-syzkaller-11173-g546b1c9e93c2 #0 PREEMPT(voluntary) [ 332.560727][T18682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 332.560742][T18682] Call Trace: [ 332.560749][T18682] [ 332.560826][T18682] __dump_stack+0x1d/0x30 [ 332.560849][T18682] dump_stack_lvl+0xe8/0x140 [ 332.560869][T18682] dump_stack+0x15/0x1b [ 332.560886][T18682] should_fail_ex+0x265/0x280 [ 332.560911][T18682] should_fail+0xb/0x20 [ 332.560935][T18682] should_fail_usercopy+0x1a/0x20 [ 332.560996][T18682] _copy_to_user+0x20/0xa0 [ 332.561036][T18682] simple_read_from_buffer+0xb5/0x130 [ 332.561106][T18682] proc_fail_nth_read+0x100/0x140 [ 332.561136][T18682] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 332.561272][T18682] vfs_read+0x1a0/0x6f0 [ 332.561295][T18682] ? __rcu_read_unlock+0x4f/0x70 [ 332.561324][T18682] ? __fget_files+0x184/0x1c0 [ 332.561377][T18682] ? fput+0x8f/0xc0 [ 332.561453][T18682] ksys_read+0xda/0x1a0 [ 332.561476][T18682] __x64_sys_read+0x40/0x50 [ 332.561534][T18682] x64_sys_call+0x2d77/0x2fb0 [ 332.561609][T18682] do_syscall_64+0xd2/0x200 [ 332.561691][T18682] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 332.561795][T18682] ? clear_bhb_loop+0x40/0x90 [ 332.561817][T18682] ? clear_bhb_loop+0x40/0x90 [ 332.561846][T18682] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 332.561875][T18682] RIP: 0033:0x7f490cfdd37c [ 332.561904][T18682] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 332.561930][T18682] RSP: 002b:00007f490b647030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 332.561950][T18682] RAX: ffffffffffffffda RBX: 00007f490d205fa0 RCX: 00007f490cfdd37c [ 332.561963][T18682] RDX: 000000000000000f RSI: 00007f490b6470a0 RDI: 000000000000000e [ 332.561975][T18682] RBP: 00007f490b647090 R08: 0000000000000000 R09: 0000000000000000 [ 332.561987][T18682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 332.562000][T18682] R13: 0000000000000000 R14: 00007f490d205fa0 R15: 00007ffc60488628 [ 332.562030][T18682] [ 332.569122][ T3394] page_pool_release_retry() stalled pool shutdown: id 100, 1 inflight 60 sec [ 332.703616][T18690] serio: Serial port ptm0 [ 332.788076][T18694] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4943'. [ 332.843107][T18700] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4946'. [ 332.975378][T18719] ip6_vti0: mtu greater than device maximum [ 333.009243][T18722] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4955'. [ 333.082229][T18725] rdma_rxe: rxe_newlink: failed to add syz_tun [ 333.111840][T18733] vhci_hcd: invalid port number 16 [ 333.117017][T18733] vhci_hcd: default hub control req: 0000 v0008 i0010 l0 [ 333.171072][T18731] rdma_rxe: rxe_newlink: failed to add syz_tun [ 333.224556][T18745] ip6_vti0: mtu greater than device maximum [ 333.297100][T18753] lo speed is unknown, defaulting to 1000 [ 333.371835][T18757] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 333.742816][T18776] netlink: 'syz.5.4974': attribute type 1 has an invalid length. [ 333.763677][T18778] rdma_rxe: rxe_newlink: failed to add syz_tun [ 333.812649][T18776] netlink: 'syz.5.4974': attribute type 7 has an invalid length. [ 333.892888][T18792] Invalid ELF header magic: != ELF [ 333.900145][T18792] netlink: 'syz.1.4978': attribute type 21 has an invalid length. [ 334.962161][T18816] rdma_rxe: rxe_newlink: failed to add syz_tun [ 334.995784][T18820] netlink: 'syz.1.4989': attribute type 1 has an invalid length. [ 335.042549][T18820] netlink: 'syz.1.4989': attribute type 7 has an invalid length. [ 335.044764][T18824] serio: Serial port ptm0 [ 335.178306][T18841] bridge0: entered promiscuous mode [ 335.184188][T18841] macsec1: entered promiscuous mode [ 335.191467][T18841] bridge0: port 3(macsec1) entered blocking state [ 335.197999][T18841] bridge0: port 3(macsec1) entered disabled state [ 335.206397][T18841] macsec1: entered allmulticast mode [ 335.211900][T18841] bridge0: entered allmulticast mode [ 335.234661][T18841] macsec1: left allmulticast mode [ 335.239928][T18841] bridge0: left