last executing test programs: 2m59.043258921s ago: executing program 2 (id=481): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000007c0)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000ffff00000000000000bd0000000000000000000000e4ec01000000004000000000fc00000000000000000000000000013da51fd47aa2e2f7000000"], 0x310) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f00000005c0)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 2m58.980663191s ago: executing program 2 (id=482): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp\x00') preadv(r1, &(0x7f0000000380)=[{&(0x7f00000014c0)=""/223, 0xdf}], 0x1, 0x20000000, 0x0) lseek(r1, 0x2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x4000002, 0x50032, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) ftruncate(r2, 0x2007ffc) sendfile(r2, r2, 0x0, 0x800000009) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) r3 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f0000000180)=0xffffffc1, 0x4) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @remote, 0x8}, 0x1c) sendmmsg(r3, &(0x7f0000000100)=[{{&(0x7f0000000080)=@l2tp6={0xa, 0x500, 0x0, @remote}, 0x80, 0x0}, 0x5b4}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x88, 0x88, 0x6, [@decl_tag={0x9, 0x0, 0x0, 0x11, 0x4, 0x8}, @typedef={0x6, 0x0, 0x0, 0x8, 0x2}, @volatile={0xf, 0x0, 0x0, 0x9, 0x2}, @enum64={0xa, 0x3, 0x0, 0x13, 0x1, 0x6, [{0x5, 0x80000001, 0xe}, {0xb, 0x6, 0x10001}, {0xe, 0x4, 0x5}]}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x2b, 0x0, 0x12, 0x4}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2}]}, @float={0xa, 0x0, 0x0, 0x10, 0x3c7534a1885471ef}]}, {0x0, [0x2e, 0x0, 0x2e, 0x0]}}, &(0x7f0000000600)=""/202, 0xa6, 0xca, 0x1, 0x9, 0x10000, @value}, 0x28) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x10, 0xfff, 0x4, 0x1, 0xc0c0, r2, 0x1002, '\x00', 0x0, r4, 0x2, 0x2, 0x1, 0x0, @value=r2, @void, @void, @value}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r7 = socket(0x10, 0x803, 0x0) r8 = socket$unix(0x1, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000003c0)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0xf}, 0xe) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r7, &(0x7f00000012c0)={0x0, 0x4, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r9, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0xc00}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000440)=@newtfilter={0x70, 0x2c, 0xd27, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, r9, {0xc, 0x4}, {}, {0x3, 0x3}}, [@filter_kind_options=@f_flow={{0x9}, {0x40, 0x2, [@TCA_FLOW_EMATCHES={0x3c, 0xb, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xfffb}}, @TCA_EMATCH_TREE_LIST={0x30, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x7, 0x7, 0x2}, {{0x0, 0x1, 0x0, 0x1}, {0x0, 0x1, 0x1, 0x1}}}}, @TCF_EM_META={0x18, 0x2, 0x0, 0x0, {{0xfffb, 0x4, 0x2}, [@TCA_EM_META_HDR={0xc, 0x1, {{0xd, 0x6c}, {0x1, 0x81, 0x1}}}]}}]}]}]}}]}, 0x70}}, 0x20040054) 2m58.382515428s ago: executing program 2 (id=495): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000006c0)={0x40, 0x0, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x400000d0}, 0x20004010) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001600), 0x28000, 0x0) ioctl$TIOCMIWAIT(r2, 0x545c, 0x200000000000000) 2m57.411640042s ago: executing program 2 (id=525): r0 = add_key$keyring(&(0x7f0000000300), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000040)='devtmpfs\x00', 0x0, 0x0) chroot(&(0x7f0000000300)='./file0/../file0/../file0/../file0\x00') r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000340)=@keyring={'key_or_keyring:', r0}) 2m57.248121961s ago: executing program 2 (id=527): bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYRESOCT, @ANYRES32=0x1, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sys_enter\x00', r0}, 0x10) setfsuid(0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="500000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000002000001c0012800b00010067656e65766500000c00028008000100ffffff001400030067"], 0x50}}, 0x2000000) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, 0x0, 0x40000) getgroups(0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='rxrpc_local\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000000)='rxrpc_local\x00', r2}, 0x10) r3 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)=ANY=[], 0x10b8}, 0x0) r4 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[], 0x18}, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e0, 0xd0, 0x268, 0x311, 0xd0, 0x268, 0x210, 0x460, 0x460, 0x210, 0x460, 0x9, 0x0, {[{{@ipv6={@local, @local, [0x0, 0xffffff00, 0x0, 0xffffffff], [0xff000000, 0xff, 0xff, 0xff], 'pim6reg1\x00', 'batadv_slave_0\x00', {}, {}, 0x11, 0x80, 0x4}, 0x160, 0xa8, 0xd0, 0x0, {0x9401}}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x401, 0x6, 0x11}}}, {{@ipv6={@private2, @remote, [], [0x0, 0x0, 0xff], 'ip6gretap0\x00', 'ip6_vti0\x00'}, 0x0, 0xd8, 0x140, 0xe4030000, {}, [@common=@ah={{0x30}, {[0x4d3, 0x4d5], 0x4, 0xa, 0x1}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x18, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x340) mount$tmpfs(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x8c0420, &(0x7f0000000b00)=ANY=[]) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r6}, 0x18) 2m56.827122439s ago: executing program 2 (id=531): syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x10, &(0x7f0000000180)={[{}, {@dioread_lock}, {@dax_never}, {@usrjquota}]}, 0xfe, 0x463, &(0x7f0000001200)="$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") r0 = syz_io_uring_setup(0x24fa, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000280)="3e64332048216c16bf7c6418417f9e4f81c8b5032b1a6c7ec8409f471a8547cf69078b7a93d222ce6f49a51eb619e1d7520d6cb91890d2c99d143ea706dd94c75f13850fa9c676d8a5a4b900c717b75fa5125a388a82809382bd9c66449ab69a312a2baadb74847113c4a21b1a2dfa8d7029ba12f465b2b46b87799cc89c94586710b65c5ff009d414f9cd551afab49485c7684e3e9bf79418ec4a12bdec351d37f952df7700c74a969bfac60c1e92072cbb40a6a38bd76de1b7ed36108060068945ddcc4792f0959ec01c32", 0xcc) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) lseek(0xffffffffffffffff, 0x100, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x44) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES8=r1], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) fcntl$notify(r2, 0x402, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioperm(0x9, 0xad, 0x100d6de) timer_delete(0x0) 2m56.756451398s ago: executing program 32 (id=531): syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x10, &(0x7f0000000180)={[{}, {@dioread_lock}, {@dax_never}, {@usrjquota}]}, 0xfe, 0x463, &(0x7f0000001200)="$eJzs3MtvG8UfAPDvOrH7+vWXUMqjLwgURMUjadIHPXApAokDSEhwKOJk0rQqdRvUBIlWFRQO5YgqcUcckfgLuFAOIOCExBXuCKlCuVA4Ga29mxrHduLEiUv8+UirznjHnfnu7sSzM14HMLDGImJfRPwvIn6JiJGISJoLjNX/ub1wdfqvhavTSVSrr/2R1Mr9uXB1Oi+av29HPVMd6lDv9TcjypXKzKUsPzF/4Z2JuctXnjl3oXx25uzMxakTJ44eOVA6PnWsJ3HuTNu69/3Z/XteeuPGK9Onbrz1w5dJFnc0xdErY7Wj1trjva6sz3Y2pJPhPjaErqR9ND1dxVr/H4mh2La4byRe/KivjQPWVbVaqG5pv/taFdjE0tE8MIjyD/r0/jffNmjocVe4dTIW5zFuZ1t9z3AUsjLFdax/LCJOXfv7s3SLdZqHAABodPNkRDzdavxXiPsbyv0/WxsajYh7ImJXRNwbEbsj4r6IWtkHIuLBLutvXiFZOv6pjqwqsBVKx3/PZWtb/x7/5aO/GB3Kcjtr8ReTM+cqM4ezY3IoilvS/GSHOr554edP2u1rHP+lW1p/PhbM2vH7cNME3elysbyWmBvd+rC+ALA0/iTyZZx0fLwnIvZ2+X/n9xjnnvxif7syYw1HunX8HfRgnan6ecQT9fN/LZrizyVt1ycnnz0+dWxia1RmDk/kV8VSP/50/dV29S9//tfXrZvV2N7y+l+MfzTZGjF3+cr52nrtXPd1XP/147b3NKu7/ufLpeT1WrqUvfZeeX7+0mREKXl56etTd96b5/Py6fV/6GDr/r8r7hyJfRGRXsQHIuKhiHg4a/sjEfFoRBzsEP/3zz/2dvfxd5iV76E0/tPLnf9oPP/dJ4bOf/dV9/Hn0vN/tJY6lL2Snv/l4lppA9dy7AAAAOC/olD7DnxSGF9MFwrj4/Xv8O+O7YXK7Nz8U2dm3714uv5d+dEoFvKZrpGG+dDJbG44z0815Y9k88afDm2r5cenZyvdzicCvbWjTf9P/dbpAR5gc/C8Fgwu/R8Gl/4Pg0v/h8Gl/8PgatX/P+hDO4CNt8zn/7aNagew8VY7/t+YR5SA9TQc8W2p340A+sL8Hwykts/GF9b0yL9EnxJfl9b2Ww0rT0ThLgl50ySK0XLX8Ip/zGIViSS9jW+5q99/mQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHrjnwAAAP//2i3jhQ==") r0 = syz_io_uring_setup(0x24fa, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) write(r0, &(0x7f0000000280)="3e64332048216c16bf7c6418417f9e4f81c8b5032b1a6c7ec8409f471a8547cf69078b7a93d222ce6f49a51eb619e1d7520d6cb91890d2c99d143ea706dd94c75f13850fa9c676d8a5a4b900c717b75fa5125a388a82809382bd9c66449ab69a312a2baadb74847113c4a21b1a2dfa8d7029ba12f465b2b46b87799cc89c94586710b65c5ff009d414f9cd551afab49485c7684e3e9bf79418ec4a12bdec351d37f952df7700c74a969bfac60c1e92072cbb40a6a38bd76de1b7ed36108060068945ddcc4792f0959ec01c32", 0xcc) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) lseek(0xffffffffffffffff, 0x100, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x44) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES8=r1], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) fcntl$notify(r2, 0x402, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioperm(0x9, 0xad, 0x100d6de) timer_delete(0x0) 2m50.479071973s ago: executing program 3 (id=647): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000006c0)={0x40, 0x0, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x400000d0}, 0x20004010) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001600), 0x28000, 0x0) ioctl$TIOCMIWAIT(r2, 0x545c, 0x200000000000000) 2m49.626917918s ago: executing program 3 (id=689): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400000bb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000700)='kfree\x00', r1}, 0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0500000001000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x47, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4cf68d79c8eac253, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2, 0x17, &(0x7f0000000880)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x2, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) r7 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$UHID_INPUT(r7, &(0x7f0000001580)={0x8, {"6c83ebafad99676452d2d40ffec7d768ce4e6800834183afc14b5fc6c0e794f63bc1798f895f224f405997d7b576324f2fe43f5c6ddb1c79f85aea76889dd9048cb1d23c1027a09bfcbe6412472c92d14140762253b2acdb16955152ddb419b062c4295aabdbab2b280f63a20a9e7eb4f9b7d2fe36c4302109f9d560148e496f4d79c87c487e24c79aaab2d31ca66864cee80aac7b9dc8ce2e7c0be210475dd69613f8ff40ed6e28e51fadcdb5e0304e8b18f75a3b438ebd2fe83a5d40a0b4af36565488f0b1a15f38d21261221cd8acf1acc7b0be1737a68c2644fc23e02b94268f27d0e2e3073f44113912d72a4065f33eac4610f766eda00b4465ef33e36ddd7c3b19322ea4a1f321d7315be3989fc4e24a3e70deecac0952dbcded927de3d70fd3220ad9a2603114ab144229d952bbed438c9a205524956860c284cfb276ec5bdc482cba36b3e2e4ef3415c3a07fd88d6cce104562c5bebc3931c2e123147a56418c9421b1bc9397142fa51923326a192b0b1b84c656ce6729676209a737ee3cba5b403cbc9ef9c53cb0656ac47e4bd842852e645743aa323e765901f66ffc752a96e32f712aa55fc12e68433cd48d19ac5c18d134f163f82081a1f2dc9ed7933c25c76b29700359c5bc7c5675ac8c993066405a5597a52306e168df17113eebb0e26442ed907b77315a14431ae162c5e31ad36b62b97cf4da7dbed1f8d2a4eee081b0357f2f890b06538dbfcbdb385c163ae7d37ab9332f016dcd61f87d3d5b8b25f0f46607e904b39ca682e01dc95209bd39b24e010f2c156a91453d597dd7b20fa700575b13f25e0db6c3ce3f18af01b0b2e6c0e1240aaa9ca4e6460c02c43d196778aab49892cc37f9994af262e357c4ce17d07307f25ed5163a105ef4e4a8b46b3ed406b0663fdfde9559d71b2e9827375db6b4f9e33cc44d3f6f51301d1452acceff54010f4485a3ecd337b073987e48900a87c0f7b19fe282f39e99b6745738c3fd5c00c69a2b1f1fa6d656a99272e9f88c336ad8b9d94bc5c6c226541678e46422f04257f72288d044e6fa49972b7f2d101c0d865941a17219b0f45ac42408419447d92ac2905def2083eb9c481cc43ff3af17c46847f3416e01318de406ec8933b38b45902389a60dea29050c4a3c279bf22d2d01d77dd21707acf122eba040f29212483eed94d2aa3097291dc3070eedf76757584d419930acbb54c933df5688b403fb3b06803c860bef4d03aef85324b3077360bac9767d21013605629d71780188b307a1fef08dcc4c387142d5c062696f1128c3af910b4532f876c5e16e119898e9175188edbe47df9ceb25980e94bd113b400667c7004d8ef1002c9ffa4d9d1fd52657b806b45eb7c4c28fdcff1accc42a2efd35c75795121005d3afa59685f9a6891f441043119b68d944dc3ca7cd2280ce51247f40405b25df7b5af058b57ccfb5c284dd46a7caa1b7ddf63c33f73ffaab6382398df81728c11087eeaff708dc80e59d68eefa9b62f425614121d9d69227f803a0b84cd5d9e7718c2ab8166a5e87161a97b37acc8f0cf55703fa6e87edc6fdbf8ca54f1e78abcef8863d77036daae50c0c746909d18eb1075a10bbe30568096779b9c3677a72f4a35f5b0eb8ba10063daa9446730bf33e14ec73872e9e1d99e63b490aa3fe4718422c1c765ccd1ede867ed024f534a828aba24f35a34386bc38cffac00c1cb6539e42c32d4fdd723aa0b1b96330e5b6ce446f6e55907daa3d92c965a84260792dcdb006ca33030a0d928e9e73c3ab383c31655a9069356bd65eb361742fb0ba8513dc91a9dc6705723df8b6f0b3f4a3270b647819ad2e6e9744777ce05e3ef8f0a0f49934beda25cb83290fe4a1a99bab0814221acfc1b6ccaa632b144eb1dbd88984316330cdb5b0c94787b2956c05679e9c46c69dc4a029883448a8d591b41437ec4bd399497d23ecdf1090eb6694700deb36543b6cb49e277b0ea6f7edd87a3a3b0d9b017429f1af7563e2c973c5ae1c3e51893bb9918dd854b1403795f7947f067e86d06c8cb16b906be134c1c24e26302483cdb41b6078b72a8c78be68877f34575331df4a06f8bedbe90e0fcaafa6c2f5cba0af983cb11dd2bb993647543fbc71f708981fa92d1f95b1e0b4a24eee301976db5bc6b99e9ed4d16b3a7019aa42fef37a8187f4c41cfb40101bd55294a899a2e41d6e6c393e4545e2b3204222590298efd385279ef8d634a520cdd4f0bac05d5eedd75a93dabe22f5a77c4a519f991cc159e0fadcee75c77c28f6b815315154e3ff1eda2f0a87e2d774e75f57f752c39652862407cfdb12498d6eaa516ae38bce44adff5d7ad727b9ad761c5ebde23e31bb5152071575a908eb123abb5b14e42e296d2c9267c239bcb0e451d9d454bbe8c3d0ac248bce7ed0448b4e987a75067396694b3e10df8a59df8fbad563a727f17899276ced21335e066f70e28ff03b5999e8b27fb282426480046d0e01d1ad85b0b6d5e6456446c68d755c40b2449f95263105e5772938b028cce57b0aa67543fa3a4d386fc2c90614621bbcfa78a137003dc0c3bedd075cc76e749458d5e98056570f1ef2a1762a988165b290ae9316991017f003a119941e4e9b85f685f36069fb6ae8324d82cd2de4aeafac2f03512c303fad3d62a57737ad0994a6da2dbce8715cd2e6fb3ad77a9cf3c4d010fff104eaca9c83af3950417d0f9eea9ea265f31030296d5e79d154597f3081d7b200e787fbb6332ac45be3c49cbeedbe44b1e3d93673191a58a5c11783ed209bf17f88ed58e06c33a30f8458c23ae34e0e4ff1ba562a4ea1cbf0ee4f9da60bb8e293a617c0a27b9319213781aaabef2bf2af828b9728e2954bb6292f20ac608a0d67173d8f2998859cdbbe22f563bf38140c22d89d9650595dfa7276f3159f8e742a5e5ab20562fb3a886e9ce250144eaa808106367e9fa8eb17277614368a2376991892082df0ae3bad72ecc1212488b62c35433e3685b582cd376d3ccc9f6c614f27239908bd03b9bc3d478ef0aea0aa84d920f45ba97d73c04d8a42b22e49bf4a2b55aa9a172bddeef7bdbe4cc768ffd2772b88c372b7545a1e166ec95f47fd903d4da30be79053214d9eab1eca9d980ce0e264e92cfaa7ec519bdacd1042a243d0bd0941fafcf1cc8d216f7a40e3314406adf427bb7e7d317e2fa92d1e6e1c53fcf118d002765a79670aae5b8949e99ee4f81ed618249b0534713d05bfd3591b1cae1effea1b51fc9b7a08f5001c72d037c4621bf81655e0670cba6fd8c5acaa766d16ae75dbb33c892d4c57bcc67fedc386c79f27965a41f8de7e714150a743683386e901e20c6c1b9585160838a92650ed794e913775c922ce2d7465c41ddc5d3a28b660be66aa991ce8477315b05b89745b09cb8609cd1f590489694fd7aac299e4b339b0da3a2ec11e9b8717ca16a23a749d3c8e5675705d704ffa5a7e99e38f1b8c658c4b73a8ba9c644f53a8678ba836d5596a5d8005fc4e574ecdefc53c1f90a14cd171de9a5b3081a73dfe8bb52d8fef3c35d36c6981e53f8b3fd4362ed04a77d7f5cebfaf8dce94ccc1d40f632d1a862e7c47aed2e63a2f333c49d126dfae5100dc807fcad0302ac404853df55321381942c113141f682990f29bfbbe90a4ce4f9c25da392a479ebee7159d65cc98654f41cca18c27d4570f9f5925058429423340b891c2a2896d9d330029cf005b687e4c98359c3b41e5a115a0c164df1711d42e1233eb1832ecad7ad03fb5fbd0790fbdb8d9218d3288d5e83f0fb63c79be05050f786a01a918d713d059b1f818845b24c802b043f8a9befdb1e2a9ab67654b773bc862317f95d7b187b4dc22c6a142e75983e1e5863bd1b0a3cf8a25b0f3d913269ac893edfcf7f851c9e6307b391fbf91be68dd0d5eca678729e05fc7a71b1923cb2a28ceaca88b124c61b794bd2f2c4fecd61d572ddcca51125d07390116829d954d7d0504cdcc482ab38ac9db4ba8c9d11ba49d406c664856fafe941c340a0f4f348399a80cc237a1a8b2b7604dcccda309e257660dda3a128e7d9c9adbaaba33ab3a825da1f93d3e1e235a4167cf45ec0300a84941f74e1dd8edff4684d04934b0a531420114e6d785c6fa0f27290e7a40a6880ab2592546adcba94654c2fa42076ee4ee4e55d602957ddca0545f470756e873eb687f57398d37e119666791e498365900e2682401d022f9f99cc1405e978fa6e459f58ee5ef05d92660a892f39fc92dfa50810b2d43e52e7c7ae3e146f4cc1d564ccfa21362cbe4b4eafaf9bf7f87789475947d2a6355fd0435718f94289a77c9072724f6db7d44f9497b9ff8a67281a6818431dcba94dd926c7303a2919cd553d2bc91844a432b16acbd86632c4b25457e6bf1fd8389edd151087778d11ac325e8e1f86672f2298f551c8b7c30d7772427e2ea9e3fa903cb1723598d1ae669b599ebca631ecd755b1ee74e10bd332a6d4dc7344370f926198946e35d5319cec1359d0fa4672a9549ab4c0447a4884446f2c7f78a134531f9882064866adbc5f48ea87bdb87bec00fe10cf00aaae055111e68a92739e9a06066ff9d2e20d91bfb15822989e0e733cd27aef52c76c97c535f293543e0bf7ee9e41981b480d15103e28f90c169bda33381895b4b479ee4f56a1c29540c7b4f40d9b3fdaa0378313692277726d5cbba497b713af1c5a7304f7b8fdb0119a11e86e1a2fe80dd2dad52572453bc016b87b7a6930ecb367e98cc4c238578b5c57c4bd63d7bef403aaaf0ad0694d25d4b3109ea75d4a1a0a0c76bb0fb2d5a1d06af59bba5086199870553ee79f447a679ab1a4eb4b8a60a20eb3781e2167deee8a8c103e7b96ab55b7497d3961d2e4205165b24989618e0edc1da846c3fb7561f8ae21679f00d2afcee52202cda8608afe00ca343540fc0ec3867edcbe699ffe10028de27f9f30a522a97086c858115392f2530af334ed4511c1c0ffb59af50daf75bf7362935d2fed42ead8470e20f8906d3abde5c892264c0a058b892263f465ef892c991b133bb894d74c255b68bee95b6a86b9795e05c78139fb7284849cec4560abcd0d2806c8c89440974ca06f2c87f2e74959d4a0b27fed4625197a130e7029a87d9029753d5e49cef37e843997a6746cffdfb77b8ce20852a30f8275a50677a7a09fd3c1869cf92d5f108d76100f8d45a9dafd31b2e86d72056aedb840c178d51574a42df74bdf3136660c119fe547e8a4be6b6dba0f202c593a1b830d768639b116832a412aabc7cd2b1a980aedfffa1f521e5a12016340acb192f0c7bf730fcd06ff62aa2d252b72f0466743d1e102d37b62735bf785e3db0f67b3b53b86b140c8767a21351ba1e9fc1d9e624a3a8fb7dcdbd1745c6f6a50f832840828ef31064c664e8594e48d39319e500563f0583d33b9289cca7b61ee98f9f2b4efbb54599b86ffc588e95c840082f7d9beb05ffe8469cfcbfecb27a4d548a85dbac98b028156f9c0e0a8d6424bb554563698bf5d221a07c494001c543436393d9541a437a0074a8ef6147fc5105c4e2a3cbd9b56bcfa56c67e45e6dd60baaf5e7e19ad2db7bdd816d85ab2bdc581a633bb2aa9c1d8ec8dbacc0e0798b1b263e65d491fa7a8c2060cb4ef89798f0edea39c2dd383db108f90fc3a6e9d7f0b859d96a8407038fa9ebf50f9029527293db26caace8a3da8fe16123b468351ded0e364006c998ec119bcc930e7b6bf2fc91967751022ded74297d97bef9d5f6e163c93a1c9809a8caac6965f3d02b1833084d26d14720", 0x1000}}, 0x1006) r8 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r8, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r8, &(0x7f0000000600)={0x2, 0x4e23, 0x0, @dev}, 0x1c) connect$inet6(r8, &(0x7f0000000100)={0xa, 0x2008, 0x0, @remote, 0x6}, 0x1c) fstat(r2, &(0x7f0000000340)) r9 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r9, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e230e227f000001925aa80020007b00090080007f000001e809000000ff0000f03ac71002000000ffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$ETHTOOL_MSG_DEBUG_SET(r2, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000080)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0100000400000000000008000000180001801400020073797a5f74756e0000000000000000001c0002800400010014000380"], 0x48}, 0x1, 0x0, 0x0, 0x20004084}, 0x0) 2m48.681876823s ago: executing program 3 (id=723): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000080)='sys_enter\x00', r0}, 0x10) setpgid(0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), 0xffffffffffffffff) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a5000000"], &(0x7f0000000400)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000180)=@gcm_256={{0x304}, "e3da62162895237d", "5e1cdd4af3bd2b0da0c5bdb1bd658200", "a98ae4df", "cd5019dfdf2f702b"}, 0x38) sendto$inet6(r2, &(0x7f0000000480)='&', 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x2, &(0x7f0000000140)=@gcm_256={{0x304}, "480ca6eda49ed6a6", "3a2cc8b276a753b0e23e2a8436b0e1d53d11b70c57abe2e932240e766d3aebfd", "a0eb068e", "e96e232f2004a832"}, 0x38) pipe(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b7030000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0) 2m48.620907942s ago: executing program 3 (id=724): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000200)='./file2\x00', 0x204002, &(0x7f00000000c0), 0xb8, 0x57b, &(0x7f0000000e40)="$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") r0 = open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) creat(&(0x7f0000000340)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sendmsg$inet6(r1, &(0x7f0000000000)={&(0x7f0000000080)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000100)=[@rthdrdstopts={{0x18}}, @dstopts_2292={{0x10, 0x29, 0xb}}], 0x30}, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r2 = open(&(0x7f0000000500)='./bus\x00', 0x0, 0x42) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, "ef359f41a4ae6dddfbd1ce5d29c2ee5e5c9d000ff8ee09e737ff0edf110ff4eb4b78c66ee677df701905b9aafab4ffffffff00", "cba3d625780820d1cbf7db71038259ca171ce1a311ef97e4298d1e14ef01060000e9009600fdff00000000000000000000000000000000000400", "d300e6d6ae9ef30bea2a004000"}) write$P9_RREADDIR(r0, &(0x7f0000000700)={0xb, 0x29, 0x2, {0x5}}, 0xb) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x281c2, 0x0) fcntl$setlease(r3, 0x400, 0x1) fremovexattr(r3, &(0x7f0000000040)=@known='system.posix_acl_default\x00') getdents(r3, &(0x7f0000001780)=""/12, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f00850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r5, 0x6, 0x1, 0x0, &(0x7f00000001c0)) close_range(r4, 0xffffffffffffffff, 0x0) 2m48.536131362s ago: executing program 3 (id=725): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x7}, 0x120, 0x5dd8, 0x1000003, 0x0, 0x6, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x8) r1 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000180)) ioctl$KDSETMODE(r0, 0x4b45, 0x3) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_READ_FIXED={0x4, 0x4, 0x4000, @fd, 0x10, 0x20000000, 0x20004, 0x0, 0x0, {0x1}}) r4 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$SCSI_IOCTL_GET_PCI(r5, 0x5393, &(0x7f0000000000)) syz_genetlink_get_family_id$tipc2(0x0, r5) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000010000304000000000000000000007400", @ANYRES32=r9, @ANYBLOB="00000000000000001c0012800b00010062726964676500000c00028005002a"], 0x3c}}, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000000900010073797a30000000000900030073797a310000000088000000060a010400000000000000000100000008000b400000000060000480280001800e000100636f6e6e6c696d69740000001400028008000140000006e508000240000000003400018008000100636d7000280002800800024000000001140003800400010009000100efbb17b799000000080001400000000e0900010073797a30"], 0xfc}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r10 = syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x8401) r11 = fcntl$dupfd(r10, 0x0, r10) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_SUBMITURB(r11, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x0, 0xb, 0x0, 0x0, 0x7995}, 0xfcb5, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) 2m48.020886439s ago: executing program 3 (id=730): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x4, 0x62200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x6, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000002280)={&(0x7f0000001e40)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b00500000000000029"], 0x5b0}, 0x20008001) sendmsg$inet6(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="376cd986b39285495ddf4bd643ae6e1941265eda7926884d6d4cc781a3b510578cd2000000000000eaab3115dba8f520bb23254f6503ef5510e4cf21bd348a4e32b9a738009784b2b3573bdb54a73e7257b1e9c17143f91c81d0a56517f3efdb6392dc3838f26eebeea878e98ce9cc07e304d25383bdb9dd769020eec32c591ebfdccd92497456259f06173c18", 0x8d}], 0x1}, 0x0) 2m48.020742159s ago: executing program 33 (id=730): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x4, 0x62200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x6, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000002280)={&(0x7f0000001e40)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b00500000000000029"], 0x5b0}, 0x20008001) sendmsg$inet6(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="376cd986b39285495ddf4bd643ae6e1941265eda7926884d6d4cc781a3b510578cd2000000000000eaab3115dba8f520bb23254f6503ef5510e4cf21bd348a4e32b9a738009784b2b3573bdb54a73e7257b1e9c17143f91c81d0a56517f3efdb6392dc3838f26eebeea878e98ce9cc07e304d25383bdb9dd769020eec32c591ebfdccd92497456259f06173c18", 0x8d}], 0x1}, 0x0) 1.70172568s ago: executing program 6 (id=4196): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x7, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x3, 0x3, 0x3}, 0x10) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r4, 0x9) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) sendmmsg(r5, &(0x7f0000002840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20044000) bpf$PROG_LOAD(0x5, 0x0, 0x0) connect$inet(r5, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$mptcp(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000001c0)={0x28, r7, 0x9, 0x0, 0x0, {0x7}, [@MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1d}]}]}, 0x28}}, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) 1.66632403s ago: executing program 6 (id=4198): creat(&(0x7f00000000c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x16, 0x14, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000fcffffff1801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r4, 0x0, 0x8, 0x8, &(0x7f00000006c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000700)=""/8, 0x60ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) creat(&(0x7f0000000380)='./file0\x00', 0x80) 1.63614238s ago: executing program 6 (id=4200): syz_genetlink_get_family_id$fou(&(0x7f00000005c0), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) dup3(r1, r2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000400180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000140)=ANY=[@ANYRES8=r4], 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x20, &(0x7f0000000480)={&(0x7f0000000340)=""/246, 0xf6, 0x0, &(0x7f0000000440)=""/15, 0xf}}, 0x10) set_mempolicy(0x4005, &(0x7f0000000040)=0x10000000005, 0x4) r7 = memfd_create(&(0x7f00000000c0)='\xfd\x0fm3#/\x00n\xaa\xaa\xe4\x01U\x8b\xc2\f\x03\x19\x9c\x8e\xcb\x90\x00\x00\xaegQ\x0e\x94\\y\x0fU2@\'\x8a\x80\x00$\x12\xfc\xe4.)\x9b\xf2@\xf0\xe0\xdb\x1f\xe6\xb4gc\x13\xda\xf9\xcd7el\xb7\xe6\b\x00\x00\x00\x00\xef\xff\x00vob/~\xc2\x00\b\x00\x00\x00\x00\x00\x00 \xff\xf1\xdem\x9c;%\xb5\"\xe4\xf1x2\x8a\x19p\x04\\\xaa-\x93\xd1\xc4 )\xbfK\xf7E\xf3\x05\xa0\xd0\xe6%\x97\x15\xf0\xab\x86\x90k\x10\xcer\x14\xe0a\xaf\xab\xfe\xd9V\x19\xa5d\x16\x8e]:3\xff\t\xe6\xf7\xb3\xbf\xa3\b[?\xb5\x14t\xd3\x8e\xc0\xe8\xefd\x88\xddz\xa25)\x17\xef\xfb4\xff\xdb\t\x8e\xeb\x1d\\\xf9\x14\xc7\v\xa8\x89\xdb A\xbaBAj\xfe\x18\xc3-+\xd6\xb0K\xee\x1b+\xc7lA\x84\xa6\xfe\x8bU<&\x1a\xe7m\x86\xb7\xa1A\xf9\x02S;C\x99\a.$K\x833\x82\x7f\x1b\'nj\x06\b\xb7\xe8] \x87A[y\xdc\x14\f\xcet\x00\x1f\x0f\xef\xca\xcfz\x7f\an0\xebB\xb8}&\xdd\xc9\xa7\x1dp\t\x9a\xceb \x81\xaaq{H\x88\xdf\xf8\x80\\\x1c8\xfe\xc4\xe3\xb0\x90\xcb\x8b1r\x94\x9f\x00\xce\xc8\xc3\x84\xa0\xc9\b\x00\x81Ks\xba\xbbC6\xd6\x13\xb5\xe086EzD\x18\xd5\x16\x88E\xc6\xf0A9\xf1u\xb3\x85\x02\x12\\Sp\xf4\x9a\xe8\x96^\xe6\xa8K\x12\b}\xff\xcb{\xc6\xf6\xb4\x8b\xb6\xa8Y\xf2\x91\xeeR\v#\xb5)\xb0\x99\x9b-p\xe3\x17\x04\xb0\xdc\x0fk\x11\xe1\x9a\a\x16\xb7\x9b\x88\xfa\x1e`\x84$\xfc\xd7\xf5^X\xd8[}\x032\xd0\x84\xdby\x94Vp\xa5\xcd(\xab\xb6\x95sR\xab\xfc\x8c\'\x9c\x16Q\xad\xbc\xb04%\xb7\xe5\x14\xb1`\x87#X\\W`;\'_4\xc5\xc9\x921<\xd9\xad\x9f\x12@!\xfaI\x88\xab\xef\x86\xe9\a>\xdd7\xb7\x8e\x9c0-o\xc9\xec_|\x02\xc8Ru\x95\xa8#U\xd6J\x87\xf6X\xb6{\x11$\x00\xc8\x14\xcb\xd1nK\xd8\xb9\x0e\x9bA\xed\xbcs\x1fS\r\x12O\x83\x15\xcb(\xdb\xb1S\x1f%\x04\x9a\xa0l\xa3}\xe7r\x02\x00\x00\x00\x8aeh;F[\xe2\x1c\xe26 \x19k&.\x7f\x1d~\xdaI\xd4\x99\a+\xdf]\xbc\xa6\xc3\x0f\x99W\x9c-t\v\xc7J\xfd\x91\x853\xd1j;\x19W\x96V\x8az+\xf9\x82#\xfaC\xa3YN:\xe8\xda\xbc\xb2h\x8f\xe0\xc6d\x96\xccy\xb3\xc2\x98\x1c\xca\xde\"\xaeW\x89\x83\xc2sB\xe7\b\x9b9~}\xc2\xb3\x1d\xcc?\xd1\x89\xef\xca\x00\x00\x00\x00\x00\x00\x00\x00\x00J[\xc4\x04\xc1\xa6\x10\xc2\x9d\x11\t|\xc0\t\xd9(\x80\xe6s\xaa\x88\x8a\xd6\xa2\x01\x10W]Z\x8d\xf7\xd1P\xf9d\x01|\xa3\x03hSq\x95\x8f\xe1J\xd3#/fcCz\xff\x80\xe2M\xa3-r\xf6\x1a\xd74\xdc\xe1\xe4\xc3\x9dU t}\x02\x9a{C|S\xf4\x98\x05\xb9\x15}\xfa\"\xdc\xc2r\xf9\a\xadnD\xb6\x06\xd3\'\x10\x9f|\x17\xd6\x89O\f\x98@\x85\xa5m\x9d\\&\x17o\x11Z=l\xfb\x93\x8exZ', 0x6) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8010002}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r8}, 0x10) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r9}, 0x18) r10 = socket$rds(0x15, 0x5, 0x0) bind$rds(r10, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r11 = syz_io_uring_setup(0xe02, &(0x7f0000000140)={0x0, 0x7cc5, 0x400, 0x2, 0x374}, &(0x7f0000000780)=0x0, &(0x7f0000000880)=0x0) syz_io_uring_submit(r12, r13, &(0x7f0000000300)=@IORING_OP_SENDMSG={0x9, 0x59, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0, 0x20040884, 0x1}) syz_memcpy_off$IO_URING_METADATA_GENERIC(r12, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) io_uring_enter(r11, 0x47f8, 0x0, 0x0, 0x0, 0x0) 1.118271817s ago: executing program 1 (id=4216): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000398e7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x6, 0x4, &(0x7f0000002180)=ANY=[@ANYBLOB="180200000000000000000000b7050000850000001700000095"], &(0x7f0000000040)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'veth0\x00', 0x0}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) r6 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000002cc0)={r1, r3, 0x25, 0x0, @val=@tcx={@void, @value}}, 0x1c) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="180200000000000000000000000000001800000008000000000000006e14000095"], &(0x7f0000000040)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000180)={r6, r7, 0x4, r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) syz_open_dev$tty20(0xc, 0x4, 0x0) r8 = syz_open_dev$usbfs(&(0x7f0000000480), 0xc, 0x141341) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@fwd={0xe}, @volatile={0xb, 0x0, 0x0, 0x9, 0x3}, @const={0x5, 0x0, 0x0, 0xa, 0x3}, @ptr={0x8, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x4d, 0xffffffffffffffb0, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, 0x0, 0x50) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x2000, 0x0) ioctl$USBDEVFS_IOCTL(r8, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r8, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) memfd_create(&(0x7f0000000080)=',\xea\x00', 0x4) 1.043150147s ago: executing program 1 (id=4218): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000080)='./file1\x00', 0x2, &(0x7f00000000c0), 0x7, 0x4be, &(0x7f00000005c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x101) r1 = socket(0x2, 0x3, 0x100000001) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000500)={@local, @random="00e300", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, @time_exceeded={0x4, 0x1, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=0x64010102, @dev}}}}}}, 0x0) getdents64(r0, 0x0, 0x0) lseek(r0, 0x2000000003, 0x1) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000003b810100850000006d000000850000005000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000340)='kfree\x00', r2, 0x0, 0x1}, 0x18) getdents64(r0, 0x0, 0x0) 1.023008826s ago: executing program 0 (id=4219): syz_emit_ethernet(0xc6, &(0x7f00000002c0)={@broadcast, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2e}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "82d2f3", 0x90, 0x4, 0x0, @initdev={0xfe, 0x88, '\x00', 0xfd, 0x0}, @mcast2, {[@routing={0x62, 0x4, 0x2, 0x6, 0x0, [@loopback, @dev={0xfe, 0x80, '\x00', 0x11}]}, @fragment={0x2b, 0x0, 0x4, 0x0, 0x0, 0x5, 0x65}, @fragment={0x1d, 0x0, 0xee, 0x0, 0x0, 0x1b, 0x64}, @dstopts={0x3c, 0x9, '\x00', [@padn, @jumbo, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x3c}, @generic={0x81, 0x2a, "edcc7b8b1c6334c3829d10e1472ad5cfc982aa6f01878249e5b933dfa95ce8bb7d73f2f96fba39bed883"}, @hao={0xc9, 0x10, @local}]}]}}}}}, 0x0) 1.004212746s ago: executing program 1 (id=4220): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="34000000060601030000000000000000030000040900030073797a310000000005000100070000000900020073797a3000000000ca94d56a3dd699cf3d59b2162aff969e7e4ddfd8c726b153641230df7d07c8374226d7524b531367f5b298b5d0af2e6b6c"], 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='kfree\x00', r0}, 0x18) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000006c0)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x4b, 0x2}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) r2 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) write$char_usb(r2, &(0x7f0000000040)="e2", 0x12d8) 1.003748946s ago: executing program 0 (id=4221): socket$packet(0x11, 0x2, 0x300) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000004830000000000000fa40000007010000080020007500feff0000820095"], &(0x7f0000000100)='GPL\x00', 0x8, 0xfa, &(0x7f0000000580)=""/250, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) listen(r1, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000500)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010101, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) 999.060846ms ago: executing program 1 (id=4222): r0 = socket(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0xa, 0x300) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3477, 0x0, 0x0, 0x0, 0x8}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7535}}]}, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newqdisc={0x24, 0x24, 0x3fe3aa0262d8c583, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 932.391206ms ago: executing program 4 (id=4223): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r0}, 0x18) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000400)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0xf20e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x63db, 0x6, 0x0, 0x0, 0x0, 0x0, 0x80}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 932.142556ms ago: executing program 0 (id=4224): r0 = mq_open(&(0x7f0000000080)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x40, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="b4000000000000007910480000000000a600ffff800000f195007400000000008b26680991cf7be46e92ba4de27a4391c3b6f3fc34b23fb6589be2ac17c158b20730d0e4a5e2", @ANYRES16=r2, @ANYBLOB="786f69e2c773b0f254137e4c8a5feebaf96cd2e439f9d178508034b81a7e2723d7b1a5ddba929211c92e8d945301c1f1b897431853c1ffcf0b553a2fb1923155ff93aefdf2541cd83ee8a334b55a69294ecc2e5c475c8d2150c4eeee27475181f203cb5907ff2ed68984248d67ee5a7c8fb9207c15962f3b3dfe51513a7dd7bc1090e51f29819172321b687f17ed5dfe55897cf83e546c09c4d0b16b302ba4ffcdd589a8f030b5edd80590f979dc56a806294cdb566910a49fd4c203f0ca3eb032fd0563d8fde2a725dbf4634d6ec8021c3be53e66443e3939a9cc826d07b76fadb08c34108b90a3aefd5afd1c34d125604cff2687b7705d"], &(0x7f0000003ff6)='GPL\x00', 0x8, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000d40)=@newqdisc={0x88, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x2, [0x0, 0x2], 0x0, [0x4, 0x2], [0x0, 0x4]}}}}]}, 0x88}}, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x6, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000640)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000080)=[{0x28}, {0x80000006, 0x0, 0x19, 0x2}]}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='leases_conflict\x00', r5}, 0x10) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000040), 0x0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x74, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x18, 0xd, &(0x7f00000011c0)=ANY=[], &(0x7f0000000440)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41000, 0x1, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x4, 0x6, 0xffffffff, 0x6e7}, 0x10, 0x0, 0x0, 0x7, &(0x7f00000008c0)=[0xffffffffffffffff], &(0x7f0000000900)=[{0x1, 0x1, 0x10, 0x7}, {0x2, 0x1, 0x9, 0xc}, {0x0, 0x4, 0xd, 0xd}, {0x3, 0x1, 0x4, 0x2}, {0x4, 0x4, 0x10, 0xa}, {0x5, 0x3, 0xe, 0xc}, {0x2, 0x5, 0x7, 0x5}], 0x10, 0x6, @void, @value}, 0x94) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001400) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000003c0)='./file0\x00', 0x808d, &(0x7f00000000c0), 0xfe, 0x50d, &(0x7f00000012c0)="$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") mount(0x0, 0x0, &(0x7f0000002000)='devtmpfs\x00', 0x0, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x10rust\xe3c*sgrVdn:Dd', 0x0) mq_timedreceive(r0, &(0x7f0000004600)=""/102381, 0xfffffceb, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) 908.092686ms ago: executing program 0 (id=4225): setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0xfff0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000100)=0x1, 0x4) connect$inet(0xffffffffffffffff, &(0x7f00000006c0)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000140)=0x1, 0x4) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000700)="a8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000480)="ec", 0x1}], 0x1}}], 0x2, 0x4004441) 896.056966ms ago: executing program 1 (id=4226): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000040)={@val, @void, @eth={@broadcast, @dev, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2f, 0x0, @private=0x1fe1, @multicast1}, {0xa000, 0x6558, 0xc, 0x0, @gue={{0x1, 0x0, 0x1, 0x9, 0x0, @void}}}}}}}}, 0x32) 866.524175ms ago: executing program 0 (id=4227): socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ftruncate(0xffffffffffffffff, 0xc17a) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "87ee8af188c9864f", "2607080d7f4fcf00fd4ef2dece6c7c58", "545324f1"}, 0x28) sendto$inet6(r0, &(0x7f0000000700)="bb", 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000680)=@gcm_128={{0x303}, "000037d7009400", "c0b6c5b29ca2b838d41ac2fc7ddf972d", "e9be1eae", "0daf7461cfccf6ce"}, 0x28) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0), 0x13}, 0x0) 866.268915ms ago: executing program 4 (id=4228): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100)=0x1, 0x4) connect$inet(r0, &(0x7f00000006c0)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x1, 0x4) sendmmsg$inet(r0, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000700)="a8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000480)="ec", 0x1}], 0x1}}], 0x2, 0x4004441) 848.246155ms ago: executing program 4 (id=4229): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000398e7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x6, 0x4, &(0x7f0000002180)=ANY=[@ANYBLOB="180200000000000000000000b7050000850000001700000095"], &(0x7f0000000040)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'veth0\x00', 0x0}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) r6 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000002cc0)={r1, r3, 0x25, 0x0, @val=@tcx={@void, @value}}, 0x1c) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x5, &(0x7f00000001c0)=ANY=[@ANYBLOB="180200000000000000000000000000001800000008000000000000006e14000095"], &(0x7f0000000040)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000180)={r6, r7, 0x4, r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) syz_open_dev$tty20(0xc, 0x4, 0x0) r8 = syz_open_dev$usbfs(&(0x7f0000000480), 0xc, 0x141341) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@fwd={0xe}, @volatile={0xb, 0x0, 0x0, 0x9, 0x3}, @const={0x5, 0x0, 0x0, 0xa, 0x3}, @ptr={0x8, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x4d, 0xffffffffffffffb0, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, 0x0, 0x50) ioctl$USBDEVFS_IOCTL(r8, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r8, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) memfd_create(&(0x7f0000000080)=',\xea\x00', 0x4) 771.621835ms ago: executing program 4 (id=4230): r0 = socket(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0xa, 0x300) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000077340000000000000800000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000ff030000357500007b8af8ff00000000bfa200000000000007020000f8ffff27b703000008000000b704000000000000850000008200"/72], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$NFT_BATCH(r5, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x84, 0x80, 0x0, 0x0) dup3(r3, r4, 0x80000) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) unshare(0x8000000) setns(0xffffffffffffffff, 0x80) semtimedop(0xffffffffffffffff, &(0x7f0000000140)=[{0x3, 0xffff, 0x1800}], 0x1, 0x0) unshare(0x2c040000) prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffc000/0x4000)=nil) brk(0x20001000) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000700)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095c60613853072aa5ce5567d3ac21c07e9780f0174a499a95271891262c6fcff1c969f117acc997fd721528cd470c343bc5358eca2bd3cad90c04ef64c27448f021c49259512e08c5f599a16957da39a25204e89babc80200a14056916ad755e47db7ba8b070667d38f6763c4793bff79adaf41879e7aa085dc130be16db80d531db033c33a8a3af6b81ea75da1a1a889c7e52152fe523ecd096810278e1cdc44fdf07c65790e0b46024"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newqdisc={0x24, 0x24, 0x3fe3aa0262d8c583, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 764.306135ms ago: executing program 1 (id=4231): perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x4, 0x1, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0xf0, 0x0, &(0x7f00000004c0)="b9180bb76003070c009e40f086dd1fff310000003c0020010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7472ce0ab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f08450", 0x0, 0x31, 0x6000000000000000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000de0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) rt_sigprocmask(0x0, &(0x7f000078b000)={[0xffffffffeffffffd]}, 0x0, 0x8) gettid() getpid() r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8)={[0xfffffffffffffffc]}, 0x8) read(r0, &(0x7f0000000740)=""/384, 0x200008c0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0xfffffffd}}, 0x10) r3 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000100)={0x42}, 0x10) sendmsg$tipc(r3, &(0x7f00000002c0)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x0, {{0x0, 0x4}}}, 0x10, 0x0}, 0x0) (fail_nth: 1) close_range(r1, 0xffffffffffffffff, 0x0) 708.101255ms ago: executing program 6 (id=4232): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="34000000060601030000000000000000030000040900030073797a310000000005000100070000000900020073797a3000000000ca94d56a3dd699cf3d59b2162aff969e7e4ddfd8c726b153641230df7d07c8374226d7524b531367f5b298b5d0af2e6b6c"], 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x800) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000006c0)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x4b, 0x2}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) r1 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) write$char_usb(r1, &(0x7f0000000040)="e2", 0x12d8) 599.861644ms ago: executing program 5 (id=4233): syz_emit_ethernet(0x36, &(0x7f00000002c0)={@broadcast, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2e}, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "82d2f3", 0x0, 0x4, 0x0, @initdev={0xfe, 0x88, '\x00', 0xfd, 0x0}, @mcast2}}}}, 0x0) 588.998453ms ago: executing program 5 (id=4234): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000040000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_NAME(0xf, &(0x7f0000000a40)='GPL\x00') getpgid(0xffffffffffffffff) mlockall(0x3) 483.924793ms ago: executing program 4 (id=4235): r0 = socket(0x11, 0x800000003, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2, {0x2}}, './file0\x00'}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x16, 0x0, 0x4, 0xff, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x3, 0xc, &(0x7f0000000080)=ANY=[@ANYRESOCT=r2, @ANYRES32=r4, @ANYRES8, @ANYBLOB="4001d544354ea51235ff21fff4327bf1b9b434b9d108c8eb98ccb7913965670a7b06979f99448c837c5cd5a3a61f2f061bb131ae00d23ee9735bd1496291a6ed2fcc0a50f1757d7842e1d29aead515c699c519535d9a", @ANYRES32=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, 