last executing test programs: 43.378571401s ago: executing program 4 (id=108): bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) io_setup(0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000580)=ANY=[@ANYRES8=r0, @ANYRES16, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000e8ba6fcc130000000007020000f8ffffffb703000000000000b70400000000000085000fc3114c000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x33, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./bus\x00', 0x20080e, &(0x7f0000000380)={[{@test_dummy_encryption}, {@nombcache}, {@debug}, {@lazytime}, {@oldalloc}, {@noload}]}, 0x7, 0x451, &(0x7f0000000ec0)="$eJzs3MtvG0UYAPBv7Th9k1CVRx9AoCDKK2nSUnrgAgKJA0hIcCjHkLhVqdugJki0qqAgVI6oEicuiCMSfwEnuCDghMQV7qhShXJp4WS09m5iO44bp05c6t9PWndmd+yZz7tjz+zUCWBgjaUPScTOiPgjIkbq2eYCY/V/bi5emvln8dJMEtXqW38ntXI3Fi/N5EXz5+3IM0MRhc+S2N+m3vkLF9MS5fNZfmLh7PsT8xcuPnf67PSp8qnyuanjx48emXzh2NTzPYkzjevGvo/mDux97Z2rb8ycuPruL98lefwtcfTIWKeDT1SrPa6uv3Y1pJOhPjaErhTr3TRKtf4/EsVYPnkj8eqnfW0csKGq1Wr1/tUPX64Cd7Ek+t0CoD/yL/p0/ptvmzT0uCNcf6k+AUrjvplt9SNDUcjKlFrmt700FhEnLv/7dbrFxtyHAABo8kM6/nm23fivEI33he7J1lBGI+LeiNgdEcciYk9E3BdRK/tARDzYZf2tiyQrxz+Fa+sKbI3S8d+L2dpW8/gvH/3FaDHL7arFX0pOnq6UD2fvyaEobUnzkx3q+PGV379Y7Vjj+C/d0vrzsWDWjmtDW5qfMzu9MH07MTe6/knEvqF28SdLKwFJROyNiH3rrOP0098eWO3YrePvoAfrTNVvIp6sn//L0RJ/Lum8PjmxNSrlwxP5VbHSr79deXO1+m8r/h5Iz//2ttf/UvyjSX299sx0pVI+P9/Nq3/1VPp45c/PV53TrPf6H07ebtr34fTCwvnJiOHk9XqjG/dPtZSbWi6fxn/oYPv+vzuW34n9EZFexA9FxMMR8UjW9kcj4rGIONjhXfj55cffW3/8GyuNf7ar87+cGI7WPe0TxTM/fd9U6Wg38afn/2gtdSjbs5bPv7W0q9urGQAAAP6vChGxM5LC+FK6UBgfr/8f/j2xvVCZm1945uTcB+dm678RGI1SIb/TNdJwP3Qym9bn+amW/JHsvvGXxW21/PjMXGW238HDgNvR0P9LDf0/9Vex360DNpzfa8Hg0v9hcOn/MLj0fxhcbfr/tn60A9h87b7/P+5DO4DN19L/LfvBADH/h8G1nv7vMwPuDh378vDmtQPYVPPb4tY/kpeQWJGIQu9fObZG9DuuDUskydr/LMUdkOj3JxMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEBv/BcAAP//A/7ipA==") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x83, &(0x7f0000000300), &(0x7f0000000380)=0xc) socket(0x2, 0x3, 0x6) r2 = syz_io_uring_setup(0x6440, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, 0x0, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x40, 0x0, 0x3, 0x3, 0x0, 0xce}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r5, &(0x7f00000001c0)=ANY=[@ANYBLOB='.'], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r5, 0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_MKDIRAT={0x25, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}) io_uring_enter(r2, 0x2d3e, 0x0, 0x0, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = dup2(r6, r6) faccessat2(r7, &(0x7f0000000880)='\x00', 0x1, 0x1100) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e) socket$kcm(0x10, 0x100000000002, 0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="190000000400000008000000ff"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) set_robust_list(&(0x7f0000000200)={0x0, 0xffffffffffffffff}, 0x18) 43.27930376s ago: executing program 4 (id=109): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f00850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f00000003c0), r2) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond0\x00', 0x0}) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000001fee)='R\x10rust\xe3cusg\x91\xdeeH\xe5+\xf0', 0xffffffffffffffff) sendmsg$nl_route(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x4, r3, 0x33c60, 0x4a30d}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8, 0x2, r3}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4c054}, 0x4040044) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0, 0x0, 0x8}, 0x18) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3615, &(0x7f0000000300)={0x0, 0x5981, 0x0, 0x3, 0x15d}, &(0x7f0000ff0000), 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x20000000ec071, 0xffffffffffffffff, 0x4000) 43.18981396s ago: executing program 4 (id=110): bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) clock_gettime(0x0, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004", @ANYBLOB], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d) socket$igmp6(0xa, 0x3, 0x2) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000300)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x12, &(0x7f0000000000), 0xfd, 0x244, &(0x7f0000000680)="$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") r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000001, 0x12, r5, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) truncate(&(0x7f0000000180)='./file0\x00', 0x8fff5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r6, 0x0, 0x30, 0xe1515f8735398fb, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[0x45c], 0x0, 0x0, 0x1f, 0x1}}, 0x3c) 42.313769227s ago: executing program 4 (id=117): prctl$PR_SET_NAME(0xf, &(0x7f0000000240)='+}[@\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='mm_page_free\x00', r0, 0x0, 0xfffffffff7fffffe}, 0x18) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000b6000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b705000008000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x22}, 0x21) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f000000c8c0)={'erspan0\x00', &(0x7f000000c840)={'tunl0\x00', 0x0, 0x10, 0x80, 0x9, 0xc, {{0xa, 0x4, 0x2, 0x9, 0x28, 0x65, 0x0, 0x6, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, {[@ssrr={0x89, 0x13, 0xd0, [@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @private=0xa010100]}]}}}}}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x89a0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f000000ca00)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000ca40)) r4 = syz_io_uring_setup(0x789, &(0x7f0000000140)={0x0, 0x1041, 0x80, 0x1, 0x802}, &(0x7f0000000200)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000300)=@IORING_OP_READ_FIXED={0x4, 0x8, 0x4004, @fd_index=0x8, 0x9, 0x4, 0xdc0, 0x10, 0x1, {0x1}}) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) io_uring_register$IORING_REGISTER_BUFFERS(r4, 0x0, &(0x7f0000000040)=[{0x0}, {0x0}], 0x2) io_uring_enter(r4, 0x47f8, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000340)={[{@noblock_validity}, {@dioread_nolock}, {@noinit_itable}, {@acl}, {@jqfmt_vfsv0}, {@usrjquota, 0x2e}], [], 0x2c}, 0xc5, 0x452, &(0x7f0000000480)="$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") r7 = socket$inet_sctp(0x2, 0x5, 0x84) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000000000088500000050000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r8}, 0x10) bind$inet(r7, &(0x7f0000000080)={0x2, 0x4e22, @empty}, 0x10) listen(r7, 0x1ff) connect$inet(r7, &(0x7f0000000040)={0x2, 0x4e22, @remote}, 0x10) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 41.280998833s ago: executing program 4 (id=130): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./bus\x00', 0x200000, &(0x7f0000001000)={[{@user_xattr}, {@delalloc}, {@usrjquota}, {@nouser_xattr}, {@data_err_abort}]}, 0xfc, 0x57c, &(0x7f00000013c0)="$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") open(&(0x7f0000000040)='./bus\x00', 0x46b42, 0xb8) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x3, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x3, 0x0, 0x3ff000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = syz_open_procfs(0x0, &(0x7f00000020c0)='mountinfo\x00') preadv(r0, &(0x7f00000010c0)=[{&(0x7f0000000000)=""/4096, 0x1000}], 0x1, 0x4000000, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000000040000000800000008"], 0x48) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYRESHEX, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095260ae3a8579b15d09151af47ab3b88a603093596b2755b7681f9913aba56133013c059aa2fa6d61fe29722fe60899252ea88cf668549e17e735116ce4ca9215878be2da7a1af93c52c4fdb03823b2a1b80450c6696a646ffe32daca48d41927d641b1d9bf1473f60617e286914d78823deed6d07bd4e6efbe5a1b08e"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x37, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='ext4_error\x00', r3, 0x0, 0x20}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001100)=ANY=[@ANYBLOB="0ed554e354964539fc052404000000083500"/28, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r5}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x10, &(0x7f0000000600)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000040)={0x1f, 0xffffffffffffffff}, 0x67) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000040)={0x0, 0x0}) bind$bt_hci(r6, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r6, &(0x7f0000000040)=ANY=[], 0x6) 40.810041231s ago: executing program 4 (id=137): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) kexec_load(0x0, 0x1, &(0x7f00000002c0)=[{0x0, 0x3e00, 0xff600000, 0x1000000}], 0x0) 40.809860601s ago: executing program 32 (id=137): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) kexec_load(0x0, 0x1, &(0x7f00000002c0)=[{0x0, 0x3e00, 0xff600000, 0x1000000}], 0x0) 8.824525025s ago: executing program 1 (id=680): r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='xfrm0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) socket(0x11, 0x800000003, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) open(&(0x7f0000000100)='./file0\x00', 0x80ff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udplite(0xa, 0x2, 0x88) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r1], 0x20}}, 0x0) getsockname$inet(r0, &(0x7f0000000000), &(0x7f0000000040)=0x10) r3 = syz_open_dev$rtc(&(0x7f0000000180), 0x0, 0xa4001) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000340)={0x1, 0x1, {0x1c, 0x37, 0x11, 0xc, 0x2, 0x459, 0x2, 0x1a, 0xffffffffffffffff}}) 8.620096944s ago: executing program 1 (id=682): memfd_secret(0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[], 0xe8}, 0x1, 0x0, 0x0, 0x4008000}, 0x24004000) unshare(0x24040000) unshare(0x2c020400) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x802, &(0x7f00000001c0)={[{@noblock_validity}, {@dioread_nolock}, {@nobh}, {@minixdf}, {@init_itable}, {@usrjquota, 0x2e}, {@grpquota}, {@i_version}, {@jqfmt_vfsv0}, {@noload}], [{@seclabel}], 0x2c}, 0x83, 0x452, &(0x7f0000001900)="$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") write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB='+'], 0x118) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e21, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}}}, 0x84) 8.609920724s ago: executing program 1 (id=683): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) io_setup(0x8, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800"], 0x48) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'wg0\x00'}) r2 = epoll_create1(0x0) r3 = socket(0x2a, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000005c0)=@newqdisc={0x24}, 0x24}}, 0x0) getsockname$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xf0b, 0x4, 0x25dfdbfe, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000540)=@newtfilter={0x5c, 0x2c, 0xd27, 0x70bd2d, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}, {}, {0x9}}, [@filter_kind_options=@f_flower={{0xb}, {0x2c, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS_MASK={0x10, 0x55, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0xc, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x200}]}]}, @TCA_FLOWER_KEY_ENC_OPTS={0x18, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x14, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x2}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_HWID={0x5, 0x4, 0xd}]}]}]}}]}, 0x5c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r5, &(0x7f00000002c0), 0x40000000000009f, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r6, &(0x7f00000000c0)={0xe000001a}) read$char_usb(r6, &(0x7f0000001980)=""/179, 0xb3) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r6, &(0x7f0000000000)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f0000000340)=""/20, 0x14, 0x0, &(0x7f0000000380)=""/124, 0x7c}}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000c"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYRES8=r1, @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) eventfd2(0xffffffff, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x7) connect$unix(0xffffffffffffffff, 0x0, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 8.465156763s ago: executing program 1 (id=686): openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/locks\x00', 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100000100000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000003c0)) ptrace$getregset(0x4204, r0, 0x200, &(0x7f0000000900)={0x0, 0x10}) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000000)='./bus\x00', 0x280009a, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x97, 0x2a9, &(0x7f0000000500)="$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") r2 = open(&(0x7f0000000040)='./bus\x00', 0x46342, 0x0) ftruncate(r2, 0x4) write$P9_RGETLOCK(r2, &(0x7f0000000080)={0x22, 0x37, 0x2, {0x0, 0x4, 0x800, 0xffffffffffffffff, 0x4, '!?@!'}}, 0x22) openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/locks\x00', 0x0, 0x0) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100000100000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) (async) ptrace(0x10, r0) (async) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000003c0)) (async) ptrace$getregset(0x4204, r0, 0x200, &(0x7f0000000900)={0x0, 0x10}) (async) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000000)='./bus\x00', 0x280009a, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x97, 0x2a9, &(0x7f0000000500)="$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") (async) open(&(0x7f0000000040)='./bus\x00', 0x46342, 0x0) (async) ftruncate(r2, 0x4) (async) write$P9_RGETLOCK(r2, &(0x7f0000000080)={0x22, 0x37, 0x2, {0x0, 0x4, 0x800, 0xffffffffffffffff, 0x4, '!?@!'}}, 0x22) (async) 8.389796143s ago: executing program 1 (id=687): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) io_setup(0x8, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'wg0\x00'}) r2 = epoll_create1(0x0) r3 = socket(0x2a, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000005c0)=@newqdisc={0x24}, 0x24}}, 0x0) getsockname$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xf0b, 0x4, 0x25dfdbfe, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000540)=@newtfilter={0x5c, 0x2c, 0xd27, 0x70bd2d, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}, {}, {0x9}}, [@filter_kind_options=@f_flower={{0xb}, {0x2c, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS_MASK={0x10, 0x55, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0xc, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x200}]}]}, @TCA_FLOWER_KEY_ENC_OPTS={0x18, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x14, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x2}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_HWID={0x5, 0x4, 0xd}]}]}]}}]}, 0x5c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r5, &(0x7f00000002c0), 0x40000000000009f, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r6, &(0x7f00000000c0)={0xe000001a}) read$char_usb(r6, &(0x7f0000001980)=""/179, 0xb3) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r6, &(0x7f0000000000)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f0000000340)=""/20, 0x14, 0x0, &(0x7f0000000380)=""/124, 0x7c}}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000c"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYRES8=r1, @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) eventfd2(0xffffffff, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x7) connect$unix(0xffffffffffffffff, 0x0, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 8.272804703s ago: executing program 1 (id=689): ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) semtimedop(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@deltaction={0x4c, 0x18, 0x1, 0x0, 0x25dfdbfe, {0xa}, [@TCA_ACT_TAB={0x38, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x14, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0x14, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}]}]}, 0x4c}}, 0x0) 8.246767532s ago: executing program 33 (id=689): ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) semtimedop(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@deltaction={0x4c, 0x18, 0x1, 0x0, 0x25dfdbfe, {0xa}, [@TCA_ACT_TAB={0x38, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x14, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0x14, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}]}]}, 0x4c}}, 0x0) 3.557979104s ago: executing program 3 (id=779): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="d8000000180081054e81f782db4cb904021d0800fe00fe05e8fe55a10a0015000600142603600e1208000f007f370401a8001600200003401c000100035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090014d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00350db798262f3d40fad95667e006dcdf63951f215c3f8b6ad2cba0e2375ee535e3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) (fail_nth: 2) 3.147146243s ago: executing program 3 (id=784): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_setup(0x1624, &(0x7f0000000000)={0x0, 0x1163, 0x1000, 0x0, 0x3c9}, &(0x7f0000000080)=0x0, &(0x7f00000001c0)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x114, &(0x7f0000000200)=0xfffffffe, 0x0, 0x4) r2 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x0, @rand_addr=0x64010102}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000580), &(0x7f0000000940)=0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000b5060000000000000000"], 0x50) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb229aa7a200000000000018000000180000000b000000090000000100000406000000050000000300000001040000002e2e00002e5f4f306100"], 0x0, 0x3b, 0x0, 0x1, 0x8, 0x0, @void, @value}, 0x28) futex(&(0x7f0000000080), 0x5, 0x0, 0x0, &(0x7f0000000100), 0x90000000) syz_mount_image$msdos(&(0x7f0000000200), &(0x7f00000000c0)='./file1\x00', 0x10088, &(0x7f0000000580)=ANY=[@ANYBLOB="73686f77657865632c6e6f646f74732c7379735f696d6d757461626c652c646f74732c6e66732c6e6f646f74732c6e6f646f74732c64656275672c646f74732c756d61736b3d30303030303030303030303030303030303030303230302c00c4cd878e2e225ee8a12ec0f0234a613f191236529e2eb19792d74d539f7b74148c4cd01ca5836451894237f5161f323e3dff6322349bb51c07b887571b07ed2b9f7e59a22824b104346da8", @ANYRESOCT], 0x1, 0x1ff, &(0x7f00000002c0)="$eJzs3MtqU1scBvB12p5ecuhldEAnLnSik02tTxCkBTGg1EbUgbBLUw2JSckOmoiDjh35HMWhM0F8gb6FsyJIRx0ZaZNerTqxjZLfD8L6wkdgLULCfweytx68eVZZzZLVtBmGxmMYCmE97IQws5t6/umtQ3t5NBy1Hq7NPt9+fe/ho9v5QmF+McaF/NKNuRjj1KUPL169vfyx+d/9d1Pvx8LmzOOtL3OfNv/fvLD1delpOYvlLNbqzZjG5Xq9mS5XS3GlnFWSGO9WS2lWiuVaVmoc61er9bW1dkxrK5O5tUYpy2Jaa8dKqR2b9dhstGP6JC3XYpIkcTIX+JXixuJimu/3LjhbjUY+HQ4hTHzXFDf6siEAoK/M/4PM/D8Iduf/XO/ze5z5HwAAAAAAAAAAAAAA/gY7nc50p9OZ3l/3H2MhhPEQwv7zfu+Ts+H9H2xH/rg3HsLn9VaxVeyu3X7hVmF+Nu6ZOXzVdqtVHD7or3f7eLz/N+R6/dyp/Wi4eqXb73Y37xRO9BNh5eyPDwAAAAMhiQdOvb5Pkh/13XTk94ET1+8j4eLIuR0DAAAA+Ims/bKSVqulhiAIwkHo9zcTAADwux0O/f3eCQAAAAAAAAAAAAAAAAAAAAyu87idWL/PCAAAAAAAAAAAAAAAAAAAAAAAAH+KbwEAAP//VuHQrA==") mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0xa, [@func_proto={0x0, 0x1, 0x0, 0xd, 0xa, [{0x4}]}, @enum]}, {0x0, [0x0, 0x30, 0x5f, 0x5f, 0x2e, 0x61, 0x0, 0x60]}}, &(0x7f0000000f40)=""/4089, 0x42, 0xff9, 0x4, 0x0, 0x0, @void, @value}, 0x28) r5 = openat(0xffffffffffffff9c, &(0x7f0000004280)='.