allmulticast mode [ 335.246515][T18841] bridge0: left promiscuous mode [ 335.281507][T18847] $Hÿ: renamed from bond0 (while UP) [ 335.296607][T18847] $Hÿ: entered promiscuous mode [ 335.301776][T18847] bond_slave_0: entered promiscuous mode [ 335.307509][T18847] bond_slave_1: entered promiscuous mode [ 335.394102][T18861] netlink: 'syz.5.5005': attribute type 1 has an invalid length. [ 335.413316][T18865] FAULT_INJECTION: forcing a failure. [ 335.413316][T18865] name failslab, interval 1, probability 0, space 0, times 0 [ 335.426050][T18865] CPU: 1 UID: 0 PID: 18865 Comm: syz.4.5006 Not tainted 6.15.0-syzkaller-11173-g546b1c9e93c2 #0 PREEMPT(voluntary) [ 335.426087][T18865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 335.426101][T18865] Call Trace: [ 335.426110][T18865] [ 335.426120][T18865] __dump_stack+0x1d/0x30 [ 335.426148][T18865] dump_stack_lvl+0xe8/0x140 [ 335.426175][T18865] dump_stack+0x15/0x1b [ 335.426197][T18865] should_fail_ex+0x265/0x280 [ 335.426223][T18865] should_failslab+0x8c/0xb0 [ 335.426276][T18865] kmem_cache_alloc_node_noprof+0x57/0x320 [ 335.426308][T18865] ? __alloc_skb+0x101/0x320 [ 335.426337][T18865] __alloc_skb+0x101/0x320 [ 335.426373][T18865] mpls_netconf_notify_devconf+0x46/0x100 [ 335.426429][T18865] mpls_dev_sysctl_unregister+0x6b/0x80 [ 335.426469][T18865] ? __pfx_mpls_dev_notify+0x10/0x10 [ 335.426571][T18865] mpls_dev_notify+0x7a7/0x8d0 [ 335.426649][T18865] ? batadv_hard_if_event+0xbdb/0x1070 [ 335.426682][T18865] ? ovs_netdev_get_vport+0x5a/0x60 [ 335.426720][T18865] ? __pfx_mpls_dev_notify+0x10/0x10 [ 335.426753][T18865] raw_notifier_call_chain+0x6c/0x1b0 [ 335.426850][T18865] ? call_netdevice_notifiers_info+0x9c/0x100 [ 335.426881][T18865] call_netdevice_notifiers_info+0xae/0x100 [ 335.426910][T18865] unregister_netdevice_many_notify+0xd9a/0x1690 [ 335.427008][T18865] unregister_netdevice_queue+0x1f5/0x220 [ 335.427059][T18865] __tun_detach+0x7db/0xad0 [ 335.427082][T18865] ? __pfx_tun_chr_close+0x10/0x10 [ 335.427135][T18865] tun_chr_close+0x5a/0x100 [ 335.427211][T18865] __fput+0x298/0x650 [ 335.427247][T18865] fput_close_sync+0x6e/0x120 [ 335.427278][T18865] __x64_sys_close+0x56/0xf0 [ 335.427365][T18865] x64_sys_call+0x2747/0x2fb0 [ 335.427388][T18865] do_syscall_64+0xd2/0x200 [ 335.427417][T18865] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 335.427450][T18865] ? clear_bhb_loop+0x40/0x90 [ 335.427515][T18865] ? clear_bhb_loop+0x40/0x90 [ 335.427545][T18865] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 335.427573][T18865] RIP: 0033:0x7f68fb63e969 [ 335.427601][T18865] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 335.427704][T18865] RSP: 002b:00007f68f9ca7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 335.427724][T18865] RAX: ffffffffffffffda RBX: 00007f68fb865fa0 RCX: 00007f68fb63e969 [ 335.427737][T18865] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 335.427749][T18865] RBP: 00007f68f9ca7090 R08: 0000000000000000 R09: 0000000000000000 [ 335.427764][T18865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 335.427780][T18865] R13: 0000000000000000 R14: 00007f68fb865fa0 R15: 00007ffc0ed58048 [ 335.427807][T18865] [ 335.708445][T18867] lo speed is unknown, defaulting to 1000 [ 335.730347][T18861] netlink: 'syz.5.5005': attribute type 7 has an invalid length. [ 335.860923][ T29] kauditd_printk_skb: 634 callbacks suppressed [ 335.860938][ T29] audit: type=1326 audit(1748998264.248:44011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18875 comm="syz.4.5010" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68fb63e969 code=0x7ffc0000 [ 335.949722][ T29] audit: type=1326 audit(1748998264.278:44012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18875 comm="syz.4.5010" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68fb63e969 code=0x7ffc0000 [ 335.973443][ T29] audit: type=1326 audit(1748998264.278:44013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18875 comm="syz.4.5010" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f68fb63e969 