0x0, &(0x7f0000000040)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) r6 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0xd26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1, 0x9}, 0x140a0, 0x86, 0xffff, 0x0, 0x0, 0xfffffffa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x64, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = getpgid(0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r7, 0x0, 0x30, 0xe1515f8735398fb, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[0x45c], 0x0, 0x0, 0x1, 0x1, r8}}, 0x40) r9 = socket$key(0xf, 0x3, 0x2) r10 = dup3(r9, r6, 0x0) sendmsg$key(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="0213000005000000000000000000000003"], 0x28}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=@newqdisc={0x48, 0x24, 0xf0b, 0x3, 0xfffffffc, {0x0, 0x0, 0x12, r1, {}, {0xffff, 0xffff}, {0x1, 0x8}}, [@qdisc_kind_options=@q_prio={{0x9}, {0x44, 0x2, {0x38aef5e9, "d69c7e9d5f0b27c49cf5926b867402db"}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) 481.729993ms ago: executing program 6 (id=4236): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x7, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x3, 0x3, 0x3}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(0xffffffffffffffff, 0x9) r3 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f00000002c0), 0xffffffffffffffff) 451.888513ms ago: executing program 6 (id=4237): perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x4, 0x1, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0xf0, 0x0, &(0x7f00000004c0)="b9180bb76003070c009e40f086dd1fff310000003c0020010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7472ce0ab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f08450", 0x0, 0x31, 0x6000000000000000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000de0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) rt_sigprocmask(0x0, &(0x7f000078b000)={[0xffffffffeffffffd]}, 0x0, 0x8) gettid() getpid() r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8)={[0xfffffffffffffffc]}, 0x8) read(r0, &(0x7f0000000740)=""/384, 0x200008c0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0xfffffffd}}, 0x10) r3 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000100)={0x42}, 0x10) sendmsg$tipc(r3, &(0x7f00000002c0)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x0, {{0x0, 0x4}}}, 0x10, 0x0}, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 392.799213ms ago: executing program 4 (id=4238): perf_event_open(&(0x7f0000000ac0)={0x0, 0x80, 0x4, 0x1, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0xf0, 0x0, &(0x7f00000004c0)="b9180bb76003070c009e40f086dd1fff310000003c0020010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7472ce0ab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f08450", 0x0, 0x31, 0x6000000000000000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000de0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) rt_sigprocmask(0x0, &(0x7f000078b000)={[0xffffffffeffffffd]}, 0x0, 0x8) gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f00000000c0), 0x1000013b}, 0x3) getpid() r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000600)='./file2\x00', 0x404, &(0x7f0000000240), 0x3, 0x42f, &(0x7f0000000940)="$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") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r2, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1200, 0x0, 0x3) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r3}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'ip6gretap0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="400000001000cff5000000000000000200000700", @ANYRES32=0x0, @ANYBLOB="00040400000000002000128008000100687372001400028008000200", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="2abcffd4f6cc0c140303c170346c9d3b8b64dcf0aa2b325cb7bc02e947524b31d5a066122982525c00de6c0ee1afc54d1a9c7a752704492813177338998aa53149f004aecaf9a13bc1b8e263f0d46ba27d988de20d8ec0ad3ed10bfdb46aec49413984e3f1704be95f1c90efd4e5afba"], 0x40}, 0x1, 0x0, 0x0, 0x40044}, 0x0) r7 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8)={[0xfffffffffffffffc]}, 0x8) read(r7, &(0x7f0000000740)=""/384, 0x200008c0) socket$inet_tcp(0x2, 0x1, 0x0) r8 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r8, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0xfffffffd}}, 0x10) r9 = socket$tipc(0x1e, 0x2, 0x0) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r7) sendmsg$NL80211_CMD_JOIN_MESH(r10, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x5c, r11, 0x10, 0x70bd27, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_HANDLE_DFS={0x4}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_BEACON_INTERVAL={0x8}, @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x4}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x80000001}], @NL80211_ATTR_CONTROL_PORT_OVER_NL80211={0x4}, @NL80211_ATTR_BSS_BASIC_RATES={0x10, 0x24, [{0x2, 0x1}, {0x12}, {0x30, 0x1}, {0x4}, {0x4, 0x1}, {0x16}, {0x11}, {0x48}, {0x18}, {0xc, 0x1}, {0xc}, {0x6, 0x1}]}, @NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x7}]}, 0x5c}, 0x1, 0x0, 0x0, 0x50}, 0x48800) setsockopt$TIPC_GROUP_JOIN(r9, 0x10f, 0x87, &(0x7f0000000100)={0x42}, 0x10) 268.053672ms ago: executing program 5 (id=4239): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) prctl$PR_SET_NAME(0xf, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000400)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0xf20e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x63db, 0x6, 0x0, 0x0, 0x0, 0x0, 0x80}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 167.698852ms ago: executing program 5 (id=4240): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'tunl0\x00', &(0x7f0000000280)={'gre0\x00', 0x0, 0x20, 0x8000, 0x2, 0x2, {{0x8, 0x4, 0x2, 0x1d, 0x20, 0x66, 0x0, 0x9, 0x0, 0x0, @remote, @private=0xa010100, {[@timestamp_prespec={0x44, 0xc, 0x74, 0x3, 0x0, [{@multicast1, 0x101}]}]}}}}}) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd0, 0xd0, 0x3, [@enum64={0xd, 0x4, 0x0, 0x13, 0x1, 0x7396bb8f80a1ad0c, [{0x6, 0x9, 0x1}, {0x8, 0x2, 0x33}, {0x1, 0x8, 0x80000000}, {0x10, 0x2, 0x7}]}, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{0x3, 0x3}, {}, {0x2}, {0x5, 0x3}, {0x3, 0x1}, {0x3, 0x1}, {0x4, 0x1}, {0x8, 0x3}]}, @func={0x3, 0x0, 0x0, 0xc, 0x3}, @struct={0x10, 0x4, 0x0, 0x4, 0x1, 0x5732, [{0xa, 0x1, 0x2}, {0xb, 0x2, 0x2}, {0x7, 0x4, 0x4}, {0x4, 0x4, 0xbe11}]}]}, {0x0, [0x61]}}, &(0x7f0000000400)=""/250, 0xeb, 0xfa, 0x0, 0x7, 0x0, @void, @value}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000580)={0x8, 0x0}, 0x8) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000005c0), 0x189200, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0x1, 0x8}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000640), &(0x7f0000000680)}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000780)={{0x1, 0xffffffffffffffff}, &(0x7f0000000700), &(0x7f0000000740)='%pi6 \x00'}, 0x20) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0x0, @void, @value, @void, @value}, 0x50) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000840)={0x0, 0xfec, 0x8}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000880), &(0x7f00000008c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x12, 0x1b, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x200}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xb}, @ldst={0x1, 0x1, 0x7cc267b1378d4015, 0x1, 0xa, 0x20, 0x8}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x61}, @jmp={0x5, 0x1, 0x8, 0x0, 0x1, 0x1, 0x10}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000000200)='syzkaller\x00', 0x1, 0x2c, &(0x7f0000000240)=""/44, 0x0, 0x2, '\x00', r2, @fallback=0x2, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000540)={0x2, 0xf, 0x1, 0x8}, 0x10, r4, r5, 0x5, &(0x7f0000000940)=[r6, r7, r8, r9, r10, r11], &(0x7f0000000980)=[{0x0, 0x1, 0xa, 0x5}, {0x4, 0x3, 0x5, 0x3}, {0x1, 0x1, 0x6, 0x1}, {0x2, 0x2, 0xd, 0x3}, {0x4, 0x5, 0x6, 0x4}], 0x10, 0x1, @void, @value}, 0x94) r12 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2) ioctl$SNDRV_TIMER_IOCTL_SELECT(r12, 0x40345410, &(0x7f0000000b00)={{0x3, 0x0, 0x57, 0x3, 0xb}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) timer_create(0x7, &(0x7f0000000c80)={0x0, 0x27, 0x1, @thr={&(0x7f0000000b40)="4261fcc0f0725c253f1bf2dff1ff7dc10b7ff775cab1d30902f67cf46b15feb16bdd2e61982ef8166aa3f8627f7a7b4151259974b81eb677b1505274c84651b15774b6e52e2c826aea", &(0x7f0000000bc0)="dddf70c43df1dc4f8f0ec45ba45305a84acac1b527e77fb2831bd185e5d87eac9ead32bbdb4b48c72b13bc9f29232cd0750bfcc3508965c649201bca17cbb3daaf49b7a582f083bbaaea07be419e1a16f5b4d74990e1e162c8d7871ddcfb8d2e8dc1276aee891b7f3c568853aed316503dd7f54c6cfc53344db79fec45aa2dc7c76695dc0bb0aea28975a4f2a4ab33ddc209adbc1395f18da0f026f571c8770eb3c32295"}}, &(0x7f0000000cc0)) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000d00), 0x20001) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r12, 0x40505412, &(0x7f0000000d40)={0x2, 0x7, 0x0, 0x0, 0xd}) setsockopt$packet_int(r5, 0x107, 0xc, &(0x7f0000000dc0)=0xf6f5, 0x4) sendmsg$nl_route_sched(r5, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)=@delchain={0x34, 0x65, 0x200, 0x70bd26, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0xffff, 0xa}, {0xa, 0x2}, {0x3, 0xcf45a591d5aa4821}}, [@TCA_CHAIN={0x8, 0xb, 0xff}, @TCA_RATE={0x6, 0x5, {0x98, 0x1}}]}, 0x34}, 0x1, 0x0, 0x0, 0x7ef98c4761a1b48b}, 0x4004000) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r9, 0xf50f, 0x0) socket(0x6, 0x4, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000f00), &(0x7f0000000f40)=0x4) r13 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r5, 0xa, 0x0, r13) syz_io_uring_setup(0x7c72, &(0x7f0000000f80)={0x0, 0x20ed, 0x10, 0x1, 0x1c4}, &(0x7f0000001000)=0x0, &(0x7f0000001040)) r15 = mmap$IORING_OFF_SQES(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4, 0x10010, r5, 0x10000000) syz_io_uring_submit(r14, r15, &(0x7f00000010c0)=@IORING_OP_UNLINKAT={0x24, 0x42, 0x0, r5, 0x0, &(0x7f0000001080)='./file0\x00', 0x0, 0x0, 0x1, {0x0, r13}}) socket$qrtr(0x2a, 0x2, 0x0) 112.798601ms ago: executing program 5 (id=4241): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="34000000060601030000000000000000030000040900030073797a310000000005000100070000000900020073797a3000000000ca94d56a3dd699cf3d59b2162aff969e7e4ddfd8c726b153641230df7d07c8374226d7524b531367f5b298b5d0af2e6b6c"], 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='kfree\x00', r0}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x18}}], 0x1, 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="17000000", @ANYRES16=r4, @ANYBLOB="8b33000000000000000005"], 0x20}, 0x1, 0x0, 0x0, 0x3390c6ec282c7b79}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000001c0)={[{@usrquota}, {@grpjquota}, {@nodelalloc}]}, 0x1, 0x4bc, &(0x7f0000000a40)="$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") r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5dd7316e2fde1a8d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000006c0)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x4b, 0x2}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x822b01) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r7, &(0x7f00000002c0)=ANY=[@ANYRES8=r7], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r7, 0x0) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r8, 0x541c, &(0x7f0000000000)) 96.534381ms ago: executing program 5 (id=4242): syz_genetlink_get_family_id$fou(&(0x7f00000005c0), 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) dup3(r1, r2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000400180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000140)=ANY=[@ANYRES8=r4], 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x20, &(0x7f0000000480)={&(0x7f0000000340)=""/246, 0xf6, 0x0, &(0x7f0000000440)=""/15, 0xf}}, 0x10) set_mempolicy(0x4005, &(0x7f0000000040)=0x10000000005, 0x4) r7 = memfd_create(&(0x7f00000000c0)='\xfd\x0fm3#/\x00n\xaa\xaa\xe4\x01U\x8b\xc2\f\x03\x19\x9c\x8e\xcb\x90\x00\x00\xaegQ\x0e\x94\\y\x0fU2@\'\x8a\x80\x00$\x12\xfc\xe4.)\x9b\xf2@\xf0\xe0\xdb\x1f\xe6\xb4gc\x13\xda\xf9\xcd7el\xb7\xe6\b\x00\x00\x00\x00\xef\xff\x00vob/~\xc2\x00\b\x00\x00\x00\x00\x00\x00 \xff\xf1\xdem\x9c;%\xb5\"\xe4\xf1x2\x8a\x19p\x04\\\xaa-\x93\xd1\xc4 )\xbfK\xf7E\xf3\x05\xa0\xd0\xe6%\x97\x15\xf0\xab\x86\x90k\x10\xcer\x14\xe0a\xaf\xab\xfe\xd9V\x19\xa5d\x16\x8e]:3\xff\t\xe6\xf7\xb3\xbf\xa3\b[?\xb5\x14t\xd3\x8e\xc0\xe8\xefd\x88\xddz\xa25)\x17\xef\xfb4\xff\xdb\t\x8e\xeb\x1d\\\xf9\x14\xc7\v\xa8\x89\xdb A\xbaBAj\xfe\x18\xc3-+\xd6\xb0K\xee\x1b+\xc7lA\x84\xa6\xfe\x8bU<&\x1a\xe7m\x86\xb7\xa1A\xf9\x02S;C\x99\a.$K\x833\x82\x7f\x1b\'nj\x06\b\xb7\xe8] \x87A[y\xdc\x14\f\xcet\x00\x1f\x0f\xef\xca\xcfz\x7f\an0\xebB\xb8}&\xdd\xc9\xa7\x1dp\t\x9a\xceb \x81\xaaq{H\x88\xdf\xf8\x80\\\x1c8\xfe\xc4\xe3\xb0\x90\xcb\x8b1r\x94\x9f\x00\xce\xc8\xc3\x84\xa0\xc9\b\x00\x81Ks\xba\xbbC6\xd6\x13\xb5\xe086EzD\x18\xd5\x16\x88E\xc6\xf0A9\xf1u\xb3\x85\x02\x12\\Sp\xf4\x9a\xe8\x96^\xe6\xa8K\x12\b}\xff\xcb{\xc6\xf6\xb4\x8b\xb6\xa8Y\xf2\x91\xeeR\v#\xb5)\xb0\x99\x9b-p\xe3\x17\x04\xb0\xdc\x0fk\x11\xe1\x9a\a\x16\xb7\x9b\x88\xfa\x1e`\x84$\xfc\xd7\xf5^X\xd8[}\x032\xd0\x84\xdby\x94Vp\xa5\xcd(\xab\xb6\x95sR\xab\xfc\x8c\'\x9c\x16Q\xad\xbc\xb04%\xb7\xe5\x14\xb1`\x87#X\\W`;\'_4\xc5\xc9\x921<\xd9\xad\x9f\x12@!\xfaI\x88\xab\xef\x86\xe9\a>\xdd7\xb7\x8e\x9c0-o\xc9\xec_|\x02\xc8Ru\x95\xa8#U\xd6J\x87\xf6X\xb6{\x11$\x00\xc8\x14\xcb\xd1nK\xd8\xb9\x0e\x9bA\xed\xbcs\x1fS\r\x12O\x83\x15\xcb(\xdb\xb1S\x1f%\x04\x9a\xa0l\xa3}\xe7r\x02\x00\x00\x00\x8aeh;F[\xe2\x1c\xe26 \x19k&.\x7f\x1d~\xdaI\xd4\x99\a+\xdf]\xbc\xa6\xc3\x0f\x99W\x9c-t\v\xc7J\xfd\x91\x853\xd1j;\x19W\x96V\x8az+\xf9\x82#\xfaC\xa3YN:\xe8\xda\xbc\xb2h\x8f\xe0\xc6d\x96\xccy\xb3\xc2\x98\x1c\xca\xde\"\xaeW\x89\x83\xc2sB\xe7\b\x9b9~}\xc2\xb3\x1d\xcc?\xd1\x89\xef\xca\x00\x00\x00\x00\x00\x00\x00\x00\x00J[\xc4\x04\xc1\xa6\x10\xc2\x9d\x11\t|\xc0\t\xd9(\x80\xe6s\xaa\x88\x8a\xd6\xa2\x01\x10W]Z\x8d\xf7\xd1P\xf9d\x01|\xa3\x03hSq\x95\x8f\xe1J\xd3#/fcCz\xff\x80\xe2M\xa3-r\xf6\x1a\xd74\xdc\xe1\xe4\xc3\x9dU t}\x02\x9a{C|S\xf4\x98\x05\xb9\x15}\xfa\"\xdc\xc2r\xf9\a\xadnD\xb6\x06\xd3\'\x10\x9f|\x17\xd6\x89O\f\x98@\x85\xa5m\x9d\\&\x17o\x11Z=l\xfb\x93\x8exZ', 0x6) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x8010002}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r8}, 0x10) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r9}, 0x18) r10 = socket$rds(0x15, 0x5, 0x0) bind$rds(r10, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r11 = syz_io_uring_setup(0xe02, &(0x7f0000000140)={0x0, 0x7cc5, 0x400, 0x2, 0x374}, &(0x7f0000000780)=0x0, &(0x7f0000000880)=0x0) syz_io_uring_submit(r12, r13, &(0x7f0000000300)=@IORING_OP_SENDMSG={0x9, 0x59, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0, 0x20040884, 0x1}) syz_memcpy_off$IO_URING_METADATA_GENERIC(r12, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) io_uring_enter(r11, 0x47f8, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 0 (id=4243): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x37, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0xa0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) unshare(0x2040400) r2 = fsopen(&(0x7f0000000040)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) unshare(0x2000400) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000009f910000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$packet(0x11, 0x2, 0x300) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f0000003000)=@abs={0x1}, 0x6e) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYRESDEC=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) sendmsg$nl_route_sched(r6, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f0000000680)=@newtaction={0x180, 0x30, 0x216822a75a8bdd29, 0xffe4, 0x0, {}, [{0x16c, 0x1, [@m_connmark={0x50, 0x2, 0x0, 0x0, {{0xd}, {0x20, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x3, 0xd, 0x5, 0x0, 0x3}, 0x8}}]}, {0x4}, {0xc}, {0xc}}}, @m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0xd4, 0x3, 0x0, 0x0, {{0x9}, {0x58, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0x0, 0x3, {0x2, 0xea3, 0x7}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x1d28}}, @TCA_GACT_PARMS={0x18, 0x2, {0xb66, 0xb3, 0x10000000, 0x34e, 0xffff}}, @TCA_GACT_PARMS={0x18, 0x2, {0x7ff, 0xd8, 0x0, 0x9, 0x100000e0}}]}, {0x52, 0x6, "a06b1d1931f3579c6d7c5159238a286074602c3726c701f3c0d5382de62a6e8c4fb714fcd674c66cd306a4f78d3d05530609c9b04b7483bd084d70df8e77e6fbd503917aa0a6c737cef0ed021b60"}, {0xc}, {0x1, 0x8, {0x2, 0x2}}}}]}]}, 0x180}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) r9 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r10 = ioctl$LOOP_CTL_GET_FREE(r9, 0x4c82) ioctl$LOOP_CTL_REMOVE(r9, 0x4c81, r10) fsmount(r2, 0x0, 0x0) kernel console output (not intermixed with test programs): 1 a8 ff ff ff f7 d8 64 89 01 48 [ 197.583888][T12777] RSP: 002b:00007fb9283a1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 197.592407][T12777] RAX: ffffffffffffffda RBX: 00007fb929f25fa0 RCX: 00007fb929d35d29 [ 197.600401][T12777] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 000000000000000a [ 197.608390][T12777] RBP: 00007fb9283a1090 R08: 0000000000000000 R09: 0000000000000000 [ 197.616401][T12777] R10: 0000000100000002 R11: 0000000000000246 R12: 0000000000000001 [ 197.624456][T12777] R13: 0000000000000000 R14: 00007fb929f25fa0 R15: 00007fff9385cd78 [ 197.632480][T12777] [ 197.677685][ T9622] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 197.691769][ T9622] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on syz0 [ 197.878659][ T29] kauditd_printk_skb: 670 callbacks suppressed [ 197.878740][ T29] audit: type=1326 audit(1737513175.930:15784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12800 comm="syz.1.3463" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe202b25d29 code=0x7ffc0000 [ 197.950490][ T29] audit: type=1326 audit(1737513175.930:15785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12800 comm="syz.1.3463" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe202b25d29 code=0x7ffc0000 [ 197.954667][T12806] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 197.974268][ T29] audit: type=1326 audit(1737513175.940:15786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12800 comm="syz.1.3463" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe202b25d29 code=0x7ffc0000 [ 198.006296][ T29] audit: type=1326 audit(1737513175.940:15787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12800 comm="syz.1.3463" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe202b25d29 code=0x7ffc0000 [ 198.030052][ T29] audit: type=1326 audit(1737513175.940:15788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12800 comm="syz.1.3463" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe202b25d29 code=0x7ffc0000 [ 198.033084][T12806] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 198.053674][ T29] audit: type=1326 audit(1737513175.940:15789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12800 comm="syz.1.3463" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe202b25d29 code=0x7ffc0000 [ 198.085101][ T29] audit: type=1326 audit(1737513175.940:15790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12800 comm="syz.1.3463" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe202b25d29 code=0x7ffc0000 [ 198.109356][ T29] audit: type=1326 audit(1737513175.940:15791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12800 comm="syz.1.3463" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe202b25d29 code=0x7ffc0000 [ 198.133201][ T29] audit: type=1326 audit(1737513175.950:15792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12800 comm="syz.1.3463" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe202b25d29 code=0x7ffc0000 [ 198.156794][ T29] audit: type=1326 audit(1737513175.950:15793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12800 comm="syz.1.3463" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe202b25d29 code=0x7ffc0000 [ 198.559401][T12791] chnl_net:caif_netlink_parms(): no params data found [ 198.565908][T12826] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3468'. [ 198.616809][T12791] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.624038][T12791] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.632988][T12791] bridge_slave_0: entered allmulticast mode [ 198.642432][T12791] bridge_slave_0: entered promiscuous mode [ 198.650949][T12791] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.658108][T12791] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.668696][T12791] bridge_slave_1: entered allmulticast mode [ 198.675303][T12791] bridge_slave_1: entered promiscuous mode [ 198.705311][T12791] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 198.716673][T12791] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 198.745195][T12791] team0: Port device team_slave_0 added [ 198.759170][T12791] team0: Port device team_slave_1 added [ 198.787233][T12791] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 198.794235][T12791] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 198.820257][T12791] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 198.837931][T12791] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 198.845048][T12791] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 198.871098][T12791] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 198.950039][T12791] hsr_slave_0: entered promiscuous mode [ 198.962460][T12791] hsr_slave_1: entered promiscuous mode [ 198.970298][T12791] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 198.979581][T12791] Cannot create hsr debugfs directory [ 199.565291][T12886] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3492'. [ 199.658547][T12791] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 199.700484][T12791] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 199.721314][T12791] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 