\x00', 0x0, 0x0) getdents64(r5, &(0x7f0000000500)=""/45, 0x2d) getdents64(r5, 0x0, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x2, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) r6 = epoll_create(0x2a) close_range(r6, r4, 0x0) perf_event_open(&(0x7f0000000400)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0xf20e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x63db, 0x6, 0x0, 0x0, 0x0, 0x0, 0x80}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r7}, 0x10) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000001940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r8, @ANYBLOB="01dfffffff9a26000000210000000c000180080001"], 0x20}}, 0x0) 3.146190243s ago: executing program 3 (id=786): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) io_setup(0x8, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800"], 0x48) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'wg0\x00'}) r2 = epoll_create1(0x0) r3 = socket(0x2a, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000005c0)=@newqdisc={0x24}, 0x24}}, 0x0) getsockname$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xf0b, 0x4, 0x25dfdbfe, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000540)=@newtfilter={0x5c, 0x2c, 0xd27, 0x70bd2d, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}, {}, {0x9}}, [@filter_kind_options=@f_flower={{0xb}, {0x2c, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS_MASK={0x10, 0x55, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0xc, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x200}]}]}, @TCA_FLOWER_KEY_ENC_OPTS={0x18, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x14, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x2}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_HWID={0x5, 0x4, 0xd}]}]}]}}]}, 0x5c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r5, &(0x7f00000002c0), 0x40000000000009f, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r6, &(0x7f00000000c0)={0xe000001a}) read$char_usb(r6, &(0x7f0000001980)=""/179, 0xb3) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r6, &(0x7f0000000000)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f0000000340)=""/20, 0x14, 0x0, &(0x7f0000000380)=""/124, 0x7c}}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000c"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYRES8=r1, @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) eventfd2(0xffffffff, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x7) connect$unix(0xffffffffffffffff, 0x0, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 3.025696982s ago: executing program 3 (id=794): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r2, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x3}) fcntl$lock(r2, 0x6, &(0x7f0000000000)={0x1}) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000680)={{0x14}, [@NFT_MSG_DELSET={0x2c, 0xb, 0xa, 0x3, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}]}], {0x14}}, 0x54}}, 0x0) listen(r1, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000040)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "f900f5", 0x20, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@fastopen={0x1e, 0xc, "770fa0b6618100000000"}]}}}}}}}}, 0x0) 2.973074542s ago: executing program 3 (id=797): capset(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff}) r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$inet6(r0, &(0x7f0000000040)={&(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x7f}, 0x1c, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="280000000000000029000000390000008402020100000100000000000000000000000000000000aa180000000000000029000000370000002f0000000000000012"], 0x58}, 0x24004800) 2.677938921s ago: executing program 3 (id=808): bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[], 0x48) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r1 = dup(r0) ioctl$PTP_EXTTS_REQUEST2(r1, 0x43403d05, 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) r2 = epoll_create1(0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f0000000100)={0x20000014}) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r2, &(0x7f0000000000)={0xa0000001}) getgid() ppoll(&(0x7f0000000200)=[{r5, 0x1}], 0x1, 0x0, 0x0, 0x3) epoll_wait(r5, &(0x7f0000000040)=[{}], 0x1, 0x400) syz_usb_connect$printer(0x5, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r6 = getpid() sched_setscheduler(r6, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r7, &(0x7f00000bd000), 0x318, 0x0) r8 = syz_clone3(&(0x7f0000001880)={0x100000200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) tgkill(r8, r8, 0x21) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @loopback, 0xace}, 0x1c) 896.977573ms ago: executing program 0 (id=866): mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x118) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e21, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}}}, 0x84) 832.315474ms ago: executing program 5 (id=869): r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000200), 0x8000, 0x0) fchdir(r0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000003c0)={'wg0\x00', 0x0}) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f0, 0x0) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f0000000080)={0x18, 0x0, {0x1, @link_local, 'geneve0\x00'}}, 0x1e) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000280)={'geneve0\x00'}) ioctl$PPPOEIOCSFWD(r5, 0x4008b100, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r7}, 0x10) setgroups(0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x2a, &(0x7f0000000100)=r10, 0x4) sendmsg$unix(r9, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r9, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000200)="2cf1723f30e9", 0x6}], 0x1}, 0x40000) recvmsg$unix(r8, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x40000062) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYRES8=r7, @ANYRESDEC=r4, @ANYRES32=r4, @ANYRES32=0x0, @ANYBLOB="0c0099007ac3ffff0f0000001c000d8018000280140003000200807f6c0108008a00460003000900"], 0x44}, 0x1, 0x0, 0x0, 0x48000}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000a40)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYRESOCT=r4], 0x24}, 0x1, 0x0, 0x0, 0x4080000}, 0x4040040) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r14 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000ac0)=ANY=[@ANYRESHEX=r6, @ANYRESHEX=r11], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, @void, @value}, 0xfffffe94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r13, r14, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r13}, &(0x7f00000006c0), &(0x7f0000000700)=r12}, 0x20) 832.149663ms ago: executing program 0 (id=870): r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x200, 0x2) ioctl$USBDEVFS_CONNECTINFO(r0, 0x40085511, &(0x7f0000000000)) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r4}, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r3, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000001940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r5, @ANYBLOB="01dfffffff9a26000000210000000c00018008000100", @ANYRES32=r2], 0x20}}, 0x0) 780.368963ms ago: executing program 5 (id=873): r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000200), 0x8000, 0x0) fchdir(r0) syz_read_part_table(0x5fb, &(0x7f0000000d00)="$eJzs2z9olHcYB/DnYu5eNdB0cHJp49BJKIqjtyiXs2JBzkohOGhrETFThMBJDw90aG9QvEE6dpHCLZpM+TNkKAkJdC4hQ0sgQ5ZCsoSmQ95yubdpk/7JUXJD6eezPM/78tzv+z7wWy/4T+uLfNalyW55/5N/nE8Hf+/rcbNVGv4gTdP0o4hc3Ip8DH371kRE9Mf+U+NMRBT+cM6rr0/Ofrl5Jd9aubH13u35Rt/emUm8HREDhUM/Pel+S3rldXFh8MnTsfKz9kO5trbzccSbjVJl+lqjOXE1f/lu+/3jiMVsvnMxTsTDqMajeBB3+v9Nam5ffr2dXy3eXy7X1r5qrZ7bOV1uTd27uP3u7PO58xHj7YjrB34Xh9+vruztn+WPD70YadYunZ089fJCdWapsn7s57Qji8wfTS4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAL3xurgw+OTpWPlZtXh/uVxb++L77z58s1GqTF9rNCeuFi7fzeYWs9qf1YdRjUfxIO7EaIzGZzHWfeRI7m/zfzkZsXpu53S5NXXv4vbw7PO589nc9aNY9i8c3H986MVIs3bp7OSplxeqM0uV9WOdudEkPo18p0969C0AAAAAAAAAAAAAAAAAAAD8f5WGB7IuF7eOR8RPn/e1n9Lkt7cdZ7L6QxJxIiJeHY+ob17Jt1ZubBVuzzd+TGL3n/L1SKIeEQPfTN+MeGcv5/GfknO9XYyu/BoAAP//A+GUCg==") (fail_nth: 2) 779.937293ms ago: executing program 0 (id=874): r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000200), 0x8000, 0x0) fchdir(r0) syz_read_part_table(0x5fb, &(0x7f0000000d00)="$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") 582.994192ms ago: executing program 5 (id=876): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000010001000000004000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_io_uring_setup(0xd2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x34f}, &(0x7f00000002c0)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x50}, 0x4, 0x700000000000000}, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x58}}, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x30, 0x0, 0x0, 0x4}]}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_MADVISE={0x19, 0x7b, 0x0, 0x0, 0x0, &(0x7f0000011000/0x4000)=nil, 0x4000, 0xc}) io_uring_enter(r2, 0x47bc, 0x0, 0x0, 0x0, 0x0) 525.240972ms ago: executing program 0 (id=877): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) 401.138452ms ago: executing program 5 (id=878): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) io_setup(0x8, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'wg0\x00'}) r2 = epoll_create1(0x0) r3 = socket(0x2a, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000005c0)=@newqdisc={0x24}, 0x24}}, 0x0) getsockname$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xf0b, 0x4, 0x25dfdbfe, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000540)=@newtfilter={0x5c, 0x2c, 0xd27, 0x70bd2d, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}, {}, {0x9}}, [@filter_kind_options=@f_flower={{0xb}, {0x2c, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS_MASK={0x10, 0x55, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0xc, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x200}]}]}, @TCA_FLOWER_KEY_ENC_OPTS={0x18, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x14, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x2}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_HWID={0x5, 0x4, 0xd}]}]}]}}]}, 0x5c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r5, &(0x7f00000002c0), 0x40000000000009f, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r6, &(0x7f00000000c0)={0xe000001a}) read$char_usb(r6, &(0x7f0000001980)=""/179, 0xb3) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r6, &(0x7f0000000000)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f0000000340)=""/20, 0x14, 0x0, &(0x7f0000000380)=""/124, 0x7c}}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000c"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYRES8=r1, @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) eventfd2(0xffffffff, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x7) socket$nl_audit(0x10, 0x3, 0x9) 375.289671ms ago: executing program 2 (id=880): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x18) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$phonet(0x23, 0x2, 0x1) connect$pppl2tp(r1, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0xe4ff, r2, 0x2, 0x0, 0x0, 0x1, {0xa, 0x0, 0x400, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x826f}}}, 0x32) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x5, 0x10, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYBLOB="000000000400eaffb605000008000624bbf11e5cc99a0000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x3, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff000000ffffb703000008ac6017db040000000000008500000092153c3695"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, 0x0, &(0x7f0000000380)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='virtio_transport_alloc_pkt\x00', r7}, 0x18) r8 = socket$vsock_stream(0x28, 0x1, 0x0) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x3000004, 0x3032, 0xffffffffffffffff, 0x0) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$bt_hci(r9, 0x84, 0xd, &(0x7f0000003140)=""/4111, &(0x7f0000000080)=0x100f) connect$vsock_stream(r8, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) r10 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r10, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r10, 0x84, 0x75, &(0x7f0000000000)={0x0, 0xcc}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r10, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendmmsg$inet6(r10, &(0x7f0000000480)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000140)="03", 0x1}], 0x1}}], 0x1, 0x34000811) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r10, 0x84, 0x77, &(0x7f0000000180)=ANY=[], 0x1000f) 292.320071ms ago: executing program 2 (id=882): r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x2, 0x3, 0x3}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r1, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x27, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf38, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000000), 0x10, 0x0}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000002c0)={0x0, &(0x7f00000000c0)}) 292.097511ms ago: executing program 6 (id=883): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x3c8, 0x1f8, 0x110, 0x0, 0x2e0, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2}}, {@mac=@random="3c192477987a"}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 'bridge0\x00', 'erspan0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @empty, @dev={0xac, 0x14, 0x14, 0x22}, @broadcast, 0x4}}}, {{@arp={@loopback, @private=0xa010102, 0xff, 0xffffff00, 0xd, 0x10, {@mac=@multicast, {[0xff, 0xff, 0x0, 0x0, 0xff]}}, {@empty, {[0x0, 0xff, 0x0, 0x0, 0xff]}}, 0x8, 0x0, 0x0, 0x8, 0x1, 0x5a, 'macvlan0\x00', 'ipvlan0\x00', {0xff}, {}, 0x0, 0x100}, 0xc0, 0xe8}, @unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x2}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xff, 0x0, 0x0, 0x0, {@mac=@link_local, {[0xff]}}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x3}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) (fail_nth: 10) 291.832591ms ago: executing program 2 (id=884): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000001000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1, 0x0, 0xfffffffffffffffe}, 0x18) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000340), 0x1) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2008002, &(0x7f0000001e80)={[{@inlinecrypt}]}, 0x1, 0x549, &(0x7f0000001800)="$eJzs3c9vI1cdAPDvTH65222zCz1ABewChQWt1t5421XVS8sFhKpKiIoD4rANiTcKseMQO6UJkUj/BpBA4gR/AgckDkg9ceDGEYkDQpQDUoEItEHiYDRjJ+smNmtqx+7Gn480O/Pmzcz3PWdn3vNz4hfA1LoeEQcRMR8Rb0TEYmd/0lnilfaSHffgcH/l6HB/JYlW6/W/J3l+ti+6zsk82blmISK+/pWIbydn4zZ29zaWq9XKdiddata2So3dvVvrteW1ylpls1y+u3T39ot3XiiPrK7Xar9478vrr37j17/65Lu/O/ji97NiXe7kdddjlNpVnzuJk5mNiFfPI9gEzHTW8xMuBx9MGhEfiYjP5Pf/Yszk/zsBgIus1VqM1mJ3GgC46NJ8DCxJixGRpp1OQLE9hvdMXEqr9Ubz5v36zuZqe6zsSsyl99erldtXF/7w3fzguSRLL+V5eX6eLp9K34mIqxHxo4Un8nRxpV5dnUyXBwCm3pPd7X9E/GshTYvFgU7t8akeAPDYKEy6AADA2Gn/AWD6aP8BYPoM0P53Puw/OPeyAADj4f0/AEwf7T8ATB/tPwBMla+99lq2tI4633+9+ubuzkb9zVurlcZGsbazUlypb28V1+r1tfw7e2qPul61Xt9aej523io1K41mqbG7d69W39ls3su/1/teZW4stQIA/per1975fRIRBy89kS/RNZeDthoutnSERwGPl5lhTtZBgMea2b5geg3UhOedhN+ee1mAyej5Zd6Fnpvv95P/I4jfM4IPlRsfH3z83xzPcLEY2Yfp9cHG/18eeTmA8TP+D9Or1UpOz/k/f5IFAFxIQ/wKX+sHo+qEABP1qMm8R/L5PwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFwwlyPiO5GkxXwu8DT7Ny0WI56KiCsxl9xfr1ZuR8TTcS0i5hay9NKkCw0ADCn9a9KZ/+vG4nOXT+fOJ/9eyNcR8b2fvv7jt5abze2lbP8/TvYvHE8fVn543hDzCgIAg/vzIAfl7Xe5s+56I//gcH/leDnHMp7x3pdOJh9dOTrcz5d2zmy0Wq1WRCHvS1z6ZxKznXMKEfFsRMyMIP7B2xHxsV71T/KxkSudmU+740cn9lNjjZ++L36a57XX2cv30RGUBabNO9nz55Ve918a1/N17/u/kD+hhpc//woRx8++o674s51IMz3iZ/f89UFjPP+br57Z2Vps570d8exsr/jJSfykT/znBoz/x0986ocv98lr/SziRvSO3x2r1KxtlRq7e7fWa8trlbXKZrl8d+nu7RfvvFAu5WPUpeOR6rP+9tLNp/uVLav/pT7xCz3rP39y7ucGrP/P//PGtz79MLlwOv4XPtv75/9Mz/htWZv4+QHjL1/6Zd/pu7P4q33q/6if/80B47/7l73VAQ8FAMagsbu3sVytVraH2sjehY7iOmc2siIOdvBxd3G4oH+KfGNEL0ufjawzNsjBc+f1qp77xuxJX3G0V/5mdsUxVycdeS2G2ngwrliTeyYB4/Hwpp90SQAAAAAAAAAAAAAAgH7G8adLk64jAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAF9d/AwAA//8+JMPM") r3 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r3, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000080)={{}, {0x1, 0x1}, [], {0x4, 0x1}, [], {0x10, 0x6}}, 0x24, 0x2) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r4, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r6}, 0x10) r7 = socket(0x10, 0x3, 0x9) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) connect$netlink(r7, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) sendmsg$TIPC_CMD_GET_MAX_PORTS(r7, &(0x7f0000000080)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000400)={0x1c, 0x0, 0x8, 0x70bd27}, 0x1c}}, 0x400c810) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r8}, 0x10) open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x130) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, 0x0) r9 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r9, 0x1, 0x4a, &(0x7f0000000640), 0x4) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 277.888481ms ago: executing program 2 (id=885): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) io_setup(0x8, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'wg0\x00'}) r2 = epoll_create1(0x0) r3 = socket(0x2a, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xf0b, 0x4, 0x25dfdbfe, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000540)=@newtfilter={0x5c, 0x2c, 0xd27, 0x70bd2d, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}, {}, {0x9}}, [@filter_kind_options=@f_flower={{0xb}, {0x2c, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS_MASK={0x10, 0x55, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0xc, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x200}]}]}, @TCA_FLOWER_KEY_ENC_OPTS={0x18, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x14, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x2}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_HWID={0x5, 0x4, 0xd}]}]}]}}]}, 0x5c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r5, &(0x7f00000002c0), 0x40000000000009f, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r6, &(0x7f00000000c0)={0xe000001a}) read$char_usb(r6, &(0x7f0000001980)=""/179, 0xb3) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r6, &(0x7f0000000000)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f0000000340)=""/20, 0x14, 0x0, &(0x7f0000000380)=""/124, 0x7c}}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000c"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYRES8=r1, @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) eventfd2(0xffffffff, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x7) connect$unix(0xffffffffffffffff, 0x0, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 249.903941ms ago: executing program 5 (id=886): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000004cc0)=[{{0x0, 0xfffffffffffffdb9, &(0x7f0000000640)=[{&(0x7f0000000380)="a1", 0x1}], 0x1, &(0x7f0000000a40)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r1], 0x30, 0x40400d1}}], 0x1, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, 0x0, &(0x7f0000000140), 0x5, r3}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) splice(r0, 0x0, r2, 0x0, 0x400000, 0x100000000000000) 230.133451ms ago: executing program 5 (id=887): bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_emit_ethernet(0x1f, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) pipe2(&(0x7f0000000400), 0x80400) syz_emit_ethernet(0x7e, &(0x7f0000004e00)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaaaa86dd60f4adf700082c00fe800000000000000000000000000000ff0200000000000000000000000000018100007800388100"], 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/fscreate\x00') perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x90000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x9}, 0x8224, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x20) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000040)="dc", 0x1}], 0x8) ioctl$AUTOFS_DEV_IOCTL_FAIL(r3, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x38c1, 0x2f}}, './file0\x00'}) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000003c0)) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000004000000000000000000850000002300000095"], &(0x7f0000000180)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000380)='sched_switch\x00', r4}, 0x10) sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400c800}, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x6) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x50) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000002a7b000000000000000000000000030000000023b500000000000100000000000000feffffff0000000000000000000000000012c31aa8b556307b0000160900000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000ffffff7f000000000000000000000000000000feffffff010000001100000009000000000000000000106cf4aa4ac99e8d000000006c6f0000000000000000000000000001000000000002000001000000100000fa6215e1c90fed90ac00000010a85f001a4b000000000000000580000000aaaaaabd0000020000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800000000000d000000000000000000"]}, 0x1a8) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000440)={'filter\x00', 0x0, 0x0, 0x0, [0x0, 0x0, 0x100000000], 0x0, 0x0}, 0x78) 137.655561ms ago: executing program 6 (id=888): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000010001000000004000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_io_uring_setup(0xd2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x34f}, &(0x7f00000002c0)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x50}, 0x4, 0x700000000000000}, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x58}}, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x30, 0x0, 0x0, 0x4}]}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_MADVISE={0x19, 0x7b, 0x0, 0x0, 0x0, &(0x7f0000011000/0x4000)=nil, 0x4000, 0xc}) io_uring_enter(r2, 0x47bc, 0x0, 0x0, 0x0, 0x0) 137.120341ms ago: executing program 0 (id=889): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x804, &(0x7f0000000140)={[{@norecovery}]}, 0xee, 0x469, &(0x7f0000000ac0)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x200040, 0x80) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) pwrite64(r2, &(0x7f0000000440)="c3", 0x1, 0xfece) pwrite64(r1, &(0x7f0000000140)='2', 0x1, 0x8000c61) ioctl$EXT4_IOC_MOVE_EXT(r1, 0x40305829, &(0x7f00000000c0)={0x17c04, 0xffffffffffffffff, 0x40000, 0x100000001}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000340)='tlb_flush\x00', r3}, 0x10) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x2800001, 0xc3072, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x600600, 0x200000, 0x3, &(0x7f0000a00000/0x600000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c4627f59061ff7f00000000000003003e00ecffecb8859fbb"], 0x78) ioctl$F2FS_IOC_GET_FEATURES(r0, 0x8004f50c, &(0x7f0000000180)) close(r4) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0) 111.96406ms ago: executing program 2 (id=890): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) io_setup(0x8, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) r2 = epoll_create1(0x0) r3 = socket(0x2a, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000005c0)=@newqdisc={0x24}, 0x24}}, 0x0) getsockname$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xf0b, 0x4, 0x25dfdbfe, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000540)=@newtfilter={0x5c, 0x2c, 0xd27, 0x70bd2d, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}, {}, {0x9}}, [@filter_kind_options=@f_flower={{0xb}, {0x2c, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS_MASK={0x10, 0x55, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0xc, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x200}]}]}, @TCA_FLOWER_KEY_ENC_OPTS={0x18, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x14, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x2}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_HWID={0x5, 0x4, 0xd}]}]}]}}]}, 0x5c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r5, &(0x7f00000002c0), 0x40000000000009f, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r6, &(0x7f00000000c0)={0xe000001a}) read$char_usb(r6, &(0x7f0000001980)=""/179, 0xb3) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r6, &(0x7f0000000000)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f0000000340)=""/20, 0x14, 0x0, &(0x7f0000000380)=""/124, 0x7c}}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000c"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYRES8=r1, @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) eventfd2(0xffffffff, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x7) connect$unix(0xffffffffffffffff, 0x0, 0x0) socket$nl_audit(0x10, 0x3, 0x9) 60.24883ms ago: executing program 6 (id=891): ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'pimreg0\x00'}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000080000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2, 0x0, 0x7}, 0x18) r3 = dup(r1) statx(r3, 0x0, 0x100, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000480)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000140)="03", 0x1}], 0x1}}], 0x1, 0x34000811) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='sched_switch\x00', r4}, 0x18) r5 = syz_open_dev$usbmon(&(0x7f0000000900), 0x7, 0x0) ioctl$MON_IOCX_MFETCH(r5, 0xc0109207, &(0x7f0000000080)={0x0}) ioctl$MON_IOCX_GETX(r5, 0x80089203, 0x0) syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='task\x00') fstat(r6, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r6, 0x84, 0x1c, &(0x7f0000000240), &(0x7f00000002c0)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) io_uring_register$IORING_UNREGISTER_RING_FDS(0xffffffffffffffff, 0x15, &(0x7f0000000a00)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c00000004000000010000", @ANYRES32, @ANYBLOB="000000000000000003000000cf92cf4100000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_SENDMSG={0x9, 0x18, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1}) io_uring_enter(0xffffffffffffffff, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 59.83974ms ago: executing program 0 (id=892): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000283d0020850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001100)={&(0x7f0000001500)='mm_page_alloc\x00', r0}, 0x10) close_range(r0, r0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="780100003c000701fcffffff00000003047c000004003680600101"], 0x178}, 0x1, 0x0, 0x0, 0x4c040}, 0xc000) 59.15812ms ago: executing program 6 (id=893): mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x118) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e21, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}, 0x2}}}, 0x84) 1.32019ms ago: executing program 6 (id=894): r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x2, 0x3, 0x3}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r1, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x27, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf38, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) sendmsg$tipc(r1, &(0x7f00000002c0)={&(0x7f0000000000), 0x10, 0x0}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000002c0)={0x0, &(0x7f00000000c0)}) 667.49µs ago: executing program 6 (id=895): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0500000006000a000800000001000000000000009991", @ANYRES32, @ANYBLOB="000000e500000000000000000000000000000000529c28358af9e44873c0db4fb4ce2620c7bd73977673489ead3ec3ba97780769d7c1404d0a6d441b9d22a586da57cb4f09e949e838cc744bd7b2e524464b1fe878f1d7d9b59623e3590c4a30a2c9b1b11478a99a1e0e20fa427f158fd2d7e48c1f29c294eb22a8ca5881e4539f8c6518fe18b838c92b09ff1141afc99fe8cbcb288bfa8f1b453f7a3f", @ANYRES32=0x0, @ANYRES32, @ANYRES16], 0x48) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000400)='io_uring_create\x00', r0, 0x0, 0x1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x1, 0x0, 0x7ffc1ffb}]}) (async) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040002000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000fff755090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, r2, 0x0) (async) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001300)=ANY=[@ANYBLOB="0600000004000000fd0f000002"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) (async) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x0, "ff00f7000000000000000000af88008300"}) (async) r7 = syz_open_pts(r6, 0x141601) write(r7, &(0x7f0000000000)="d5", 0xfffffedf) close_range(r6, 0xffffffffffffffff, 0x0) (async) ptrace$pokeuser(0x6, r3, 0x358, 0x0) (async) r8 = perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x80, 0xf5, 0x8, 0x5, 0x2, 0x0, 0x80000000000, 0x8e00, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000002c0), 0x4}, 0x425, 0x1, 0x6, 0x2, 0xe3, 0x106, 0xcca7, 0x0, 0x802, 0x0, 0x2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r3, r8, 0x0, 0x3, &(0x7f00000000c0)='-!\x00'}, 0x30) (async) syz_io_uring_setup(0x10bd, &(0x7f0000000300)={0x0, 0x0, 0x400, 0x0, 0x40001000}, 0x0, 0x0) (async) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000140)={'batadv_slave_0\x00'}) r10 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r10}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) (async) futex(0x0, 0xd, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000)=0x2000000, 0x0) 0s ago: executing program 2 (id=896): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) io_setup(0x8, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'wg0\x00'}) r2 = epoll_create1(0x0) r3 = socket(0x2a, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000005c0)=@newqdisc={0x24}, 0x24}}, 0x0) getsockname$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newqdisc={0x34, 0x24, 0xf0b, 0x4, 0x25dfdbfe, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000540)=@newtfilter={0x5c, 0x2c, 0xd27, 0x70bd2d, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}, {}, {0x9}}, [@filter_kind_options=@f_flower={{0xb}, {0x2c, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS_MASK={0x10, 0x55, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0xc, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x200}]}]}, @TCA_FLOWER_KEY_ENC_OPTS={0x18, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x14, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x2}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_HWID={0x5, 0x4, 0xd}]}]}]}}]}, 0x5c}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r5, &(0x7f00000002c0), 0x40000000000009f, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r6, &(0x7f00000000c0)={0xe000001a}) read$char_usb(r6, &(0x7f0000001980)=""/179, 0xb3) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r6, &(0x7f0000000000)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f0000000340)=""/20, 0x14, 0x0, &(0x7f0000000380)=""/124, 0x7c}}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000c"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYRES8=r1, @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) eventfd2(0xffffffff, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x7) socket$nl_audit(0x10, 0x3, 0x9) kernel console output (not intermixed with test programs): 503] loop0: detected capacity change from 0 to 512 [ 50.602003][ T4503] EXT4-fs: Ignoring removed mblk_io_submit option [ 50.609260][ T4503] EXT4-fs: Ignoring removed nobh option [ 50.617145][ T4503] EXT4-fs error (device loop0): ext4_xattr_ibody_find:2240: inode #12: comm syz.0.267: corrupted in-inode xattr: invalid ea_ino [ 50.618708][ T4496] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 50.637769][ T4503] EXT4-fs error (device loop0): ext4_orphan_get:1394: comm syz.0.267: couldn't read orphan inode 12 (err -117) [ 50.655082][ T4503] EXT4-fs (loop0): mounted filesystem 00000005-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 50.669485][ T4506] syz.1.268[4506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.669566][ T4506] syz.1.268[4506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.681117][ T4506] syz.1.268[4506] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 50.694022][ T3302] EXT4-fs (loop0): unmounting filesystem 00000005-0000-0000-0000-000000000000. [ 50.753267][ T4496] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 50.820172][ T4496] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 50.879235][ T4496] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.906423][ T4496] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.918657][ T4496] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.930835][ T4496] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 50.957728][ T4530] syz.3.276[4530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 51.068448][ T4535] syzkaller0: entered promiscuous mode [ 51.085257][ T4535] syzkaller0: entered allmulticast mode [ 51.171342][ T4543] IPv6: NLM_F_CREATE should be specified when creating new route [ 51.200898][ T4545] loop5: detected capacity change from 0 to 512 [ 51.231217][ T4545] EXT4-fs (loop5): encrypted files will use data=ordered instead of data journaling mode [ 51.259447][ T4545] EXT4-fs (loop5): 1 truncate cleaned up [ 51.273049][ T4547] loop2: detected capacity change from 0 to 512 [ 51.281034][ T4545] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 51.308263][ T4545] EXT4-fs error (device loop5): ext4_xattr_ibody_find:2240: inode #15: comm syz.5.281: corrupted in-inode xattr: overlapping e_value [ 51.330158][ T4545] EXT4-fs (loop5): Remounting filesystem read-only [ 51.336885][ T4545] EXT4-fs warning (device loop5): ext4_xattr_set_entry:1772: inode #15: comm syz.5.281: unable to update i_inline_off [ 51.351790][ T4547] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 51.368946][ T4547] ext4 filesystem being mounted at /46/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 51.395128][ T4528] loop1: detected capacity change from 0 to 256 [ 51.411869][ T4528] FAT-fs (loop1): Directory bread(block 64) failed [ 51.418571][ T4528] FAT-fs (loop1): Directory bread(block 65) failed [ 51.425155][ T4528] FAT-fs (loop1): Directory bread(block 66) failed [ 51.431830][ T4528] FAT-fs (loop1): Directory bread(block 67) failed [ 51.438475][ T4528] FAT-fs (loop1): Directory bread(block 68) failed [ 51.445066][ T4528] FAT-fs (loop1): Directory bread(block 69) failed [ 51.451821][ T4528] FAT-fs (loop1): Directory bread(block 70) failed [ 51.458750][ T4528] FAT-fs (loop1): Directory bread(block 71) failed [ 51.459801][ T4557] netlink: 'syz.0.284': attribute type 53 has an invalid length. [ 51.465473][ T4528] FAT-fs (loop1): Directory bread(block 72) failed [ 51.479653][ T4528] FAT-fs (loop1): Directory bread(block 73) failed [ 51.499201][ T3306] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 51.548798][ C1] sd 0:0:1:0: [sda] tag#2937 FAILED Result: hostbyte=DID_ERROR driverbyte=DRIVER_OK cmd_age=0s [ 51.559250][ C1] sd 0:0:1:0: [sda] tag#2937 CDB: Read(6) 08 00 00 00 01 00 00 00 09 00 00 00 [ 51.606753][ T4563] loop2: detected capacity change from 0 to 1024 [ 51.618064][ T4563] EXT4-fs: Invalid want_extra_isize 5 [ 51.625364][ T29] kauditd_printk_skb: 525 callbacks suppressed [ 51.625377][ T29] audit: type=1326 audit(1734513606.924:2119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4562 comm="syz.2.287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12a6215d29 code=0x7ffc0000 [ 51.654926][ T29] audit: type=1326 audit(1734513606.924:2120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4562 comm="syz.2.287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12a6215d29 code=0x7ffc0000 [ 51.678354][ T29] audit: type=1326 audit(1734513606.924:2121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4562 comm="syz.2.287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f12a62147df code=0x7ffc0000 [ 51.701594][ T29] audit: type=1326 audit(1734513606.924:2122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4562 comm="syz.2.287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12a6215d29 code=0x7ffc0000 [ 51.725019][ T29] audit: type=1326 audit(1734513606.924:2123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4562 comm="syz.2.287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=258 compat=0 ip=0x7f12a6215d29 code=0x7ffc0000 [ 51.748364][ T29] audit: type=1326 audit(1734513606.924:2124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4562 comm="syz.2.287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12a6215d29 code=0x7ffc0000 [ 51.771773][ T29] audit: type=1326 audit(1734513606.924:2125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4562 comm="syz.2.287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7f12a6215d29 code=0x7ffc0000 [ 51.795181][ T29] audit: type=1326 audit(1734513606.924:2126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4562 comm="syz.2.287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12a6215d29 code=0x7ffc0000 [ 51.818631][ T29] audit: type=1326 audit(1734513606.924:2127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4562 comm="syz.2.287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=294 compat=0 ip=0x7f12a6215d29 code=0x7ffc0000 [ 51.842173][ T29] audit: type=1326 audit(1734513606.924:2128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4562 comm="syz.2.287" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12a6215d29 code=0x7ffc0000 [ 51.895934][ T4571] bridge_slave_1: left allmulticast mode [ 51.901717][ T4571] bridge_slave_1: left promiscuous mode [ 51.907531][ T4571] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.916873][ T4571] bridge_slave_0: left allmulticast mode [ 51.922542][ T4571] bridge_slave_0: left promiscuous mode [ 51.928226][ T4571] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.975723][ T4575] FAULT_INJECTION: forcing a failure. [ 51.975723][ T4575] name failslab, interval 1, probability 0, space 0, times 0 [ 51.988532][ T4575] CPU: 0 UID: 0 PID: 4575 Comm: syz.2.290 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 51.999227][ T4575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 52.009299][ T4575] Call Trace: [ 52.012685][ T4575] [ 52.015649][ T4575] dump_stack_lvl+0xf2/0x150 [ 52.020270][ T4575] dump_stack+0x15/0x1a [ 52.024539][ T4575] should_fail_ex+0x223/0x230 [ 52.029309][ T4575] should_failslab+0x8f/0xb0 [ 52.034081][ T4575] __kmalloc_node_noprof+0xad/0x410 [ 52.039298][ T4575] ? __kvmalloc_node_noprof+0x72/0x170 [ 52.044776][ T4575] __kvmalloc_node_noprof+0x72/0x170 [ 52.050139][ T4575] seq_read_iter+0x144/0x930 [ 52.054803][ T4575] ? __alloc_pages_noprof+0x194/0x340 [ 52.060245][ T4575] kernfs_fop_read_iter+0xc0/0x310 [ 52.065423][ T4575] ? __kmalloc_noprof+0x1e3/0x3f0 [ 52.070543][ T4575] copy_splice_read+0x3a0/0x5d0 [ 52.075495][ T4575] ? __pfx_copy_splice_read+0x10/0x10 [ 52.080936][ T4575] splice_direct_to_actor+0x269/0x670 [ 52.086373][ T4575] ? __pfx_direct_splice_actor+0x10/0x10 [ 52.092104][ T4575] do_splice_direct+0xd7/0x150 [ 52.096983][ T4575] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 52.102914][ T4575] do_sendfile+0x398/0x660 [ 52.107341][ T4575] __x64_sys_sendfile64+0x110/0x150 [ 52.112547][ T4575] x64_sys_call+0xfbd/0x2dc0 [ 52.117229][ T4575] do_syscall_64+0xc9/0x1c0 [ 52.121743][ T4575] ? clear_bhb_loop+0x55/0xb0 [ 52.126465][ T4575] ? clear_bhb_loop+0x55/0xb0 [ 52.131224][ T4575] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 52.137168][ T4575] RIP: 0033:0x7f12a6215d29 [ 52.141596][ T4575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 52.161426][ T4575] RSP: 002b:00007f12a4887038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 52.169863][ T4575] RAX: ffffffffffffffda RBX: 00007f12a6405fa0 RCX: 00007f12a6215d29 [ 52.177904][ T4575] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 52.185956][ T4575] RBP: 00007f12a4887090 R08: 0000000000000000 R09: 0000000000000000 [ 52.194041][ T4575] R10: 0000000000000017 R11: 0000000000000246 R12: 0000000000000001 [ 52.202063][ T4575] R13: 0000000000000000 R14: 00007f12a6405fa0 R15: 00007ffd4299be88 [ 52.210149][ T4575] [ 52.245757][ T3966] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 52.439268][ T4593] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 1280 [ 52.533490][ T4600] delete_channel: no stack [ 52.538064][ T4600] delete_channel: no stack [ 52.588020][ T4601] mmap: syz.3.298 (4601) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 52.622774][ T4598] loop1: detected capacity change from 0 to 512 [ 52.768899][ T4606] nfs4: Bad value for 'source' [ 52.783197][ T4598] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 52.822609][ T4598] ext4 filesystem being mounted at /79/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 53.148568][ T4617] FAULT_INJECTION: forcing a failure. [ 53.148568][ T4617] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 53.161801][ T4617] CPU: 0 UID: 0 PID: 4617 Comm: syz.3.301 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 53.172434][ T4617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 53.182580][ T4617] Call Trace: [ 53.185878][ T4617] [ 53.188868][ T4617] dump_stack_lvl+0xf2/0x150 [ 53.193578][ T4617] dump_stack+0x15/0x1a [ 53.197781][ T4617] should_fail_ex+0x223/0x230 [ 53.202482][ T4617] should_fail+0xb/0x10 [ 53.206697][ T4617] should_fail_usercopy+0x1a/0x20 [ 53.211766][ T4617] strncpy_from_user+0x25/0x210 [ 53.216671][ T4617] ? kmem_cache_alloc_noprof+0x18e/0x320 [ 53.222372][ T4617] ? getname_flags+0x81/0x3b0 [ 53.227077][ T4617] getname_flags+0xb0/0x3b0 [ 53.231606][ T4617] getname+0x17/0x20 [ 53.235537][ T4617] path_listxattrat+0x7d/0x2a0 [ 53.240429][ T4617] __x64_sys_listxattr+0x4a/0x60 [ 53.245385][ T4617] x64_sys_call+0x2c66/0x2dc0 [ 53.250085][ T4617] do_syscall_64+0xc9/0x1c0 [ 53.254609][ T4617] ? clear_bhb_loop+0x55/0xb0 [ 53.259364][ T4617] ? clear_bhb_loop+0x55/0xb0 [ 53.264062][ T4617] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 53.270064][ T4617] RIP: 0033:0x7f90d53c5d29 [ 53.274482][ T4617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 53.294104][ T4617] RSP: 002b:00007f90d3a31038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c2 [ 53.302529][ T4617] RAX: ffffffffffffffda RBX: 00007f90d55b5fa0 RCX: 00007f90d53c5d29 [ 53.310525][ T4617] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200003c0 [ 53.318671][ T4617] RBP: 00007f90d3a31090 R08: 0000000000000000 R09: 0000000000000000 [ 53.326735][ T4617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 53.334743][ T4617] R13: 0000000000000000 R14: 00007f90d55b5fa0 R15: 00007ffee873c558 [ 53.342725][ T4617] [ 53.446754][ T3299] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 53.849668][ T4648] loop2: detected capacity change from 0 to 512 [ 53.870583][ T4648] lo speed is unknown, defaulting to 1000 [ 53.899645][ T4648] lo speed is unknown, defaulting to 1000 [ 53.912699][ T4648] lo speed is unknown, defaulting to 1000 [ 53.929456][ T4648] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 53.947538][ T4648] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 53.963835][ T4648] lo speed is unknown, defaulting to 1000 [ 53.981405][ T4648] lo speed is unknown, defaulting to 1000 [ 53.988875][ T4648] lo speed is unknown, defaulting to 1000 [ 53.995030][ T4648] lo speed is unknown, defaulting to 1000 [ 54.001254][ T4648] lo speed is unknown, defaulting to 1000 [ 54.670952][ T4663] netlink: 'syz.2.317': attribute type 3 has an invalid length. [ 54.714677][ T4669] loop1: detected capacity change from 0 to 512 [ 54.821953][ T4678] bpf_get_probe_write_proto: 8 callbacks suppressed [ 54.821966][ T4678] syz.1.323[4678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.828968][ T4678] syz.1.323[4678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.840444][ T4678] syz.1.323[4678] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 54.927126][ T4684] loop1: detected capacity change from 0 to 128 [ 55.492702][ C0] vxcan1: j1939_tp_rxtimer: 0xffff888118719000: rx timeout, send abort [ 55.501208][ C0] vxcan1: j1939_xtp_rx_abort_one: 0xffff888118719000: 0x0ff00: (3) A timeout occurred and this is the connection abort to close the session. [ 55.605876][ T4709] vlan2: entered promiscuous mode [ 55.610949][ T4709] vlan2: entered allmulticast mode [ 55.639849][ T4712] loop2: detected capacity change from 0 to 512 [ 55.671129][ T4712] EXT4-fs (loop2): fragment/cluster size (1024) != block size (2048) [ 55.705896][ T4718] FAULT_INJECTION: forcing a failure. [ 55.705896][ T4718] name failslab, interval 1, probability 0, space 0, times 0 [ 55.718615][ T4718] CPU: 0 UID: 0 PID: 4718 Comm: syz.1.335 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 55.729226][ T4718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 55.739399][ T4718] Call Trace: [ 55.742684][ T4718] [ 55.745619][ T4718] dump_stack_lvl+0xf2/0x150 [ 55.750239][ T4718] dump_stack+0x15/0x1a [ 55.754416][ T4718] should_fail_ex+0x223/0x230 [ 55.759107][ T4718] should_failslab+0x8f/0xb0 [ 55.763764][ T4718] __kmalloc_noprof+0xab/0x3f0 [ 55.768612][ T4718] ? io_alloc_async_data+0x4a/0xb0 [ 55.773741][ T4718] io_alloc_async_data+0x4a/0xb0 [ 55.778761][ T4718] io_prep_rw+0x2ec/0x440 [ 55.783103][ T4718] io_prep_rwv+0x59/0x1f0 [ 55.787453][ T4718] io_prep_readv+0x1f/0x30 [ 55.791881][ T4718] io_submit_sqes+0x5d0/0x1090 [ 55.796738][ T4718] __se_sys_io_uring_enter+0x1b9/0x1ba0 [ 55.802622][ T4718] ? 