code=0x7ffc0000 [ 335.997075][ T29] audit: type=1326 audit(1748998264.278:44014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18875 comm="syz.4.5010" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68fb63e969 code=0x7ffc0000 [ 336.020703][ T29] audit: type=1326 audit(1748998264.278:44015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18875 comm="syz.4.5010" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68fb63e969 code=0x7ffc0000 [ 336.044349][ T29] audit: type=1326 audit(1748998264.278:44016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18875 comm="syz.4.5010" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f68fb63e969 code=0x7ffc0000 [ 336.067950][ T29] audit: type=1326 audit(1748998264.328:44017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18875 comm="syz.4.5010" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68fb63e969 code=0x7ffc0000 [ 336.091576][ T29] audit: type=1326 audit(1748998264.328:44018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18875 comm="syz.4.5010" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68fb63e969 code=0x7ffc0000 [ 336.115214][ T29] audit: type=1326 audit(1748998264.328:44019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18875 comm="syz.4.5010" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f68fb63e969 code=0x7ffc0000 [ 336.138712][ T29] audit: type=1326 audit(1748998264.328:44020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18875 comm="syz.4.5010" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68fb63e969 code=0x7ffc0000 [ 336.340226][T18903] netlink: 'syz.1.5022': attribute type 1 has an invalid length. [ 336.397506][T18907] vlan2: entered allmulticast mode [ 336.411754][T18903] netlink: 'syz.1.5022': attribute type 7 has an invalid length. [ 336.419555][T18903] __nla_validate_parse: 12 callbacks suppressed [ 336.419569][T18903] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5022'. [ 336.609959][T18927] lo speed is unknown, defaulting to 1000 [ 336.646411][T18931] netlink: 'syz.5.5034': attribute type 1 has an invalid length. [ 336.654340][T18931] netlink: 228 bytes leftover after parsing attributes in process `syz.5.5034'. [ 336.698676][T18934] netlink: 'syz.5.5035': attribute type 1 has an invalid length. [ 336.743143][T18934] netlink: 'syz.5.5035': attribute type 7 has an invalid length. [ 336.750981][T18934] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5035'. [ 336.969589][T18956] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 336.991990][T18958] Invalid ELF header magic: != ELF [ 336.998709][T18958] netlink: 'syz.1.5043': attribute type 21 has an invalid length. [ 337.206040][T18971] lo speed is unknown, defaulting to 1000 [ 337.567783][T19000] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 337.577233][T19000] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 337.581516][T18997] bridge_slave_0: left allmulticast mode [ 337.590914][T18997] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.618405][T19004] netlink: 'syz.4.5059': attribute type 4 has an invalid length. [ 337.628452][T19004] (unnamed net_device) (uninitialized): option arp_validate: invalid value (18446744073709551614) [ 337.793901][T19009] netlink: 56 bytes leftover after parsing attributes in process `syz.1.5061'. [ 337.806435][T19009] syz1: rxe_newlink: already configured on syz_tun [ 337.855438][T19016] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 337.865572][T19016] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 337.907151][T19025] netlink: 28 bytes leftover after parsing attributes in process `syz.1.5067'. [ 338.177505][T19039] lo speed is unknown, defaulting to 1000 [ 338.492936][T19049] netlink: 56 bytes leftover after parsing attributes in process `syz.2.5075'. [ 338.504367][T19049] rdma_rxe: rxe_newlink: failed to add syz_tun [ 338.732615][T19062] ip6_vti0: mtu greater than device maximum [ 338.794580][T19066] netlink: 28 bytes leftover after parsing attributes in process `syz.1.5078'. [ 