199.733827][T12791] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 199.787551][T12791] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.802931][T12791] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.813418][ T1736] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.820571][ T1736] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.833729][ T1736] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.840856][ T1736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.842841][T12908] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3503'. [ 199.879102][T12910] program syz.4.3504 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 199.915792][T12914] serio: Serial port ptm0 [ 199.948158][T12791] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 200.109139][T12791] veth0_vlan: entered promiscuous mode [ 200.124344][T12791] veth1_vlan: entered promiscuous mode [ 200.144170][T12791] veth0_macvtap: entered promiscuous mode [ 200.156048][T12791] veth1_macvtap: entered promiscuous mode [ 200.173611][T12791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 200.184159][T12791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.194065][T12791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 200.204594][T12791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.214482][T12791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 200.224991][T12791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.234823][T12791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 200.245312][T12791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.269285][T12791] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 200.287492][T12791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 200.298097][T12791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.307978][T12791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 200.318466][T12791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.328323][T12791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 200.338815][T12791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.348706][T12791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 200.359254][T12791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.467555][T12948] netlink: 12 bytes leftover after parsing attributes in process `syz.0.3513'. [ 200.499351][T12791] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 200.512903][T12791] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 200.521855][T12791] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 200.530646][T12791] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 200.539448][T12791] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 200.554971][T12950] veth0_virt_wifi: entered promiscuous mode [ 200.561526][T12950] veth1_macvtap: entered promiscuous mode [ 200.662923][T12968] serio: Serial port ptm1 [ 200.745853][T12977] serio: Serial port ptm1 [ 200.760471][T12980] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 200.765443][T12973] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3523'. [ 200.772543][T12980] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 200.942651][T12993] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 200.981280][T12993] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 201.254074][T13003] program syz.0.3533 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 201.353764][T13006] serio: Serial port ptm0 [ 201.431583][ T9628] kernel write not supported for file /257/projid_map (pid: 9628 comm: kworker/1:11) [ 201.444582][T13011] program syz.6.3536 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 201.481400][T13011] program syz.6.3536 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 201.561945][T13016] netlink: 4 bytes leftover after parsing attributes in process `syz.6.3537'. [ 201.570849][T13016] bridge_slave_1: left allmulticast mode [ 201.576534][T13016] bridge_slave_1: left promiscuous mode [ 201.582652][T13016] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.589983][T13018] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3539'. [ 201.604672][T13016] bridge_slave_0: left allmulticast mode [ 201.610517][T13016] bridge_slave_0: left promiscuous mode [ 201.616222][T13016] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.664517][T13022] serio: Serial port ptm0 [ 201.951387][T13038] program syz.4.3547 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 202.029251][T13047] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 202.175520][T13047] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 202.274783][T13047] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 202.385777][T13047] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 202.428875][T13047] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 202.443516][T13047] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 202.462950][T13047] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 202.486999][T13047] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 202.633433][T13050] chnl_net:caif_netlink_parms(): no params data found [ 202.764986][T13050] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.772312][T13050] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.814059][T13050] bridge_slave_0: entered allmulticast mode [ 202.823022][T13050] bridge_slave_0: entered promiscuous mode [ 202.830418][T13050] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.837595][T13050] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.845118][T13050] bridge_slave_1: entered allmulticast mode [ 202.851636][T13050] bridge_slave_1: entered promiscuous mode [ 202.877202][T13050] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 202.888212][T13050] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 202.917940][T13050] team0: Port device team_slave_0 added [ 202.925058][T13050] team0: Port device team_slave_1 added [ 202.940268][ T29] kauditd_printk_skb: 979 callbacks suppressed [ 202.940284][ T29] audit: type=1326 audit(1737513180.989:16773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13083 comm="syz.4.3561" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 202.984871][ T29] audit: type=1326 audit(1737513181.019:16774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13083 comm="syz.4.3561" exe="/root/syz-executor" sig=0 arch=c000003e syscall=334 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 202.988231][T13050] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 203.008763][ T29] audit: type=1326 audit(1737513181.019:16775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13083 comm="syz.4.3561" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 203.015716][T13050] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 203.015752][T13050] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 203.039304][ T29] audit: type=1326 audit(1737513181.019:16776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13083 comm="syz.4.3561" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 203.039338][ T29] audit: type=1326 audit(1737513181.019:16777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13083 comm="syz.4.3561" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 203.076256][T13050] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 203.099538][ T29] audit: type=1326 audit(1737513181.019:16778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13083 comm="syz.4.3561" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 203.099587][ T29] audit: type=1326 audit(1737513181.019:16779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13083 comm="syz.4.3561" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 203.123226][T13050] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 203.130163][ T29] audit: type=1326 audit(1737513181.019:16780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13083 comm="syz.4.3561" exe="/root/syz-executor" sig=0 arch=c000003e syscall=161 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 203.153733][T13050] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 203.237915][ T29] audit: type=1326 audit(1737513181.029:16781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13083 comm="syz.4.3561" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 203.261585][ T29] audit: type=1326 audit(1737513181.029:16782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13083 comm="syz.4.3561" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 203.315869][T13050] hsr_slave_0: entered promiscuous mode [ 203.325807][T13050] hsr_slave_1: entered promiscuous mode [ 203.337576][T13050] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 203.357321][T13050] Cannot create hsr debugfs directory [ 203.409611][T13095] FAULT_INJECTION: forcing a failure. [ 203.409611][T13095] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 203.422865][T13095] CPU: 0 UID: 0 PID: 13095 Comm: syz.4.3564 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 203.433364][T13095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 203.443489][T13095] Call Trace: [ 203.446788][T13095] [ 203.449750][T13095] dump_stack_lvl+0xf2/0x150 [ 203.454457][T13095] dump_stack+0x15/0x1a [ 203.458649][T13095] should_fail_ex+0x223/0x230 [ 203.463363][T13095] should_fail+0xb/0x10 [ 203.467589][T13095] should_fail_usercopy+0x1a/0x20 [ 203.472647][T13095] _copy_from_user+0x1c/0xa0 [ 203.477265][T13095] usbdev_ioctl+0xab2/0x3e00 [ 203.481875][T13095] ? do_vfs_ioctl+0x96e/0x1530 [ 203.486772][T13095] ? selinux_file_ioctl+0x2f7/0x380 [ 203.492068][T13095] ? __fget_files+0x17c/0x1c0 [ 203.496758][T13095] ? __pfx_usbdev_ioctl+0x10/0x10 [ 203.501850][T13095] __se_sys_ioctl+0xc9/0x140 [ 203.506565][T13095] __x64_sys_ioctl+0x43/0x50 [ 203.511174][T13095] x64_sys_call+0x1690/0x2dc0 [ 203.515923][T13095] do_syscall_64+0xc9/0x1c0 [ 203.520455][T13095] ? clear_bhb_loop+0x55/0xb0 [ 203.525147][T13095] ? clear_bhb_loop+0x55/0xb0 [ 203.529935][T13095] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 203.535879][T13095] RIP: 0033:0x7f8778bc5d29 [ 203.540399][T13095] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 203.560023][T13095] RSP: 002b:00007f8777237038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 203.568450][T13095] RAX: ffffffffffffffda RBX: 00007f8778db5fa0 RCX: 00007f8778bc5d29 [ 203.576438][T13095] RDX: 0000000020000040 RSI: 00000000c0185500 RDI: 0000000000000003 [ 203.584497][T13095] RBP: 00007f8777237090 R08: 0000000000000000 R09: 0000000000000000 [ 203.592482][T13095] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 203.600471][T13095] R13: 0000000000000000 R14: 00007f8778db5fa0 R15: 00007fff4c592f28 [ 203.608556][T13095] [ 204.025667][T13050] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 204.037631][T13050] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 204.058089][T13050] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 204.069389][T13050] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 204.243106][T13050] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.256843][T13050] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.268641][T12063] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.275903][T12063] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.285432][T12063] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.292530][T12063] bridge0: port 2(bridge_slave_1) entered forwarding state [ 204.581613][T13050] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 204.827045][T13050] veth0_vlan: entered promiscuous mode [ 204.854559][T13050] veth1_vlan: entered promiscuous mode [ 204.904566][T13050] veth0_macvtap: entered promiscuous mode [ 204.931606][T13050] veth1_macvtap: entered promiscuous mode [ 204.967391][T13050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 204.977928][T13050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.987871][T13050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 205.000270][T13050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.010127][T13050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 205.010145][T13050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.010161][T13050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 205.010173][T13050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.010201][T13050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 205.010217][T13050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.095721][T13050] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 205.117714][T13050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 205.128424][T13050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.138356][T13050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 205.149817][T13050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.159697][T13050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 205.170218][T13050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.180079][T13050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 205.190547][T13050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.200507][T13050] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 205.211151][T13050] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.351507][T13050] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 205.373398][T13050] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 205.382437][T13050] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 205.391282][T13050] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 205.400131][T13050] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 205.556574][T13173] FAULT_INJECTION: forcing a failure. [ 205.556574][T13173] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 205.571313][T13173] CPU: 0 UID: 0 PID: 13173 Comm: syz.4.3585 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 205.581806][T13173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 205.591887][T13173] Call Trace: [ 205.595195][T13173] [ 205.598175][T13173] dump_stack_lvl+0xf2/0x150 [ 205.602794][T13173] dump_stack+0x15/0x1a [ 205.607064][T13173] should_fail_ex+0x223/0x230 [ 205.611777][T13173] should_fail+0xb/0x10 [ 205.615950][T13173] should_fail_usercopy+0x1a/0x20 [ 205.621004][T13173] _copy_from_user+0x1c/0xa0 [ 205.625654][T13173] move_addr_to_kernel+0x82/0x120 [ 205.630730][T13173] __sys_sendto+0x12e/0x230 [ 205.635327][T13173] __x64_sys_sendto+0x78/0x90 [ 205.640086][T13173] x64_sys_call+0x29fa/0x2dc0 [ 205.644787][T13173] do_syscall_64+0xc9/0x1c0 [ 205.649304][T13173] ? clear_bhb_loop+0x55/0xb0 [ 205.654136][T13173] ? clear_bhb_loop+0x55/0xb0 [ 205.658902][T13173] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 205.664880][T13173] RIP: 0033:0x7f8778bc5d29 [ 205.669307][T13173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 205.688976][T13173] RSP: 002b:00007f8777237038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 205.697523][T13173] RAX: ffffffffffffffda RBX: 00007f8778db5fa0 RCX: 00007f8778bc5d29 [ 205.705499][T13173] RDX: 0000000000000002 RSI: 0000000020000180 RDI: 0000000000000003 [ 205.713489][T13173] RBP: 00007f8777237090 R08: 0000000020000040 R09: 0000000000000014 [ 205.721489][T13173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 205.729465][T13173] R13: 0000000000000000 R14: 00007f8778db5fa0 R15: 00007fff4c592f28 [ 205.737577][T13173] [ 205.785562][T13175] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3586'. [ 205.794603][T13175] bridge_slave_1: left allmulticast mode [ 205.800269][T13175] bridge_slave_1: left promiscuous mode [ 205.806124][T13175] bridge0: port 2(bridge_slave_1) entered disabled state [ 205.823346][T13175] bridge_slave_0: left allmulticast mode [ 205.829169][T13175] bridge_slave_0: left promiscuous mode [ 205.835009][T13175] bridge0: port 1(bridge_slave_0) entered disabled state [ 206.420198][T13201] futex_wake_op: syz.6.3596 tries to shift op by 32; fix this program [ 206.488400][ T55] batman_adv: batadv0: Removing interface: ip6gretap1 [ 206.569048][ T55] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 206.585309][ T55] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 206.603580][ T55] bond0 (unregistering): Released all slaves [ 206.704199][ T55] hsr_slave_0: left promiscuous mode [ 206.722937][ T55] hsr_slave_1: left promiscuous mode [ 206.731338][ T55] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 206.738913][ T55] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 206.759869][ T55] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 206.767641][ T55] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 206.796013][ T55] veth0_macvtap: left promiscuous mode [ 206.801725][ T55] veth1_vlan: left promiscuous mode [ 206.807519][ T55] veth0_vlan: left promiscuous mode [ 206.886886][ T55] team0 (unregistering): Port device team_slave_1 removed [ 206.896958][ T55] team0 (unregistering): Port device team_slave_0 removed [ 207.214877][T13251] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 207.223832][T13251] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 207.572106][T13270] program syz.0.3624 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 207.578056][T13272] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 207.589971][T13272] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 207.604236][T13272] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 207.612818][T13272] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 207.733002][T13285] program syz.0.3629 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 207.792689][T13289] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(6) [ 207.799283][T13289] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 207.806795][T13289] vhci_hcd vhci_hcd.0: Device attached [ 207.829582][T13289] bridge0: entered promiscuous mode [ 207.835063][T13289] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3631'. [ 207.843997][T13289] bridge_slave_1: left allmulticast mode [ 207.849780][T13289] bridge_slave_1: left promiscuous mode [ 207.855566][T13289] bridge0: port 2(bridge_slave_1) entered disabled state [ 207.869297][T13289] bridge_slave_0: left allmulticast mode [ 207.875072][T13289] bridge_slave_0: left promiscuous mode [ 207.880802][T13289] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.895725][T13289] bridge0 (unregistering): left promiscuous mode [ 207.986424][T13290] vhci_hcd: connection closed [ 207.986692][ T1607] vhci_hcd: stop threads [ 207.995702][ T1607] vhci_hcd: release socket [ 208.000127][ T1607] vhci_hcd: disconnect device [ 208.002565][ T9628] vhci_hcd: vhci_device speed not set [ 208.018051][ T29] kauditd_printk_skb: 515 callbacks suppressed [ 208.018071][ T29] audit: type=1326 audit(1737513186.068:17298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13296 comm="syz.0.3632" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3bba9e5d29 code=0x7ffc0000 [ 208.049754][ T29] audit: type=1326 audit(1737513186.068:17299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13296 comm="syz.0.3632" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3bba9e5d29 code=0x7ffc0000 [ 208.073556][ T29] audit: type=1326 audit(1737513186.068:17300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13296 comm="syz.0.3632" exe="/root/syz-executor" sig=0 arch=c000003e syscall=334 compat=0 ip=0x7f3bba9e5d29 code=0x7ffc0000 [ 208.097343][ T29] audit: type=1326 audit(1737513186.068:17301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13296 comm="syz.0.3632" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3bba9e5d29 code=0x7ffc0000 [ 208.120988][ T29] audit: type=1326 audit(1737513186.068:17302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13296 comm="syz.0.3632" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f3bba9e5d29 code=0x7ffc0000 [ 208.144695][ T29] audit: type=1326 audit(1737513186.068:17303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13296 comm="syz.0.3632" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3bba9e5d29 code=0x7ffc0000 [ 208.168451][ T29] audit: type=1326 audit(1737513186.068:17304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13296 comm="syz.0.3632" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f3bba9e5d29 code=0x7ffc0000 [ 208.192286][ T29] audit: type=1326 audit(1737513186.068:17305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13296 comm="syz.0.3632" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3bba9e5d29 code=0x7ffc0000 [ 208.215997][ T29] audit: type=1326 audit(1737513186.068:17306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13296 comm="syz.0.3632" exe="/root/syz-executor" sig=0 arch=c000003e syscall=161 compat=0 ip=0x7f3bba9e5d29 code=0x7ffc0000 [ 208.216427][ T29] audit: type=1326 audit(1737513186.068:17307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13296 comm="syz.0.3632" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3bba9e5d29 code=0x7ffc0000 [ 208.369846][T13307] netlink: 68 bytes leftover after parsing attributes in process `syz.1.3636'. [ 208.393902][T13307] netlink: 5 bytes leftover after parsing attributes in process `syz.1.3636'. [ 208.411230][T13307] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2579 sclass=netlink_xfrm_socket pid=13307 comm=syz.1.3636 [ 208.447416][T13307] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3636'. [ 208.455389][T13311] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3638'. [ 208.537204][T13324] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 208.545799][T13324] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 208.821401][T13331] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 209.277610][T13338] program syz.4.3645 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 209.497442][T13336] netlink: 'syz.5.3643': attribute type 3 has an invalid length. [ 209.514634][T13330] netlink: 'syz.5.3643': attribute type 13 has an invalid length. [ 209.517680][T13343] FAULT_INJECTION: forcing a failure. [ 209.517680][T13343] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 209.535759][T13343] CPU: 0 UID: 0 PID: 13343 Comm: syz.4.3647 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 209.546200][T13343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 209.556325][T13343] Call Trace: [ 209.559621][T13343] [ 209.562568][T13343] dump_stack_lvl+0xf2/0x150 [ 209.567255][T13343] dump_stack+0x15/0x1a [ 209.571478][T13343] should_fail_ex+0x223/0x230 [ 209.576204][T13343] should_fail+0xb/0x10 [ 209.580394][T13343] should_fail_usercopy+0x1a/0x20 [ 209.585451][T13343] _copy_to_user+0x20/0xa0 [ 209.589939][T13343] simple_read_from_buffer+0xa0/0x110 [ 209.595423][T13343] proc_fail_nth_read+0xf9/0x140 [ 209.600397][T13343] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 209.606034][T13343] vfs_read+0x1a2/0x700 [ 209.610302][T13343] ? __rcu_read_unlock+0x4e/0x70 [ 209.615332][T13343] ? __fget_files+0x17c/0x1c0 [ 209.620031][T13343] ksys_read+0xe8/0x1b0 [ 209.624259][T13343] __x64_sys_read+0x42/0x50 [ 209.628780][T13343] x64_sys_call+0x2874/0x2dc0 [ 209.633480][T13343] do_syscall_64+0xc9/0x1c0 [ 209.638012][T13343] ? clear_bhb_loop+0x55/0xb0 [ 209.642708][T13343] ? clear_bhb_loop+0x55/0xb0 [ 209.647495][T13343] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 209.653448][T13343] RIP: 0033:0x7f8778bc473c [ 209.657868][T13343] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 209.677538][T13343] RSP: 002b:00007f8777237030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 209.685956][T13343] RAX: ffffffffffffffda RBX: 00007f8778db5fa0 RCX: 00007f8778bc473c [ 209.694023][T13343] RDX: 000000000000000f RSI: 00007f87772370a0 RDI: 0000000000000003 [ 209.702017][T13343] RBP: 00007f8777237090 R08: 0000000000000000 R09: 0000000000000000 [ 209.710072][T13343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 209.718055][T13343] R13: 0000000000000000 R14: 00007f8778db5fa0 R15: 00007fff4c592f28 [ 209.726116][T13343] [ 209.804709][T13330] gretap0: refused to change device tx_queue_len [ 209.853221][T13330] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 210.579175][T13388] FAULT_INJECTION: forcing a failure. [ 210.579175][T13388] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 210.592450][T13388] CPU: 0 UID: 0 PID: 13388 Comm: syz.6.3665 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 210.602986][T13388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 210.613064][T13388] Call Trace: [ 210.616339][T13388] [ 210.619298][T13388] dump_stack_lvl+0xf2/0x150 [ 210.623904][T13388] dump_stack+0x15/0x1a [ 210.628112][T13388] should_fail_ex+0x223/0x230 [ 210.632856][T13388] should_fail+0xb/0x10 [ 210.637024][T13388] should_fail_usercopy+0x1a/0x20 [ 210.642066][T13388] _copy_to_user+0x20/0xa0 [ 210.646516][T13388] simple_read_from_buffer+0xa0/0x110 [ 210.651937][T13388] proc_fail_nth_read+0xf9/0x140 [ 210.656902][T13388] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 210.662624][T13388] vfs_read+0x1a2/0x700 [ 210.666851][T13388] ? __rcu_read_unlock+0x4e/0x70 [ 210.671846][T13388] ? __fget_files+0x17c/0x1c0 [ 210.676540][T13388] ksys_read+0xe8/0x1b0 [ 210.680724][T13388] __x64_sys_read+0x42/0x50 [ 210.685245][T13388] x64_sys_call+0x2874/0x2dc0 [ 210.689940][T13388] do_syscall_64+0xc9/0x1c0 [ 210.694493][T13388] ? clear_bhb_loop+0x55/0xb0 [ 210.699191][T13388] ? clear_bhb_loop+0x55/0xb0 [ 210.703876][T13388] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 210.709879][T13388] RIP: 0033:0x7f042b4e473c [ 210.714352][T13388] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 210.734083][T13388] RSP: 002b:00007f0429b57030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 210.742584][T13388] RAX: ffffffffffffffda RBX: 00007f042b6d5fa0 RCX: 00007f042b4e473c [ 210.750635][T13388] RDX: 000000000000000f RSI: 00007f0429b570a0 RDI: 0000000000000008 [ 210.758615][T13388] RBP: 00007f0429b57090 R08: 0000000000000000 R09: 0000000000000000 [ 210.766603][T13388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 210.774720][T13388] R13: 0000000000000000 R14: 00007f042b6d5fa0 R15: 00007ffc942dfff8 [ 210.782739][T13388] [ 210.858344][T13395] vlan2: entered allmulticast mode [ 210.866740][T13395] bond0: entered allmulticast mode [ 210.871917][T13395] bond_slave_0: entered allmulticast mode [ 210.876826][T13399] FAULT_INJECTION: forcing a failure. [ 210.876826][T13399] name failslab, interval 1, probability 0, space 0, times 0 [ 210.877707][T13395] bond_slave_1: entered allmulticast mode [ 210.890413][T13399] CPU: 0 UID: 0 PID: 13399 Comm: syz.0.3669 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 210.906596][T13399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 210.916683][T13399] Call Trace: [ 210.920037][T13399] [ 210.923063][T13399] dump_stack_lvl+0xf2/0x150 [ 210.927677][T13399] dump_stack+0x15/0x1a [ 210.932002][T13399] should_fail_ex+0x223/0x230 [ 210.936740][T13399] should_failslab+0x8f/0xb0 [ 210.941499][T13399] kmem_cache_alloc_noprof+0x52/0x320 [ 210.946950][T13399] ? getname_flags+0x81/0x3b0 [ 210.951647][T13399] getname_flags+0x81/0x3b0 [ 210.956175][T13399] user_path_at+0x26/0x120 [ 210.960611][T13399] __se_sys_mount+0x24b/0x2d0 [ 210.965307][T13399] __x64_sys_mount+0x67/0x80 [ 210.969996][T13399] x64_sys_call+0x2c84/0x2dc0 [ 210.974684][T13399] do_syscall_64+0xc9/0x1c0 [ 210.979212][T13399] ? clear_bhb_loop+0x55/0xb0 [ 210.983993][T13399] ? clear_bhb_loop+0x55/0xb0 [ 210.988835][T13399] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 210.994779][T13399] RIP: 0033:0x7f3bba9e5d29 [ 210.999207][T13399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 211.019067][T13399] RSP: 002b:00007f3bb9057038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 211.027490][T13399] RAX: ffffffffffffffda RBX: 00007f3bbabd5fa0 RCX: 00007f3bba9e5d29 [ 211.035469][T13399] RDX: 0000000020000200 RSI: 00000000200001c0 RDI: 0000000000000000 [ 211.043451][T13399] RBP: 00007f3bb9057090 R08: 0000000020000240 R09: 0000000000000000 [ 211.051426][T13399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 211.059422][T13399] R13: 0000000000000000 R14: 00007f3bbabd5fa0 R15: 00007ffc180a7ed8 [ 211.067443][T13399] [ 211.169420][T13395] bond0: left allmulticast mode [ 211.174395][T13395] bond_slave_0: left allmulticast mode [ 211.179949][T13395] bond_slave_1: left allmulticast mode [ 211.690761][T13423] netlink: 12 bytes leftover after parsing attributes in process `syz.5.3677'. [ 211.775726][T13430] 9pnet_virtio: no channels available for device 127.0.0.1 [ 212.095066][T13451] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 212.128015][T13451] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 212.570303][T13460] xt_TCPMSS: Only works on TCP SYN packets [ 212.700257][T13463] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3691'. [ 212.709402][T13463] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 212.723380][T13463] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 212.751484][T13466] netlink: 48 bytes leftover after parsing attributes in process `syz.6.3692'. [ 212.877652][T13470] 9pnet_virtio: no channels available for device 127.0.0.1 [ 212.964563][T13479] FAULT_INJECTION: forcing a failure. [ 212.964563][T13479] name failslab, interval 1, probability 0, space 0, times 0 [ 212.977288][T13479] CPU: 0 UID: 0 PID: 13479 Comm: syz.4.3698 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 212.987931][T13479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 212.998096][T13479] Call Trace: [ 213.001398][T13479] [ 213.004366][T13479] dump_stack_lvl+0xf2/0x150 [ 213.009028][T13479] dump_stack+0x15/0x1a [ 213.013227][T13479] should_fail_ex+0x223/0x230 [ 213.017927][T13479] should_failslab+0x8f/0xb0 [ 213.022551][T13479] kmem_cache_alloc_noprof+0x52/0x320 [ 213.027941][T13479] ? skb_clone+0x154/0x1f0 [ 213.032410][T13479] skb_clone+0x154/0x1f0 [ 213.036678][T13479] __netlink_deliver_tap+0x2bd/0x4f0 [ 213.042004][T13479] netlink_unicast+0x64a/0x670 [ 213.046793][T13479] netlink_sendmsg+0x5cc/0x6e0 [ 213.051580][T13479] ? __pfx_netlink_sendmsg+0x10/0x10 [ 213.056971][T13479] __sock_sendmsg+0x140/0x180 [ 213.061735][T13479] ____sys_sendmsg+0x312/0x410 [ 213.066521][T13479] __sys_sendmsg+0x19d/0x230 [ 213.071149][T13479] __x64_sys_sendmsg+0x46/0x50 [ 213.075929][T13479] x64_sys_call+0x2734/0x2dc0 [ 213.080615][T13479] do_syscall_64+0xc9/0x1c0 [ 213.085129][T13479] ? clear_bhb_loop+0x55/0xb0 [ 213.089819][T13479] ? clear_bhb_loop+0x55/0xb0 [ 213.094507][T13479] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 213.100414][T13479] RIP: 0033:0x7f8778bc5d29 [ 213.104943][T13479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 213.124593][T13479] RSP: 002b:00007f8777237038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 213.133074][T13479] RAX: ffffffffffffffda RBX: 00007f8778db5fa0 RCX: 00007f8778bc5d29 [ 213.141108][T13479] RDX: 0000000000000010 RSI: 0000000020000000 RDI: 0000000000000006 [ 213.149094][T13479] RBP: 00007f8777237090 R08: 0000000000000000 R09: 0000000000000000 [ 213.157093][T13479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 213.165107][T13479] R13: 0000000000000000 R14: 00007f8778db5fa0 R15: 00007fff4c592f28 [ 213.173152][T13479] [ 213.204368][ T29] kauditd_printk_skb: 622 callbacks suppressed [ 213.204383][ T29] audit: type=1326 audit(1737513191.248:17930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13482 comm="syz.6.3700" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f042b4e5d29 code=0x7ffc0000 [ 213.234226][ T29] audit: type=1326 audit(1737513191.248:17931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13482 comm="syz.6.3700" exe="/root/syz-executor" sig=0 arch=c000003e syscall=334 compat=0 ip=0x7f042b4e5d29 code=0x7ffc0000 [ 213.257838][ T29] audit: type=1326 audit(1737513191.248:17932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13482 comm="syz.6.3700" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f042b4e5d29 code=0x7ffc0000 [ 213.281550][ T29] audit: type=1326 audit(1737513191.248:17933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13482 comm="syz.6.3700" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f042b4e5d29 code=0x7ffc0000 [ 213.305224][ T29] audit: type=1326 audit(1737513191.248:17934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13482 comm="syz.6.3700" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f042b4e5d29 code=0x7ffc0000 [ 213.328860][ T29] audit: type=1326 audit(1737513191.248:17935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13482 comm="syz.6.3700" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f042b4e5d29 code=0x7ffc0000 [ 213.352582][ T29] audit: type=1326 audit(1737513191.248:17936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13482 comm="syz.6.3700" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f042b4e5d29 code=0x7ffc0000 [ 213.376276][ T29] audit: type=1326 audit(1737513191.248:17937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13482 comm="syz.6.3700" exe="/root/syz-executor" sig=0 arch=c000003e syscall=161 compat=0 ip=0x7f042b4e5d29 code=0x7ffc0000 [ 213.399950][ T29] audit: type=1326 audit(1737513191.248:17938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13482 comm="syz.6.3700" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f042b4e5d29 code=0x7ffc0000 [ 213.423577][ T29] audit: type=1326 audit(1737513191.248:17939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13482 comm="syz.6.3700" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f042b4e5d29 code=0x7ffc0000 [ 213.811120][T13509] netlink: 28 bytes leftover after parsing attributes in process `syz.1.3709'. [ 214.584223][T13537] FAULT_INJECTION: forcing a failure. [ 214.584223][T13537] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 214.597491][T13537] CPU: 0 UID: 0 PID: 13537 Comm: syz.0.3720 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 214.608021][T13537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 214.618528][T13537] Call Trace: [ 214.621807][T13537] [ 214.624808][T13537] dump_stack_lvl+0xf2/0x150 [ 214.629414][T13537] dump_stack+0x15/0x1a [ 214.633634][T13537] should_fail_ex+0x223/0x230 [ 214.638321][T13537] should_fail+0xb/0x10 [ 214.642519][T13537] should_fail_usercopy+0x1a/0x20 [ 214.647601][T13537] _copy_from_user+0x1c/0xa0 [ 214.652223][T13537] move_addr_to_kernel+0x82/0x120 [ 214.657315][T13537] __sys_sendto+0x12e/0x230 [ 214.661901][T13537] __x64_sys_sendto+0x78/0x90 [ 214.666587][T13537] x64_sys_call+0x29fa/0x2dc0 [ 214.671302][T13537] do_syscall_64+0xc9/0x1c0 [ 214.675819][T13537] ? clear_bhb_loop+0x55/0xb0 [ 214.680639][T13537] ? clear_bhb_loop+0x55/0xb0 [ 214.685559][T13537] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 214.691523][T13537] RIP: 0033:0x7f3bba9e5d29 [ 214.695941][T13537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 214.715618][T13537] RSP: 002b:00007f3bb9057038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 214.724071][T13537] RAX: ffffffffffffffda RBX: 00007f3bbabd5fa0 RCX: 00007f3bba9e5d29 [ 214.732048][T13537] RDX: 0000000000034000 RSI: 0000000020847fff RDI: 0000000000000003 [ 214.740025][T13537] RBP: 00007f3bb9057090 R08: 000000002005ffe4 R09: 000000000000001c [ 214.748012][T13537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 214.756042][T13537] R13: 0000000000000000 R14: 00007f3bbabd5fa0 R15: 00007ffc180a7ed8 [ 214.764106][T13537] [ 214.828798][T13543] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3723'. [ 214.919884][T13560] cgroup: Name too long [ 214.935447][T13560] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 214.980662][T13570] SELinux: Context system_u:object_r:lost_found_t:s0 is not valid (left unmapped). [ 215.033556][T13575] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3733'. [ 215.065960][T13575] FAULT_INJECTION: forcing a failure. [ 215.065960][T13575] name failslab, interval 1, probability 0, space 0, times 0 [ 215.078723][T13575] CPU: 1 UID: 0 PID: 13575 Comm: syz.1.3733 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 215.089170][T13575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 215.099233][T13575] Call Trace: [ 215.102596][T13575] [ 215.105570][T13575] dump_stack_lvl+0xf2/0x150 [ 215.110220][T13575] dump_stack+0x15/0x1a [ 215.114427][T13575] should_fail_ex+0x223/0x230 [ 215.119126][T13575] should_failslab+0x8f/0xb0 [ 215.123741][T13575] kmem_cache_alloc_noprof+0x52/0x320 [ 215.129222][T13575] ? security_inode_alloc+0x37/0x100 [ 215.134555][T13575] security_inode_alloc+0x37/0x100 [ 215.139753][T13575] inode_init_always_gfp+0x4a2/0x4f0 [ 215.145136][T13575] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 215.150716][T13575] alloc_inode+0x82/0x160 [ 215.155078][T13575] new_inode+0x1e/0x100 [ 215.159272][T13575] shmem_get_inode+0x24e/0x730 [ 215.160732][T13581] netlink: 4 bytes leftover after parsing attributes in process `syz.6.3737'. [ 215.164182][T13575] __shmem_file_setup+0x127/0x1f0 [ 215.164216][T13575] shmem_file_setup+0x3b/0x50 [ 215.182865][T13575] __se_sys_memfd_create+0x31d/0x5c0 [ 215.188300][T13575] __x64_sys_memfd_create+0x31/0x40 [ 215.193509][T13575] x64_sys_call+0x2d4c/0x2dc0 [ 215.198222][T13575] do_syscall_64+0xc9/0x1c0 [ 215.202776][T13575] ? clear_bhb_loop+0x55/0xb0 [ 215.207474][T13575] ? clear_bhb_loop+0x55/0xb0 [ 215.212192][T13575] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 215.218130][T13575] RIP: 0033:0x7fe202b25d29 [ 215.222542][T13575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 215.242181][T13575] RSP: 002b:00007fe201175e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 215.250716][T13575] RAX: ffffffffffffffda RBX: 000000000000044a RCX: 00007fe202b25d29 [ 215.258752][T13575] RDX: 00007fe201175ef0 RSI: 0000000000000000 RDI: 00007fe202ba2469 [ 215.266859][T13575] RBP: 0000000020000880 R08: 00007fe201175bb7 R09: 00007fe201175e40 [ 215.274844][T13575] R10: 000000000000000a R11: 0000000000000202 R12: 0000000020000300 [ 215.282845][T13575] R13: 00007fe201175ef0 R14: 00007fe201175eb0 R15: 0000000020000200 [ 215.290847][T13575] [ 215.301927][T13560] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 215.367208][T13560] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 215.426425][T13560] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 215.469007][T13598] 9pnet_fd: Insufficient options for proto=fd [ 215.525233][T13560] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 215.547352][T13560] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 215.573807][T13560] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 215.597211][T13560] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 215.911476][T13620] FAULT_INJECTION: forcing a failure. [ 215.911476][T13620] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 215.924640][T13620] CPU: 0 UID: 0 PID: 13620 Comm: syz.4.3750 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 215.935075][T13620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 215.945217][T13620] Call Trace: [ 215.948504][T13620] [ 215.951449][T13620] dump_stack_lvl+0xf2/0x150 [ 215.956076][T13620] dump_stack+0x15/0x1a [ 215.960268][T13620] should_fail_ex+0x223/0x230 [ 215.965020][T13620] should_fail+0xb/0x10 [ 215.969203][T13620] should_fail_usercopy+0x1a/0x20 [ 215.974258][T13620] _copy_from_user+0x1c/0xa0 [ 215.978888][T13620] do_ipt_set_ctl+0x423/0x8b0 [ 215.983600][T13620] ? tcp_release_cb+0xfe/0x380 [ 215.988412][T13620] nf_setsockopt+0x195/0x1b0 [ 215.993088][T13620] ip_setsockopt+0xea/0x100 [ 215.997717][T13620] tcp_setsockopt+0x93/0xb0 [ 216.002248][T13620] sock_common_setsockopt+0x64/0x80 [ 216.007503][T13620] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 216.013909][T13620] smc_setsockopt+0x182/0x7a0 [ 216.018679][T13620] ? __pfx_smc_setsockopt+0x10/0x10 [ 216.023913][T13620] __sys_setsockopt+0x187/0x200 [ 216.028822][T13620] __x64_sys_setsockopt+0x66/0x80 [ 216.033902][T13620] x64_sys_call+0x282e/0x2dc0 [ 216.038680][T13620] do_syscall_64+0xc9/0x1c0 [ 216.043230][T13620] ? clear_bhb_loop+0x55/0xb0 [ 216.047939][T13620] ? clear_bhb_loop+0x55/0xb0 [ 216.052723][T13620] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 216.058654][T13620] RIP: 0033:0x7f8778bc5d29 [ 216.063093][T13620] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 216.082856][T13620] RSP: 002b:00007f8777216038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 216.091304][T13620] RAX: ffffffffffffffda RBX: 00007f8778db6080 RCX: 00007f8778bc5d29 [ 216.099300][T13620] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 [ 216.107331][T13620] RBP: 00007f8777216090 R08: 0000000000000530 R09: 0000000000000000 [ 216.115445][T13620] R10: 0000000020000580 R11: 0000000000000246 R12: 0000000000000001 [ 216.123452][T13620] R13: 0000000000000000 R14: 00007f8778db6080 R15: 00007fff4c592f28 [ 216.131572][T13620] [ 216.514264][T13647] FAULT_INJECTION: forcing a failure. [ 216.514264][T13647] name failslab, interval 1, probability 0, space 0, times 0 [ 216.526963][T13647] CPU: 1 UID: 0 PID: 13647 Comm: syz.1.3763 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 216.537437][T13647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 216.547517][T13647] Call Trace: [ 216.550875][T13647] [ 216.553816][T13647] dump_stack_lvl+0xf2/0x150 [ 216.558545][T13647] dump_stack+0x15/0x1a [ 216.562808][T13647] should_fail_ex+0x223/0x230 [ 216.567504][T13647] should_failslab+0x8f/0xb0 [ 216.572155][T13647] kmem_cache_alloc_noprof+0x52/0x320 [ 216.577596][T13647] ? getname_flags+0x81/0x3b0 [ 216.582312][T13647] getname_flags+0x81/0x3b0 [ 216.586830][T13647] user_path_create+0x26/0x120 [ 216.591610][T13647] bpf_obj_pin_user+0xc9/0x260 [ 216.596388][T13647] bpf_obj_pin+0xd8/0xf0 [ 216.600643][T13647] __sys_bpf+0x5ad/0x7a0 [ 216.604901][T13647] __x64_sys_bpf+0x43/0x50 [ 216.609323][T13647] x64_sys_call+0x2914/0x2dc0 [ 216.614048][T13647] do_syscall_64+0xc9/0x1c0 [ 216.618672][T13647] ? clear_bhb_loop+0x55/0xb0 [ 216.623415][T13647] ? clear_bhb_loop+0x55/0xb0 [ 216.628190][T13647] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 216.634107][T13647] RIP: 0033:0x7fe202b25d29 [ 216.638537][T13647] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 216.658186][T13647] RSP: 002b:00007fe201197038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 216.666613][T13647] RAX: ffffffffffffffda RBX: 00007fe202d15fa0 RCX: 00007fe202b25d29 [ 216.674642][T13647] RDX: 0000000000000018 RSI: 0000000020000380 RDI: 0000000000000006 [ 216.682634][T13647] RBP: 00007fe201197090 R08: 0000000000000000 R09: 0000000000000000 [ 216.690682][T13647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 216.698810][T13647] R13: 0000000000000000 R14: 00007fe202d15fa0 R15: 00007ffce965ea78 [ 216.706798][T13647] [ 216.858078][T13657] program syz.1.3768 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 217.168830][T13681] program syz.6.3779 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 217.193341][T13684] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 217.206557][T13684] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 217.252548][T13684] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 217.261411][T13684] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 217.500392][T13702] FAULT_INJECTION: forcing a failure. [ 217.500392][T13702] name failslab, interval 1, probability 0, space 0, times 0 [ 217.513197][T13702] CPU: 1 UID: 0 PID: 13702 Comm: syz.5.3787 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 217.523701][T13702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 217.533775][T13702] Call Trace: [ 217.537063][T13702] [ 217.540070][T13702] dump_stack_lvl+0xf2/0x150 [ 217.544706][T13702] dump_stack+0x15/0x1a [ 217.548971][T13702] should_fail_ex+0x223/0x230 [ 217.553675][T13702] should_failslab+0x8f/0xb0 [ 217.558306][T13702] kmem_cache_alloc_noprof+0x52/0x320 [ 217.563724][T13702] ? audit_log_start+0x34c/0x6b0 [ 217.568690][T13702] audit_log_start+0x34c/0x6b0 [ 217.573485][T13702] ? kmem_cache_free+0xdc/0x2d0 [ 217.578374][T13702] audit_seccomp+0x4b/0x130 [ 217.582901][T13702] __seccomp_filter+0x6fa/0x1180 [ 217.587866][T13702] ? __perf_event_task_sched_out+0x138/0x1010 [ 217.594086][T13702] ? __dequeue_entity+0x22/0x310 [ 217.599137][T13702] __secure_computing+0x9f/0x1c0 [ 217.604102][T13702] syscall_trace_enter+0xd1/0x1f0 [ 217.609232][T13702] do_syscall_64+0xaa/0x1c0 [ 217.613771][T13702] ? clear_bhb_loop+0x55/0xb0 [ 217.618562][T13702] ? clear_bhb_loop+0x55/0xb0 [ 217.623324][T13702] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 217.629348][T13702] RIP: 0033:0x7fa24b2c473c [ 217.633793][T13702] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 217.653507][T13702] RSP: 002b:00007fa249937030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 217.662031][T13702] RAX: ffffffffffffffda RBX: 00007fa24b4b5fa0 RCX: 00007fa24b2c473c [ 217.670029][T13702] RDX: 000000000000000f RSI: 00007fa2499370a0 RDI: 0000000000000006 [ 217.678076][T13702] RBP: 00007fa249937090 R08: 0000000000000000 R09: 0000000000000000 [ 217.686108][T13702] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 217.694165][T13702] R13: 0000000000000000 R14: 00007fa24b4b5fa0 R15: 00007ffcec65dc68 [ 217.702219][T13702] [ 217.743022][T13722] program syz.6.3791 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 217.930696][T13728] FAULT_INJECTION: forcing a failure. [ 217.930696][T13728] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 217.944171][T13728] CPU: 1 UID: 0 PID: 13728 Comm: syz.5.3790 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 217.954610][T13728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 217.964687][T13728] Call Trace: [ 217.968069][T13728] [ 217.971022][T13728] dump_stack_lvl+0xf2/0x150 [ 217.975655][T13728] dump_stack+0x15/0x1a [ 217.979916][T13728] should_fail_ex+0x223/0x230 [ 217.984638][T13728] should_fail_alloc_page+0xfd/0x110 [ 217.990094][T13728] __alloc_pages_noprof+0x109/0x340 [ 217.995514][T13728] alloc_pages_mpol_noprof+0xb8/0x260 [ 218.000973][T13728] alloc_pages_noprof+0xe1/0x100 [ 218.006015][T13728] pte_alloc_one+0x31/0x110 [ 218.010555][T13728] __pte_alloc+0x33/0x2a0 [ 218.014922][T13728] handle_mm_fault+0x1b4a/0x2ac0 [ 218.020047][T13728] exc_page_fault+0x3b9/0x650 [ 218.024766][T13728] asm_exc_page_fault+0x26/0x30 [ 218.029661][T13728] RIP: 0033:0x7fa24b188c46 [ 218.034104][T13728] Code: f0 72 6e 48 63 cd 48 01 c1 49 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 <47> 0f b6 0c 08 45 84 c9 74 08 45 88 0c 00 49 8b 47 10 48 83 c0 01 [ 218.053878][T13728] RSP: 002b:00007fa2498f44a0 EFLAGS: 00010246 [ 218.060129][T13728] RAX: 0000000000000001 RBX: 00007fa2498f4540 RCX: 0000000000000101 [ 218.068119][T13728] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00007fa2498f45e0 [ 218.076108][T13728] RBP: 0000000000000102 R08: 00007fa2414d5000 R09: 0000000000000000 [ 218.084175][T13728] R10: 0000000000000000 R11: 00007fa2498f4550 R12: 0000000000000001 [ 218.092162][T13728] R13: 00007fa24b359040 R14: 0000000000000000 R15: 00007fa2498f45e0 [ 218.100242][T13728] [ 218.103514][T13728] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 218.149914][T13730] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=13730 comm=syz.1.3794 [ 218.224063][ T29] kauditd_printk_skb: 911 callbacks suppressed [ 218.224083][ T29] audit: type=1107 audit(1737513196.247:18849): pid=13729 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg=' [ 218.224083][ T29] ' [ 218.305322][T13737] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 218.314067][T13737] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 218.323216][T13737] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 218.332914][T13737] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 218.346130][ T29] audit: type=1326 audit(1737513196.397:18850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13738 comm="syz.4.3797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 218.382089][ T29] audit: type=1326 audit(1737513196.417:18851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13738 comm="syz.4.3797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=334 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 218.405892][ T29] audit: type=1326 audit(1737513196.417:18852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13738 comm="syz.4.3797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 218.429494][ T29] audit: type=1326 audit(1737513196.417:18853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13738 comm="syz.4.3797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 218.453194][ T29] audit: type=1326 audit(1737513196.417:18854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13738 comm="syz.4.3797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 218.476794][ T29] audit: type=1326 audit(1737513196.417:18855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13738 comm="syz.4.3797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 218.500499][ T29] audit: type=1326 audit(1737513196.417:18856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13738 comm="syz.4.3797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 218.517900][T13745] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 218.524174][ T29] audit: type=1326 audit(1737513196.417:18857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13738 comm="syz.4.3797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 218.550721][T13745] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 218.555963][ T29] audit: type=1326 audit(1737513196.417:18858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13738 comm="syz.4.3797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 219.101255][T13764] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 219.495388][T13776] FAULT_INJECTION: forcing a failure. [ 219.495388][T13776] name failslab, interval 1, probability 0, space 0, times 0 [ 219.508179][T13776] CPU: 0 UID: 0 PID: 13776 Comm: syz.1.3809 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 219.518617][T13776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 219.528675][T13776] Call Trace: [ 219.532002][T13776] [ 219.534930][T13776] dump_stack_lvl+0xf2/0x150 [ 219.539661][T13776] dump_stack+0x15/0x1a [ 219.543830][T13776] should_fail_ex+0x223/0x230 [ 219.548625][T13776] ? audit_log_d_path+0x96/0x250 [ 219.553602][T13776] should_failslab+0x8f/0xb0 [ 219.558327][T13776] __kmalloc_cache_noprof+0x4e/0x320 [ 219.563692][T13776] audit_log_d_path+0x96/0x250 [ 219.568552][T13776] ? __rcu_read_unlock+0x4e/0x70 [ 219.573524][T13776] audit_log_d_path_exe+0x42/0x70 [ 219.578630][T13776] audit_log_task+0x192/0x1c0 [ 219.583330][T13776] audit_seccomp+0x68/0x130 [ 219.587838][T13776] __seccomp_filter+0x6fa/0x1180 [ 219.592790][T13776] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 219.598440][T13776] ? vfs_write+0x596/0x920 [ 219.602882][T13776] ? putname+0xcf/0xf0 [ 219.607004][T13776] ? inode_to_bdi+0x7c/0x90 [ 219.611518][T13776] ? generic_fadvise+0x19f/0x460 [ 219.616647][T13776] __secure_computing+0x9f/0x1c0 [ 219.621614][T13776] syscall_trace_enter+0xd1/0x1f0 [ 219.626732][T13776] ? fpregs_assert_state_consistent+0x83/0xa0 [ 219.633032][T13776] do_syscall_64+0xaa/0x1c0 [ 219.637541][T13776] ? clear_bhb_loop+0x55/0xb0 [ 219.642222][T13776] ? clear_bhb_loop+0x55/0xb0 [ 219.646966][T13776] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 219.652862][T13776] RIP: 0033:0x7fe202b2473c [ 219.657286][T13776] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 219.677096][T13776] RSP: 002b:00007fe201197030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 219.685652][T13776] RAX: ffffffffffffffda RBX: 00007fe202d15fa0 RCX: 00007fe202b2473c [ 219.693714][T13776] RDX: 000000000000000f RSI: 00007fe2011970a0 RDI: 0000000000000007 [ 219.701694][T13776] RBP: 00007fe201197090 R08: 0000000000000000 R09: 0000000000000000 [ 219.709680][T13776] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 219.717654][T13776] R13: 0000000000000000 R14: 00007fe202d15fa0 R15: 00007ffce965ea78 [ 219.725717][T13776] [ 219.849467][T13790] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 219.858455][T13790] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 220.024939][T13802] netlink: 24 bytes leftover after parsing attributes in process `syz.5.3822'. [ 220.041291][T13806] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3824'. [ 220.051307][T13806] FAULT_INJECTION: forcing a failure. [ 220.051307][T13806] name failslab, interval 1, probability 0, space 0, times 0 [ 220.051338][T13806] CPU: 1 UID: 0 PID: 13806 Comm: syz.0.3824 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 220.074449][T13806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 220.074496][T13806] Call Trace: [ 220.074502][T13806] [ 220.074542][T13806] dump_stack_lvl+0xf2/0x150 [ 220.074592][T13806] dump_stack+0x15/0x1a [ 220.099894][T13806] should_fail_ex+0x223/0x230 [ 220.099933][T13806] should_failslab+0x8f/0xb0 [ 220.109239][T13806] kmem_cache_alloc_node_noprof+0x59/0x320 [ 220.109277][T13806] ? __alloc_skb+0x10b/0x310 [ 220.109366][T13806] __alloc_skb+0x10b/0x310 [ 220.124260][T13806] netlink_ack+0xef/0x4f0 [ 220.128653][T13806] ? __dev_queue_xmit+0x186/0x2090 [ 220.128693][T13806] netlink_rcv_skb+0x19c/0x230 [ 220.128772][T13806] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 220.128804][T13806] rtnetlink_rcv+0x1c/0x30 [ 220.148565][T13806] netlink_unicast+0x599/0x670 [ 220.148608][T13806] netlink_sendmsg+0x5cc/0x6e0 [ 220.148688][T13806] ? __pfx_netlink_sendmsg+0x10/0x10 [ 220.148793][T13806] __sock_sendmsg+0x140/0x180 [ 220.148904][T13806] ____sys_sendmsg+0x312/0x410 [ 220.148937][T13806] __sys_sendmsg+0x19d/0x230 [ 220.148981][T13806] __x64_sys_sendmsg+0x46/0x50 [ 220.149011][T13806] x64_sys_call+0x2734/0x2dc0 [ 220.149107][T13806] do_syscall_64+0xc9/0x1c0 [ 220.149153][T13806] ? clear_bhb_loop+0x55/0xb0 [ 220.149179][T13806] ? clear_bhb_loop+0x55/0xb0 [ 220.149205][T13806] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 220.149297][T13806] RIP: 0033:0x7f3bba9e5d29 [ 220.149378][T13806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 220.149414][T13806] RSP: 002b:00007f3bb9057038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 220.149435][T13806] RAX: ffffffffffffffda RBX: 00007f3bbabd5fa0 RCX: 00007f3bba9e5d29 [ 220.149449][T13806] RDX: 0000000000000000 RSI: 0000000020001280 RDI: 0000000000000004 [ 220.149462][T13806] RBP: 00007f3bb9057090 R08: 0000000000000000 R09: 0000000000000000 [ 220.149476][T13806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 220.149489][T13806] R13: 0000000000000000 R14: 00007f3bbabd5fa0 R15: 00007ffc180a7ed8 [ 220.149508][T13806] [ 220.850308][T13851] FAULT_INJECTION: forcing a failure. [ 220.850308][T13851] name failslab, interval 1, probability 0, space 0, times 0 [ 220.863134][T13851] CPU: 0 UID: 0 PID: 13851 Comm: syz.4.3838 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 220.873584][T13851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 220.883813][T13851] Call Trace: [ 220.887116][T13851] [ 220.890049][T13851] dump_stack_lvl+0xf2/0x150 [ 220.894679][T13851] dump_stack+0x15/0x1a [ 220.898934][T13851] should_fail_ex+0x223/0x230 [ 220.903640][T13851] should_failslab+0x8f/0xb0 [ 220.908272][T13851] kmem_cache_alloc_noprof+0x52/0x320 [ 220.913674][T13851] ? audit_log_start+0x34c/0x6b0 [ 220.918658][T13851] ? exc_page_fault+0x4fc/0x650 [ 220.923621][T13851] audit_log_start+0x34c/0x6b0 [ 220.928432][T13851] audit_seccomp+0x4b/0x130 [ 220.928583][T13851] __seccomp_filter+0x6fa/0x1180 [ 220.928621][T13851] ? __rcu_read_unlock+0x4e/0x70 [ 220.928655][T13851] ? bpf_trace_run2+0x123/0x1d0 [ 220.928769][T13851] ? putname+0xcf/0xf0 [ 220.928795][T13851] __secure_computing+0x9f/0x1c0 [ 220.928899][T13851] syscall_trace_enter+0xd1/0x1f0 [ 220.928991][T13851] ? fpregs_assert_state_consistent+0x83/0xa0 [ 220.929105][T13851] do_syscall_64+0xaa/0x1c0 [ 220.929133][T13851] ? clear_bhb_loop+0x55/0xb0 [ 220.929161][T13851] ? clear_bhb_loop+0x55/0xb0 [ 220.929221][T13851] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 220.929249][T13851] RIP: 0033:0x7f8778bc473c [ 220.929267][T13851] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 220.929291][T13851] RSP: 002b:00007f8777237030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 220.929320][T13851] RAX: ffffffffffffffda RBX: 00007f8778db5fa0 RCX: 00007f8778bc473c [ 220.929332][T13851] RDX: 000000000000000f RSI: 00007f87772370a0 RDI: 0000000000000005 [ 220.929344][T13851] RBP: 00007f8777237090 R08: 0000000000000000 R09: 0000000000000000 [ 220.929355][T13851] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 220.929367][T13851] R13: 0000000000000000 R14: 00007f8778db5fa0 R15: 00007fff4c592f28 [ 220.929388][T13851] [ 221.035985][T13858] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 221.152593][T13858] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 221.494496][T13827] syz.5.3829 (13827) used greatest stack depth: 7344 bytes left [ 221.686451][T13875] FAULT_INJECTION: forcing a failure. [ 221.686451][T13875] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 221.699249][T13879] binfmt_misc: register: failed to install interpreter file ./file0 [ 221.699550][T13875] CPU: 1 UID: 0 PID: 13875 Comm: syz.5.3847 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 221.718070][T13875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 221.728218][T13875] Call Trace: [ 221.731587][T13875] [ 221.734534][T13875] dump_stack_lvl+0xf2/0x150 [ 221.739177][T13875] dump_stack+0x15/0x1a [ 221.743481][T13875] should_fail_ex+0x223/0x230 [ 221.748176][T13875] should_fail+0xb/0x10 [ 221.752348][T13875] should_fail_usercopy+0x1a/0x20 [ 221.757382][T13875] _copy_from_iter+0xd5/0xd00 [ 221.762085][T13875] ? kmalloc_reserve+0x16e/0x190 [ 221.767227][T13875] ? __build_skb_around+0x196/0x1f0 [ 221.772453][T13875] ? __alloc_skb+0x21f/0x310 [ 221.777077][T13875] ? __virt_addr_valid+0x1ed/0x250 [ 221.782341][T13875] ? __check_object_size+0x364/0x520 [ 221.787696][T13875] netlink_sendmsg+0x460/0x6e0 [ 221.792497][T13875] ? __pfx_netlink_sendmsg+0x10/0x10 [ 221.797813][T13875] __sock_sendmsg+0x140/0x180 [ 221.802525][T13875] ____sys_sendmsg+0x312/0x410 [ 221.807344][T13875] __sys_sendmsg+0x19d/0x230 [ 221.812002][T13875] __x64_sys_sendmsg+0x46/0x50 [ 221.816795][T13875] x64_sys_call+0x2734/0x2dc0 [ 221.821492][T13875] do_syscall_64+0xc9/0x1c0 [ 221.826025][T13875] ? clear_bhb_loop+0x55/0xb0 [ 221.830790][T13875] ? clear_bhb_loop+0x55/0xb0 [ 221.835579][T13875] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 221.841571][T13875] RIP: 0033:0x7fa24b2c5d29 [ 221.846000][T13875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 221.865734][T13875] RSP: 002b:00007fa249937038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 221.874169][T13875] RAX: ffffffffffffffda RBX: 00007fa24b4b5fa0 RCX: 00007fa24b2c5d29 [ 221.882268][T13875] RDX: 0000000000040000 RSI: 0000000020000380 RDI: 0000000000000004 [ 221.890258][T13875] RBP: 00007fa249937090 R08: 0000000000000000 R09: 0000000000000000 [ 221.898266][T13875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 221.906252][T13875] R13: 0000000000000000 R14: 00007fa24b4b5fa0 R15: 00007ffcec65dc68 [ 221.914250][T13875] [ 222.193293][T13888] syz.6.3851[13888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.193408][T13888] syz.6.3851[13888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.209473][T13888] syz.6.3851[13888] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.380558][T13906] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 222.404097][T13906] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 222.406206][T13906] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 222.406251][T13906] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 223.681975][T13939] FAULT_INJECTION: forcing a failure. [ 223.681975][T13939] name failslab, interval 1, probability 0, space 0, times 0 [ 223.694658][T13939] CPU: 1 UID: 0 PID: 13939 Comm: syz.6.3867 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 223.705174][T13939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 223.715256][T13939] Call Trace: [ 223.718651][T13939] [ 223.721624][T13939] dump_stack_lvl+0xf2/0x150 [ 223.726251][T13939] dump_stack+0x15/0x1a [ 223.730468][T13939] should_fail_ex+0x223/0x230 [ 223.735215][T13939] ? tty_open+0x80/0xb00 [ 223.739475][T13939] should_failslab+0x8f/0xb0 [ 223.744109][T13939] __kmalloc_cache_noprof+0x4e/0x320 [ 223.749501][T13939] tty_open+0x80/0xb00 [ 223.753585][T13939] ? __pfx_exact_match+0x10/0x10 [ 223.758565][T13939] chrdev_open+0x2f9/0x370 [ 223.763051][T13939] ? __pfx_chrdev_open+0x10/0x10 [ 223.768045][T13939] do_dentry_open+0x621/0xa20 [ 223.772766][T13939] vfs_open+0x38/0x1f0 [ 223.776894][T13939] path_openat+0x1ac2/0x1fa0 [ 223.781522][T13939] do_filp_open+0x107/0x230 [ 223.786167][T13939] do_sys_openat2+0xab/0x120 [ 223.790818][T13939] __x64_sys_openat+0xf3/0x120 [ 223.795656][T13939] x64_sys_call+0x2b30/0x2dc0 [ 223.800353][T13939] do_syscall_64+0xc9/0x1c0 [ 223.804906][T13939] ? clear_bhb_loop+0x55/0xb0 [ 223.809647][T13939] ? clear_bhb_loop+0x55/0xb0 [ 223.814333][T13939] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 223.820302][T13939] RIP: 0033:0x7f042b4e4690 [ 223.824725][T13939] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 223.844390][T13939] RSP: 002b:00007f0429b56f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 223.852835][T13939] RAX: ffffffffffffffda RBX: 0000000000048260 RCX: 00007f042b4e4690 [ 223.860890][T13939] RDX: 0000000000048260 RSI: 00007f0429b56fa0 RDI: 00000000ffffff9c [ 223.868936][T13939] RBP: 00007f0429b56fa0 R08: 0000000000000000 R09: 00007f0429b56d17 [ 223.876938][T13939] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 223.884923][T13939] R13: 0000000000000000 R14: 00007f042b6d5fa0 R15: 00007ffc942dfff8 [ 223.892919][T13939] [ 224.029033][T13943] hub 2-0:1.0: USB hub found [ 224.029481][T13953] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=13953 comm=syz.4.3873 [ 224.033787][T13943] hub 2-0:1.0: 8 ports detected [ 224.082298][ T29] kauditd_printk_skb: 590 callbacks suppressed [ 224.082319][ T29] audit: type=1107 audit(1737513202.096:19447): pid=13952 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg=' [ 224.082319][ T29] ' [ 224.187567][T13954] netlink: 12 bytes leftover after parsing attributes in process `syz.6.3872'. [ 224.508296][ T29] audit: type=1326 audit(1737513202.536:19448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13970 comm="syz.4.3879" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 224.531995][ T29] audit: type=1326 audit(1737513202.536:19449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13970 comm="syz.4.3879" exe="/root/syz-executor" sig=0 arch=c000003e syscall=334 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 224.555700][ T29] audit: type=1326 audit(1737513202.536:19450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13970 comm="syz.4.3879" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 224.579484][ T29] audit: type=1326 audit(1737513202.536:19451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13970 comm="syz.4.3879" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 224.603322][ T29] audit: type=1326 audit(1737513202.536:19452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13970 comm="syz.4.3879" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 224.627122][ T29] audit: type=1326 audit(1737513202.536:19453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13970 comm="syz.4.3879" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 224.650813][ T29] audit: type=1326 audit(1737513202.536:19454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13970 comm="syz.4.3879" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 224.674682][ T29] audit: type=1326 audit(1737513202.536:19455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13970 comm="syz.4.3879" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 224.698299][ T29] audit: type=1326 audit(1737513202.536:19456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13970 comm="syz.4.3879" exe="/root/syz-executor" sig=0 arch=c000003e syscall=161 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 224.862572][T13992] netlink: 44 bytes leftover after parsing attributes in process `syz.0.3885'. [ 224.913163][T13989] netlink: 8 bytes leftover after parsing attributes in process `syz.5.3884'. [ 224.922327][T13989] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3884'. [ 224.931370][T13989] netlink: 'syz.5.3884': attribute type 14 has an invalid length. [ 224.939302][T13989] netlink: 'syz.5.3884': attribute type 11 has an invalid length. [ 225.780182][ T3375] kernel write not supported for file /327/attr/exec (pid: 3375 comm: kworker/0:3) [ 225.797312][T14029] xt_hashlimit: max too large, truncated to 1048576 [ 225.830389][T14029] Cannot find set identified by id 0 to match [ 225.976069][T14041] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=14041 comm=syz.0.3906 [ 225.998943][T14037] hub 2-0:1.0: USB hub found [ 226.003629][T14037] hub 2-0:1.0: 8 ports detected [ 226.049966][T14044] netlink: 3 bytes leftover after parsing attributes in process `syz.6.3907'. [ 226.173985][T14065] FAULT_INJECTION: forcing a failure. [ 226.173985][T14065] name failslab, interval 1, probability 0, space 0, times 0 [ 226.186871][T14065] CPU: 1 UID: 0 PID: 14065 Comm: syz.0.3915 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 226.197420][T14065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 226.207496][T14065] Call Trace: [ 226.207506][T14065] [ 226.207515][T14065] dump_stack_lvl+0xf2/0x150 [ 226.207578][T14065] dump_stack+0x15/0x1a [ 226.207691][T14065] should_fail_ex+0x223/0x230 [ 226.207722][T14065] ? audit_log_d_path+0x96/0x250 [ 226.207748][T14065] should_failslab+0x8f/0xb0 [ 226.207844][T14065] __kmalloc_cache_noprof+0x4e/0x320 [ 226.207948][T14065] audit_log_d_path+0x96/0x250 [ 226.208023][T14065] ? __rcu_read_unlock+0x4e/0x70 [ 226.208169][T14065] audit_log_d_path_exe+0x42/0x70 [ 226.208197][T14065] audit_log_task+0x192/0x1c0 [ 226.208225][T14065] audit_seccomp+0x68/0x130 [ 226.208283][T14065] __seccomp_filter+0x6fa/0x1180 [ 226.208323][T14065] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 226.208358][T14065] ? vfs_write+0x596/0x920 [ 226.208497][T14065] ? __schedule+0x6fa/0x930 [ 226.208574][T14065] __secure_computing+0x9f/0x1c0 [ 226.208640][T14065] syscall_trace_enter+0xd1/0x1f0 [ 226.208744][T14065] do_syscall_64+0xaa/0x1c0 [ 226.208771][T14065] ? clear_bhb_loop+0x55/0xb0 [ 226.208824][T14065] ? clear_bhb_loop+0x55/0xb0 [ 226.208849][T14065] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 226.208882][T14065] RIP: 0033:0x7f3bba9e5d29 [ 226.208961][T14065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 226.208983][T14065] RSP: 002b:00007f3bb9057038 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 226.209057][T14065] RAX: ffffffffffffffda RBX: 00007f3bbabd5fa0 RCX: 00007f3bba9e5d29 [ 226.209069][T14065] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000000000000003 [ 226.209080][T14065] RBP: 00007f3bb9057090 R08: 000000000406f413 R09: 0000000000000000 [ 226.209092][T14065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 226.209105][T14065] R13: 0000000000000000 R14: 00007f3bbabd5fa0 R15: 00007ffc180a7ed8 [ 226.209126][T14065] [ 226.372697][T14075] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3916'. [ 226.539931][T14088] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=14088 comm=syz.4.3923 [ 226.656425][T14092] netlink: 3 bytes leftover after parsing attributes in process `syz.6.3926'. [ 226.707816][T14096] FAULT_INJECTION: forcing a failure. [ 226.707816][T14096] name failslab, interval 1, probability 0, space 0, times 0 [ 226.720527][T14096] CPU: 0 UID: 0 PID: 14096 Comm: syz.4.3928 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 226.730975][T14096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 226.741044][T14096] Call Trace: [ 226.744407][T14096] [ 226.747393][T14096] dump_stack_lvl+0xf2/0x150 [ 226.752149][T14096] dump_stack+0x15/0x1a [ 226.756381][T14096] should_fail_ex+0x223/0x230 [ 226.761110][T14096] should_failslab+0x8f/0xb0 [ 226.765807][T14096] kmem_cache_alloc_noprof+0x52/0x320 [ 226.771245][T14096] ? dst_alloc+0xc0/0x100 [ 226.775597][T14096] ? __pfx_ip6_dst_gc+0x10/0x10 [ 226.780479][T14096] dst_alloc+0xc0/0x100 [ 226.784683][T14096] ip6_create_rt_rcu+0x130/0x2d0 [ 226.789732][T14096] ip6_pol_route_lookup+0xc29/0xe00 [ 226.795223][T14096] ? __pfx_ip6_pol_route_lookup+0x10/0x10 [ 226.800966][T14096] fib6_rule_lookup+0x3dd/0x4e0 [ 226.805831][T14096] ? __pfx_ip6_pol_route_lookup+0x10/0x10 [ 226.811571][T14096] ? ip6_mc_add_src+0x469/0x5c0 [ 226.816445][T14096] rt6_lookup+0xb9/0x120 [ 226.820745][T14096] ip6_mc_source+0x156/0x9a0 [ 226.825361][T14096] ? __ipv6_sock_mc_join+0x376/0x3f0 [ 226.830716][T14096] do_ipv6_mcast_group_source+0x36c/0x3b0 [ 226.836457][T14096] ? mntput_no_expire+0x70/0x3d0 [ 226.841412][T14096] ? mntput+0x49/0x70 [ 226.845415][T14096] ? terminate_walk+0x260/0x280 [ 226.850271][T14096] ? _raw_spin_unlock_bh+0x36/0x40 [ 226.855472][T14096] ? lock_sock_nested+0x10f/0x140 [ 226.860523][T14096] ? should_fail_ex+0xd7/0x230 [ 226.865313][T14096] do_ipv6_setsockopt+0x1288/0x2250 [ 226.870636][T14096] ? kstrtouint+0x77/0xc0 [ 226.875051][T14096] ? __rcu_read_unlock+0x4e/0x70 [ 226.880028][T14096] ? avc_has_perm_noaudit+0x1cc/0x210 [ 226.885465][T14096] ? selinux_netlbl_socket_setsockopt+0xe5/0x2d0 [ 226.891811][T14096] ipv6_setsockopt+0x57/0x130 [ 226.896531][T14096] udpv6_setsockopt+0x95/0xb0 [ 226.901240][T14096] sock_common_setsockopt+0x64/0x80 [ 226.906523][T14096] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 226.912437][T14096] __sys_setsockopt+0x187/0x200 [ 226.917442][T14096] __x64_sys_setsockopt+0x66/0x80 [ 226.922480][T14096] x64_sys_call+0x282e/0x2dc0 [ 226.927197][T14096] do_syscall_64+0xc9/0x1c0 [ 226.931715][T14096] ? clear_bhb_loop+0x55/0xb0 [ 226.936484][T14096] ? clear_bhb_loop+0x55/0xb0 [ 226.941169][T14096] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 226.947077][T14096] RIP: 0033:0x7f8778bc5d29 [ 226.951497][T14096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 226.971115][T14096] RSP: 002b:00007f8777237038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 226.979566][T14096] RAX: ffffffffffffffda RBX: 00007f8778db5fa0 RCX: 00007f8778bc5d29 [ 226.987544][T14096] RDX: 000000000000002e RSI: 0000000000000029 RDI: 0000000000000003 [ 226.995547][T14096] RBP: 00007f8777237090 R08: 0000000000000108 R09: 0000000000000000 [ 227.003600][T14096] R10: 0000000020000200 R11: 0000000000000246 R12: 0000000000000001 [ 227.011577][T14096] R13: 0000000000000000 R14: 00007f8778db5fa0 R15: 00007fff4c592f28 [ 227.019658][T14096] [ 227.179628][T14102] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=14102 comm=syz.4.3930 [ 227.550686][T14119] FAULT_INJECTION: forcing a failure. [ 227.550686][T14119] name failslab, interval 1, probability 0, space 0, times 0 [ 227.563669][T14119] CPU: 1 UID: 0 PID: 14119 Comm: syz.1.3938 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 227.574114][T14119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 227.584200][T14119] Call Trace: [ 227.587574][T14119] [ 227.590602][T14119] dump_stack_lvl+0xf2/0x150 [ 227.595294][T14119] dump_stack+0x15/0x1a [ 227.599501][T14119] should_fail_ex+0x223/0x230 [ 227.604247][T14119] ? audit_log_d_path+0x96/0x250 [ 227.609230][T14119] should_failslab+0x8f/0xb0 [ 227.613897][T14119] __kmalloc_cache_noprof+0x4e/0x320 [ 227.619235][T14119] audit_log_d_path+0x96/0x250 [ 227.624032][T14119] ? __rcu_read_unlock+0x4e/0x70 [ 227.629154][T14119] audit_log_d_path_exe+0x42/0x70 [ 227.634324][T14119] audit_log_task+0x192/0x1c0 [ 227.639030][T14119] audit_seccomp+0x68/0x130 [ 227.643644][T14119] __seccomp_filter+0x6fa/0x1180 [ 227.648617][T14119] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 227.654381][T14119] ? vfs_write+0x596/0x920 [ 227.658822][T14119] ? __schedule+0x6fa/0x930 [ 227.663374][T14119] __secure_computing+0x9f/0x1c0 [ 227.668356][T14119] syscall_trace_enter+0xd1/0x1f0 [ 227.673564][T14119] do_syscall_64+0xaa/0x1c0 [ 227.678135][T14119] ? clear_bhb_loop+0x55/0xb0 [ 227.682829][T14119] ? clear_bhb_loop+0x55/0xb0 [ 227.687593][T14119] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 227.693565][T14119] RIP: 0033:0x7fe202b25d29 [ 227.698004][T14119] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 227.717889][T14119] RSP: 002b:00007fe201197038 EFLAGS: 00000246 ORIG_RAX: 0000000000000059 [ 227.726361][T14119] RAX: ffffffffffffffda RBX: 00007fe202d15fa0 RCX: 00007fe202b25d29 [ 227.734422][T14119] RDX: 0000000000000bd5 RSI: 0000000020000e00 RDI: 0000000020000000 [ 227.742483][T14119] RBP: 00007fe201197090 R08: 0000000000000000 R09: 0000000000000000 [ 227.750458][T14119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 227.758586][T14119] R13: 0000000000000000 R14: 00007fe202d15fa0 R15: 00007ffce965ea78 [ 227.766628][T14119] [ 227.796677][T14122] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 227.826669][T14122] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 227.842353][T14122] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 227.851303][T14122] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 227.906540][T14134] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=14134 comm=syz.1.3943 [ 227.970355][T14142] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 227.984801][T14142] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 228.049181][T14148] netlink: 'syz.1.3948': attribute type 29 has an invalid length. [ 228.058221][T14148] netlink: 'syz.1.3948': attribute type 29 has an invalid length. [ 228.068175][T14148] netlink: 500 bytes leftover after parsing attributes in process `syz.1.3948'. [ 228.077440][T14148] unsupported nla_type 40 [ 228.467513][T14169] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 228.495690][T14169] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 228.540941][T14169] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 228.574803][T14169] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 228.604839][T14176] veth0_vlan: entered allmulticast mode [ 228.955476][T14194] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 228.963982][T14194] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 228.973034][T14185] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3963'. [ 229.086538][T14194] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 229.105072][ T29] kauditd_printk_skb: 2546 callbacks suppressed [ 229.105090][ T29] audit: type=1326 audit(1737513207.126:22003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14184 comm="syz.1.3963" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fe202b1cce7 code=0x7ffc0000 [ 229.134919][ T29] audit: type=1326 audit(1737513207.126:22004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14184 comm="syz.1.3963" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fe202ac1f29 code=0x7ffc0000 [ 229.158538][ T29] audit: type=1326 audit(1737513207.126:22005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14184 comm="syz.1.3963" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe202b25d29 code=0x7ffc0000 [ 229.182216][ T29] audit: type=1326 audit(1737513207.126:22006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14184 comm="syz.1.3963" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fe202b1cce7 code=0x7ffc0000 [ 229.205718][ T29] audit: type=1326 audit(1737513207.126:22007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14184 comm="syz.1.3963" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fe202ac1f29 code=0x7ffc0000 [ 229.229309][ T29] audit: type=1326 audit(1737513207.126:22008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14184 comm="syz.1.3963" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe202b25d29 code=0x7ffc0000 [ 229.252969][ T29] audit: type=1326 audit(1737513207.126:22009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14184 comm="syz.1.3963" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fe202b1cce7 code=0x7ffc0000 [ 229.276539][ T29] audit: type=1326 audit(1737513207.126:22010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14184 comm="syz.1.3963" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fe202ac1f29 code=0x7ffc0000 [ 229.300167][ T29] audit: type=1326 audit(1737513207.126:22011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14184 comm="syz.1.3963" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fe202b1cce7 code=0x7ffc0000 [ 229.323892][ T29] audit: type=1326 audit(1737513207.126:22012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14184 comm="syz.1.3963" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fe202ac1f29 code=0x7ffc0000 [ 229.347948][T14194] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 229.421353][T14202] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2586 sclass=netlink_xfrm_socket pid=14202 comm=syz.1.3969 [ 229.443036][T14205] netlink: 3 bytes leftover after parsing attributes in process `syz.0.3970'. [ 229.902690][T14224] hub 2-0:1.0: USB hub found [ 229.913021][T14224] hub 2-0:1.0: 8 ports detected [ 230.436726][T14245] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 230.585025][T14253] hub 2-0:1.0: USB hub found [ 230.602039][T14253] hub 2-0:1.0: 8 ports detected [ 231.113018][T14272] netlink: 3 bytes leftover after parsing attributes in process `syz.1.3994'. [ 231.363714][T14289] netlink: 3 bytes leftover after parsing attributes in process `syz.1.4000'. [ 231.458465][T14292] hub 2-0:1.0: USB hub found [ 231.463265][T14292] hub 2-0:1.0: 8 ports detected [ 231.561674][T14297] netlink: 16 bytes leftover after parsing attributes in process `syz.4.4004'. [ 231.611057][T14303] netlink: 3 bytes leftover after parsing attributes in process `syz.6.4006'. [ 231.861687][T14312] netlink: 3 bytes leftover after parsing attributes in process `syz.5.4010'. [ 231.949138][T14319] netlink: 3 bytes leftover after parsing attributes in process `syz.5.4012'. [ 232.499669][T14349] netlink: 3 bytes leftover after parsing attributes in process `syz.4.4024'. [ 232.797514][T14361] netlink: 3 bytes leftover after parsing attributes in process `syz.4.4029'. [ 232.863589][T14367] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=14367 comm=syz.6.4032 [ 232.880109][T14363] hub 2-0:1.0: USB hub found [ 232.884774][T14363] hub 2-0:1.0: 8 ports detected [ 232.953673][T14371] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 232.962424][T14371] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 232.987913][T14373] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 232.996536][T14373] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 233.160995][T14378] block device autoloading is deprecated and will be removed. [ 233.565226][T14392] netlink: 3 bytes leftover after parsing attributes in process `syz.4.4043'. [ 233.589772][T14388] hub 2-0:1.0: USB hub found [ 233.594507][T14388] hub 2-0:1.0: 8 ports detected [ 233.693861][T14397] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=14397 comm=syz.1.4045 [ 233.695205][T14399] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=14399 comm=syz.4.4046 [ 233.833642][T14412] FAULT_INJECTION: forcing a failure. [ 233.833642][T14412] name failslab, interval 1, probability 0, space 0, times 0 [ 233.846506][T14412] CPU: 1 UID: 0 PID: 14412 Comm: syz.4.4053 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 233.856995][T14412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 233.867070][T14412] Call Trace: [ 233.870360][T14412] [ 233.873312][T14412] dump_stack_lvl+0xf2/0x150 [ 233.878111][T14412] dump_stack+0x15/0x1a [ 233.882370][T14412] should_fail_ex+0x223/0x230 [ 233.887068][T14412] should_failslab+0x8f/0xb0 [ 233.891735][T14412] __kmalloc_node_noprof+0xad/0x410 [ 233.896964][T14412] ? qdisc_alloc+0x65/0x450 [ 233.901500][T14412] qdisc_alloc+0x65/0x450 [ 233.905878][T14412] qdisc_create+0xe5/0xae0 [ 233.905932][T14420] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4051'. [ 233.910323][T14412] ? __nla_parse+0x40/0x60 [ 233.923699][T14412] tc_modify_qdisc+0x65f/0x1050 [ 233.928585][T14412] ? ns_capable+0x7d/0xb0 [ 233.932948][T14412] ? __pfx_tc_modify_qdisc+0x10/0x10 [ 233.938310][T14412] rtnetlink_rcv_msg+0x6aa/0x710 [ 233.943284][T14412] ? ref_tracker_free+0x3a5/0x410 [ 233.948422][T14412] ? __dev_queue_xmit+0x186/0x2090 [ 233.953578][T14412] netlink_rcv_skb+0x12c/0x230 [ 233.958402][T14412] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 233.964116][T14412] rtnetlink_rcv+0x1c/0x30 [ 233.968623][T14412] netlink_unicast+0x599/0x670 [ 233.973439][T14412] netlink_sendmsg+0x5cc/0x6e0 [ 233.978307][T14412] ? __pfx_netlink_sendmsg+0x10/0x10 [ 233.983659][T14412] __sock_sendmsg+0x140/0x180 [ 233.988376][T14412] ____sys_sendmsg+0x312/0x410 [ 233.993195][T14412] __sys_sendmsg+0x19d/0x230 [ 233.997842][T14412] __x64_sys_sendmsg+0x46/0x50 [ 234.002741][T14412] x64_sys_call+0x2734/0x2dc0 [ 234.007515][T14412] do_syscall_64+0xc9/0x1c0 [ 234.012047][T14412] ? clear_bhb_loop+0x55/0xb0 [ 234.016753][T14412] ? clear_bhb_loop+0x55/0xb0 [ 234.021440][T14412] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 234.027433][T14412] RIP: 0033:0x7f8778bc5d29 [ 234.031857][T14412] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 234.051480][T14412] RSP: 002b:00007f8777237038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 234.059909][T14412] RAX: ffffffffffffffda RBX: 00007f8778db5fa0 RCX: 00007f8778bc5d29 [ 234.067946][T14412] RDX: 0000000000000000 RSI: 0000000020001200 RDI: 0000000000000004 [ 234.075918][T14412] RBP: 00007f8777237090 R08: 0000000000000000 R09: 0000000000000000 [ 234.083969][T14412] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 234.091990][T14412] R13: 0000000000000000 R14: 00007f8778db5fa0 R15: 00007fff4c592f28 [ 234.099984][T14412] [ 234.162692][T14431] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=14431 comm=syz.0.4058 [ 234.215965][ T29] kauditd_printk_skb: 1064 callbacks suppressed [ 234.215983][ T29] audit: type=1107 audit(1737513212.245:23077): pid=14430 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg=' [ 234.215983][ T29] ' [ 234.222947][T14436] FAULT_INJECTION: forcing a failure. [ 234.222947][T14436] name failslab, interval 1, probability 0, space 0, times 0 [ 234.254622][T14436] CPU: 0 UID: 0 PID: 14436 Comm: syz.4.4060 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 234.265166][T14436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 234.275395][T14436] Call Trace: [ 234.278697][T14436] [ 234.281700][T14436] dump_stack_lvl+0xf2/0x150 [ 234.286360][T14436] dump_stack+0x15/0x1a [ 234.290584][T14436] should_fail_ex+0x223/0x230 [ 234.295299][T14436] should_failslab+0x8f/0xb0 [ 234.299937][T14436] kmem_cache_alloc_noprof+0x52/0x320 [ 234.305500][T14436] ? security_file_alloc+0x32/0x100 [ 234.310740][T14436] security_file_alloc+0x32/0x100 [ 234.315857][T14436] init_file+0x5b/0x1b0 [ 234.320033][T14436] alloc_empty_file+0xea/0x200 [ 234.324901][T14436] alloc_file_pseudo+0xc3/0x140 [ 234.329783][T14436] __shmem_file_setup+0x1bb/0x1f0 [ 234.331260][T14433] hub 2-0:1.0: USB hub found [ 234.334845][T14436] shmem_file_setup+0x3b/0x50 [ 234.344253][T14436] __se_sys_memfd_create+0x31d/0x5c0 [ 234.345790][T14433] hub 2-0:1.0: 8 ports detected [ 234.349556][T14436] __x64_sys_memfd_create+0x31/0x40 [ 234.359738][T14436] x64_sys_call+0x2d4c/0x2dc0 [ 234.364471][T14436] do_syscall_64+0xc9/0x1c0 [ 234.369090][T14436] ? clear_bhb_loop+0x55/0xb0 [ 234.373866][T14436] ? clear_bhb_loop+0x55/0xb0 [ 234.378617][T14436] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 234.384535][T14436] RIP: 0033:0x7f8778bc5d29 [ 234.388971][T14436] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 234.408627][T14436] RSP: 002b:00007f8777236e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 234.417181][T14436] RAX: ffffffffffffffda RBX: 000000000000050a RCX: 00007f8778bc5d29 [ 234.425228][T14436] RDX: 00007f8777236ef0 RSI: 0000000000000000 RDI: 00007f8778c42469 [ 234.433239][T14436] RBP: 0000000020000200 R08: 00007f8777236bb7 R09: 00007f8777236e40 [ 234.441245][T14436] R10: 000000000000000a R11: 0000000000000202 R12: 00000000200001c0 [ 234.449220][T14436] R13: 00007f8777236ef0 R14: 00007f8777236eb0 R15: 0000000020000940 [ 234.457261][T14436] [ 234.471068][T14451] FAULT_INJECTION: forcing a failure. [ 234.471068][T14451] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 234.484382][T14451] CPU: 0 UID: 0 PID: 14451 Comm: syz.5.4062 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 234.494820][T14451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 234.501861][ T29] audit: type=1326 audit(1737513212.535:23078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14457 comm="syz.4.4064" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 234.504941][T14451] Call Trace: [ 234.504950][T14451] [ 234.504959][T14451] dump_stack_lvl+0xf2/0x150 [ 234.539933][T14451] dump_stack+0x15/0x1a [ 234.544128][T14451] should_fail_ex+0x223/0x230 [ 234.548859][T14451] should_fail+0xb/0x10 [ 234.553100][T14451] should_fail_usercopy+0x1a/0x20 [ 234.558180][T14451] _copy_to_user+0x20/0xa0 [ 234.562620][T14451] simple_read_from_buffer+0xa0/0x110 [ 234.568019][T14451] proc_fail_nth_read+0xf9/0x140 [ 234.573017][T14451] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 234.578591][T14451] vfs_read+0x1a2/0x700 [ 234.582828][T14451] ? __rcu_read_unlock+0x4e/0x70 [ 234.587819][T14451] ? __fget_files+0x17c/0x1c0 [ 234.592510][T14451] ksys_read+0xe8/0x1b0 [ 234.596690][T14451] __x64_sys_read+0x42/0x50 [ 234.601320][T14451] x64_sys_call+0x2874/0x2dc0 [ 234.606009][T14451] do_syscall_64+0xc9/0x1c0 [ 234.610691][T14451] ? clear_bhb_loop+0x55/0xb0 [ 234.615384][T14451] ? clear_bhb_loop+0x55/0xb0 [ 234.620148][T14451] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 234.626109][T14451] RIP: 0033:0x7fa24b2c473c [ 234.630530][T14451] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 234.650240][T14451] RSP: 002b:00007fa249937030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 234.658676][T14451] RAX: ffffffffffffffda RBX: 00007fa24b4b5fa0 RCX: 00007fa24b2c473c [ 234.666684][T14451] RDX: 000000000000000f RSI: 00007fa2499370a0 RDI: 0000000000000005 [ 234.674662][T14451] RBP: 00007fa249937090 R08: 0000000000000000 R09: 0000000000000000 [ 234.682688][T14451] R10: 0000000020000180 R11: 0000000000000246 R12: 0000000000000001 [ 234.690690][T14451] R13: 0000000000000000 R14: 00007fa24b4b5fa0 R15: 00007ffcec65dc68 [ 234.698680][T14451] [ 234.713718][ T29] audit: type=1326 audit(1737513212.535:23079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14457 comm="syz.4.4064" exe="/root/syz-executor" sig=0 arch=c000003e syscall=334 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 234.740561][ T29] audit: type=1326 audit(1737513212.535:23080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14457 comm="syz.4.4064" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 234.764410][ T29] audit: type=1326 audit(1737513212.535:23081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14457 comm="syz.4.4064" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 234.787925][ T29] audit: type=1326 audit(1737513212.535:23082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14457 comm="syz.4.4064" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 234.811641][ T29] audit: type=1326 audit(1737513212.535:23083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14457 comm="syz.4.4064" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 234.835240][ T29] audit: type=1326 audit(1737513212.535:23084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14457 