0xffffffff81000000 [ 55.806776][ T4718] ? selinux_file_permission+0x22a/0x360 [ 55.812487][ T4718] ? get_pid_task+0x8e/0xc0 [ 55.817073][ T4718] ? proc_fail_nth_write+0x12a/0x150 [ 55.822440][ T4718] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 55.828161][ T4718] ? vfs_write+0x596/0x920 [ 55.832650][ T4718] ? __fget_files+0x17c/0x1c0 [ 55.837347][ T4718] ? fput+0x1c4/0x200 [ 55.841336][ T4718] ? ksys_write+0x176/0x1b0 [ 55.845921][ T4718] __x64_sys_io_uring_enter+0x78/0x90 [ 55.851308][ T4718] x64_sys_call+0xb5e/0x2dc0 [ 55.855976][ T4718] do_syscall_64+0xc9/0x1c0 [ 55.860489][ T4718] ? clear_bhb_loop+0x55/0xb0 [ 55.865173][ T4718] ? clear_bhb_loop+0x55/0xb0 [ 55.869862][ T4718] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 55.875789][ T4718] RIP: 0033:0x7f8ca5645d29 [ 55.880303][ T4718] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 55.900120][ T4718] RSP: 002b:00007f8ca3cb7038 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 55.908569][ T4718] RAX: ffffffffffffffda RBX: 00007f8ca5835fa0 RCX: 00007f8ca5645d29 [ 55.916546][ T4718] RDX: 0000000000000000 RSI: 0000000000000567 RDI: 0000000000000004 [ 55.924523][ T4718] RBP: 00007f8ca3cb7090 R08: 0000000000000000 R09: 0000000000000000 [ 55.932510][ T4718] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 55.940494][ T4718] R13: 0000000000000000 R14: 00007f8ca5835fa0 R15: 00007fff8b0932c8 [ 55.948478][ T4718] [ 56.013684][ T4722] loop5: detected capacity change from 0 to 512 [ 56.031782][ T4722] EXT4-fs error (device loop5): ext4_xattr_block_get:596: inode #2: comm syz.5.338: corrupted xattr block 255: invalid header [ 56.045724][ T4722] EXT4-fs (loop5): Cannot turn on journaled quota: type 1: error -117 [ 56.065919][ T4722] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 56.083692][ T4722] EXT4-fs error (device loop5): ext4_xattr_block_get:596: inode #2: comm syz.5.338: corrupted xattr block 255: invalid header [ 56.104151][ T4722] SELinux: (dev loop5, type ext4) getxattr errno 117 [ 56.111972][ T4722] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 56.145413][ T4739] netlink: 'syz.1.342': attribute type 1 has an invalid length. [ 56.153118][ T4739] __nla_validate_parse: 4 callbacks suppressed [ 56.153131][ T4739] netlink: 224 bytes leftover after parsing attributes in process `syz.1.342'. [ 56.175433][ T4733] Invalid logical block size (32769) [ 56.205756][ T4733] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 56.231816][ T4743] IPv6: NLM_F_CREATE should be specified when creating new route [ 56.598625][ T4803] loop2: detected capacity change from 0 to 512 [ 56.607230][ T4803] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 56.658777][ T4803] EXT4-fs (loop2): 1 truncate cleaned up [ 56.667163][ T4803] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 56.681842][ T29] kauditd_printk_skb: 586 callbacks suppressed [ 56.681855][ T29] audit: type=1326 audit(1734513612.014:2715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4811 comm="syz.0.369" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fda4ff55d29 code=0x7ffc0000 [ 56.712705][ T29] audit: type=1326 audit(1734513612.014:2716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4811 comm="syz.0.369" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fda4ff55d29 code=0x7ffc0000 [ 56.736121][ T29] audit: type=1326 audit(1734513612.014:2717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4811 comm="syz.0.369" exe="/root/syz-executor" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7fda4ff55d29 code=0x7ffc0000 [ 56.759545][ T29] audit: type=1326 audit(1734513612.014:2718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4811 comm="syz.0.369" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fda4ff55d29 code=0x7ffc0000 [ 56.782990][ T29] audit: type=1326 audit(1734513612.014:2719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4811 comm="syz.0.369" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fda4ff55d29 code=0x7ffc0000 [ 56.806331][ T29] audit: type=1326 audit(1734513612.014:2720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4811 comm="syz.0.369" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fda4ff55d29 code=0x7ffc0000 [ 56.829807][ T29] audit: type=1326 audit(1734513612.014:2721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4811 comm="syz.0.369" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fda4ff55d29 code=0x7ffc0000 [ 56.853179][ T29] audit: type=1326 audit(1734513612.014:2722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4811 comm="syz.0.369" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fda4ff55d29 code=0x7ffc0000 [ 56.876580][ T29] audit: type=1326 audit(1734513612.014:2723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4811 comm="syz.0.369" exe="/root/syz-executor" sig=0 arch=c000003e syscall=291 compat=0 ip=0x7fda4ff55d29 code=0x7ffc0000 [ 56.900019][ T29] audit: type=1326 audit(1734513612.014:2724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4811 comm="syz.0.369" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fda4ff55d29 code=0x7ffc0000 [ 56.933279][ T4820] loop5: detected capacity change from 0 to 1024 [ 56.941424][ T4820] EXT4-fs (loop5): filesystem too large to mount safely on this system [ 56.957579][ T4820] IPVS: Error connecting to the multicast addr [ 57.061865][ T4825] netlink: 32 bytes leftover after parsing attributes in process `syz.1.372'. [ 57.092720][ T3306] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 57.152577][ T4833] Illegal XDP return value 4294967274 on prog (id 303) dev N/A, expect packet loss! [ 57.273778][ T4848] loop1: detected capacity change from 0 to 1024 [ 57.281354][ T4846] infiniband syz!: set active [ 57.286111][ T4846] infiniband syz!: added team_slave_0 [ 57.306672][ T4848] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 57.327471][ T4846] RDS/IB: syz!: added [ 57.334087][ T4848] ext4 filesystem being mounted at /100/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 57.350894][ T4846] smc: adding ib device syz! with port count 1 [ 57.370757][ T4854] pim6reg1: entered promiscuous mode [ 57.376159][ T4854] pim6reg1: entered allmulticast mode [ 57.383632][ T4846] smc: ib device syz! port 1 has pnetid [ 57.409643][ T4856] loop0: detected capacity change from 0 to 2048 [ 57.432732][ T3299] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 57.513643][ T4856] loop0: p3 < > p4 < > [ 57.517908][ T4856] loop0: partition table partially beyond EOD, truncated [ 57.526570][ T4856] loop0: p3 start 4284289 is beyond EOD, truncated [ 57.564774][ T4856] syz.0.383[4856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.564839][ T4856] syz.0.383[4856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.598824][ T4856] syz.0.383[4856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 57.622310][ T4858] netlink: 3 bytes leftover after parsing attributes in process `syz.3.385'. [ 57.690630][ T4856] netlink: 4 bytes leftover after parsing attributes in process `syz.0.383'. [ 57.699483][ T4856] netlink: 4 bytes leftover after parsing attributes in process `syz.0.383'. [ 57.716998][ T4858] 0ªX¹¦À: renamed from caif0 [ 57.728168][ T4858] 0ªX¹¦À: entered allmulticast mode [ 57.728185][ T4858] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 57.739745][ T4856] netlink: 4 bytes leftover after parsing attributes in process `syz.0.383'. [ 57.976523][ T4869] netlink: 32 bytes leftover after parsing attributes in process `syz.3.386'. [ 57.995389][ T4869] netlink: 12 bytes leftover after parsing attributes in process `syz.3.386'. [ 58.182775][ T4842] syz.2.379 (4842) used greatest stack depth: 7272 bytes left [ 58.282251][ T4915] FAULT_INJECTION: forcing a failure. [ 58.282251][ T4915] name failslab, interval 1, probability 0, space 0, times 0 [ 58.295091][ T4915] CPU: 0 UID: 0 PID: 4915 Comm: syz.5.394 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 58.305763][ T4915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 58.315935][ T4915] Call Trace: [ 58.319266][ T4915] [ 58.322202][ T4915] dump_stack_lvl+0xf2/0x150 [ 58.326825][ T4915] dump_stack+0x15/0x1a [ 58.331015][ T4915] should_fail_ex+0x223/0x230 [ 58.335778][ T4915] should_failslab+0x8f/0xb0 [ 58.340523][ T4915] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 58.346976][ T4915] ? should_failslab+0x8f/0xb0 [ 58.351835][ T4915] ? __request_module+0x1d5/0x3e0 [ 58.356879][ T4915] kstrdup+0x38/0x80 [ 58.360832][ T4915] __request_module+0x1d5/0x3e0 [ 58.365700][ T4915] ? strrchr+0x18/0x40 [ 58.369838][ T4915] ? bprm_execve+0x6ca/0xc60 [ 58.374478][ T4915] bprm_execve+0x6de/0xc60 [ 58.378984][ T4915] do_execveat_common+0x793/0x800 [ 58.384028][ T4915] __x64_sys_execveat+0x75/0x90 [ 58.388892][ T4915] x64_sys_call+0x291e/0x2dc0 [ 58.393649][ T4915] do_syscall_64+0xc9/0x1c0 [ 58.398196][ T4915] ? clear_bhb_loop+0x55/0xb0 [ 58.402909][ T4915] ? clear_bhb_loop+0x55/0xb0 [ 58.407596][ T4915] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 58.413509][ T4915] RIP: 0033:0x7fc86cd95d29 [ 58.417929][ T4915] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 58.437573][ T4915] RSP: 002b:00007fc86b401038 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 58.446054][ T4915] RAX: ffffffffffffffda RBX: 00007fc86cf85fa0 RCX: 00007fc86cd95d29 [ 58.454036][ T4915] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 58.462057][ T4915] RBP: 00007fc86b401090 R08: 0000000000001000 R09: 0000000000000000 [ 58.470139][ T4915] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 58.478172][ T4915] R13: 0000000000000000 R14: 00007fc86cf85fa0 R15: 00007ffe87171528 [ 58.486245][ T4915] [ 58.834785][ T4963] bridge0: port 3(macvlan2) entered blocking state [ 58.841461][ T4963] bridge0: port 3(macvlan2) entered disabled state [ 58.849235][ T4963] macvlan2: entered allmulticast mode [ 58.855860][ T4963] macvlan2: left allmulticast mode [ 58.913646][ T4973] netlink: 3 bytes leftover after parsing attributes in process `syz.2.407'. [ 58.927758][ T4973] 0ªX¹¦À: renamed from caif0 [ 58.941796][ T4973] 0ªX¹¦À: entered allmulticast mode [ 58.947146][ T4973] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 59.391490][ T5028] loop1: detected capacity change from 0 to 1024 [ 59.401819][ T5028] ext4: Unknown parameter 'nouser_xattr' [ 59.426872][ T5033] loop0: detected capacity change from 0 to 512 [ 59.479019][ T5036] loop2: detected capacity change from 0 to 1024 [ 59.482652][ T5033] EXT4-fs error (device loop0): ext4_xattr_block_get:596: inode #2: comm syz.0.418: corrupted xattr block 255: invalid header [ 59.498915][ T5036] EXT4-fs: Ignoring removed orlov option [ 59.504889][ T5036] EXT4-fs: Ignoring removed nomblk_io_submit option [ 59.547549][ T5033] EXT4-fs (loop0): Cannot turn on journaled quota: type 1: error -117 [ 59.571211][ T5033] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 59.585940][ T5036] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 59.607415][ T5033] EXT4-fs error (device loop0): ext4_xattr_block_get:596: inode #2: comm syz.0.418: corrupted xattr block 255: invalid header [ 59.625129][ T5033] SELinux: (dev loop0, type ext4) getxattr errno 117 [ 59.633055][ T5033] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 59.633912][ T5036] ÿÿÿÿÿÿ: renamed from vlan1 (while UP) [ 59.654300][ T5049] loop1: detected capacity change from 0 to 512 [ 59.707896][ T5049] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 59.731499][ T5049] ext4 filesystem being mounted at /106/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 59.772381][ T5049] syz.1.421[5049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.772491][ T5049] syz.1.421[5049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.815508][ T5049] syz.1.421[5049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.957607][ T3299] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 60.357305][ T3306] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 60.451217][ T5101] FAULT_INJECTION: forcing a failure. [ 60.451217][ T5101] name failslab, interval 1, probability 0, space 0, times 0 [ 60.463966][ T5101] CPU: 0 UID: 0 PID: 5101 Comm: syz.2.434 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 60.474932][ T5101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 60.485009][ T5101] Call Trace: [ 60.488305][ T5101] [ 60.491262][ T5101] dump_stack_lvl+0xf2/0x150 [ 60.495947][ T5101] dump_stack+0x15/0x1a [ 60.500128][ T5101] should_fail_ex+0x223/0x230 [ 60.504905][ T5101] should_failslab+0x8f/0xb0 [ 60.509634][ T5101] kmem_cache_alloc_node_noprof+0x59/0x320 [ 60.515471][ T5101] ? __alloc_skb+0x10b/0x310 [ 60.520092][ T5101] __alloc_skb+0x10b/0x310 [ 60.524574][ T5101] ? dev_deactivate_many+0x6b1/0x6e0 [ 60.529877][ T5101] qdisc_notify+0xdc/0x2b0 [ 60.534712][ T5101] ? __list_del_entry_valid_or_report+0x5f/0xf0 [ 60.541012][ T5101] qdisc_graft+0xb78/0xc70 [ 60.545502][ T5101] tc_modify_qdisc+0x73b/0x1050 [ 60.550381][ T5101] ? ns_capable+0x7d/0xb0 [ 60.554787][ T5101] ? __pfx_tc_modify_qdisc+0x10/0x10 [ 60.560096][ T5101] rtnetlink_rcv_msg+0x6aa/0x710 [ 60.565091][ T5101] ? ref_tracker_free+0x3a5/0x410 [ 60.570203][ T5101] ? __dev_queue_xmit+0x186/0x2090 [ 60.575358][ T5101] netlink_rcv_skb+0x12c/0x230 [ 60.580260][ T5101] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 60.585833][ T5101] rtnetlink_rcv+0x1c/0x30 [ 60.590262][ T5101] netlink_unicast+0x599/0x670 [ 60.595068][ T5101] netlink_sendmsg+0x5cc/0x6e0 [ 60.599913][ T5101] ? __pfx_netlink_sendmsg+0x10/0x10 [ 60.605287][ T5101] __sock_sendmsg+0x140/0x180 [ 60.610092][ T5101] ____sys_sendmsg+0x312/0x410 [ 60.614911][ T5101] __sys_sendmsg+0x19d/0x230 [ 60.619521][ T5101] __x64_sys_sendmsg+0x46/0x50 [ 60.624297][ T5101] x64_sys_call+0x2734/0x2dc0 [ 60.629054][ T5101] do_syscall_64+0xc9/0x1c0 [ 60.633637][ T5101] ? clear_bhb_loop+0x55/0xb0 [ 60.638321][ T5101] ? clear_bhb_loop+0x55/0xb0 [ 60.643105][ T5101] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 60.649062][ T5101] RIP: 0033:0x7f12a6215d29 [ 60.653512][ T5101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 60.673177][ T5101] RSP: 002b:00007f12a4887038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 60.681690][ T5101] RAX: ffffffffffffffda RBX: 00007f12a6405fa0 RCX: 00007f12a6215d29 [ 60.689809][ T5101] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 60.697887][ T5101] RBP: 00007f12a4887090 R08: 0000000000000000 R09: 0000000000000000 [ 60.705876][ T5101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 60.714019][ T5101] R13: 0000000000000000 R14: 00007f12a6405fa0 R15: 00007ffd4299be88 [ 60.722114][ T5101] [ 60.809377][ T5115] loop0: detected capacity change from 0 to 512 [ 60.834886][ T5115] EXT4-fs error (device loop0): ext4_xattr_block_get:596: inode #2: comm syz.0.438: corrupted xattr block 255: invalid header [ 60.849115][ T5110] loop1: detected capacity change from 0 to 8192 [ 60.873364][ T5115] EXT4-fs (loop0): Cannot turn on journaled quota: type 1: error -117 [ 60.892484][ T5115] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 60.905240][ T5115] EXT4-fs error (device loop0): ext4_xattr_block_get:596: inode #2: comm syz.0.438: corrupted xattr block 255: invalid header [ 60.926685][ T5132] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 60.940848][ T5115] SELinux: (dev loop0, type ext4) getxattr errno 117 [ 60.948323][ T5115] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 61.268996][ T5161] loop1: detected capacity change from 0 to 164 [ 61.275659][ T5161] iso9660: Unknown parameter '01777777777777777777777' [ 61.694006][ T29] kauditd_printk_skb: 702 callbacks suppressed [ 61.694021][ T29] audit: type=1400 audit(1734513617.014:3427): avc: denied { audit_write } for pid=5173 comm="syz.5.456" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 61.722731][ T29] audit: type=1107 audit(1734513617.014:3428): pid=5173 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='é£J¢0‹í &‹  Íš³öÐJ!œ«6F».bï4ÛRr%õ-ÂË' [ 61.753160][ T5175] loop1: detected capacity change from 0 to 512 [ 61.803992][ T29] audit: type=1326 audit(1734513617.124:3429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5168 comm="syz.1.454" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f8ca55e1f29 code=0x7ffc0000 [ 61.827270][ T29] audit: type=1326 audit(1734513617.124:3430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5168 comm="syz.1.454" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ca5645d29 code=0x7ffc0000 [ 61.850664][ T29] audit: type=1326 audit(1734513617.124:3431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5168 comm="syz.1.454" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ca5645d29 code=0x7ffc0000 [ 61.883138][ T5178] FAULT_INJECTION: forcing a failure. [ 61.883138][ T5178] name failslab, interval 1, probability 0, space 0, times 0 [ 61.895897][ T5178] CPU: 0 UID: 0 PID: 5178 Comm: syz.5.457 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 61.906577][ T5178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 61.916693][ T5178] Call Trace: [ 61.919995][ T5178] [ 61.922938][ T5178] dump_stack_lvl+0xf2/0x150 [ 61.927632][ T5178] dump_stack+0x15/0x1a [ 61.931866][ T5178] should_fail_ex+0x223/0x230 [ 61.936628][ T5178] should_failslab+0x8f/0xb0 [ 61.941274][ T5178] kmem_cache_alloc_noprof+0x52/0x320 [ 61.946664][ T5178] ? vm_area_alloc+0xac/0x130 [ 61.951417][ T5178] vm_area_alloc+0xac/0x130 [ 61.955955][ T5178] __mmap_region+0x6b5/0x13f0 [ 61.960745][ T5178] mmap_region+0x164/0x1e0 [ 61.965200][ T5178] do_mmap+0x718/0xb60 [ 61.969421][ T5178] vm_mmap_pgoff+0x133/0x290 [ 61.974052][ T5178] ksys_mmap_pgoff+0xd0/0x330 [ 61.978777][ T5178] x64_sys_call+0x1940/0x2dc0 [ 61.983526][ T5178] do_syscall_64+0xc9/0x1c0 [ 61.988080][ T5178] ? clear_bhb_loop+0x55/0xb0 [ 61.992795][ T5178] ? clear_bhb_loop+0x55/0xb0 [ 61.997562][ T5178] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 62.001903][ T29] audit: type=1326 audit(1734513617.284:3432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5138 comm="syz.3.446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90d53c5d29 code=0x7ffc0000 [ 62.003467][ T5178] RIP: 0033:0x7fc86cd95d63 [ 62.003487][ T5178] Code: f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 41 89 ca 41 f7 c1 ff 0f 00 00 75 14 b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 25 c3 0f 1f 40 00 48 c7 c0 a8 ff ff ff 64 c7 [ 62.003506][ T5178] RSP: 002b:00007fc86b400e18 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 62.003525][ T5178] RAX: ffffffffffffffda RBX: 00000000000004ec RCX: 00007fc86cd95d63 [ 62.003549][ T5178] RDX: 0000000000000003 RSI: 0000000008400000 RDI: 0000000000000000 [ 62.027017][ T29] audit: type=1326 audit(1734513617.284:3433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5138 comm="syz.3.446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90d53c5d29 code=0x7ffc0000 [ 62.031187][ T5178] RBP: 0000000020000c42 R08: 00000000ffffffff R09: 0000000000000000 [ 62.106645][ T5178] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000009 [ 62.114686][ T5178] R13: 00007fc86b400ef0 R14: 00007fc86b400eb0 R15: 0000000020000340 [ 62.122684][ T5178] [ 62.130699][ T5175] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 62.145219][ T5175] ext4 filesystem being mounted at /115/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 62.161407][ T29] audit: type=1326 audit(1734513617.474:3434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5138 comm="syz.3.446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f90d53c5d29 code=0x7ffc0000 [ 62.184882][ T29] audit: type=1326 audit(1734513617.474:3435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5138 comm="syz.3.446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90d53c5d29 code=0x7ffc0000 [ 62.208275][ T29] audit: type=1326 audit(1734513617.474:3436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5138 comm="syz.3.446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90d53c5d29 code=0x7ffc0000 [ 62.458165][ T3299] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 62.686644][ T5237] netlink: 28 bytes leftover after parsing attributes in process `syz.3.479'. [ 63.277068][ T5267] loop5: detected capacity change from 0 to 1024 [ 63.284998][ T5267] ext4: Unknown parameter 'nouser_xattr' [ 63.485061][ T5274] tipc: Failed to remove unknown binding: 66,1,1/0:3374421052/3374421054 [ 63.508996][ T5274] tipc: Failed to remove unknown binding: 66,1,1/0:3374421052/3374421054 [ 64.040600][ T5287] FAULT_INJECTION: forcing a failure. [ 64.040600][ T5287] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 64.053916][ T5287] CPU: 0 UID: 0 PID: 5287 Comm: syz.3.497 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 64.064533][ T5287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 64.074622][ T5287] Call Trace: [ 64.077903][ T5287] [ 64.080905][ T5287] dump_stack_lvl+0xf2/0x150 [ 64.085509][ T5287] dump_stack+0x15/0x1a [ 64.089685][ T5287] should_fail_ex+0x223/0x230 [ 64.094466][ T5287] should_fail_alloc_page+0xfd/0x110 [ 64.099968][ T5287] __alloc_pages_noprof+0x109/0x340 [ 64.105252][ T5287] alloc_pages_mpol_noprof+0xb1/0x1e0 [ 64.110689][ T5287] vma_alloc_folio_noprof+0x1a0/0x2f0 [ 64.116096][ T5287] handle_mm_fault+0xdd7/0x2ac0 [ 64.120975][ T5287] exc_page_fault+0x3b9/0x650 [ 64.125695][ T5287] asm_exc_page_fault+0x26/0x30 [ 64.130642][ T5287] RIP: 0033:0x7f90d5288ba3 [ 64.135069][ T5287] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 64.154710][ T5287] RSP: 002b:00007f90d3a304a0 EFLAGS: 00010206 [ 64.160824][ T5287] RAX: 0000000000007000 RBX: 00007f90d3a30540 RCX: 00007f90cb611000 [ 64.168807][ T5287] RDX: 00007f90d3a306e0 RSI: 000000000000000d RDI: 00007f90d3a305e0 [ 64.176778][ T5287] RBP: 0000000000000079 R08: 0000000000000008 R09: 000000000000008e [ 64.184750][ T5287] R10: 00000000000000b6 R11: 00007f90d3a30540 R12: 0000000000000001 [ 64.192721][ T5287] R13: 00007f90d5458f60 R14: 0000000000000003 R15: 00007f90d3a305e0 [ 64.200794][ T5287] [ 64.203937][ T5287] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 64.930290][ T5323] loop5: detected capacity change from 0 to 1024 [ 64.937098][ T5323] ext4: Unknown parameter 'nouser_xattr' [ 65.006517][ T5328] No such timeout policy "syz1" [ 65.050945][ T5331] dccp_invalid_packet: P.type (RESPONSE) not Data || [Data]Ack, while P.X == 0 [ 65.149762][ T5336] loop5: detected capacity change from 0 to 2048 [ 65.201107][ T5336] Alternate GPT is invalid, using primary GPT. [ 65.207630][ T5336] loop5: p2 p3 p7 [ 65.331649][ T5346] loop5: detected capacity change from 0 to 512 [ 65.351815][ T5346] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm syz.5.520: bg 0: block 393: padding at end of block bitmap is not set [ 65.365932][ T5352] loop1: detected capacity change from 0 to 1024 [ 65.372798][ T5352] ext4: Unknown parameter 'nouser_xattr' [ 65.380902][ T5346] EXT4-fs error (device loop5) in ext4_mb_clear_bb:6550: Corrupt filesystem [ 65.398818][ T5346] EXT4-fs (loop5): 2 truncates cleaned up [ 65.405029][ T5346] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 65.429280][ T5354] loop0: detected capacity change from 0 to 512 [ 65.450834][ T5354] EXT4-fs error (device loop0): ext4_xattr_ibody_find:2240: inode #15: comm syz.0.523: corrupted in-inode xattr: invalid ea_ino [ 65.453199][ T5357] tipc: Failed to remove unknown binding: 66,1,1/0:2200105186/2200105188 [ 65.466085][ T5354] EXT4-fs error (device loop0): ext4_orphan_get:1394: comm syz.0.523: couldn't read orphan inode 15 (err -117) [ 65.476190][ T5357] tipc: Failed to remove unknown binding: 66,1,1/0:2200105186/2200105188 [ 65.486576][ T5354] EXT4-fs (loop0): mounted filesystem 00000007-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 65.497638][ T3966] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 65.530079][ T5354] sit0 speed is unknown, defaulting to 1000 [ 65.537437][ T5354] sit0 speed is unknown, defaulting to 1000 [ 65.543540][ T5354] sit0 speed is unknown, defaulting to 1000 [ 65.577309][ T5354] infiniband syz2: set active [ 65.582184][ T5354] infiniband syz2: added sit0 [ 65.586970][ T3374] sit0 speed is unknown, defaulting to 1000 [ 65.609211][ T5354] RDS/IB: syz2: added [ 65.613436][ T5354] smc: adding ib device syz2 with port count 1 [ 65.619947][ T5354] smc: ib device syz2 port 1 has pnetid [ 65.626003][ T3353] sit0 speed is unknown, defaulting to 1000 [ 65.633008][ T5354] sit0 speed is unknown, defaulting to 1000 [ 65.676054][ T5354] sit0 speed is unknown, defaulting to 1000 [ 65.710534][ T5354] sit0 speed is unknown, defaulting to 1000 [ 65.752405][ T5354] sit0 speed is unknown, defaulting to 1000 [ 65.770778][ T5371] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(3) [ 65.777409][ T5371] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 65.784908][ T5371] vhci_hcd vhci_hcd.0: Device attached [ 65.793526][ T5371] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 65.797787][ T5354] sit0 speed is unknown, defaulting to 1000 [ 65.810707][ T5371] vhci_hcd vhci_hcd.0: pdev(3) rhport(2) sockfd(12) [ 65.817339][ T5371] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 65.824994][ T5371] vhci_hcd vhci_hcd.0: Device attached [ 65.845405][ T5371] vhci_hcd vhci_hcd.0: pdev(3) rhport(3) sockfd(14) [ 65.852118][ T5371] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 65.852155][ T5371] vhci_hcd vhci_hcd.0: Device attached [ 65.857629][ T5374] vhci_hcd: connection closed [ 65.865213][ T5376] vhci_hcd: connection closed [ 65.875840][ T55] vhci_hcd: stop threads [ 65.884818][ T55] vhci_hcd: release socket [ 65.889262][ T55] vhci_hcd: disconnect device [ 65.897320][ T5372] vhci_hcd: connection closed [ 65.913246][ T55] vhci_hcd: stop threads [ 65.922248][ T55] vhci_hcd: release socket [ 65.926701][ T55] vhci_hcd: disconnect device [ 65.932888][ T55] vhci_hcd: stop threads [ 65.937269][ T55] vhci_hcd: release socket [ 65.941696][ T55] vhci_hcd: disconnect device [ 65.961184][ T5381] syz.5.531[5381] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.961278][ T5381] syz.5.531[5381] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 65.972758][ T3374] vhci_hcd: vhci_device speed not set [ 65.989604][ T5383] loop2: detected capacity change from 0 to 512 [ 65.990355][ T5381] syz.5.531[5381] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 66.001662][ T5383] EXT4-fs error (device loop2): ext4_xattr_block_get:596: inode #2: comm syz.2.532: corrupted xattr block 255: invalid header [ 66.026364][ T5383] EXT4-fs (loop2): Cannot turn on journaled quota: type 1: error -117 [ 66.035589][ T5383] EXT4-fs error (device loop2): ext4_xattr_block_get:596: inode #2: comm syz.2.532: corrupted xattr block 255: invalid header [ 66.055387][ T5383] SELinux: (dev loop2, type ext4) getxattr errno 117 [ 67.060851][ T29] kauditd_printk_skb: 459 callbacks suppressed [ 67.060868][ T29] audit: type=1326 audit(1734513622.384:3896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5417 comm="syz.2.543" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12a6215d29 code=0x7ffc0000 [ 67.090527][ T29] audit: type=1326 audit(1734513622.384:3897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5417 comm="syz.2.543" exe="/root/syz-executor" sig=0 arch=c000003e syscall=266 compat=0 ip=0x7f12a6215d29 code=0x7ffc0000 [ 67.114112][ T29] audit: type=1326 audit(1734513622.384:3898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5417 comm="syz.2.543" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12a6215d29 code=0x7ffc0000 [ 67.137521][ T29] audit: type=1326 audit(1734513622.384:3899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5417 comm="syz.2.543" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12a6215d29 code=0x7ffc0000 [ 67.320903][ T29] audit: type=1326 audit(1734513622.644:3900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5428 comm="syz.3.547" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90d53c5d29 code=0x7ffc0000 [ 67.344437][ T29] audit: type=1326 audit(1734513622.644:3901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5428 comm="syz.3.547" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90d53c5d29 code=0x7ffc0000 [ 67.347623][ T5422] loop2: detected capacity change from 0 to 256 [ 67.367789][ T29] audit: type=1326 audit(1734513622.644:3902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5428 comm="syz.3.547" exe="/root/syz-executor" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7f90d53c5d29 code=0x7ffc0000 [ 67.367822][ T29] audit: type=1326 audit(1734513622.644:3903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5428 comm="syz.3.547" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90d53c5d29 code=0x7ffc0000 [ 67.387490][ T5431] loop5: detected capacity change from 0 to 512 [ 67.397380][ T29] audit: type=1326 audit(1734513622.644:3904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5428 comm="syz.3.547" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90d53c5d29 code=0x7ffc0000 [ 67.449542][ T5431] siw: device registration error -23 [ 67.450251][ T29] audit: type=1326 audit(1734513622.644:3905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5428 comm="syz.3.547" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f90d53c5d29 code=0x7ffc0000 [ 67.460801][ T5422] msdos: Unknown parameter '' [ 67.508183][ T5422] 9pnet: p9_errstr2errno: server reported unknown error @íÎhQI¸¥Šte [ 67.654188][ T5434] tipc: Failed to remove unknown binding: 66,1,1/0:1679116870/1679116872 [ 67.662996][ T5434] tipc: Failed to remove unknown binding: 66,1,1/0:1679116870/1679116872 [ 68.087371][ T5436] netlink: 'syz.2.549': attribute type 16 has an invalid length. [ 68.098083][ T5436] netlink: 64138 bytes leftover after parsing attributes in process `syz.2.549'. [ 68.205549][ T5446] loop2: detected capacity change from 0 to 128 [ 68.217955][ T5446] EXT4-fs mount: 3 callbacks suppressed [ 68.217973][ T5446] EXT4-fs (loop2): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 68.238227][ T5446] ext4 filesystem being mounted at /112/mnt supports timestamps until 2038-01-19 (0x7fffffff) [ 68.290344][ T3306] EXT4-fs (loop2): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 68.369694][ T5459] netlink: 12 bytes leftover after parsing attributes in process `syz.5.558'. [ 68.632190][ T5483] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 68.671445][ T5489] loop2: detected capacity change from 0 to 512 [ 68.679243][ T5489] EXT4-fs error (device loop2): ext4_orphan_get:1389: inode #15: comm syz.2.570: casefold flag without casefold feature [ 68.691881][ T5492] loop5: detected capacity change from 0 to 764 [ 68.693058][ T5489] EXT4-fs error (device loop2): ext4_orphan_get:1394: comm syz.2.570: couldn't read orphan inode 15 (err -117) [ 68.703040][ T5492] iso9660: Unknown parameter 'cgroup.subtree_control' [ 68.720418][ T5483] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 68.733635][ T5489] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 68.760907][ T5489] EXT4-fs (loop2): re-mounted 00000000-0000-0000-0000-000000000000 ro. Quota mode: writeback. [ 68.772957][ T5489] EXT4-fs (loop2): warning: mounting fs with errors, running e2fsck is recommended [ 68.782857][ T5489] EXT4-fs (loop2): re-mounted 00000000-0000-0000-0000-000000000000 r/w. Quota mode: writeback. [ 68.796433][ T5483] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 68.826750][ T5494] geneve0: entered allmulticast mode [ 68.833951][ T3306] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 68.865198][ T5483] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 68.921655][ T5483] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.932508][ T5483] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.943773][ T5483] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.955916][ T5483] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.171128][ T5506] tipc: Failed to remove unknown binding: 66,1,1/0:9398730/9398732 [ 69.179573][ T5506] tipc: Failed to remove unknown binding: 66,1,1/0:9398730/9398732 [ 69.399892][ T5508] loop5: detected capacity change from 0 to 8192 [ 69.408098][ T5508] FAT-fs (loop5): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 69.454938][ T5510] netlink: 8 bytes leftover after parsing attributes in process `syz.5.578'. [ 69.465303][ T5510] netlink: 3 bytes leftover after parsing attributes in process `syz.5.578'. [ 69.474292][ T5510] 0ªX¹¦À: renamed from team_slave_1 (while UP) [ 69.482611][ T5510] 0ªX¹¦À: entered allmulticast mode [ 69.492185][ T5510] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 69.549910][ T5518] netlink: 16 bytes leftover after parsing attributes in process `syz.5.582'. [ 69.590044][ T5524] netlink: 8 bytes leftover after parsing attributes in process `syz.1.581'. [ 69.598918][ T5524] netlink: 24 bytes leftover after parsing attributes in process `syz.1.581'. [ 69.610446][ T5524] gtp0: entered promiscuous mode [ 69.615450][ T5524] gtp0: entered allmulticast mode [ 69.718442][ T5533] loop5: detected capacity change from 0 to 512 [ 69.728649][ T5533] EXT4-fs error (device loop5): ext4_xattr_block_get:596: inode #2: comm syz.5.586: corrupted xattr block 255: invalid header [ 69.741934][ T5533] EXT4-fs (loop5): Cannot turn on journaled quota: type 1: error -117 [ 69.750669][ T5533] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 69.763343][ T5533] EXT4-fs error (device loop5): ext4_xattr_block_get:596: inode #2: comm syz.5.586: corrupted xattr block 255: invalid header [ 69.776690][ T5533] SELinux: (dev loop5, type ext4) getxattr errno 117 [ 69.783879][ T5533] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 69.969711][ T5539] syz.2.588[5539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.969807][ T5539] syz.2.588[5539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.981293][ T5539] syz.2.588[5539] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.993508][ T5539] netlink: 16 bytes leftover after parsing attributes in process `syz.2.588'. [ 70.109579][ T5549] loop2: detected capacity change from 0 to 736 [ 70.304849][ T5566] loop2: detected capacity change from 0 to 512 [ 70.319301][ T5566] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (17031!=33349) [ 70.336883][ T5566] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=c842e12c, mo2=0102] [ 70.350024][ T5566] EXT4-fs (loop2): orphan cleanup on readonly fs [ 70.361538][ T5566] EXT4-fs error (device loop2): ext4_clear_blocks:876: inode #11: comm syz.2.594: attempt to clear invalid blocks 1024 len 1 [ 70.408953][ T5566] EXT4-fs (loop2): Remounting filesystem read-only [ 70.426982][ T5566] EXT4-fs (loop2): 1 truncate cleaned up [ 70.441118][ T5566] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000007 ro without journal. Quota mode: none. [ 70.455545][ T5566] SELinux: (dev loop2, type ext4) getxattr errno 5 [ 70.462446][ T5566] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000007. [ 70.656880][ T5581] loop2: detected capacity change from 0 to 512 [ 70.687436][ T5581] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 70.708174][ T5585] tipc: Failed to remove unknown binding: 66,1,1/0:1131769408/1131769410 [ 70.725884][ T5581] ext4 filesystem being mounted at /129/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 70.754183][ T5585] tipc: Failed to remove unknown binding: 66,1,1/0:1131769408/1131769410 [ 71.440380][ T5603] loop0: detected capacity change from 0 to 1024 [ 71.447359][ T5603] ext4: Unknown parameter 'nouser_xattr' [ 71.454057][ T3306] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 71.612356][ T5620] loop0: detected capacity change from 0 to 512 [ 71.637240][ T5620] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 71.649971][ T5620] ext4 filesystem being mounted at /95/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 71.732444][ T3302] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 71.823136][ T5643] tipc: Failed to remove unknown binding: 66,1,1/0:1284803867/1284803869 [ 71.834850][ T5643] tipc: Failed to remove unknown binding: 66,1,1/0:1284803867/1284803869 [ 72.077906][ T5666] SELinux: syz.2.634 (5666) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 72.114524][ T5669] loop2: detected capacity change from 0 to 128 [ 72.148928][ T5669] syz.2.636: attempt to access beyond end of device [ 72.148928][ T5669] loop2: rw=0, sector=121, nr_sectors = 920 limit=128 [ 72.205772][ T5671] vlan1: entered promiscuous mode [ 72.292262][ T29] kauditd_printk_skb: 621 callbacks suppressed [ 72.292299][ T29] audit: type=1326 audit(1734513627.614:4527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5672 comm="syz.2.637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12a6215d29 code=0x7ffc0000 [ 72.329092][ T29] audit: type=1326 audit(1734513627.654:4528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5672 comm="syz.2.637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12a6215d29 code=0x7ffc0000 [ 72.352527][ T29] audit: type=1326 audit(1734513627.654:4529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5672 comm="syz.2.637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7f12a6215d29 code=0x7ffc0000 [ 72.375914][ T29] audit: type=1326 audit(1734513627.654:4530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5672 comm="syz.2.637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12a6215d29 code=0x7ffc0000 [ 72.399260][ T29] audit: type=1326 audit(1734513627.654:4531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5672 comm="syz.2.637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f12a6215d29 code=0x7ffc0000 [ 72.422620][ T29] audit: type=1326 audit(1734513627.654:4532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5672 comm="syz.2.637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12a6215d29 code=0x7ffc0000 [ 72.446176][ T29] audit: type=1326 audit(1734513627.654:4533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5672 comm="syz.2.637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f12a6215d29 code=0x7ffc0000 [ 72.469507][ T29] audit: type=1326 audit(1734513627.654:4534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5672 comm="syz.2.637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12a6215d29 code=0x7ffc0000 [ 72.492855][ T29] audit: type=1326 audit(1734513627.654:4535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5672 comm="syz.2.637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=291 compat=0 ip=0x7f12a6215d29 code=0x7ffc0000 [ 72.502114][ T5677] IPVS: set_ctl: invalid protocol: 5 6.0.0.0:0 [ 72.516196][ T29] audit: type=1326 audit(1734513627.654:4536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5672 comm="syz.2.637" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12a6215d29 code=0x7ffc0000 [ 72.580565][ T5677] lo speed is unknown, defaulting to 1000 [ 72.655371][ T5677] sit0 speed is unknown, defaulting to 1000 [ 72.702587][ T5681] loop2: detected capacity change from 0 to 512 [ 72.732657][ T5681] EXT4-fs error (device loop2): ext4_xattr_block_get:596: inode #2: comm syz.2.640: corrupted xattr block 255: invalid header [ 72.757833][ T5681] EXT4-fs (loop2): Cannot turn on journaled quota: type 1: error -117 [ 72.766735][ T5681] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 72.779543][ T5681] EXT4-fs error (device loop2): ext4_xattr_block_get:596: inode #2: comm syz.2.640: corrupted xattr block 255: invalid header [ 72.793891][ T5686] netlink: 32 bytes leftover after parsing attributes in process `syz.0.642'. [ 72.802864][ T5686] netlink: 7 bytes leftover after parsing attributes in process `syz.0.642'. [ 72.810795][ T5681] SELinux: (dev loop2, type ext4) getxattr errno 117 [ 72.816066][ T5686] batadv1: entered promiscuous mode [ 72.824848][ T5686] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 72.830127][ T5681] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 72.876188][ T5691] SELinux: policydb version 0 does not match my version range 15-33 [ 72.884583][ T5691] SELinux: failed to load policy [ 73.028035][ T5706] tipc: Failed to remove unknown binding: 66,1,1/0:2013706738/2013706740 [ 73.037333][ T5706] tipc: Failed to remove unknown binding: 66,1,1/0:2013706738/2013706740 [ 73.084646][ T5713] FAULT_INJECTION: forcing a failure. [ 73.084646][ T5713] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 73.098006][ T5713] CPU: 0 UID: 0 PID: 5713 Comm: syz.1.653 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 73.108692][ T5713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 73.118784][ T5713] Call Trace: [ 73.122063][ T5713] [ 73.125055][ T5713] dump_stack_lvl+0xf2/0x150 [ 73.129669][ T5713] dump_stack+0x15/0x1a [ 73.133841][ T5713] should_fail_ex+0x223/0x230 [ 73.138618][ T5713] should_fail+0xb/0x10 [ 73.142802][ T5713] should_fail_usercopy+0x1a/0x20 [ 73.147855][ T5713] _copy_from_user+0x1e/0xb0 [ 73.152535][ T5713] copy_msghdr_from_user+0x54/0x2a0 [ 73.157827][ T5713] ? __fget_files+0x17c/0x1c0 [ 73.162527][ T5713] __sys_sendmsg+0x13e/0x230 [ 73.167203][ T5713] __x64_sys_sendmsg+0x46/0x50 [ 73.171976][ T5713] x64_sys_call+0x2734/0x2dc0 [ 73.176662][ T5713] do_syscall_64+0xc9/0x1c0 [ 73.181238][ T5713] ? clear_bhb_loop+0x55/0xb0 [ 73.185975][ T5713] ? clear_bhb_loop+0x55/0xb0 [ 73.190716][ T5713] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 73.196735][ T5713] RIP: 0033:0x7f8ca5645d29 [ 73.201152][ T5713] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 73.221012][ T5713] RSP: 002b:00007f8ca3cb7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 73.229468][ T5713] RAX: ffffffffffffffda RBX: 00007f8ca5835fa0 RCX: 00007f8ca5645d29 [ 73.237445][ T5713] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 73.245445][ T5713] RBP: 00007f8ca3cb7090 R08: 0000000000000000 R09: 0000000000000000 [ 73.253500][ T5713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 73.261474][ T5713] R13: 0000000000000000 R14: 00007f8ca5835fa0 R15: 00007fff8b0932c8 [ 73.269459][ T5713] [ 73.293839][ T5718] loop5: detected capacity change from 0 to 164 [ 73.306080][ T5718] ISOFS: unable to read i-node block [ 73.311412][ T5718] ISOFS: root inode is unusable. Disabling Rock Ridge and switching to Joliet. [ 73.336547][ T5720] loop0: detected capacity change from 0 to 1024 [ 73.343541][ T5720] ext4: Unknown parameter 'nouser_xattr' [ 73.412885][ T5726] FAULT_INJECTION: forcing a failure. [ 73.412885][ T5726] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 73.426011][ T5726] CPU: 1 UID: 0 PID: 5726 Comm: syz.5.658 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 73.436634][ T5726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 73.446744][ T5726] Call Trace: [ 73.450080][ T5726] [ 73.453106][ T5726] dump_stack_lvl+0xf2/0x150 [ 73.457767][ T5726] dump_stack+0x15/0x1a [ 73.462055][ T5726] should_fail_ex+0x223/0x230 [ 73.466748][ T5726] should_fail+0xb/0x10 [ 73.470914][ T5726] should_fail_usercopy+0x1a/0x20 [ 73.475950][ T5726] _copy_from_iter+0x24b/0xd00 [ 73.480799][ T5726] ? __virt_addr_valid+0x1ed/0x250 [ 73.486001][ T5726] ? __check_object_size+0x364/0x520 [ 73.491314][ T5726] raw_sendmsg+0x240/0x950 [ 73.495804][ T5726] ? __pfx_raw_sendmsg+0x10/0x10 [ 73.500757][ T5726] __sock_sendmsg+0x140/0x180 [ 73.505462][ T5726] ____sys_sendmsg+0x312/0x410 [ 73.510314][ T5726] __sys_sendmsg+0x19d/0x230 [ 73.514958][ T5726] __x64_sys_sendmsg+0x46/0x50 [ 73.519790][ T5726] x64_sys_call+0x2734/0x2dc0 [ 73.524507][ T5726] do_syscall_64+0xc9/0x1c0 [ 73.529021][ T5726] ? clear_bhb_loop+0x55/0xb0 [ 73.533752][ T5726] ? clear_bhb_loop+0x55/0xb0 [ 73.538434][ T5726] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 73.544344][ T5726] RIP: 0033:0x7fc86cd95d29 [ 73.548780][ T5726] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 73.568450][ T5726] RSP: 002b:00007fc86b401038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 73.576870][ T5726] RAX: ffffffffffffffda RBX: 00007fc86cf85fa0 RCX: 00007fc86cd95d29 [ 73.585048][ T5726] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 73.593071][ T5726] RBP: 00007fc86b401090 R08: 0000000000000000 R09: 0000000000000000 [ 73.601042][ T5726] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 73.609074][ T5726] R13: 0000000000000000 R14: 00007fc86cf85fa0 R15: 00007ffe87171528 [ 73.617101][ T5726] [ 73.679678][ T5741] tipc: Failed to remove unknown binding: 66,1,1/0:1836961729/1836961731 [ 73.716171][ T5741] tipc: Failed to remove unknown binding: 66,1,1/0:1836961729/1836961731 [ 73.772042][ T5749] loop1: detected capacity change from 0 to 512 [ 73.791268][ T5749] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 73.816198][ T5749] EXT4-fs error (device loop1): ext4_xattr_ibody_find:2240: inode #15: comm +}[@: corrupted in-inode xattr: e_name out of bounds [ 73.842273][ T5749] EXT4-fs (loop1): Remounting filesystem read-only [ 73.855209][ T5749] EXT4-fs (loop1): 1 truncate cleaned up [ 73.866986][ T5749] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 73.891460][ T5749] SELinux: (dev loop1, type ext4) getxattr errno 5 [ 73.905004][ T5749] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 74.047685][ T5766] loop0: detected capacity change from 0 to 1024 [ 74.056080][ T5766] ext4: Unknown parameter 'nouser_xattr' [ 74.278095][ T5773] bridge0: port 3(bond0) entered blocking state [ 74.284587][ T5773] bridge0: port 3(bond0) entered disabled state [ 74.291355][ T5773] bond0: entered allmulticast mode [ 74.296601][ T5773] bond_slave_0: entered allmulticast mode [ 74.302412][ T5773] bond_slave_1: entered allmulticast mode [ 74.309614][ T5773] bond0: entered promiscuous mode [ 74.314699][ T5773] bond_slave_0: entered promiscuous mode [ 74.320468][ T5773] bond_slave_1: entered promiscuous mode [ 74.326570][ T5773] bridge0: port 3(bond0) entered blocking state [ 74.332898][ T5773] bridge0: port 3(bond0) entered forwarding state [ 74.372902][ T5775] loop0: detected capacity change from 0 to 1024 [ 74.379661][ T5775] EXT4-fs: Ignoring removed orlov option [ 74.385491][ T5775] EXT4-fs: Ignoring removed nomblk_io_submit option [ 74.417716][ T5775] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 74.431899][ T5775] syz.0.673[5775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.432077][ T5775] syz.0.673[5775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.445196][ T5775] syz.0.673[5775] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.518485][ T3302] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 74.891345][ T5793] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 75.257371][ T5810] loop1: detected capacity change from 0 to 256 [ 75.280536][ T3299] FAT-fs (loop1): error, corrupted directory (invalid entries) [ 75.288175][ T3299] FAT-fs (loop1): Filesystem has been set read-only [ 75.294896][ T3299] FAT-fs (loop1): error, corrupted directory (invalid entries) [ 75.439607][ T5818] random: crng reseeded on system resumption [ 75.507209][ T5820] loop2: detected capacity change from 0 to 128 [ 75.529929][ T5818] syz.2.688: attempt to access beyond end of device [ 75.529929][ T5818] loop2: rw=2049, sector=209, nr_sectors = 135 limit=128 [ 75.602665][ T5821] lo speed is unknown, defaulting to 1000 [ 75.634994][ T5821] sit0 speed is unknown, defaulting to 1000 [ 75.695796][ T5837] FAULT_INJECTION: forcing a failure. [ 75.695796][ T5837] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 75.709008][ T5837] CPU: 1 UID: 0 PID: 5837 Comm: syz.0.693 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 75.719619][ T5837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 75.729687][ T5837] Call Trace: [ 75.730434][ T5821] chnl_net:caif_netlink_parms(): no params data found [ 75.733023][ T5837] [ 75.733033][ T5837] dump_stack_lvl+0xf2/0x150 [ 75.747335][ T5837] dump_stack+0x15/0x1a [ 75.751548][ T5837] should_fail_ex+0x223/0x230 [ 75.756263][ T5837] should_fail+0xb/0x10 [ 75.760433][ T5837] should_fail_usercopy+0x1a/0x20 [ 75.765480][ T5837] strncpy_from_user+0x25/0x210 [ 75.770399][ T5837] ? kmem_cache_alloc_noprof+0x18e/0x320 [ 75.776102][ T5837] ? getname_flags+0x81/0x3b0 [ 75.780797][ T5837] getname_flags+0xb0/0x3b0 [ 75.785313][ T5837] getname+0x17/0x20 [ 75.789264][ T5837] io_mkdirat_prep+0x13a/0x190 [ 75.794043][ T5837] io_submit_sqes+0x5d0/0x1090 [ 75.798910][ T5837] __se_sys_io_uring_enter+0x1b9/0x1ba0 [ 75.804486][ T5837] ? 0xffffffff81000000 [ 75.808637][ T5837] ? selinux_file_permission+0x22a/0x360 [ 75.814365][ T5837] ? get_pid_task+0x8e/0xc0 [ 75.818936][ T5837] ? proc_fail_nth_write+0x12a/0x150 [ 75.824231][ T5837] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 75.829916][ T5837] ? vfs_write+0x596/0x920 [ 75.834351][ T5837] ? __fget_files+0x17c/0x1c0 [ 75.839195][ T5837] ? fput+0x1c4/0x200 [ 75.843179][ T5837] ? ksys_write+0x176/0x1b0 [ 75.847709][ T5837] __x64_sys_io_uring_enter+0x78/0x90 [ 75.853109][ T5837] x64_sys_call+0xb5e/0x2dc0 [ 75.857714][ T5837] do_syscall_64+0xc9/0x1c0 [ 75.862272][ T5837] ? clear_bhb_loop+0x55/0xb0 [ 75.867064][ T5837] ? clear_bhb_loop+0x55/0xb0 [ 75.871842][ T5837] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 75.877790][ T5837] RIP: 0033:0x7fda4ff55d29 [ 75.882211][ T5837] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 75.901939][ T5837] RSP: 002b:00007fda4e5c7038 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 75.910408][ T5837] RAX: ffffffffffffffda RBX: 00007fda50145fa0 RCX: 00007fda4ff55d29 [ 75.918380][ T5837] RDX: 0000000000000000 RSI: 0000000000002d3e RDI: 0000000000000003 [ 75.926351][ T5837] RBP: 00007fda4e5c7090 R08: 0000000000000000 R09: 0000000000000000 [ 75.934398][ T5837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 75.942366][ T5837] R13: 0000000000000000 R14: 00007fda50145fa0 R15: 00007ffc56b87f68 [ 75.950344][ T5837] [ 75.978853][ T5844] loop0: detected capacity change from 0 to 1024 [ 75.986670][ T5844] ext4: Unknown parameter 'nouser_xattr' [ 75.988300][ T5821] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.999529][ T5821] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.006805][ T5821] bridge_slave_0: entered allmulticast mode [ 76.013364][ T5821] bridge_slave_0: entered promiscuous mode [ 76.020128][ T5821] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.027248][ T5821] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.034470][ T5821] bridge_slave_1: entered allmulticast mode [ 76.040959][ T5821] bridge_slave_1: entered promiscuous mode [ 76.081559][ T5821] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.093314][ T5821] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.117104][ T5851] netlink: 'syz.0.697': attribute type 1 has an invalid length. [ 76.128555][ T5851] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=5851 comm=syz.0.697 [ 76.147618][ T5821] team0: Port device team_slave_0 added [ 76.154635][ T5821] team0: Port device team_slave_1 added [ 76.171468][ T5853] loop0: detected capacity change from 0 to 512 [ 76.179382][ T5821] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 76.186412][ T5821] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 76.212459][ T5821] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 76.247280][ T5821] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 76.254338][ T5821] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 76.280456][ T5821] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 76.313969][ T5821] hsr_slave_0: entered promiscuous mode [ 76.320198][ T5821] hsr_slave_1: entered promiscuous mode [ 76.326419][ T5821] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 76.334141][ T5821] Cannot create hsr debugfs directory [ 76.414231][ T5821] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 76.426458][ T5821] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 76.435848][ T5821] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 76.454823][ T5821] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 76.480106][ T5821] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.487212][ T5821] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.494555][ T5821] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.501725][ T5821] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.584856][ T5821] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.598181][ T5899] netlink: 8 bytes leftover after parsing attributes in process `syz.3.701'. [ 76.610662][ T1903] bridge0: port 1(bridge_slave_0) entered disabled state [ 76.620868][ T1903] bridge0: port 2(bridge_slave_1) entered disabled state [ 76.632273][ T5894] loop2: detected capacity change from 0 to 8192 [ 76.646966][ T5899] IPVS: Error joining to the multicast group [ 76.655092][ T5821] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.665864][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.672957][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.705986][ T1903] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.713194][ T1903] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.776463][ T5907] netlink: 'syz.0.705': attribute type 1 has an invalid length. [ 77.126450][ T5927] netlink: 8 bytes leftover after parsing attributes in process `syz.0.711'. [ 77.321718][ T5930] wireguard0: entered promiscuous mode [ 77.327311][ T5930] wireguard0: entered allmulticast mode [ 77.473584][ T5821] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 77.700524][ T5939] loop2: detected capacity change from 0 to 8192 [ 77.718054][ T5946] loop5: detected capacity change from 0 to 256 [ 77.752656][ T5939] FAULT_INJECTION: forcing a failure. [ 77.752656][ T5939] name failslab, interval 1, probability 0, space 0, times 0 [ 77.765402][ T5939] CPU: 1 UID: 0 PID: 5939 Comm: syz.2.712 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 77.776012][ T5939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 77.786208][ T5939] Call Trace: [ 77.789500][ T5939] [ 77.792511][ T5939] dump_stack_lvl+0xf2/0x150 [ 77.797195][ T5939] dump_stack+0x15/0x1a [ 77.801474][ T5939] should_fail_ex+0x223/0x230 [ 77.806220][ T5939] should_failslab+0x8f/0xb0 [ 77.810881][ T5939] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 77.817267][ T5939] ? should_failslab+0x8f/0xb0 [ 77.822068][ T5939] ? __request_module+0x1d5/0x3e0 [ 77.827250][ T5939] kstrdup+0x38/0x80 [ 77.831174][ T5939] __request_module+0x1d5/0x3e0 [ 77.836079][ T5939] dev_load+0xa0/0xb0 [ 77.840115][ T5939] dev_ioctl+0x741/0xab0 [ 77.844407][ T5939] sock_do_ioctl+0x11c/0x260 [ 77.849103][ T5939] sock_ioctl+0x40f/0x600 [ 77.853459][ T5939] ? __pfx_sock_ioctl+0x10/0x10 [ 77.858478][ T5939] __se_sys_ioctl+0xc9/0x140 [ 77.863096][ T5939] __x64_sys_ioctl+0x43/0x50 [ 77.867759][ T5939] x64_sys_call+0x1690/0x2dc0 [ 77.872459][ T5939] do_syscall_64+0xc9/0x1c0 [ 77.877042][ T5939] ? clear_bhb_loop+0x55/0xb0 [ 77.881737][ T5939] ? clear_bhb_loop+0x55/0xb0 [ 77.886440][ T5939] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 77.892396][ T5939] RIP: 0033:0x7f12a6215d29 [ 77.896834][ T5939] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 77.916561][ T5939] RSP: 002b:00007f12a4887038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 77.925047][ T5939] RAX: ffffffffffffffda RBX: 00007f12a6405fa0 RCX: 00007f12a6215d29 [ 77.933067][ T5939] RDX: 0000000020000000 RSI: 0000000000008923 RDI: 0000000000000009 [ 77.941063][ T5939] RBP: 00007f12a4887090 R08: 0000000000000000 R09: 0000000000000000 [ 77.949057][ T5939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 77.957184][ T5939] R13: 0000000000000000 R14: 00007f12a6405fa0 R15: 00007ffd4299be88 [ 77.965220][ T5939] [ 78.026368][ T29] kauditd_printk_skb: 484 callbacks suppressed [ 78.026384][ T29] audit: type=1326 audit(1734513633.334:5021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5965 comm="syz.3.719" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90d53c5d29 code=0x7ffc0000 [ 78.056251][ T29] audit: type=1326 audit(1734513633.354:5022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5965 comm="syz.3.719" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90d53c5d29 code=0x7ffc0000 [ 78.081032][ T29] audit: type=1326 audit(1734513633.414:5023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5965 comm="syz.3.719" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f90d53c5d29 code=0x7ffc0000 [ 78.104522][ T29] audit: type=1326 audit(1734513633.414:5024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5965 comm="syz.3.719" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90d53c5d29 code=0x7ffc0000 [ 78.113741][ T5974] loop2: detected capacity change from 0 to 512 [ 78.163714][ T5821] veth0_vlan: entered promiscuous mode [ 78.171139][ T29] audit: type=1326 audit(1734513633.454:5025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5965 comm="syz.3.719" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90d53c5d29 code=0x7ffc0000 [ 78.194598][ T29] audit: type=1326 audit(1734513633.454:5026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5965 comm="syz.3.719" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f90d53c5d29 code=0x7ffc0000 [ 78.217942][ T29] audit: type=1326 audit(1734513633.454:5027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5965 comm="syz.3.719" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90d53c5d29 code=0x7ffc0000 [ 78.241390][ T29] audit: type=1326 audit(1734513633.454:5028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5965 comm="syz.3.719" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f90d53c5d29 code=0x7ffc0000 [ 78.247008][ T5821] veth1_vlan: entered promiscuous mode [ 78.264855][ T29] audit: type=1326 audit(1734513633.454:5029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5965 comm="syz.3.719" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90d53c5d29 code=0x7ffc0000 [ 78.278776][ T5821] veth0_macvtap: entered promiscuous mode [ 78.293602][ T29] audit: type=1326 audit(1734513633.454:5030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5965 comm="syz.3.719" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f90d53c5d29 code=0x7ffc0000 [ 78.301261][ T5821] veth1_macvtap: entered promiscuous mode [ 78.338927][ T5821] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 78.349447][ T5821] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 78.359379][ T5821] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 78.369838][ T5821] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 78.379767][ T5821] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 78.390227][ T5821] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 78.400110][ T5821] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 78.410625][ T5821] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 78.421949][ T5821] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 78.430267][ T5821] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 78.440834][ T5821] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 78.450668][ T5821] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 78.458686][ T5974] EXT4-fs error (device loop2): ext4_xattr_block_get:596: inode #2: comm syz.2.720: corrupted xattr block 255: invalid header [ 78.461113][ T5821] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 78.483960][ T5821] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 78.494680][ T5821] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 78.504648][ T5821] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 78.515164][ T5821] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 78.525700][ T5821] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 78.528372][ T5974] EXT4-fs (loop2): Cannot turn on journaled quota: type 1: error -117 [ 78.552862][ T5974] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 78.566357][ T5821] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.575082][ T5821] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.583903][ T5821] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.593124][ T5821] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.602902][ T5974] EXT4-fs error (device loop2): ext4_xattr_block_get:596: inode #2: comm syz.2.720: corrupted xattr block 255: invalid header [ 78.618289][ T5974] SELinux: (dev loop2, type ext4) getxattr errno 117 [ 78.628763][ T5962] SELinux: Context system_u:object_r:fonts_t:s0 is not valid (left unmapped). [ 78.661652][ T5974] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 79.023984][ T6024] netlink: 'syz.2.739': attribute type 1 has an invalid length. [ 79.047928][ T6026] netlink: 24 bytes leftover after parsing attributes in process `syz.6.740'. [ 79.103154][ T6032] hsr_slave_0: left promiscuous mode [ 79.156509][ T6038] syz.5.743[6038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.156651][ T6038] syz.5.743[6038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.185569][ T6038] syz.5.743[6038] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 79.193715][ T6039] netlink: 12 bytes leftover after parsing attributes in process `syz.2.741'. [ 79.205765][ T6032] hsr_slave_1: left promiscuous mode [ 79.241841][ T6036] loop6: detected capacity change from 0 to 8192 [ 79.284056][ T6041] FAULT_INJECTION: forcing a failure. [ 79.284056][ T6041] name failslab, interval 1, probability 0, space 0, times 0 [ 79.296780][ T6041] CPU: 0 UID: 0 PID: 6041 Comm: syz.5.745 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 79.307426][ T6041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 79.317496][ T6041] Call Trace: [ 79.320914][ T6041] [ 79.323860][ T6041] dump_stack_lvl+0xf2/0x150 [ 79.328524][ T6041] dump_stack+0x15/0x1a [ 79.332783][ T6041] should_fail_ex+0x223/0x230 [ 79.335791][ T6043] lo speed is unknown, defaulting to 1000 [ 79.337491][ T6041] should_failslab+0x8f/0xb0 [ 79.347812][ T6041] kmem_cache_alloc_noprof+0x52/0x320 [ 79.353438][ T6041] ? skb_clone+0x154/0x1f0 [ 79.357962][ T6041] skb_clone+0x154/0x1f0 [ 79.362323][ T6041] __netlink_deliver_tap+0x2bd/0x4f0 [ 79.367669][ T6041] netlink_unicast+0x64a/0x670 [ 79.372462][ T6041] netlink_sendmsg+0x5cc/0x6e0 [ 79.373412][ T6043] sit0 speed is unknown, defaulting to 1000 [ 79.377266][ T6041] ? __pfx_netlink_sendmsg+0x10/0x10 [ 79.377301][ T6041] __sock_sendmsg+0x140/0x180 [ 79.393310][ T6041] ____sys_sendmsg+0x312/0x410 [ 79.398098][ T6041] __sys_sendmsg+0x19d/0x230 [ 79.402787][ T6041] __x64_sys_sendmsg+0x46/0x50 [ 79.407649][ T6041] x64_sys_call+0x2734/0x2dc0 [ 79.412408][ T6041] do_syscall_64+0xc9/0x1c0 [ 79.416932][ T6041] ? clear_bhb_loop+0x55/0xb0 [ 79.421724][ T6041] ? clear_bhb_loop+0x55/0xb0 [ 79.426461][ T6041] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 79.432520][ T6041] RIP: 0033:0x7fc86cd95d29 [ 79.436950][ T6041] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 79.456655][ T6041] RSP: 002b:00007fc86b401038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 79.465099][ T6041] RAX: ffffffffffffffda RBX: 00007fc86cf85fa0 RCX: 00007fc86cd95d29 [ 79.471149][ T6036] FAT-fs (loop6): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 79.473082][ T6041] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 79.491542][ T6041] RBP: 00007fc86b401090 R08: 0000000000000000 R09: 0000000000000000 [ 79.499529][ T6041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 79.507523][ T6041] R13: 0000000000000000 R14: 00007fc86cf85fa0 R15: 00007ffe87171528 [ 79.515596][ T6041] [ 79.521185][ T6041] netlink: 8 bytes leftover after parsing attributes in process `syz.5.745'. [ 79.860682][ T6090] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD Dec 18 09:20:35 syzkaller kern.info kernel: [ 79.860682][ T6090] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 80.000343][ T6108] FAULT_INJECTION: forcing a failure. [ 80.000343][ T6108] name failslab, interval 1, probability 0, space 0, times 0 [ 80.013092][ T6108] CPU: 0 UID: 0 PID: 6108 Comm: syz.6.775 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 80.023803][ T6108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 80.033936][ T6108] Call Trace: [ 80.037232][ T6108] [ 80.040197][ T6108] dump_stack_lvl+0xf2/0x150 [ 80.044905][ T6108] dump_stack+0x15/0x1a [ 80.049191][ T6108] should_fail_ex+0x223/0x230 [ 80.053923][ T6108] should_failslab+0x8f/0xb0 [ 80.058556][ T6108] kmem_cache_alloc_noprof+0x52/0x320 [ 80.064019][ T6108] ? __anon_vma_prepare+0x73/0x310 [ 80.069173][ T6108] __anon_vma_prepare+0x73/0x310 [ 80.074154][ T6108] ? handle_mm_fault+0x1be7/0x2ac0 [ 80.079329][ T6108] handle_mm_fault+0x1c76/0x2ac0 [ 80.084315][ T6108] exc_page_fault+0x296/0x650 [ 80.089052][ T6108] asm_exc_page_fault+0x26/0x30 [ 80.093946][ T6108] RIP: 0010:__put_user_8+0x11/0x20 [ 80.099116][ T6108] Code: 84 00 00 00 00 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 48 89 cb 48 c1 fb 3f 48 09 d9 0f 01 cb <48> 89 01 31 c9 0f 01 ca c3 cc cc cc cc 66 90 90 90 90 90 90 90 90 [ 80.117627][ T6117] FAULT_INJECTION: forcing a failure. [ 80.117627][ T6117] name failslab, interval 1, probability 0, space 0, times 0 [ 80.118825][ T6108] RSP: 0018:ffffc900012efe78 EFLAGS: 00050206 [ 80.118849][ T6108] RAX: 00007ffdeff065f8 RBX: 0000000000000000 RCX: 00000000200003c0 [ 80.145451][ T6108] RDX: 0000000000000000 RSI: ffffffff8663fa00 RDI: 1fffffffffffffef [ 80.153427][ T6108] RBP: ffffc900012eff48 R08: 0000000000000007 R09: ffffffff810aad7a [ 80.161514][ T6108] R10: 0000000000000009 R11: ffff888109f81080 R12: 0000000000000000 [ 80.169487][ T6108] R13: 0000000000000003 R14: 00000000200003c0 R15: ffff88810350a100 [ 80.177470][ T6108] ? getreg+0x2a/0x1e0 [ 80.181666][ T6108] arch_ptrace+0x3cc/0x400 [ 80.186238][ T6108] __se_sys_ptrace+0xf4/0x2b0 [ 80.190923][ T6108] __x64_sys_ptrace+0x55/0x70 [ 80.195639][ T6108] x64_sys_call+0x2225/0x2dc0 [ 80.200383][ T6108] do_syscall_64+0xc9/0x1c0 [ 80.204954][ T6108] ? clear_bhb_loop+0x55/0xb0 [ 80.209652][ T6108] ? clear_bhb_loop+0x55/0xb0 [ 80.214366][ T6108] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 80.220314][ T6108] RIP: 0033:0x7ffac8265d29 [ 80.224780][ T6108] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 80.244468][ T6108] RSP: 002b:00007ffac68d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000065 [ 80.252954][ T6108] RAX: ffffffffffffffda RBX: 00007ffac8455fa0 RCX: 00007ffac8265d29 [ 80.260932][ T6108] RDX: 0000000000000000 RSI: 000000000000002b RDI: 0000000000000003 [ 80.268911][ T6108] RBP: 00007ffac68d7090 R08: 0000000000000000 R09: 0000000000000000 [ 80.276886][ T6108] R10: 00000000200003c0 R11: 0000000000000246 R12: 0000000000000001 [ 80.284976][ T6108] R13: 0000000000000000 R14: 00007ffac8455fa0 R15: 00007ffdeff065f8 [ 80.292982][ T6108] [ 80.296076][ T6117] CPU: 1 UID: 0 PID: 6117 Comm: syz.3.779 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 80.306724][ T6117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 80.316810][ T6117] Call Trace: [ 80.320143][ T6117] [ 80.323087][ T6117] dump_stack_lvl+0xf2/0x150 [ 80.327811][ T6117] dump_stack+0x15/0x1a [ 80.332010][ T6117] should_fail_ex+0x223/0x230 [ 80.336736][ T6117] should_failslab+0x8f/0xb0 [ 80.341489][ T6117] kmem_cache_alloc_node_noprof+0x59/0x320 [ 80.347346][ T6117] ? __alloc_skb+0x10b/0x310 [ 80.351993][ T6117] __alloc_skb+0x10b/0x310 [ 80.356443][ T6117] netlink_alloc_large_skb+0xad/0xe0 [ 80.361825][ T6117] netlink_sendmsg+0x3b4/0x6e0 [ 80.361866][ T6117] ? __pfx_netlink_sendmsg+0x10/0x10 [ 80.361897][ T6117] __sock_sendmsg+0x140/0x180 [ 80.361983][ T6117] ____sys_sendmsg+0x312/0x410 [ 80.362009][ T6117] __sys_sendmsg+0x19d/0x230 [ 80.386338][ T6117] __x64_sys_sendmsg+0x46/0x50 [ 80.391190][ T6117] x64_sys_call+0x2734/0x2dc0 [ 80.395954][ T6117] do_syscall_64+0xc9/0x1c0 [ 80.400522][ T6117] ? clear_bhb_loop+0x55/0xb0 [ 80.405225][ T6117] ? clear_bhb_loop+0x55/0xb0 [ 80.409928][ T6117] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 80.415910][ T6117] RIP: 0033:0x7f90d53c5d29 [ 80.420373][ T6117] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 80.440041][ T6117] RSP: 002b:00007f90d3a31038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 80.448491][ T6117] RAX: ffffffffffffffda RBX: 00007f90d55b5fa0 RCX: 00007f90d53c5d29 [ 80.456563][ T6117] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 80.464615][ T6117] RBP: 00007f90d3a31090 R08: 0000000000000000 R09: 0000000000000000 [ 80.472613][ T6117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 80.480654][ T6117] R13: 0000000000000000 R14: 00007f90d55b5fa0 R15: 00007ffee873c558 Dec 18 09:20:35 syzkaller kern.n[ 80.488688][ T6117] otice kernel: [ 80.000343][ T6108] FAULT_INJECTION: forcing a failure. Dec 18 09:20:35 syzkaller kern.notice kernel: [ 80.000343][ T6108] name failslab, interval 1, probability 0, space 0, times 0 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.013092][ T6108] CPU: 0 UID: 0 PID: 6108 Comm: syz.6.775 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.023803][ T6108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.033936][ T6108] Call Trace: Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.037232][ T6108] Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.040197][ T6108] dump_stack_lvl+0xf2/0x150 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.044905][ T6108] dump_stack+0x15/0x1a Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.049191][ T6108] should_fail_ex+0x223/0x230 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.053923][ T6108] should_failslab+0x8f/0xb0 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.058556][ T6108] kmem_cache_alloc_noprof+0x52/0x320 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.064019][ T6108] ? __anon_vma_prepare+0x73/0x310 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.069173][ T6108] __anon_vma_prepare+0x73/0x310 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.074154][ T6108] ? handle_mm_fault+0x1be7/0x2ac0 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.079329][ T6108] handle_mm_fault+0x1c76/0x2ac0 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.084315][ T6108] exc_page_fault+0x296/0x650 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.089052][ T6108] asm_exc_page_fault+0x26/0x30 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.093946][ T6108] RIP: 0010:__put_user_8+0x11/0x20 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.099116][ T6108] Code: 84 00 00 00 00 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 48 89 cb 48 c1 fb 3f 48 09 d9 0f 01 cb <48> 89 01 31 c9 0f 01 ca c3 cc cc cc cc 66 90 90 90 90 90 90 90 90 Dec 18 09:20:35 syzkaller kern.notice kernel: [ 80[ 80.686007][ T6145] SELinux: syz.2.793 (6145) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. .117627][ T6117] FAULT_INJECTION: forcing a failure. Dec 18 09:20:35 syzkaller kern.notice kernel: [ 80.117627][ T6117] name failslab, interval 1, probability 0, space 0, times 0 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.118825][ T6108] RSP: 0018:ffffc900012efe78 EFLAGS: 00050206 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.118849][ T6108] RAX: 00007ffdeff065f8 RBX: 0000000000000000 RCX: 00000000200003c0 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.145451][ T6108] RDX: 0000000000000000 RSI: ffffffff8663fa00 RDI: 1fffffffffffffef Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.153427][ T6108] RBP: ffffc900012eff48 R08: 0000000000000007 R09: ffffffff810aad7a Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.161514][ T6108] R10: 0000000000000009 R11: ffff888109f81080 R12: 0000000000000000 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.169487][ T6108] R13: 0000000000000003 R14: 00000000200003c0 R15: ffff88810350a100 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.177470][ T6108] ? getreg+0x2a/0x1e0 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.181666][ T6108][ 80.796914][ T6164] FAULT_INJECTION: forcing a failure. [ 80.796914][ T6164] name failslab, interval 1, probability 0, space 0, times 0 arch_ptrace+0x[ 80.810906][ T6164] CPU: 1 UID: 0 PID: 6164 Comm: syz.2.802 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 80.822761][ T6164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 80.832852][ T6164] Call Trace: [ 80.836155][ T6164] [ 80.839106][ T6164] dump_stack_lvl+0xf2/0x150 [ 80.843812][ T6164] dump_stack+0x15/0x1a [ 80.848009][ T6164] should_fail_ex+0x223/0x230 [ 80.852767][ T6164] should_failslab+0x8f/0xb0 [ 80.857403][ T6164] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 80.863160][ T6164] ? __d_alloc+0x3d/0x340 [ 80.867568][ T6164] ? selinux_inode_permission+0x341/0x410 [ 80.873383][ T6164] __d_alloc+0x3d/0x340 [ 80.877575][ T6164] d_alloc_parallel+0x54/0xc60 [ 80.882387][ T6164] ? __rcu_read_unlock+0x4e/0x70 [ 80.887496][ T6164] ? __d_lookup+0x342/0x370 [ 80.892058][ T6164] ? make_vfsuid+0x52/0xa0 [ 80.896564][ T6164] ? down_read+0x171/0x4b0 [ 80.901107][ T6164] path_openat+0x6c8/0x1fa0 [ 80.905733][ T6164] ? _parse_integer_limit+0x167/0x180 [ 80.911151][ T6164] do_filp_open+0x107/0x230 [ 80.915674][ T6164] ? __pfx_kfree_link+0x10/0x10 [ 80.920591][ T6164] do_sys_openat2+0xab/0x120 [ 80.925186][ T6164] __x64_sys_openat+0xf3/0x120 [ 80.930049][ T6164] x64_sys_call+0x2b30/0x2dc0 [ 80.934742][ T6164] do_syscall_64+0xc9/0x1c0 [ 80.939266][ T6164] ? clear_bhb_loop+0x55/0xb0 [ 80.944002][ T6164] ? clear_bhb_loop+0x55/0xb0 [ 80.948778][ T6164] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 80.954783][ T6164] RIP: 0033:0x7f12a6215d29 [ 80.959221][ T6164] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 80.978959][ T6164] RSP: 002b:00007f12a4887038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 80.987408][ T6164] RAX: ffffffffffffffda RBX: 00007f12a6405fa0 RCX: 00007f12a6215d29 [ 80.995459][ T6164] RDX: 0000000000004400 RSI: 0000000020000040 RDI: ffffffffffffff9c [ 81.003455][ T6164] RBP: 00007f12a4887090 R08: 0000000000000000 R09: 0000000000000000 [ 81.011452][ T6164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.019500][ T6164] R13: 0000000000000001 R14: 00007f12a6405fa0 R15: 00007ffd4299be88 [ 81.027505][ T6164] 3cc/0x400 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.186238][ T6108] __se_sys_ptrace+0xf4/0x2b0 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.190923][ T6108] __x64_sys_ptrace+0x55/0x70 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.195639][ T6108] x64_sys_call+0x2225/0x2dc0 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.200383][ T6108] do_syscall_64+0xc9/0x1c0 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.204954][ T6108] ? clear_bhb_loop+0x55/0xb0 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.209652][ T6108] ? clear_bhb_loop+0x55/0xb0 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.214366][ T6108] entry_SYSCALL_64_after_hwframe+0x77/0x7f Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.220314][ T6108] RIP: 0033:0x7ffac8265d29 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.224780][ T6108] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Dec 18 09:20:35 syzkaller kern.warn kernel: [ 80.244468][ T6108] RSP: 002b:00007ffac68d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000065 Dec 18 09:20:35 syzkaller kern.warn kDec 18 09:20:35 Dec 18 09:20:35 syzkaller kern.wDec 18 09:20:35 Dec 18 09:20:35 Dec 18 09:20:35 Dec 18 09:20:35 Dec 18 09:20:35 Dec 18 09:20:35 Dec 18 09:20:36 syzkaller kern.warn kernel: [ 80.686007][ T6145] SELinux: syz.2.793 (6145) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. Dec 18 09:20:36 syzkaller kern.notice kernel: [ 80.796914][ T6164] FAULT_[ 81.173149][ T6192] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=6192 comm=syz.2.813 INJECTION: forcing a failure. Dec 18 09:20:36 syzkaller kern.notice kernel: [ 80.796914][ T6164] name failslab, interval 1, probability 0, space 0, times 0 Dec 18 09:20:36 syzkaller kern.warn kernel: [ 80.810906][ T6164] CPU: 1 UID: 0 PID: 6164 Comm: syz.2.802 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 Dec 18 09:20:36 syzkaller kern.warn kernel: [ 80.822761][ T6164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 Dec 18 09:20:36 syzkaller kern.warn kernel: [ 80.832852][ T6164] Call Trace: Dec 18 09:20:36 syzkaller kern.warn kernel: [ 80.836155][ T6164] Dec 18 09:20:36 syzkaller kern.warn kernel: [ 80.839106][ T6164] dump_stack_lvl+0xf2/0x150 Dec 18 09:20:36 syzkaller kern.warn kernel: [ 80.843812][ T6164] dump_stack+0x15/0x1a Dec 18 09:20:36 syzkaller kern.warn kernel: [ 80.848009][ T6164] should_fail_ex+0x223/0x230 Dec 18 09:20:36 syzkaller[ 81.269185][ T6208] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6208 comm=syz.6.820 kern.warn kernel: [ 80.852767][ T6164] should_failslab+0x8f/0xb0 Dec 18 09:20:36 syzkaller kern.warn kernel: [ 80.857403][ T6164] kmem_cache_alloc_lru_noprof+0x57/0x320 Dec 18 09:20:36 syzkaller kern.warn kernel: [ 80.863160][ T6164] ? __d_alloc+0x3d/0x340 Dec 18 09:20:36 syzkaller kern.warn kernel: [ 80.867568][ T6164] ? selinux_inode_permission+0x341/0x410 Dec 18 09:20:36 syzkaller kern.warn kernel: [ 80.873383][ T6164] __d_alloc+0x3d/0x3[ 81.321308][ T6214] FAULT_INJECTION: forcing a failure. [ 81.321308][ T6214] name failslab, interval 1, probability 0, space 0, times 0 40 Dec 18 09:20[ 81.334879][ T6214] CPU: 1 UID: 0 PID: 6214 Comm: syz.6.823 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 81.346657][ T6214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 81.356814][ T6214] Call Trace: [ 81.360121][ T6214] [ 81.363085][ T6214] dump_stack_lvl+0xf2/0x150 [ 81.367866][ T6214] dump_stack+0x15/0x1a [ 81.372098][ T6214] should_fail_ex+0x223/0x230 [ 81.376892][ T6214] should_failslab+0x8f/0xb0 [ 81.381522][ T6214] __kmalloc_noprof+0xab/0x3f0 [ 81.386323][ T6214] ? sel_write_relabel+0x175/0x340 [ 81.391748][ T6214] sel_write_relabel+0x175/0x340 [ 81.396758][ T6214] selinux_transaction_write+0xba/0x100 [ 81.402414][ T6214] ? __pfx_selinux_transaction_write+0x10/0x10 [ 81.408646][ T6214] vfs_write+0x281/0x920 [ 81.412933][ T6214] ? __fget_files+0x17c/0x1c0 [ 81.417745][ T6214] ksys_write+0xe8/0x1b0 [ 81.419720][ T6218] FAULT_INJECTION: forcing a failure. [ 81.419720][ T6218] name failslab, interval 1, probability 0, space 0, times 0 [ 81.422046][ T6214] __x64_sys_write+0x42/0x50 [ 81.439245][ T6214] x64_sys_call+0x287e/0x2dc0 [ 81.444075][ T6214] do_syscall_64+0xc9/0x1c0 [ 81.448702][ T6214] ? clear_bhb_loop+0x55/0xb0 [ 81.453391][ T6214] ? clear_bhb_loop+0x55/0xb0 [ 81.458123][ T6214] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 81.464123][ T6214] RIP: 0033:0x7ffac8265d29 [ 81.468543][ T6214] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 81.488179][ T6214] RSP: 002b:00007ffac68d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 81.496654][ T6214] RAX: ffffffffffffffda RBX: 00007ffac8455fa0 RCX: 00007ffac8265d29 [ 81.504638][ T6214] RDX: 0000000000000054 RSI: 0000000020000440 RDI: 0000000000000003 [ 81.512630][ T6214] RBP: 00007ffac68d7090 R08: 0000000000000000 R09: 0000000000000000 [ 81.520633][ T6214] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.528654][ T6214] R13: 0000000000000000 R14: 00007ffac8455fa0 R15: 00007ffdeff065f8 [ 81.536688][ T6214] :36 syzkaller ke[ 81.539715][ T6218] CPU: 0 UID: 0 PID: 6218 Comm: syz.2.825 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 rn.warn kernel: [ 81.551741][ T6218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 80.877575][ [ 81.563172][ T6218] Call Trace: T6164] d_alloc_[ 81.567825][ T6218] parallel+0x54/0x[ 81.572195][ T6218] dump_stack_lvl+0xf2/0x150 c60 Dec 18 09:2[ 81.578147][ T6218] dump_stack+0x15/0x1a 0:36 syzkaller k[ 81.583722][ T6218] should_fail_ex+0x223/0x230 ern.warn kernel:[ 81.589783][ T6218] should_failslab+0x8f/0xb0 [ 80.882387][[ 81.595745][ T6218] __kmalloc_node_track_caller_noprof+0xa8/0x410 T6164] ? __rcu[ 81.603468][ T6218] ? sidtab_sid2str_get+0xb8/0x140 _read_unlock+0x4[ 81.610000][ T6218] kmemdup_noprof+0x2a/0x60 e/0x70 Dec 18 0[ 81.615822][ T6218] sidtab_sid2str_get+0xb8/0x140 9:20:36 syzkalle[ 81.622144][ T6218] security_sid_to_context_core+0x1eb/0x2f0 r kern.warn kern[ 81.629412][ T6218] security_sid_to_context_force+0x2a/0x40 el: [ 80.88749[ 81.636609][ T6218] selinux_inode_init_security+0x344/0x3e0 6][ T6164] ? __[ 81.643802][ T6218] ? __pfx_shmem_initxattrs+0x10/0x10 d_lookup+0x342/0[ 81.650537][ T6218] ? __pfx_shmem_initxattrs+0x10/0x10 x370 Dec 18 09:[ 81.657318][ T6218] security_inode_init_security+0x141/0x330 20:36 syzkaller [ 81.664596][ T6218] shmem_mknod+0xa8/0x180 kern.warn kernel[ 81.670306][ T6218] ? __pfx_shmem_create+0x10/0x10 : [ 80.892058][ 81.676714][ T6218] shmem_create+0x34/0x40 [ T6164] ? make[ 81.682496][ T6218] path_openat+0xe92/0x1fa0 _vfsuid+0x52/0xa0 Dec 18 09:20:36 syzkaller ker[ 81.688326][ T6218] do_filp_open+0x107/0x230 n.warn kernel: [[ 81.688375][ T6218] do_sys_openat2+0xab/0x120 80.896564][ T[ 81.688405][ T6218] __x64_sys_open+0xe6/0x110 6164] ? down_re[ 81.688479][ T6218] x64_sys_call+0x13e1/0x2dc0 ad+0x171/0x4b0 [ 81.688704][ T6218] do_syscall_64+0xc9/0x1c0 Dec 18 09:20:36 [ 81.688737][ T6218] ? clear_bhb_loop+0x55/0xb0 syzkaller kern.warn kernel: [ 80.901107][ T6164] path_openat+0x6c8/0x1fa0 Dec 18 09:20:36 syzkaller kern.warn kernel: [ 80.905733][ T6164] ? _parse_integer_limit+0x167/0x180 Dec 18 09:20:36 syzkaller kern.warn kernel: [ 80.911151][ T6164] do_filp_open+0x107/0x230 Dec 18 09:20:36 syzkaller kern.warn kernel: [ 80.915674][ T6164] ? __pfx_kfree_link+0x10/0x10 Dec 18 09:[ 81.688766][ T6218] ? clear_bhb_loop+0x55/0xb0 20:36 syzkaller kern.warn kernel: [ 80.920591][ T6164] do_sys_openat2+0xab/0x120 Dec 18 09:20:36 syzkaller k[ 81.688793][ T6218] entry_SYSCALL_64_after_hwframe+0x77/0x7f ern.warn kernel: [ 80.925186][ T6164] __x64_sys_openat+0xf3/0x120 Dec 18 09:20:36 syzkaller kern.warn kernel: [ 80.930049][ T6164] x64_sys_call+0x2b30/0x2dc0 Dec 18 09:20:36 syzkaller kern.warn kernel: [ 80.934742][ T6164] do_syscall_64+0xc9/0x1c0 Dec 18 09:20:36 syzkaller keDec 18 09:20:36 [ 81.688890][ T6218] RIP: 0033:0x7f12a6215d29 syzkaller kern.warn kernel: [ Dec 18 09:20:36 [ 81.688909][ T6218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Dec 18 09:20:36 syzkaller kern.wDec 18 09:20:36 [ 81.688929][ T6218] RSP: 002b:00007f12a4887038 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 syzkaller kern.warn kernel: [ 81.173149][ T6192] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=[ 81.688951][ T6218] RAX: ffffffffffffffda RBX: 00007f12a6405fa0 RCX: 00007f12a6215d29 1538 sclass=netlink_route_socket pid=6192 comm=syz.2.813 Dec 18 09:20:36 syzkaller kern.warn kernel: [ 81.269[ 81.688970][ T6218] RDX: 0000000000000000 RSI: 000000000002a4c0 RDI: 0000000020000140 185][ T6208] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 scla[ 81.688985][ T6218] RBP: 00007f12a4887090 R08: 0000000000000000 R09: 0000000000000000 ss=netlink_route[ 81.689000][ T6218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 _socket pid=6208[ 81.689015][ T6218] R13: 0000000000000000 R14: 00007f12a6405fa0 R15: 00007ffd4299be88 comm=syz.6.820[ 81.689105][ T6218] Dec 18 09:20:36 syzkaller kern.notice kernel: [ 81.321308][ T6214] FAULT_INJECTION: forcing a failure. Dec 18 09:20:36 syzkaller kern.notice kernel: [ 81.321308][ T6214] name failslab, interval 1, probability 0, space 0, times 0 Dec 18 09:20:36 syzkaller kern.warn kernel: [ 81.334879][ T6214] CPU: 1 UID: 0 PID: 6214 Comm: syz.6.823 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 Dec 18 09:20:36 syzkaller kern.warn kernel: [ 81.346657][ T6214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 Dec 18 09:20:36 syzkaller kern.warn kernel: [ 81.356814][ T6214] Call Trace: Dec 