338.903509][T19077] netlink: 56 bytes leftover after parsing attributes in process `syz.5.5087'. [ 338.929615][T19077] rdma_rxe: rxe_newlink: failed to add syz_tun [ 339.468093][T19094] bridge_slave_1: left allmulticast mode [ 339.473979][T19094] bridge_slave_1: left promiscuous mode [ 339.479713][T19094] bridge0: port 2(bridge_slave_1) entered disabled state [ 339.498332][T19094] bond0: (slave bond_slave_0): Releasing backup interface [ 339.513433][T19094] bond0: (slave bond_slave_1): Releasing backup interface [ 339.532727][T19094] team0: Port device team_slave_0 removed [ 339.585473][T19096] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5091'. [ 339.629341][T19101] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5092'. [ 339.772944][T19111] SELinux: failed to load policy [ 339.907533][T19131] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 340.222887][T19142] Invalid ELF header magic: != ELF [ 340.229560][T19142] netlink: 'syz.5.5108': attribute type 21 has an invalid length. [ 340.522024][T19150] FAULT_INJECTION: forcing a failure. [ 340.522024][T19150] name failslab, interval 1, probability 0, space 0, times 0 [ 340.534868][T19150] CPU: 1 UID: 0 PID: 19150 Comm: syz.2.5112 Not tainted 6.15.0-syzkaller-11173-g546b1c9e93c2 #0 PREEMPT(voluntary) [ 340.534970][T19150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 340.534987][T19150] Call Trace: [ 340.534995][T19150] [ 340.535015][T19150] __dump_stack+0x1d/0x30 [ 340.535126][T19150] dump_stack_lvl+0xe8/0x140 [ 340.535161][T19150] dump_stack+0x15/0x1b [ 340.535184][T19150] should_fail_ex+0x265/0x280 [ 340.535214][T19150] should_failslab+0x8c/0xb0 [ 340.535299][T19150] __kmalloc_noprof+0xa5/0x3e0 [ 340.535333][T19150] ? nfc_llcp_build_tlv+0xac/0x100 [ 340.535407][T19150] nfc_llcp_build_tlv+0xac/0x100 [ 340.535435][T19150] nfc_llcp_build_gb+0x157/0x2f0 [ 340.535466][T19150] nfc_llcp_general_bytes+0xd9/0x1e0 [ 340.535545][T19150] nfc_dep_link_up+0xdd/0x260 [ 340.535582][T19150] nfc_genl_dep_link_up+0xdd/0x120 [ 340.535639][T19150] genl_family_rcv_msg_doit+0x143/0x1b0 [ 340.535680][T19150] genl_rcv_msg+0x422/0x460 [ 340.535721][T19150] ? __pfx_nfc_genl_dep_link_up+0x10/0x10 [ 340.535752][T19150] netlink_rcv_skb+0x123/0x220 [ 340.535791][T19150] ? __pfx_genl_rcv_msg+0x10/0x10 [ 340.535843][T19150] genl_rcv+0x28/0x40 [ 340.535977][T19150] netlink_unicast+0x5a1/0x670 [ 340.536009][T19150] netlink_sendmsg+0x58b/0x6b0 [ 340.536055][T19150] ? __pfx_netlink_sendmsg+0x10/0x10 [ 340.536098][T19150] __sock_sendmsg+0x142/0x180 [ 340.536264][T19150] ____sys_sendmsg+0x31e/0x4e0 [ 340.536329][T19150] ___sys_sendmsg+0x17b/0x1d0 [ 340.536477][T19150] __x64_sys_sendmsg+0xd4/0x160 [ 340.536520][T19150] x64_sys_call+0x2999/0x2fb0 [ 340.536584][T19150] do_syscall_64+0xd2/0x200 [ 340.536616][T19150] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 340.536647][T19150] ? clear_bhb_loop+0x40/0x90 [ 340.536676][T19150] ? clear_bhb_loop+0x40/0x90 [ 340.536705][T19150] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 340.536776][T19150] RIP: 0033:0x7f6e3b45e969 [ 340.536795][T19150] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 340.536817][T19150] RSP: 002b:00007f6e39ac7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 340.536962][T19150] RAX: ffffffffffffffda RBX: 00007f6e3b685fa0 RCX: 00007f6e3b45e969 [ 340.536975][T19150] RDX: 0000000000000040 RSI: 0000200000000600 RDI: 0000000000000004 [ 340.536988][T19150] RBP: 00007f6e39ac7090 R08: 0000000000000000 R09: 0000000000000000 [ 340.537038][T19150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 340.537050][T19150] R13: 0000000000000000 R14: 00007f6e3b685fa0 R15: 00007ffca8154bb8 [ 340.537071][T19150] [ 340.827415][T19154] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 340.836730][T19154] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 340.894635][T19164] rdma_rxe: rxe_newlink: failed to add syz_tun [ 340.943710][T19173] ip6_vti0: mtu greater than device maximum [ 340.980069][ T29] kauditd_printk_skb: 1126 callbacks suppressed [ 340.980089][ T29] audit: type=1326 audit(1748998269.357:45147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19155 comm="syz.2.5114" exe="/root/syz-executor" sig=0 arch=c000003e syscall=60 compat=0 ip=0x7f6e3b45e969 code=0x7ffc0000 [ 341.017286][ T29] audit: type=1400 audit(1748998269.397:45148): avc: denied { kexec_image_load } for pid=19177 comm="syz.4.5120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 341.051536][T19178] infiniband srz1: RDMA CMA: cma_listen_on_dev, error -98 [ 341.058802][ T29] audit: type=1326 audit(1748998269.427:45149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19170 comm="syz.1.5118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7eff214de969 code=0x7ffc0000 [ 341.082468][ T29] audit: type=1326 audit(1748998269.427:45150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19170 comm="syz.1.5118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7eff214de969 code=0x7ffc0000 [ 341.106356][ T29] audit: type=1326 audit(1748998269.427:45151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19170 comm="syz.1.5118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7eff214de969 code=0x7ffc0000 [ 341.130093][ T29] audit: type=1326 audit(1748998269.427:45152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19170 comm="syz.1.5118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7eff214de969 code=0x7ffc0000 [ 341.153846][ T29] audit: type=1326 audit(1748998269.427:45153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19170 comm="syz.1.5118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7eff214de969 code=0x7ffc0000 [ 341.177642][ T29] audit: type=1326 audit(1748998269.427:45154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19170 comm="syz.1.5118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=307 compat=0 ip=0x7eff214de969 code=0x7ffc0000 [ 341.201339][ T29] audit: type=1326 audit(1748998269.427:45155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19170 comm="syz.1.5118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7eff214de969 code=0x7ffc0000 [ 341.225002][ T29] audit: type=1326 audit(1748998269.427:45156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19170 comm="syz.1.5118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7eff214de969 code=0x7ffc0000 [ 341.528284][T19201] __nla_validate_parse: 6 callbacks suppressed [ 341.528303][T19201] netlink: 56 bytes leftover after parsing attributes in process `syz.1.5129'. [ 341.564519][T19204] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 341.615692][T19201] syz1: rxe_newlink: already configured on syz_tun [ 341.669283][T19212] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5132'. [ 342.418393][T19230] netlink: 28 bytes leftover after parsing attributes in process `syz.1.5138'. [ 342.901905][T19240] netlink: 'syz.5.5142': attribute type 21 has an invalid length. [ 343.408951][T19244] netlink: 20 bytes leftover after parsing attributes in process `syz.2.5144'. [ 343.429276][T19244] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 343.443559][T19246] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 343.453952][T19244] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 343.461398][T19246] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 343.739078][T19251] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 343.778599][T19251] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 344.033672][T19257] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5148'. [ 344.120389][T19259] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5149'. [ 344.156439][T19261] netlink: 28 bytes leftover after parsing attributes in process `syz.1.5150'. [ 344.263844][T19263] SELinux: ebitmap: truncated map [ 344.295484][T19263] SELinux: failed to load policy [ 344.697199][T19270] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5154'. [ 344.706420][T19270] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5154'. [ 344.715489][T19270] netlink: 'syz.1.5154': attribute type 19 has an invalid length. [ 344.763717][T19273] lo speed is unknown, defaulting to 1000 [ 344.992546][T19291] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5160'. [ 345.816589][T19330] smc: net device bond0 applied user defined pnetid SYZ2 [ 345.981488][ T29] kauditd_printk_skb: 1213 callbacks suppressed [ 345.981508][ T29] audit: type=1326 audit(1748998274.356:46370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19327 comm="syz.1.5174" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7eff214d5927 code=0x7ffc0000 [ 346.013596][ T29] audit: type=1326 audit(1748998274.396:46371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19340 comm="syz.5.5180" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7ff8e09c5927 code=0x7ffc0000 [ 346.037241][ T29] audit: type=1326 audit(1748998274.396:46373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19340 comm="syz.5.5180" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7ff8e096ab39 code=0x7ffc0000 [ 346.060807][ T29] audit: type=1326 audit(1748998274.396:46372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19327 comm="syz.1.5174" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7eff2147ab39 code=0x7ffc0000 [ 346.085190][ T29] audit: type=1326 audit(1748998274.396:46374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19340 comm="syz.5.5180" exe="/root/syz-executor" sig=0 arch=c000003e syscall=73 compat=0 ip=0x7ff8e09ce969 code=0x7ffc0000 [ 346.108897][ T29] audit: type=1326 audit(1748998274.396:46375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19327 comm="syz.1.5174" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7eff214d5927 code=0x7ffc0000 [ 346.132582][ T29] audit: type=1326 audit(1748998274.396:46376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19327 comm="syz.1.5174" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7eff2147ab39 code=0x7ffc0000 [ 346.156186][ T29] audit: type=1326 audit(1748998274.396:46377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19327 comm="syz.1.5174" exe="/root/syz-executor" sig=0 arch=c000003e syscall=73 compat=0 ip=0x7eff214de969 code=0x7ffc0000 [ 346.181062][ T29] audit: type=1326 audit(1748998274.396:46378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19340 comm="syz.5.5180" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7ff8e09c5927 code=0x7ffc0000 [ 346.204734][ T29] audit: type=1326 audit(1748998274.396:46379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19340 comm="syz.5.5180" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7ff8e096ab39 code=0x7ffc0000 [ 346.746271][T19383] FAULT_INJECTION: forcing a failure. [ 346.746271][T19383] name failslab, interval 1, probability 0, space 0, times 0 [ 346.758968][T19383] CPU: 1 UID: 0 PID: 19383 Comm: syz.0.5196 Not tainted 6.15.0-syzkaller-11173-g546b1c9e93c2 #0 PREEMPT(voluntary) [ 346.759005][T19383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 346.759020][T19383] Call Trace: [ 346.759044][T19383] [ 346.759053][T19383] __dump_stack+0x1d/0x30 [ 346.759134][T19383] dump_stack_lvl+0xe8/0x140 [ 346.759157][T19383] dump_stack+0x15/0x1b [ 346.759183][T19383] should_fail_ex+0x265/0x280 [ 346.759279][T19383] ? io_manage_buffers_legacy+0x149/0x5e0 [ 346.759310][T19383] should_failslab+0x8c/0xb0 [ 346.759338][T19383] __kmalloc_cache_noprof+0x4c/0x320 [ 346.759445][T19383] io_manage_buffers_legacy+0x149/0x5e0 [ 346.759549][T19383] __io_issue_sqe+0xfb/0x2e0 [ 346.759583][T19383] ? io_assign_file+0x56/0x200 [ 346.759663][T19383] io_issue_sqe+0x53/0x970 [ 346.759778][T19383] ? io_provide_buffers_prep+0x1c7/0x1f0 [ 346.759810][T19383] io_submit_sqes+0x667/0xfd0 [ 346.759839][T19383] __se_sys_io_uring_enter+0x1c1/0x1b70 [ 346.759862][T19383] ? 0xffffffff81000000 [ 346.759876][T19383] ? __rcu_read_unlock+0x4f/0x70 [ 346.759901][T19383] ? get_pid_task+0x96/0xd0 [ 346.759938][T19383] ? proc_fail_nth_write+0x12d/0x160 [ 346.759965][T19383] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 346.760019][T19383] ? vfs_write+0x75e/0x8e0 [ 346.760042][T19383] ? __rcu_read_unlock+0x4f/0x70 [ 346.760070][T19383] ? __fget_files+0x184/0x1c0 [ 346.760098][T19383] ? fput+0x8f/0xc0 [ 346.760182][T19383] __x64_sys_io_uring_enter+0x78/0x90 [ 346.760205][T19383] x64_sys_call+0x28c8/0x2fb0 [ 346.760229][T19383] do_syscall_64+0xd2/0x200 [ 346.760262][T19383] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 346.760291][T19383] ? clear_bhb_loop+0x40/0x90 [ 346.760323][T19383] ? clear_bhb_loop+0x40/0x90 [ 346.760347][T19383] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 346.760392][T19383] RIP: 0033:0x7f490cfde969 [ 346.760408][T19383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 346.760596][T19383] RSP: 002b:00007f490b647038 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 346.760617][T19383] RAX: ffffffffffffffda RBX: 00007f490d205fa0 RCX: 00007f490cfde969 [ 346.760631][T19383] RDX: 0000000000000000 RSI: 00000000000047fa RDI: 0000000000000003 [ 346.760645][T19383] RBP: 00007f490b647090 R08: 0000000000000000 R09: 0000000000000000 [ 346.760658][T19383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 346.760671][T19383] R13: 0000000000000000 R14: 00007f490d205fa0 R15: 00007ffc60488628 [ 346.760693][T19383] [ 347.233531][T19397] __nla_validate_parse: 8 callbacks suppressed [ 347.233548][T19397] netlink: 28 bytes leftover after parsing attributes in process `syz.2.5200'. [ 347.369936][T19408] netlink: 'syz.2.5204': attribute type 21 has an invalid length. [ 347.476190][T19415] SELinux: ebitmap: truncated map [ 347.483701][T19415] SELinux: failed to load policy [ 347.735270][T19433] netlink: 28 bytes leftover after parsing attributes in process `syz.5.5215'. [ 348.029712][T19443] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5218'. [ 348.131509][T19451] netlink: 'syz.0.5222': attribute type 298 has an invalid length. [ 348.226375][T19462] netlink: 28 bytes leftover after parsing attributes in process `syz.5.5227'. [ 348.238270][T19451] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5222'. [ 348.251288][T19451] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5222'. [ 348.268522][T19451] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5222'. [ 348.301777][T19468] ================================================================== [ 348.309921][T19468] BUG: KCSAN: data-race in mas_state_walk / mas_wr_store_entry [ 348.317502][T19468] [ 348.319830][T19468] write to 0xffff888139dd5b10 of 8 bytes by task 19465 on cpu 1: [ 348.327558][T19468] mas_wr_store_entry+0x1581/0x2b50 [ 348.332801][T19468] mas_store_prealloc+0x74d/0x9e0 [ 348.337847][T19468] commit_merge+0x66e/0x6f0 [ 348.342363][T19468] vma_expand+0x1d0/0x370 [ 348.346704][T19468] vma_merge_new_range+0x296/0x310 [ 348.351858][T19468] mmap_region+0x9f1/0x1560 [ 348.356477][T19468] do_mmap+0x9b3/0xbe0 [ 348.360669][T19468] vm_mmap_pgoff+0x17a/0x2e0 [ 348.365277][T19468] ksys_mmap_pgoff+0xc2/0x310 [ 348.369967][T19468] x64_sys_call+0x1602/0x2fb0 [ 348.374659][T19468] do_syscall_64+0xd2/0x200 [ 348.379332][T19468] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 348.385284][T19468] [ 348.387621][T19468] read to 0xffff888139dd5b10 of 8 bytes by task 19468 on cpu 0: [ 348.395262][T19468] mas_state_walk+0x2f5/0x650 [ 348.399959][T19468] mas_walk+0x30/0x120 [ 348.404047][T19468] lock_vma_under_rcu+0xa2/0x2f0 [ 348.409013][T19468] do_user_addr_fault+0x233/0x1090 [ 348.414154][T19468] exc_page_fault+0x62/0xa0 [ 348.418677][T19468] asm_exc_page_fault+0x26/0x30 [ 348.423539][T19468] [ 348.425868][T19468] value changed: 0x00007ff8deff5fff -> 0xffffffff855e6890 [ 348.432981][T19468] [ 348.435307][T19468] Reported by Kernel Concurrency Sanitizer on: [ 348.441464][T19468] CPU: 0 UID: 0 PID: 19468 Comm: syz.5.5228 Not tainted 6.15.0-syzkaller-11173-g546b1c9e93c2 #0 PREEMPT(voluntary) [ 348.453626][T19468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 348.463696][T19468] ================================================================== [ 348.543109][T19473] lo speed is unknown, defaulting to 1000