comm="syz.4.4064" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 234.860452][ T29] audit: type=1326 audit(1737513212.535:23085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14457 comm="syz.4.4064" exe="/root/syz-executor" sig=0 arch=c000003e syscall=161 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 234.884477][ T29] audit: type=1326 audit(1737513212.535:23086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14457 comm="syz.4.4064" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8778bc5d29 code=0x7ffc0000 [ 235.126384][T14481] Falling back ldisc for ttyS3. [ 235.150688][T14496] netlink: 'syz.5.4077': attribute type 62 has an invalid length. [ 235.270851][T14505] FAULT_INJECTION: forcing a failure. [ 235.270851][T14505] name failslab, interval 1, probability 0, space 0, times 0 [ 235.283690][T14505] CPU: 0 UID: 0 PID: 14505 Comm: syz.1.4081 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 235.294137][T14505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 235.304228][T14505] Call Trace: [ 235.307528][T14505] [ 235.310555][T14505] dump_stack_lvl+0xf2/0x150 [ 235.315192][T14505] dump_stack+0x15/0x1a [ 235.319383][T14505] should_fail_ex+0x223/0x230 [ 235.324192][T14505] ? syslog_print+0x74/0x760 [ 235.325706][T14508] FAULT_INJECTION: forcing a failure. [ 235.325706][T14508] name failslab, interval 1, probability 0, space 0, times 0 [ 235.328804][T14505] should_failslab+0x8f/0xb0 [ 235.328848][T14505] __kmalloc_cache_noprof+0x4e/0x320 [ 235.351352][T14505] ? _parse_integer+0x27/0x30 [ 235.356041][T14505] syslog_print+0x74/0x760 [ 235.360521][T14505] ? avc_has_perm_noaudit+0x1cc/0x210 [ 235.365980][T14505] ? __rcu_read_unlock+0x4e/0x70 [ 235.370942][T14505] ? avc_has_perm_noaudit+0x1cc/0x210 [ 235.376381][T14505] ? selinux_syslog+0xec/0x100 [ 235.381239][T14505] do_syslog+0x3a1/0x7f0 [ 235.385507][T14505] ? __fget_files+0x17c/0x1c0 [ 235.390262][T14505] ? ksys_write+0x176/0x1b0 [ 235.394827][T14505] __x64_sys_syslog+0x43/0x50 [ 235.399600][T14505] x64_sys_call+0x29be/0x2dc0 [ 235.404286][T14505] do_syscall_64+0xc9/0x1c0 [ 235.408797][T14505] ? clear_bhb_loop+0x55/0xb0 [ 235.413486][T14505] ? clear_bhb_loop+0x55/0xb0 [ 235.418192][T14505] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 235.424123][T14505] RIP: 0033:0x7fe202b25d29 [ 235.428548][T14505] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 235.448211][T14505] RSP: 002b:00007fe201197038 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 235.456650][T14505] RAX: ffffffffffffffda RBX: 00007fe202d15fa0 RCX: 00007fe202b25d29 [ 235.464628][T14505] RDX: 0000000000000057 RSI: 0000000020001940 RDI: 0000000000000002 [ 235.472603][T14505] RBP: 00007fe201197090 R08: 0000000000000000 R09: 0000000000000000 [ 235.480587][T14505] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 235.488742][T14505] R13: 0000000000000000 R14: 00007fe202d15fa0 R15: 00007ffce965ea78 [ 235.496728][T14505] [ 235.499752][T14508] CPU: 1 UID: 0 PID: 14508 Comm: syz.6.4082 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 235.510285][T14508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 235.520363][T14508] Call Trace: [ 235.523681][T14508] [ 235.526627][T14508] dump_stack_lvl+0xf2/0x150 [ 235.531297][T14508] dump_stack+0x15/0x1a [ 235.535481][T14508] should_fail_ex+0x223/0x230 [ 235.540305][T14508] should_failslab+0x8f/0xb0 [ 235.544970][T14508] kmem_cache_alloc_noprof+0x52/0x320 [ 235.550414][T14508] ? hashtab_duplicate+0x10f/0x370 [ 235.555574][T14508] hashtab_duplicate+0x10f/0x370 [ 235.560650][T14508] ? __pfx_cond_bools_copy+0x10/0x10 [ 235.565963][T14508] ? __pfx_cond_bools_destroy+0x10/0x10 [ 235.571664][T14508] cond_policydb_dup+0xdb/0x710 [ 235.576553][T14508] ? __kmalloc_node_track_caller_noprof+0x1e4/0x410 [ 235.583181][T14508] ? security_set_bools+0x8b/0x350 [ 235.588380][T14508] security_set_bools+0xa8/0x350 [ 235.593344][T14508] ? sel_commit_bools_write+0x164/0x260 [ 235.598917][T14508] sel_commit_bools_write+0x1de/0x260 [ 235.604307][T14508] vfs_writev+0x3fb/0x880 [ 235.608660][T14508] ? __pfx_sel_commit_bools_write+0x10/0x10 [ 235.614594][T14508] ? mutex_lock+0xd/0x40 [ 235.619004][T14508] do_writev+0xf4/0x220 [ 235.623174][T14508] __x64_sys_writev+0x45/0x50 [ 235.627873][T14508] x64_sys_call+0x1fab/0x2dc0 [ 235.632559][T14508] do_syscall_64+0xc9/0x1c0 [ 235.637092][T14508] ? clear_bhb_loop+0x55/0xb0 [ 235.641862][T14508] ? clear_bhb_loop+0x55/0xb0 [ 235.646579][T14508] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 235.652521][T14508] RIP: 0033:0x7f042b4e5d29 [ 235.656938][T14508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 235.676617][T14508] RSP: 002b:00007f0429b36038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 235.685052][T14508] RAX: ffffffffffffffda RBX: 00007f042b6d6080 RCX: 00007f042b4e5d29 [ 235.693197][T14508] RDX: 0000000000000001 RSI: 00000000200025c0 RDI: 0000000000000003 [ 235.701266][T14508] RBP: 00007f0429b36090 R08: 0000000000000000 R09: 0000000000000000 [ 235.709251][T14508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 235.717232][T14508] R13: 0000000000000000 R14: 00007f042b6d6080 R15: 00007ffc942dfff8 [ 235.725264][T14508] [ 235.758938][T14513] tipc: Started in network mode [ 235.763844][T14513] tipc: Node identity 7, cluster identity 4711 [ 235.770149][T14513] tipc: Node number set to 7 [ 235.883695][T14523] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 235.913772][T14524] bridge0: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 236.637850][T14557] hub 2-0:1.0: USB hub found [ 236.671327][T14557] hub 2-0:1.0: 8 ports detected [ 236.836591][T14560] __nla_validate_parse: 3 callbacks suppressed [ 236.836667][T14560] netlink: 3 bytes leftover after parsing attributes in process `syz.6.4101'. [ 237.342269][T14583] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4110'. [ 237.448851][T14592] netlink: 'syz.1.4113': attribute type 10 has an invalid length. [ 237.506670][T14592] team0: Port device netdevsim1 added [ 237.547312][T14595] FAULT_INJECTION: forcing a failure. [ 237.547312][T14595] name failslab, interval 1, probability 0, space 0, times 0 [ 237.560022][T14595] CPU: 0 UID: 0 PID: 14595 Comm: syz.6.4114 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 237.562681][T14597] netlink: 20 bytes leftover after parsing attributes in process `syz.1.4115'. [ 237.570439][T14595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 237.570458][T14595] Call Trace: [ 237.570466][T14595] [ 237.570476][T14595] dump_stack_lvl+0xf2/0x150 [ 237.570522][T14595] dump_stack+0x15/0x1a [ 237.604537][T14595] should_fail_ex+0x223/0x230 [ 237.609261][T14595] should_failslab+0x8f/0xb0 [ 237.613900][T14595] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 237.620280][T14595] ? strcmp+0x21/0x50 [ 237.624366][T14595] ? vfs_getxattr_alloc+0x334/0x3b0 [ 237.625187][T14597] netlink: 16 bytes leftover after parsing attributes in process `syz.1.4115'. [ 237.629609][T14595] krealloc_noprof+0xb6/0x2a0 [ 237.629647][T14595] vfs_getxattr_alloc+0x334/0x3b0 [ 237.648315][T14595] cap_inode_getsecurity+0xab/0x500 [ 237.653621][T14595] security_inode_getsecurity+0x92/0xe0 [ 237.659219][T14595] vfs_getxattr+0x17f/0x220 [ 237.663761][T14595] do_getxattr+0x10c/0x270 [ 237.668289][T14595] filename_getxattr+0xad/0x150 [ 237.673188][T14595] path_getxattrat+0x160/0x290 [ 237.678076][T14595] __x64_sys_lgetxattr+0x5f/0x70 [ 237.683188][T14595] x64_sys_call+0x2720/0x2dc0 [ 237.687923][T14595] do_syscall_64+0xc9/0x1c0 [ 237.692471][T14595] ? clear_bhb_loop+0x55/0xb0 [ 237.697172][T14595] ? clear_bhb_loop+0x55/0xb0 [ 237.701909][T14595] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 237.707827][T14595] RIP: 0033:0x7f042b4e5d29 [ 237.712254][T14595] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 237.732067][T14595] RSP: 002b:00007f0429b57038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c0 [ 237.740616][T14595] RAX: ffffffffffffffda RBX: 00007f042b6d5fa0 RCX: 00007f042b4e5d29 [ 237.748601][T14595] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000020000000 [ 237.756687][T14595] RBP: 00007f0429b57090 R08: 0000000000000000 R09: 0000000000000000 [ 237.764670][T14595] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 237.772656][T14595] R13: 0000000000000000 R14: 00007f042b6d5fa0 R15: 00007ffc942dfff8 [ 237.780648][T14595] [ 237.794153][T14601] netlink: 48 bytes leftover after parsing attributes in process `syz.4.4116'. [ 237.826928][ T9627] kernel write not supported for file /vcs (pid: 9627 comm: kworker/0:10) [ 237.881120][T14613] FAULT_INJECTION: forcing a failure. [ 237.881120][T14613] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 237.894408][T14613] CPU: 1 UID: 0 PID: 14613 Comm: syz.4.4122 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 237.904942][T14613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 237.915022][T14613] Call Trace: [ 237.918375][T14613] [ 237.921371][T14613] dump_stack_lvl+0xf2/0x150 [ 237.926276][T14613] dump_stack+0x15/0x1a [ 237.930538][T14613] should_fail_ex+0x223/0x230 [ 237.935245][T14613] should_fail+0xb/0x10 [ 237.939497][T14613] should_fail_usercopy+0x1a/0x20 [ 237.944624][T14613] _copy_from_user+0x1c/0xa0 [ 237.949459][T14613] copy_msghdr_from_user+0x54/0x2a0 [ 237.954693][T14613] ? __fget_files+0x17c/0x1c0 [ 237.959409][T14613] __sys_sendmmsg+0x1e8/0x4b0 [ 237.964130][T14613] __x64_sys_sendmmsg+0x57/0x70 [ 237.969132][T14613] x64_sys_call+0x29aa/0x2dc0 [ 237.973829][T14613] do_syscall_64+0xc9/0x1c0 [ 237.978427][T14613] ? clear_bhb_loop+0x55/0xb0 [ 237.983120][T14613] ? clear_bhb_loop+0x55/0xb0 [ 237.987813][T14613] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 237.993814][T14613] RIP: 0033:0x7f8778bc5d29 [ 237.998249][T14613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 238.017929][T14613] RSP: 002b:00007f8777237038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 238.026368][T14613] RAX: ffffffffffffffda RBX: 00007f8778db5fa0 RCX: 00007f8778bc5d29 [ 238.034344][T14613] RDX: 0000000000000001 RSI: 0000000020001b40 RDI: 0000000000000004 [ 238.042324][T14613] RBP: 00007f8777237090 R08: 0000000000000000 R09: 0000000000000000 [ 238.050312][T14613] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000001 [ 238.058348][T14613] R13: 0000000000000000 R14: 00007f8778db5fa0 R15: 00007fff4c592f28 [ 238.066388][T14613] [ 238.173554][T14629] FAULT_INJECTION: forcing a failure. [ 238.173554][T14629] name failslab, interval 1, probability 0, space 0, times 0 [ 238.186363][T14629] CPU: 0 UID: 0 PID: 14629 Comm: syz.4.4130 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 238.196881][T14629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 238.206952][T14629] Call Trace: [ 238.210238][T14629] [ 238.213225][T14629] dump_stack_lvl+0xf2/0x150 [ 238.217846][T14629] dump_stack+0x15/0x1a [ 238.222043][T14629] should_fail_ex+0x223/0x230 [ 238.226818][T14629] ? __se_sys_mount+0xf2/0x2d0 [ 238.231619][T14629] should_failslab+0x8f/0xb0 [ 238.236267][T14629] __kmalloc_cache_noprof+0x4e/0x320 [ 238.241582][T14629] ? memdup_user+0x9f/0xc0 [ 238.246061][T14629] __se_sys_mount+0xf2/0x2d0 [ 238.250703][T14629] ? fput+0x1c4/0x200 [ 238.254878][T14629] ? ksys_write+0x176/0x1b0 [ 238.259421][T14629] __x64_sys_mount+0x67/0x80 [ 238.264108][T14629] x64_sys_call+0x2c84/0x2dc0 [ 238.268808][T14629] do_syscall_64+0xc9/0x1c0 [ 238.273349][T14629] ? clear_bhb_loop+0x55/0xb0 [ 238.278104][T14629] ? clear_bhb_loop+0x55/0xb0 [ 238.282809][T14629] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 238.288730][T14629] RIP: 0033:0x7f8778bc5d29 [ 238.293193][T14629] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 238.312832][T14629] RSP: 002b:00007f8777237038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 238.321301][T14629] RAX: ffffffffffffffda RBX: 00007f8778db5fa0 RCX: 00007f8778bc5d29 [ 238.329296][T14629] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000000000000 [ 238.337295][T14629] RBP: 00007f8777237090 R08: 0000000020000400 R09: 0000000000000000 [ 238.345348][T14629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 238.353406][T14629] R13: 0000000000000000 R14: 00007f8778db5fa0 R15: 00007fff4c592f28 [ 238.353453][T14629] [ 238.989330][T14674] netlink: 'syz.0.4147': attribute type 10 has an invalid length. [ 239.001766][T14674] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 239.044615][T14680] netlink: 8 bytes leftover after parsing attributes in process `syz.6.4150'. [ 239.290120][ T29] kauditd_printk_skb: 331 callbacks suppressed [ 239.290135][ T29] audit: type=1326 audit(1737513217.335:23418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14694 comm="syz.1.4156" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe202b25d29 code=0x7ffc0000 [ 239.323313][ T29] audit: type=1326 audit(1737513217.335:23419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14694 comm="syz.1.4156" exe="/root/syz-executor" sig=0 arch=c000003e syscall=334 compat=0 ip=0x7fe202b25d29 code=0x7ffc0000 [ 239.347014][ T29] audit: type=1326 audit(1737513217.335:23420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14694 comm="syz.1.4156" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe202b25d29 code=0x7ffc0000 [ 239.370710][ T29] audit: type=1326 audit(1737513217.335:23421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14694 comm="syz.1.4156" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe202b25d29 code=0x7ffc0000 [ 239.394366][ T29] audit: type=1326 audit(1737513217.335:23422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14694 comm="syz.1.4156" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fe202b25d29 code=0x7ffc0000 [ 239.401205][T14702] hub 2-0:1.0: USB hub found [ 239.417847][ T29] audit: type=1326 audit(1737513217.335:23423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14694 comm="syz.1.4156" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe202b25d29 code=0x7ffc0000 [ 239.424884][T14702] hub 2-0:1.0: 8 ports detected [ 239.446104][ T29] audit: type=1326 audit(1737513217.335:23424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14694 comm="syz.1.4156" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe202b25d29 code=0x7ffc0000 [ 239.446141][ T29] audit: type=1326 audit(1737513217.335:23425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14694 comm="syz.1.4156" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7fe202b25d29 code=0x7ffc0000 [ 239.498290][ T29] audit: type=1326 audit(1737513217.335:23426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14694 comm="syz.1.4156" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe202b25d29 code=0x7ffc0000 [ 239.498369][ T29] audit: type=1326 audit(1737513217.335:23427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14694 comm="syz.1.4156" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe202b25d29 code=0x7ffc0000 [ 239.727974][T14724] netlink: 3 bytes leftover after parsing attributes in process `syz.1.4168'. [ 239.871549][T14735] xt_recent: Unsupported userspace flags (00000042) [ 239.891744][T14735] tun0: tun_chr_ioctl cmd 1074812118 [ 239.995904][T14743] netlink: 'syz.4.4172': attribute type 4 has an invalid length. [ 240.023280][T14747] FAULT_INJECTION: forcing a failure. [ 240.023280][T14747] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 240.036548][T14747] CPU: 0 UID: 0 PID: 14747 Comm: syz.0.4176 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 240.047026][T14747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 240.057369][T14747] Call Trace: [ 240.060655][T14747] [ 240.063595][T14747] dump_stack_lvl+0xf2/0x150 [ 240.068285][T14747] dump_stack+0x15/0x1a [ 240.072564][T14747] should_fail_ex+0x223/0x230 [ 240.077256][T14747] should_fail+0xb/0x10 [ 240.081462][T14747] should_fail_usercopy+0x1a/0x20 [ 240.086551][T14747] _copy_from_user+0x1c/0xa0 [ 240.091277][T14747] copy_msghdr_from_user+0x54/0x2a0 [ 240.096533][T14747] ? __fget_files+0x17c/0x1c0 [ 240.101247][T14747] __sys_sendmsg+0x13e/0x230 [ 240.105889][T14747] __x64_sys_sendmsg+0x46/0x50 [ 240.110667][T14747] x64_sys_call+0x2734/0x2dc0 [ 240.115356][T14747] do_syscall_64+0xc9/0x1c0 [ 240.119917][T14747] ? clear_bhb_loop+0x55/0xb0 [ 240.124613][T14747] ? clear_bhb_loop+0x55/0xb0 [ 240.129314][T14747] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 240.135295][T14747] RIP: 0033:0x7f3bba9e5d29 [ 240.139723][T14747] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 240.159380][T14747] RSP: 002b:00007f3bb9057038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 240.167851][T14747] RAX: ffffffffffffffda RBX: 00007f3bbabd5fa0 RCX: 00007f3bba9e5d29 [ 240.175831][T14747] RDX: 0000000000000000 RSI: 00000000200005c0 RDI: 0000000000000003 [ 240.183838][T14747] RBP: 00007f3bb9057090 R08: 0000000000000000 R09: 0000000000000000 [ 240.191899][T14747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 240.199931][T14747] R13: 0000000000000000 R14: 00007f3bbabd5fa0 R15: 00007ffc180a7ed8 [ 240.207993][T14747] [ 240.214041][T14743] netlink: 'syz.4.4172': attribute type 4 has an invalid length. [ 240.321359][T14760] netlink: 3 bytes leftover after parsing attributes in process `syz.1.4183'. [ 240.370834][T14757] netlink: 288 bytes leftover after parsing attributes in process `syz.4.4181'. [ 240.380300][T14757] unsupported nlmsg_type 40 [ 240.434939][T14767] tun0: tun_chr_ioctl cmd 1074033745 [ 240.621324][T14794] netlink: 116 bytes leftover after parsing attributes in process `syz.1.4197'. [ 240.631346][T14790] netlink: 'syz.5.4193': attribute type 10 has an invalid length. [ 240.651554][T14790] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 241.221781][T14840] vhci_hcd: invalid port number 12 [ 241.227012][T14840] vhci_hcd: default hub control req: 1f10 v0001 i000c l0 [ 241.239916][T14838] hub 2-0:1.0: USB hub found [ 241.244652][T14838] hub 2-0:1.0: 8 ports detected [ 241.499376][T14865] hub 2-0:1.0: USB hub found [ 241.504199][T14865] hub 2-0:1.0: 8 ports detected [ 241.601273][T14871] FAULT_INJECTION: forcing a failure. [ 241.601273][T14871] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 241.614485][T14871] CPU: 0 UID: 0 PID: 14871 Comm: syz.1.4231 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 241.624975][T14871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 241.635103][T14871] Call Trace: [ 241.638385][T14871] [ 241.641313][T14871] dump_stack_lvl+0xf2/0x150 [ 241.646003][T14871] dump_stack+0x15/0x1a [ 241.650225][T14871] should_fail_ex+0x223/0x230 [ 241.654994][T14871] should_fail+0xb/0x10 [ 241.659216][T14871] should_fail_usercopy+0x1a/0x20 [ 241.664324][T14871] _copy_from_user+0x1c/0xa0 [ 241.668993][T14871] copy_msghdr_from_user+0x54/0x2a0 [ 241.674316][T14871] ? __fget_files+0x17c/0x1c0 [ 241.679052][T14871] __sys_sendmsg+0x13e/0x230 [ 241.683685][T14871] __x64_sys_sendmsg+0x46/0x50 [ 241.688507][T14871] x64_sys_call+0x2734/0x2dc0 [ 241.693209][T14871] do_syscall_64+0xc9/0x1c0 [ 241.697742][T14871] ? clear_bhb_loop+0x55/0xb0 [ 241.702517][T14871] ? clear_bhb_loop+0x55/0xb0 [ 241.707281][T14871] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 241.713307][T14871] RIP: 0033:0x7fe202b25d29 [ 241.717746][T14871] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 241.737466][T14871] RSP: 002b:00007fe201176038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 241.745905][T14871] RAX: ffffffffffffffda RBX: 00007fe202d16080 RCX: 00007fe202b25d29 [ 241.753901][T14871] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000007 [ 241.761892][T14871] RBP: 00007fe201176090 R08: 0000000000000000 R09: 0000000000000000 [ 241.769898][T14871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 241.777893][T14871] R13: 0000000000000000 R14: 00007fe202d16080 R15: 00007ffce965ea78 [ 241.785926][T14871] [ 242.177306][T14896] __nla_validate_parse: 1 callbacks suppressed [ 242.177320][T14896] netlink: 3 bytes leftover after parsing attributes in process `syz.5.4241'. [ 242.318403][T14901] netlink: 108 bytes leftover after parsing attributes in process `syz.0.4243'. [ 242.327688][T14901] netlink: 108 bytes leftover after parsing attributes in process `syz.0.4243'. [ 242.336810][T14901] netlink: 84 bytes leftover after parsing attributes in process `syz.0.4243'. [ 242.378811][T14904] ================================================================== [ 242.387007][T14904] BUG: KCSAN: data-race in io_req_defer_failed / io_wq_free_work [ 242.394739][T14904] [ 242.397057][T14904] write to 0xffff888123439348 of 8 bytes by task 14902 on cpu 1: [ 242.404768][T14904] io_req_defer_failed+0x6f/0x420 [ 242.409798][T14904] io_req_task_cancel+0x21/0x30 [ 242.414653][T14904] io_handle_tw_list+0x1b9/0x200 [ 242.419600][T14904] tctx_task_work_run+0x6e/0x1c0 [ 242.424543][T14904] tctx_task_work+0x40/0x80 [ 242.429045][T14904] task_work_run+0x13a/0x1a0 [ 242.433640][T14904] get_signal+0xe78/0x1000 [ 242.438076][T14904] arch_do_signal_or_restart+0x95/0x4b0 [ 242.443657][T14904] syscall_exit_to_user_mode+0x62/0x120 [ 242.449221][T14904] do_syscall_64+0xd6/0x1c0 [ 242.453742][T14904] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 242.459648][T14904] [ 242.461969][T14904] read to 0xffff888123439348 of 8 bytes by task 14904 on cpu 0: [ 242.469615][T14904] io_wq_free_work+0x24/0x1b0 [ 242.474310][T14904] io_worker_handle_work+0x4cb/0x9d0 [ 242.479611][T14904] io_wq_worker+0x286/0x820 [ 242.484146][T14904] ret_from_fork+0x4b/0x60 [ 242.488573][T14904] ret_from_fork_asm+0x1a/0x30 [ 242.493346][T14904] [ 242.495673][T14904] value changed: 0x0000000000582059 -> 0x0000000000d82119 [ 242.502784][T14904] [ 242.505100][T14904] Reported by Kernel Concurrency Sanitizer on: [ 242.511242][T14904] CPU: 0 UID: 0 PID: 14904 Comm: iou-wrk-14902 Not tainted 6.13.0-syzkaller-01005-gb9d8a295ed6b #0 [ 242.521914][T14904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 242.532057][T14904] ==================================================================