18 09:20:36 syzkaller kern.warn kernel: [ 81.360121][ T6214] Dec 18 09:20:36 syzkaller kern.warn kernel: [ 81.363085][ T6214] dump_stack_lvl+0xf2/0x150 Dec 18 09:20:36 syzkaller kern.warn kernel: [ 81.367866][ T6214] dump_stack+0x15/0x1a Dec 18 09:20:36 syzkaller kern.warn kernel: [ 81.372098][ T6214] should_fail_ex+0x223/0x230 Dec 18 09:20:36 syzkaller kern.warn kernel: [ 81.376892][ T6214] should_failslab+0x8f/0xb0 Dec 18 09:20:36 syzkaller kern.warn kernel: [ 81.381522][ T6214] __kmalloc_noprof+0xab/0x3f0 Dec 18 09:20:36 syzkaller kern.warn kernel: [ 81.386323][ T6214] ? sel_write_relabel+0x175/0x340 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 81.391748][ T6214] sel_write_relabel+0x175/0x340 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 81.396758][ T6214] selinux_transaction_write+0xba/0x100 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 81.402414][ T6214] ? __pfx_selinux_transaction_write+0x10/0x10 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 81.408646][ T6214] vfs_write+0x281/0x920 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 81.412933][ T6214] ? __fget_files+0x17c/0x1c0 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 81.417745][ T6214] ksys_write+0xe8/0x1b0 Dec 18 09:20:37 syzkaller kern.notice kernel: [ 81.419720][ T6218] FAULT_INJECTION: forcing a failure. Dec 18 09:20:37 syzkaller kern.notice kernel: [ 81.419720][ T6218] name failslab, interval 1, probability 0, space 0, times 0 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 81.422046][ T6214] __x64_sys_write+0x42/0x50 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 81.439245][ T6214] x64_sys_call+0x287e/0x2dc0 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 81.444075][ T6214] do_syscall_64+0xc9/0x1c0 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 81.448702][ T6214] ? clear_bhb_loop+0x55/0xb0 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 81.453391][ T6214] ? clear_bhb_loop+0x55/0xb0 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 81.458123][ T6214] entry_SYSCALL_64_after_hwframe+0x77/0x7f Dec 18 09:20:37 syzkaller kern.warn kernel: [ 81.464123][ T6214] RIP: 0033:0x7ffac8265d29 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 81.468543][ T6214] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 81.488179][ T6214] RSP: 002b:00007ffac68d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 81.496654][ T6214] RAX: ffffffffffffffda RBX: 00007ffac8455fa0 RCX: 00007ffac8265d29 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 81.504638][ T6214] RDX: 0000000000000054 RSI: 0000000020000440 RDI: 0000000000000003 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 81.512630][ T6214] RBP: 00007ffac68d7090 R08: 0000000000000000 R09: 0000000000000000 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 81.520633][ T6214] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 81.528654][ T6214] R13: 0000000000000000 R14: 00007ffac8455fa0 R15: 00007ffdeff065f8 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 81.536688][ T6214] Dec 18 09:20:37 syzkaller kern.warn kernel: [ 81.539715][ T6218] CPU: 0 UID: 0 PID: 6218 Comm: syz.2.825 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 81.551741][ T6218] Hardware name: Google Google Compute EngiDec 18 09:20:37 Dec 18 09:20:37 Dec 18 09:20:37 Dec 18 09:20:37 Dec 18 09:20:37 Dec 18 09:20:37 Dec 18 09:20:37 syzkaller kern.wDec 18 09:20:37 [ 82.377505][ T6277] FAULT_INJECTION: forcing a failure. [ 82.377505][ T6277] name failslab, interval 1, probability 0, space 0, times 0 [ 82.390254][ T6277] CPU: 0 UID: 0 PID: 6277 Comm: syz.2.850 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 82.400889][ T6277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 82.410956][ T6277] Call Trace: [ 82.414239][ T6277] [ 82.417202][ T6277] dump_stack_lvl+0xf2/0x150 [ 82.421814][ T6277] dump_stack+0x15/0x1a [ 82.426082][ T6277] should_fail_ex+0x223/0x230 [ 82.430842][ T6277] should_failslab+0x8f/0xb0 [ 82.435451][ T6277] kmem_cache_alloc_noprof+0x52/0x320 [ 82.440910][ T6277] ? copy_signal+0x54/0x350 [ 82.445474][ T6277] ? copy_sighand+0x52/0x1b0 [ 82.450077][ T6277] copy_signal+0x54/0x350 [ 82.454414][ T6277] copy_process+0xd34/0x1f90 [ 82.459014][ T6277] kernel_clone+0x167/0x5e0 [ 82.463522][ T6277] ? vfs_write+0x596/0x920 [ 82.468011][ T6277] __x64_sys_clone+0xe8/0x120 [ 82.472777][ T6277] x64_sys_call+0x2d7e/0x2dc0 [ 82.477478][ T6277] do_syscall_64+0xc9/0x1c0 [ 82.481989][ T6277] ? clear_bhb_loop+0x55/0xb0 [ 82.486715][ T6277] ? clear_bhb_loop+0x55/0xb0 [ 82.491398][ T6277] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 82.497312][ T6277] RIP: 0033:0x7f12a6215d29 [ 82.501732][ T6277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 82.521379][ T6277] RSP: 002b:00007f12a4886fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 82.529822][ T6277] RAX: ffffffffffffffda RBX: 00007f12a6405fa0 RCX: 00007f12a6215d29 [ 82.537806][ T6277] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 82.545783][ T6277] RBP: 00007f12a4887090 R08: 0000000000000000 R09: 0000000000000000 [ 82.553781][ T6277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 82.561757][ T6277] R13: 0000000000000000 R14: 00007f12a6405fa0 R15: 00007ffd4299be88 [ 82.569883][ T6277] Dec 18 09:20:37 syzkaller kern.notice kernel: [ 82.377505][ T6277] FAULT_INJECTION: forcing a failure. Dec 18 09:20:37 syzkaller kern.notice kernel: [ 82.377505][ T6277] name failslab, interval 1, probability 0, space 0, times 0 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.390254][ T6277] CPU: 0 UID: 0 PID: 6277 Comm: syz.2.850 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.400889][ T6277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.410956][ T6277] Call Trace: Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.414239][ T6277] Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.417202][ T6277] dump_stack_lvl+0xf2/0x150 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.421814][ T6277] dump_stack+0x15/0x1a Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.426082][ T6277] should_fail_ex+0x223/0x230 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.430842][ T6277] should_failslab+0x8f/0xb0 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.435451][ T6277] kmem_cache_alloc_noprof+0x52/0x320 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.440910][ T6277] ? copy_signal+0x54/0x350 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.445474][ T6277] ? copy_sighand+0x52/0x1b0 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.450077][ T6277] copy_signal+0x54/0x350 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.454414][ T6277] copy_process+0xd34/0x1f90 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.459014][ T6277] kernel_clone+0x167/0x5e0 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.463522][ T6277] ? vfs_write+0x596/0x920 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.468011][ T6277] __x64_sys_clone+0xe8/0x120 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.472777][ T6277] x64_sys_call+0x2d7e/0x2dc0 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.477478][ T6277] do_syscall_64+0xc9/0x1c0 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.481989][ T6277] ? clear_bhb_loop+0x55/0xb0 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.486715][ T6277] ? clear_bhb_loop+0x55/0xb0 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.491398][ T6277] entry_SYSCALL_64_after_hwframe+0x77/0x7f Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.497312][ T6277] RIP: 0033:0x7f12a6215d29 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.501732][ T6277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.521379][ T6277] RSP: 002b:00007f12a4886fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.529822][ T6277] RAX: ffffffffffffffda RBX: 00007f12a6405fa0 RCX: 00007f12a6215d29 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.537806][ T6277] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.545783][ T6277] RBP: 00007f12a4887090 R08: 0000000000000000 R09: 0000000000000000 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.553781][ T6277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.561757][ T6277] R13: 0000000000000000 R14: 00007f12a6405fa0 R15: 00007ffd4299be88 Dec 18 09:20:37 syzkaller kern.warn kernel: [ 82.569883][ T6277] [ 82.902076][ T6326] FAULT_INJECTION: forcing a failure. [ 82.902076][ T6326] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 82.915254][ T6326] CPU: 1 UID: 0 PID: 6326 Comm: syz.5.873 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 82.925878][ T6326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 82.935954][ T6326] Call Trace: [ 82.939275][ T6326] [ 82.942205][ T6326] dump_stack_lvl+0xf2/0x150 [ 82.946864][ T6326] dump_stack+0x15/0x1a [ 82.951055][ T6326] should_fail_ex+0x223/0x230 [ 82.955812][ T6326] should_fail+0xb/0x10 [ 82.959994][ T6326] should_fail_usercopy+0x1a/0x20 [ 82.965027][ T6326] _copy_from_user+0x1e/0xb0 [ 82.969680][ T6326] __se_sys_memfd_create+0x26b/0x5c0 [ 82.974989][ T6326] __x64_sys_memfd_create+0x31/0x40 [ 82.980199][ T6326] x64_sys_call+0x2d4c/0x2dc0 [ 82.984975][ T6326] do_syscall_64+0xc9/0x1c0 [ 82.989499][ T6326] ? clear_bhb_loop+0x55/0xb0 [ 82.994185][ T6326] ? clear_bhb_loop+0x55/0xb0 [ 82.998987][ T6326] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 83.004962][ T6326] RIP: 0033:0x7fc86cd95d29 [ 83.009377][ T6326] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 83.028989][ T6326] RSP: 002b:00007fc86b400d68 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 83.037408][ T6326] RAX: ffffffffffffffda RBX: 00000000000005fb RCX: 00007fc86cd95d29 [ 83.045413][ T6326] RDX: 00007fc86b400dec RSI: 0000000000000000 RDI: 00007fc86ce12381 [ 83.053388][ T6326] RBP: 0000000020000d00 R08: 00007fc86b400b07 R09: 0000000000000000 [ 83.061370][ T6326] R10: 000000000000000a R11: 0000000000000202 R12: 0000000000000001 [ 83.069345][ T6326] R13: 00007fc86b400dec R14: 00007fc86b400df0 R15: 00007ffe87171528 [ 83.077327][ T6326] [ 83.083528][ T29] kauditd_printk_skb: 2598 callbacks suppressed [ 83.083544][ T29] audit: type=1400 audit(1734513638.404:7629): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 18 09:20:38 syzkaller kern.n[ 83.113460][ T29] audit: type=1400 audit(1734513638.444:7630): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 otice kernel: [ [ 83.136767][ T29] audit: type=1400 audit(1734513638.444:7631): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 82.902076][ T6[ 83.160065][ T29] audit: type=1400 audit(1734513638.444:7632): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 326] FAULT_INJEC[ 83.183537][ T29] audit: type=1400 audit(1734513638.444:7633): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 TION: forcing a [ 83.206880][ T29] audit: type=1400 audit(1734513638.444:7634): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 failure. Dec 18[ 83.230598][ T29] audit: type=1400 audit(1734513638.444:7635): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 09:20:38 syzkal[ 83.253630][ T29] audit: type=1400 audit(1734513638.444:7636): avc: denied { create } for pid=6327 comm="syz.2.875" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 ler kern.notice [ 83.276074][ T29] audit: type=1400 audit(1734513638.444:7637): avc: denied { append } for pid=6327 comm="syz.2.875" name="001" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 kernel: [ 82.9[ 83.293353][ T6329] audit: audit_backlog=65 > audit_backlog_limit=64 02076][ T6326] name fail_usercopy, interval 1, probability 0, space 0, times 0 Dec 18 09:20:38 syzkaller kern.warn kernel: [ 82.915254][ T6326] CPU: 1 UID: 0 PID: 6326 Comm: syz.5.873 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 Dec 18 09:20:38 syzkaller kern.warn kernel: [ 82.925878][ T6326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 Dec 18 09:20:38 syzkaller kern.warn kernel: [ 82.935954][ T6326] Call Trace: Dec 18 09:20:38 syzkaller kern.warn kernel: [ 82.939275][ T6326] Dec 18 09:20:38 syzkaller kern.warn kernel: [ 82.942205][ T6326] dump_stack_lvl+0xf2/0x150 Dec 18 09:20:38 syzkaller kern.warn kernel: [ 82.946864][ T6326] dump_stack+0x15/0x1a Dec 18 09:20:38 syzkaller kern.warn kernel: [ 82.951055[ 83.378181][ T6348] FAULT_INJECTION: forcing a failure. [ 83.378181][ T6348] name fail_usercopy, interval 1, probability 0, space 0, times 0 ][ T6326] shoul[ 83.391367][ T6348] CPU: 0 UID: 0 PID: 6348 Comm: syz.6.883 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 d_fail_ex+0x223/[ 83.393912][ T6350] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6350 comm=syz.2.884 [ 83.403236][ T6348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 83.403254][ T6348] Call Trace: 0x230 Dec 18 09[ 83.403263][ T6348] :20:38 syzkaller[ 83.403271][ T6348] dump_stack_lvl+0xf2/0x150 [ 83.403329][ T6348] dump_stack+0x15/0x1a kern.warn kerne[ 83.403369][ T6348] should_fail_ex+0x223/0x230 l: [ 82.955812[ 83.403401][ T6348] should_fail+0xb/0x10 ][ T6326] shoul[ 83.456505][ T6348] should_fail_usercopy+0x1a/0x20 d_fail+0xb/0x10[ 83.462923][ T6348] _copy_from_user+0x1e/0xb0 Dec 18 09:20:38[ 83.468886][ T6348] kstrtouint_from_user+0x76/0xe0 syzkaller kern.[ 83.475285][ T6348] ? 0xffffffff81000000 warn kernel: [ [ 83.480832][ T6348] ? selinux_file_permission+0x22a/0x360 82.959994][ T63[ 83.487840][ T6348] proc_fail_nth_write+0x4f/0x150 26] should_fail[ 83.494256][ T6348] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 83.494354][ T6348] vfs_write+0x281/0x920 [ 83.494386][ T6348] ? __pfx_proc_fail_nth_read+0x10/0x10 _usercopy+0x1a/0[ 83.511306][ T6348] ? __fget_files+0x17c/0x1c0 x20 Dec 18 09:2[ 83.517393][ T6348] ksys_write+0xe8/0x1b0 0:38 syzkaller k[ 83.523136][ T6348] __x64_sys_write+0x42/0x50 ern.warn kernel:[ 83.529128][ T6348] x64_sys_call+0x287e/0x2dc0 [ 82.965027][[ 83.535218][ T6348] do_syscall_64+0xc9/0x1c0 T6326] _copy_from_user+0x1e/0xb0 Dec 18 09:20[ 83.541117][ T6348] ? clear_bhb_loop+0x55/0xb0 :38 syzkaller kern.warn kernel: [ 82.969680][ T6326] __se_sys_memfd_create+0x[ 83.541156][ T6348] ? clear_bhb_loop+0x55/0xb0 26b/0x5c0 Dec 1[ 83.541184][ T6348] entry_SYSCALL_64_after_hwframe+0x77/0x7f 8 09:20:38 syzkaller kern.warn kernel: [ 82.974989][ T6326] _[ 83.541231][ T6348] RIP: 0033:0x7ffac82647df _x64_sys_memfd_create+0x31/0x40 Dec 18 09:20:38 syzkaller kern.warn kernel: [ 82.980199][ T63[ 83.541271][ T6348] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 26] x64_sys_call+0x2d4c/0x2dc0 Dec 18 09:20:38 syzkaller kern.warn kernel: [ 82.984975][ T6326] do_syscall_64+0xc9/0x1c0 Dec 18 09:20:38 syzkaller kern.warn kernel: [ 82.989499][ T6326] ? clear_bhb_loop+0x55/0xb0 D[ 83.541293][ T6348] RSP: 002b:00007ffac68d7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 ec 18 09:20:38 s[ 83.541316][ T6348] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ffac82647df yzkaller kern.warn kernel: [ 8[ 83.541330][ T6348] RDX: 0000000000000001 RSI: 00007ffac68d70a0 RDI: 0000000000000004 2.994185][ T6326[ 83.541343][ T6348] RBP: 00007ffac68d7090 R08: 0000000000000000 R09: 0000000000000000 ] ? clear_bhb_l[ 83.541407][ T6348] R10: 0000000020000000 R11: 0000000000000293 R12: 0000000000000002 oop+0x55/0xb0 D[ 83.541423][ T6348] R13: 0000000000000000 R14: 00007ffac8455fa0 R15: 00007ffdeff065f8 ec 18 09:20:38 s[ 83.541509][ T6348] yzkaller kern.warn kernel: [ 82.998987][ T6326] entry_SYSCALL_64_after_hwframe+0x77/0x7f Dec 18 09:20:38 syzkaller kern.warn kernel: [ 83.004962][ T6326] RIP: 0033:0x7fc86cd95d29 Dec 18 09:20:38 syzkaller kern.warn kernel: [ 83.009377][ T6326] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 f[ 83.722330][ T6376] ================================================================== [ 83.730898][ T6376] BUG: KCSAN: data-race in mas_wr_store_entry / mtree_range_walk [ 83.738645][ T6376] [ 83.740972][ T6376] write to 0xffff8881035f8510 of 8 bytes by task 6375 on cpu 0: [ 83.748610][ T6376] mas_wr_store_entry+0x1490/0x2d10 [ 83.753830][ T6376] mas_store_prealloc+0x6bf/0x960 [ 83.758875][ T6376] commit_merge+0x441/0x740 [ 83.763384][ T6376] vma_expand+0x211/0x360 [ 83.767737][ T6376] vma_merge_new_range+0x2da/0x340 [ 83.772867][ T6376] __mmap_region+0x67c/0x13f0 [ 83.777557][ T6376] mmap_region+0x164/0x1e0 [ 83.781998][ T6376] do_mmap+0x718/0xb60 [ 83.786086][ T6376] vm_mmap_pgoff+0x133/0x290 [ 83.790702][ T6376] ksys_mmap_pgoff+0xd0/0x330 [ 83.795465][ T6376] x64_sys_call+0x1940/0x2dc0 [ 83.800167][ T6376] do_syscall_64+0xc9/0x1c0 [ 83.804687][ T6376] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 83.810612][ T6376] [ 83.812942][ T6376] read to 0xffff8881035f8510 of 8 bytes by task 6376 on cpu 1: [ 83.820499][ T6376] mtree_range_walk+0x1b4/0x460 [ 83.825479][ T6376] mas_walk+0x16e/0x320 [ 83.829658][ T6376] lock_vma_under_rcu+0x95/0x260 [ 83.834609][ T6376] exc_page_fault+0x150/0x650 [ 83.839314][ T6376] asm_exc_page_fault+0x26/0x30 [ 83.844190][ T6376] [ 83.846517][ T6376] value changed: 0x00007ffac68b6fff -> 0xffffffff852da9d0 [ 83.853623][ T6376] [ 83.855949][ T6376] Reported by Kernel Concurrency Sanitizer on: [ 83.862098][ T6376] CPU: 1 UID: 0 PID: 6376 Comm: syz.6.895 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 83.872705][ T6376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 83.882777][ T6376] ================================================================== f ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Dec 18 09:20:38 syzkaller kern.warn kernel: [ 83.028989][ T6326] RSP: 002b:00007fc86b400d68 EFLAGS: 00000202 ORIG_RAX: 000000000000013f Dec 18 09:20:38 syzkaller kern.warn kernel: [ 83.037408][ T6326] RAX: ffffffffffffffda RBX: 00000000000005fb RCX: 00007fc86cd95d29 Dec 18 09:20:38 syzkaller kern.warn kernel: [ 83.045413][ T6326] RDX: 00007fc86b400dec RSI: 0000000000000000 RDI: 00007fc86ce12381 Dec 18 09:20:38 syzkaller kern.warn kernel: [ 83.053388][ T6326] RBP: 0000000020000d00 R08: 00007fc86b400b07 R09: 0000000000000000 Dec 18 09:20:38 syzkaller kern.warn kernel: [ 83.061370][ T6326] R10: 000000000000000a R11: 0000000000000202 R12: 0000000000000001 Dec 18 09:20:38 syzkaller kern.warn kernel: [ 83.069345][ T6326] R13: 00007fc86b400dec R14: 00007fc86b400df0 R15: 00007ffe87171528 Dec 18 09:20:38 syzkaller kern.warn kernel: [ 83.077327][ T6326] Dec 18 09:20:38 syzkaller kern.warn kernel: [ 83.083528][ T29] kauditd_printk_skb: 2598 callbacks suppressed Dec 18 09:20:38 syzkaller kern.notice kernel: [ 83.083544][ T29] audit: type=1400 audit(1734513638.404:7629): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 18 09:20:38 syzkaller kern.notice kernel: [ 83.113460][ T29] audit: type=1400 audit(1734513638.444:7630): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 18 09:20:38 syzkaller kern.notice kernel: [ 83.136767][ T29] audit: type=1400 audit(1734513638.444:7631): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 18 09:20:38 syzkaller kern.notice kernel: [ 83.160065][ T29] audit: type=1400 audit(1734513638.444:7632): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:vDec 18 09:20:38 Dec 18 09:20:38 Dec 18 09:20:38 syzkaller kern.notice kernel: [ 83.378181][ T6348] FAULT_INJECTION: forcing a failure. Dec 18 09:20:38 syzkaller kern.notice kernel: [ 83.378181][ T6348] name fail_usercopy, interval 1, probability 0, space 0, times 0 Dec 18 09:20:38 syzkaller kern.warn kernel: [ 83.391367][ T6348] CPU: 0 UID: 0 PID: 6348 Comm: syz.6.883 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 Dec 18 09:20:38 syzkaller kern.warn kernel: [ 83.393912][ T6350] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6350 comm=syz.2.884 Dec 18 09:20:38 syzkaller kern.warn kernel: [ 83.403236][ T6348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 Dec 18 09:20:38 syzkaller kern.warn kernel: [ 83.403254][ T6348] Call Trace: Dec 18 09:20:38 syzkaller kern.warn kernel: [ 83.403263][ T6348] Dec 18 09:20:38 syzkaller kern.warn kernel: [ 83.403271][ T6348] dump_stack_lvl+0xf2/0x150 Dec 18 09:20:38 syzkaller kern.warn kernel: [ 83.403329][ T6348] dump_stack+0x15/0x1a Dec 18 09:20:38 syzkaller kern.warn kernel: [ 83.403369][ T6348] should_fail_ex+0x223/0x230 Dec 18 09:20:38 syzkaller kern.warn kernel: [ 83.403401][ T6348] should_fail+0xb/0x10 Dec 18 09:20:38 syzkaller kern.warn kernel: [ 83.456505][ T6348] should_fail_usercopy+0x1a/0x20 Dec 18 09:20:38 syzkaller kern.warn kernel: [ 83.462923][ T6348] _copy_from_user+0x1e/0xb0 Dec 18 09:20:38 syzkaller kern.warn kernel: [ 83.468886][ T6348] kstrtouint_from_uDec 18 09:20:39 Dec 18 09:20:39 syzkaller kern.wDec 18 09:20:39 Dec 18 09:20:39 syzkaller kern.warn kernel: [ 83.494386][ T6348] ? __pfx_proc_fail_nth_read+0x10/0x10 Dec 18Dec 18 09:20:39 Dec 18 09:20:39 Dec 18 09:20:39 syzkaller kern.err kernel: [ 83.722330][ T6376] ================================================================== Dec 18 09:20:39 syzkaller kern.err kernel: [ 83.730898][ T6376] BUG: KCSAN: data-race in mas_wr_store_entry / mtree_range_walk Dec 18 09:20:39 syzkaller kern.err kernel: [ 83.738645][ T6376] Dec 18 09:20:39 syzkaller kern.err kernel: [ 83.740972][ T6376] write to 0xffff8881035f8510 of 8 bytes by task 6375 on cpu 0: