last executing test programs: 2m17.16123762s ago: executing program 4 (id=42): r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r0, r1, 0x0) syz_io_uring_setup(0x2c91, &(0x7f0000000240)={0x0, 0xa69, 0x10100}, &(0x7f0000000380), &(0x7f0000000440)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000f30000000000000000000046d330bd084d7f0c00000000"], 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_test', 0x141a82, 0x0) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000980)='./file1\x00', 0x280809a, &(0x7f0000000f40)=ANY=[], 0xd, 0x2b2, &(0x7f00000006c0)="$eJzs3U9rY1UUAPDz0jR9OosUcaMIPtCFqzJ166ZRRhC7UiKoCw3ODEgSBqYQmArGruYTuPR7+BHcuPEbDLgV3E0XlSfvX/7ga402VXR+v9Xh3nfuPXm3TbLJeZ+/Mh3ffZDE2dMnkaZJdI7iKM6T2I9ONL6JbgAA/x/neR6/5mWY5JUNM7udGy0MALgx1ef/X/rgBwD+4z78+JP3B8fHdz7IsjRe6j+eDZOImD6eDav5wf34MiZxL25HPy4i8oUqfve94zvRzQr78fp0PhsWmdPPfqzXH/wSUeYfRj/22/MPs8pK/nw23I3nI4vB/d2m1H682J7/Zkt+DHvxxmsr9R9EP376Ih7EJO5GkbvM//owy97Jv3361afFNkV+0onhXnldKfcFCQAAAAAAAAAAAAAAAAAAAACA7TrIsqRq31P27ymG6v47Oxfl/EHW2F/vz1PlJ81CVX+gvOmWM8/ju6a/zu0sy/L6wmV+N17uerAAAAAAAAAAAAAAAAAAAAAAFE4ePbk1mkzuPTx5dDq+dtB0A2h+1v931zlaGXk1TsejncsX3Nt8r9VuA0WtV14c3W5s6ba0B2eLkeeKera+xV4sRj6KKmgOZqt7vfB2tejpeJTVU81NHo+SP9srbQ7u+9WpXly3sLz8k7jI1880XZS6ntXb0t3o3Wqd+i3P883Weevn6ozqkaRssbHZ7rt10PoCiyAtziJd/OMXUz9cvuClbxk7137TAQAAAAAAAAAAAAAAAAAAWi1/9NsyeXZlaufGigIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAf9jy+f9NkEbE+sgfgnmdfNU1ddCLhyf/8ksEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgGfB7AAAA//8rlFqg") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) writev(r3, &(0x7f0000000800)=[{&(0x7f0000000c00)="89e7ee2c7cdad9b4b47381c96558", 0xe}, {&(0x7f00000005c0)="c2c10b270d21c75ca6ebfb5b23be", 0xe}, {&(0x7f0000000280)='s', 0x1}], 0x3) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002c00)={&(0x7f0000001b80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@var={0x3, 0x0, 0x0, 0xe, 0x2}, @restrict]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000001c00)=""/4096, 0x39, 0x1000, 0x1, 0x0, 0x0, @void, @value}, 0x20) r8 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x130) r9 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x51) sendfile(r8, r9, 0x0, 0xe065) 2m17.005650423s ago: executing program 4 (id=46): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x42000, &(0x7f00000002c0), 0xfe, 0x446, &(0x7f00000004c0)="$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") open(&(0x7f00000000c0)='./bus\x00', 0x64842, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r0, 0x8010661b, &(0x7f0000000280)) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000900)=0x9, 0x8, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10012, r1, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000000)=0x9, 0x8, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x53, 0x0, &(0x7f0000000040)=0xf) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) clock_adjtime(0x0, &(0x7f0000000040)={0x37db, 0x538d28a0, 0x0, 0x0, 0x0, 0x81}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000080)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000540), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303, 0x37}, "475566172f45f011", "bd14060000000000000092f94413582b", "a4774ec6", "15b188e5e74e13ed"}, 0x28) unshare(0x2c060000) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000940)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) unshare(0x24020400) r6 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r6, &(0x7f0000000240)={0x0, 0xf0ffffff, &(0x7f0000000140)=[{&(0x7f0000000280)="89000000120081ae08060cdc030000007f03e3f7000000006ee2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec0012100001400a0c0c00bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 2m16.9170136s ago: executing program 4 (id=48): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000640)='/sys/power/pm_test', 0x42, 0x0) io_setup(0x20, &(0x7f0000001140)=0x0) io_submit(r1, 0x1, &(0x7f00000001c0)=[&(0x7f0000002040)={0xf, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000080)="0d32818e7e6ae0cd0289", 0xa}]) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2188, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="620af8ffa1dc0021bfa100000000000007010000f8ffffffb702000007000000bd120000000000008500000010000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24561f1b2607995daa56f151905ea23c22624c9f87f9793f3bbb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64b751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07372c29184ff7f4a7c0000070000006056feb4cc664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48b45e0000000000000401d01aa27ae8b09e00e79ab20b0b8ed8fb7a68000000000000000000006fa03c6468978089b302d7ff6023cdcedb5e0125ebbcebdde510cb2364149215108337719acd97cfa107d40224edc5465a932b77a74e802a0dc6bf25d8a242bc6099ad2300000480006ef6c1ff0900ff0000000010c63a949e8b7955394ffaff03000000000000ab87b1bfeda7be586602d985430cea080000000000000026abfb0767192361448279b05d96a703a660581eecdbf5bcd3de227a167ca17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80af740b5b7632d5933a1c1fa5605bd7603f2ba2a790d62d6faec2fed44da4928b30142ba1fde5c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0cb97fca585ec6bf58351d578be00d952aab9c71764b0a8a7583c90b3433b809bdb9fbd48bc877505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223d8d9e86c5ea06d108d8f80a0eb4fa39f6b5c02e6d6d90756ff578f57000000009700cf0b4b8bc229413300000000000000000003000000000000000000000000001000000000559711e6e8fcffffffffffffffb2d02edc3e01dd271c896249ed85b980680b09000000000f0000169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffffd897ef3b7cda42f93d53046da21b40216e14ba2d6af8656b01e17addaedab25b30002abbba7fa725f38400be7c1f001b2cd3170400000085be9e48dccf1f9f3282830689da6b53b263339863297771d74732d400003341bf4a00fc9fec2271ff01589646efd1cf870cd7bb2366fde4a594290c405ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d30a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4b6ab7929a57affe760e717a04becff0f719197724f4fce1093b62d7e8c7123d890cec55bf404e4e1f74b7eed82571be54c72d978cf906df08f11f1c4042e36acd37d7f9e109f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c70600000000000000b7561301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f871b136345cf67ca3fb5aac518a75f9e7d7101da841735e186c489b3a06fb99e0347f23a054de2f4d92d6bd72ee2c9f0390a6f01e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f91e358c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4df90400000000000000d6b2c5eaff07000000000000b99c9cc0ad1857216f000000009191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e669261192899d4562db0e22d564ae09bb6d163118e401e024fd452277c3887d6116c6cc9d8046c216c1f895778cb26e22a2a798de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99a3594191e104d417e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b6000000000000a1fec9000000d694210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137ab79a404abde7750898b59270b939b81367ac91bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f00fb8191bbab2dc591dda61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30065b928a31d2eca55f74a23641f61f2d5b308cf01cfaed9ef0ce21d69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821a00e8c5c39609ff854356cb490000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66018d169fc03aa188546bb2e51935ab9067ec3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d0b3bc19faa5449209b085f3c334b47f067bbab40743b2a428f1da1f626602111b40e761fd21081920382f14d12ca3c471c7868e7da7eaa69eb7f7f80572fdd11bb1d070080fbc22bf73468788df51710eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331ff5e20fa26b8471d9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba830d3f474b079b407000000deff000040430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df902aeec50e71b967ce7daac4be290159f6bcd75f0dda9de5532e66ae9e48b0ed1254a81faae79b6af6fbb869604d51de44c4e0973171ad47d6c00ebc7603093f000000fdec743af930cd6db49a47613808bad959719c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f15d6533f78a1f4e2df4ca23d867693fd42de9b49a1b36d48a44ba6a4530e59bec53e876dc660dd6d89f80a4377b1b1292a893a516dab183ee65744fb8fc4f9ce2242e0f000000000100000000d77480e0345effff6413258d1f6eb190aa28cbb4bafe3436b176c7ed4b132fb805d5edd9d188daf28d89c014c3ecca10ae55704544673e1fb03b84f63e022fe755f4007a4a899eaf52c4f491f1e97c862e29e4570600000091c691faee1e0c8fe056a07474e6e5490a7d3c3402000000b60600d837c6befc63ddf2f594ad7cbc56a1e44d218c956a5392a995f1fae8e9f206efbb33854dc70104d74dc07748f9745cb796da2dfb714a0500000000000000faed94fc39acfb3fd25dfa8116a154cd1226e1bb72b59fed817072a0da60160761fd3dffda0f7c592eabd8ab68334d2a1693cb187539049e331272bf5135044df8161400211b8012b6eb1ed5656e83f65509bb4b323c5bd61bff949d3bade2f6ffda1360c2786e16937ab61d6dcafed319c7167d0885f9c6d1f442954c167dd9b4acd9468ce3674c82bbb2e31389179b025dbe063b7f906217b2cf8410c7023aa3e5cc3ba1000000000000000000000000000000006ae6301a2da44394275c582a6516bb92ea1980a0a659f2f1811c8b281c209647c4241f292b20508b215dde27bb2487a6e2b5e4a8ccfab90c23827ef06cbe364073005f8a6d1456aaeb85ffb7858f24eced67a67ab825e863928ed64c83f62ffdaa997657335b63c6b4163aff094059e626766845fd779c9e6cdbbd64c2499ce3ffe2fef03f7cdd0d90f3a7579579a142c0f7b318264d5c13c31cf475829528267ead38523cab7e1664e8426cfce471fef821c8a02a7e7d954d05b68a9c28f79429b09e2bb3681ae2b831e27c735123361c193d66ed4d71f19b199d371ec6bfada7cd370e3fdd3cd980fa1e145fd3f3e96b1feb53c865e1ada08f5d16ed652ee0c7f45352222692fbd679212c225d097aa90f7e1fb1f983415f43e75a19ecf7fd21bfa150ef563aa72ba3c43c5f3d9be128ec26b691f31f9cab931631606a81622f120675c962be2d3b5e95f74f0b209e42e6bdd76e6e725295b1d78d928f6f63e4581d5cc41cbde2ba66adc1168070c8c6e18a6a234f5f9311ef0f78924b68dbb4712efdb6974667bdb54f16fd2061b9ba93638dd177227e94e4ebd0ec1d437db948062bf41742000000000000000000305f70dd02fa0c61d5fe6d8ff35389246037e18d34c1375ae04f44f0c2543c772c5ccb137be7dc1874c514b37c668554d77d4ea5ed144a648257f4a0301067bbcd9b91072659d872f26b796e2b81025edb5f45f785e2c2602b248ecdd80f019ca659be7e8ae953325a27564f33c9d458a60be3dab38baab7eb1a66ab1ffd6308f7fd51beb356fe75eb985b7581bb5584c53984ba9c3340f97e8d3825681c53de5f554e595b00000000000000006a8fa9f05d64c4be42f981f00051a39938613067dbd1427e01bfec016e51844cefa8a855bf23ac887b4a88eed6d9443857242f28e31a41d20105fbf3394ff910e734b4d9101265ff729c426e01c1ab13dda8c388b909006f19eecb87e39175e85e17000000000000000000009431807e43886903526074e6b40244c938a4c68a38c25ddd7c143b3f1400010000ec66815cf8d1f56aa1424bc9b5d58790298e5b310969e50c222563b54e60854e1b0100448aca8c5ccbf5546ce4c3cd5a733fec25fb94e1e0f966bcbd28a4d8fe4f556eaa1104a793006619700798354c6ae05025040965e3083562bfa20968c04007d21dc02c9fd1f75e1ff40f439bdde4e784012e52049b483d02f81b88f5f57816b3fecec79cfca8d37203e769759d6b6a56b7605ced8ee18475a77ff0963a565fb6021d216c01b1098e40550a1cfd80e918d685a7b099a4f8ed654cd76ca61fe5ad8a31ec558fdbfa706d5e738bceae81fe777c307d5bc72183a4c2d35732ab916a781b9912160a3fd2a2e74dd690c57bdfdc1f069f949170ef8cb9c13c12138116bca7a8c59363799be7005c51bc25a8bbe2cf5ddf6aa161693782b0e7feb8a768f391b49d4c978c96dbb52f21c122eba9f17c8bed10591958cf06321a248b5f76ceedfe0d080d6aeadc11b237b3326dd04b86ac37c0d131544888db9e128d059761ad9a393e96c3b41c13c5a381bff187a75de560ba6eb3faa5ff8d2bb3c88f8de5efc2fb2200cfda6d07ceae22577064334fbf76a23e62e6059211d995b879f6b7d3f7fcf03652b81e6b7cdeff947ad185d3c6269ca247b429c3b872a8f1ef60407d29a874f4ec31c9effed55543a65a6b4d778cebcd43b7905f3960140bd783540a7353014bda8e9c7a34a5f428fd1f8eb11e837dd9d586487fdebcb1ecd3a003ff0fda4be617fecf1ff0ef2c74664d60a4b9423f3297bc8eb91b4ee1d73272abbef3e7a828a7d7ab055a8eb58fe379de85338304e26e3620941b463e9049fd105c74c91cc4d71b0f76e2c2e4825106aa7ce2a3adbbc7a0443ece58e752b47e6f677eff7c5c568a89d6e36b165c39132a0f27080ece2a94c320b002c77f82662675a7713c7067081cac15994698c41ff4754268ae1676384ff799783f55d7e5a1a0920300000000000000d98440c355927629f2bcf9dc405a18ca0264400abf38e90000000000000000008faf2cddffbfa69bf32eb718e88ec75603ed7c7a8825ce0f27a114bd7a4ab74d0c7b8d90ccc1c3ca6620def782e24d75aed70eb676437f62677a69e0994cd82d72e95493c830fe9515329f40b7025326dec33a527c5d999298eaa3690fd0d38a02fc6e0bc16dbe19f353027edc014411e1138087221492f5d5e5cc9d0a1acd3f581eda9a807aa0e609f935f626d96351e0ff116686cbeb8939feecd5dac8cf45101942cc7cec21b7f337df5431bcf7e504b7c427f70a10e1cb8993a661306a0576b638a0171e6800b5b35589d676eb30ed1a72e8f7b057eb281c4504195635b6b285ebaba019913a2520e43ed790231f047f7d3789c10ae7d724929f77aec1d33d9587580268ee14396f71e7ef588cb2560d6bd0795a9b97281229eb16de086553469fad7214ffc3e416f8b8e442dce1d37f9b1c88a5d8a8d9f2fe45bd8df213ecb4194c8554aea13cadcd502e51f6fec80418e772b5bd8d0228949058038b185909ee542848680f9ad43f4057d676d5e21ae3d7e0e4a28c04f112a94707f032b35915e42993ff148291b8babe026646ee41905992db217561b90811c4702a14f312fe5d2ae7257db6be1034cc1c346b76a853ce274bf0435e18f7e86c660c18c80f30505dd4cf2ae2a1893b83c62d61bfeadc1f913e4cab2b897e096dd3fe3525090410cb23bab36cdf200a36014032cf6e5121803c5a0c4a273a19f340163fc6265425d513a1294b8439276394945d94a589708e32a1cb30f1fa4b2f08e01dc5e8c6732e6dc59b5c8cb400000000000000592c9b68f09c8f5ddb20b4ae08b4d9df548e5ed6cd47b91a4bea8b6aa52edf64576aef1e43f2958437fdc20fbbd0d4e13d8cce1193b2f9b4f107e25af178d056e1b1e40bd75b013f7484fae0bc447b1ffaf34819fe3ad1a634c94345e26e1e68dec08723a37b05d1594a66a4718a51d4d67fc880c9d640f4eacc509873f1a103c87f69"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYRES8=r3, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000007f1600850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sys_enter\x00', r6}, 0x10) cachestat(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000000)='cpu\t<0&&\t') 2m16.57256917s ago: executing program 4 (id=58): socket$l2tp6(0xa, 0x2, 0x73) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000300)='./bus\x00', 0x1008002, &(0x7f0000000640)={[{@grpquota}, {@jqfmt_vfsv1}, {@resuid}, {@sysvgroups}, {@nomblk_io_submit}, {@jqfmt_vfsold}, {@debug}, {@data_err_abort}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r0 = syz_clone(0x80, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020732600000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socket$nl_netfilter(0x10, 0x3, 0xc) ptrace$setsig(0x4203, r0, 0x0, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x10001) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_emit_ethernet(0x46, &(0x7f0000000000)={@broadcast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "120008", 0x10, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x1, 0x0, 0x2}}}}}}, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000002e40)={@local, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "7428dd", 0x28, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_na={0x89, 0x0, 0x0, 0x0, '\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [{0x0, 0x2, "122b472e41e24b11f34b608816e5"}]}}}}}}, 0x0) 2m16.425222912s ago: executing program 4 (id=62): socket$kcm(0x15, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaa53ed02aabb08004500005de3d29a000032907800000000ffffff73ff11009078000000ea0000000000000000000000009cf274c265a4d6607dac10673206000000cb0ffc0d05f101b219b3b6a8"], 0x0) syz_usb_connect$hid(0x4, 0x3f, &(0x7f0000000340)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0xff, 0x56a, 0xb8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x1, 0xb, 0x10, 0x80, [{{0x9, 0x4, 0x0, 0xd, 0x2, 0x3, 0x1, 0x1, 0xa, {0x9, 0x21, 0x9, 0xfe, 0x1, {0x22, 0x75c}}, {{{0x9, 0x5, 0x81, 0x3, 0x40, 0x7, 0xb, 0x60}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x9, 0x4, 0x4}}]}}}]}}]}}, &(0x7f00000008c0)={0xa, &(0x7f00000004c0)={0xa, 0x6, 0x200, 0x47, 0xe, 0x2, 0x10}, 0x97, &(0x7f0000000500)={0x5, 0xf, 0x97, 0x6, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x6, 0x7, 0xcc, 0x9}, @wireless={0xb, 0x10, 0x1, 0xc, 0x54, 0x1, 0x7, 0x5, 0xab}, @ss_container_id={0x14, 0x10, 0x4, 0x6, "ecad98c508b221d9fff76003f95b6d13"}, @generic={0x5b, 0x10, 0x0, "7b253eab6facf64e25e6aeb982600c0c3616cd046b80a8753fbe55b391a860e6bc66613093b95d339ee40f059aa6890b6a8ec9aa8b14df81b6aa135b2a79ce9e1904f65e1f578fddaf127b8c7f8eb59318be26983c9e574e"}, @ptm_cap={0x3}, @wireless={0xb, 0x10, 0x1, 0xc, 0x40, 0x16, 0x3, 0x8, 0x81}]}, 0x4, [{0x4, &(0x7f00000005c0)=@lang_id={0x4, 0x3, 0x41a}}, {0x4, &(0x7f0000000600)=@lang_id={0x4, 0x3, 0x446}}, {0xe8, &(0x7f00000007c0)=@string={0xe8, 0x3, "3d9e372f3eb4c1965e2df594aea3ff81b5dae3975afaa76dae33f517332ddf8ea5b76e8350547cdc4cb9e5c6a4fe6e8e3de438cc7723c499c4562c31379992e6b84105d10099527bf45ea6f0aa50fa81d9ec153bf1c9790f67b45aaa94eb937efa0a40a3c92ca9911472b0481d370b1cf8c101e4dccee3694f4e08068c981f7b3e8c78953ae2ca636b25aacbeb9b2c8fb4fc915cff2c81647d46a9b2baf472b7de11e5e22cb6160a7237662bd0a717b36c61ab2de64e09298d8116953f593d31035f49ab945bc880d85ce6bfa8534c9189a30b38a9600fffc3a3a0f7b768c3b1335bd60e99d9"}}, {0x4, &(0x7f0000000680)=@lang_id={0x4, 0x3, 0x40b}}]}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000b00)={r2, 0x9, 0x4, 0xfff}) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r3}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_tracing={0x1a, 0x3, &(0x7f00000006c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}}, &(0x7f0000000940)='syzkaller\x00', 0x40, 0xa2, &(0x7f0000000980)=""/162, 0x41100, 0x1, '\x00', 0x0, 0x18, r4, 0x8, &(0x7f0000000b40)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000b80)={0x8, 0x9, 0x0, 0xfffffff0}, 0x10, 0x13f3a, 0xffffffffffffffff, 0x4, &(0x7f0000000c40)=[r2, r2, r5, r2], &(0x7f0000000c80)=[{0x5, 0x1, 0x1, 0xa}, {0x1, 0x3, 0x7, 0x2}, {0x3, 0x1, 0x2, 0x8}, {0x4, 0x1, 0x3, 0x1}], 0x10, 0x400, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, 0x0, &(0x7f0000000380)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r6}, 0x10) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r7, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r8, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r7, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000001000010000000007000000000000000a20000000000a03000000000000000000010000000900010073797a300000000044000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f0800034000000004640000000e0a01020000000000000000010000000900020073797a32000000000900010073797a3000000000380003803400008028000180230001"], 0xf0}}, 0x0) acct(0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r0) 2m15.814000873s ago: executing program 4 (id=63): bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x8000) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010100"/20, @ANYRES32, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r1}, 0x18) syz_clone(0x4023480, 0x0, 0x8637, 0x0, 0x0, 0x0) io_uring_setup(0xb3a, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3}) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) 2m15.794804505s ago: executing program 32 (id=63): bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000400)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x8000) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010100"/20, @ANYRES32, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r1}, 0x18) syz_clone(0x4023480, 0x0, 0x8637, 0x0, 0x0, 0x0) io_uring_setup(0xb3a, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3}) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) 9.508355189s ago: executing program 5 (id=2795): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="0a00000004000000080000000b"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0x10) 9.403751598s ago: executing program 5 (id=2797): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x3, &(0x7f0000000080)=[{0x200000000006, 0x2, 0x4, 0x3}, {0x8, 0x7f, 0x1, 0x5}, {0x85d, 0x0, 0x5, 0x80000000}]}) rt_sigsuspend(0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)) 9.402820898s ago: executing program 5 (id=2799): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000b80000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) getcwd(&(0x7f0000000140)=""/132, 0x84) 9.060435437s ago: executing program 5 (id=2800): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x990, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"/2448]}, 0xa08) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x24e, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200002c0], 0x0, &(0x7f0000000080), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{0x3, 0x11, 0x600, 'ip6_vti0\x00', 'wlan1\x00', 'veth0_to_bridge\x00', 'rose0\x00', @local, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], @local, [0xff, 0xff, 0x0, 0xff, 0xff], 0xbe, 0x13e, 0x18e, [@nfacct={{'nfacct\x00', 0x0, 0x28}, {{'syz0\x00', 0x4}}}], [@common=@ERROR={'ERROR\x00', 0x20, {"08cdbaa09f1230fbd4b6800dc07b43985e088ff490c73c15039010a59b49"}}, @common=@dnat={'dnat\x00', 0x10, {{@remote, 0xfffffffffffffffd}}}], @common=@log={'log\x00', 0x28, {{0x4, "7e800df22746750ec20025da7c452e491f1567df366ae5bc534c6fd3d84b", 0x2}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x2c6) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="0000002e0000000000000018da02436f1b730c67cc000100010000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000002c0000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r3}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001900)=@newtaction={0x60, 0x30, 0xb, 0x0, 0x25dfdbfb, {}, [{0x4c, 0x1, [@m_gact={0x48, 0x1, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x60}}, 0x0) setrlimit(0xb, &(0x7f0000000000)={0x5, 0x80000000}) 8.841327875s ago: executing program 5 (id=2802): openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b80000001900010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0xb8}}, 0x0) (async) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="b80000001900010000000000000000000000000000000000de"], 0xb8}}, 0x0) (async) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000006c0)=ANY=[@ANYBLOB="b80000001400010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0xb8}}, 0x0) (async) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x41, &(0x7f0000000000)=0xff, 0x4) (async) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) (async, rerun: 32) recvmmsg(r2, &(0x7f0000001f40)=[{{0x0, 0xfffffffffffffd6d, &(0x7f0000001a80)=[{&(0x7f0000001880)=""/250, 0xfa}], 0x1, &(0x7f0000001e40)=""/23, 0x17}}], 0x1, 0x0, 0x0) (async, rerun: 32) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r3, &(0x7f0000000240)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3}, 0x1c) socket$nl_route(0x10, 0x3, 0x0) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) (async, rerun: 32) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) (async, rerun: 32) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000ff5000/0x3000)=nil) (async) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) (async, rerun: 32) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000f7541a3ad42cf0744681946599314cabd4c8a2ed118791fcb22fbf1820ff6c8e9b4b8a5bec781af9a5204b7fd3d5f2fe1dc4bd529c0cbce36508ab1828c81eea022dc1dc28cf1da5f8df60189d4d0a50c097ec64680b9c0a"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async, rerun: 64) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) (async, rerun: 64) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) (async) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) (async, rerun: 64) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) (rerun: 64) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000005850000008200000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r6}, 0x10) (async) write$cgroup_int(r4, &(0x7f00000000c0), 0xfffffff4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) 8.757061333s ago: executing program 5 (id=2804): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, 0x0, 0x20040080) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'lo\x00'}) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, 0x0) setsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, &(0x7f0000000580)=0x1, 0x4) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000780), 0x10, &(0x7f0000000200)={&(0x7f0000000140)=@can={{}, 0x0, 0x0, 0x0, 0x0, "5b7ba3698f28aaf0"}, 0x10}}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="1e0000000800000069060000ccdf000000000000", @ANYRES32=0x1, @ANYBLOB="1000"/20, @ANYRES32=0x0, @ANYRES64=r3, @ANYBLOB="0300000003000000000444d10200000000f400000000000000000000c8d27408b446606006430701ee70424f2990335ddd99332d23e1a677111268f46c541bcd9a3bf36d68e02b34c5e321649fcdd532570b6b9c2d6d026d31f1d03562fba3c5c5cc5d894923bb57d117c019e848d02a8a250b737ed013886abba65509d3c7cb28aa"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000540)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r7, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r8}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, &(0x7f0000000300)={0x1, 0x10, 0xfa00, {&(0x7f00000002c0), r8}}, 0x18) write$RDMA_USER_CM_CMD_LISTEN(r7, &(0x7f00000004c0)={0x7, 0x8, 0xfa00, {r8, 0x2}}, 0x10) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000700)=ANY=[@ANYBLOB="540000000101010100000000000000000200000006001240000400002c0001800c000280050001000000000006000340000000001400018008ec00007f00000108000200000000000c0019"], 0x54}}, 0x2e2f76ab035b98ee) 5.57947851s ago: executing program 0 (id=2821): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0xd, 0xd, &(0x7f00000000c0)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @exit, @printk={@ld={0x18, 0x0}, {0x3, 0x3, 0x3, 0xa, 0x1, 0xfe00}, {0x5}, {}, {}, {}, {0x85, 0x0, 0x0, 0x76}}]}, &(0x7f0000000180)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, 0x0, 0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000240), 0x80002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x13, 0x5, &(0x7f0000000740)=ANY=[@ANYRESOCT=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRESDEC=r0, @ANYRESOCT, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x49, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x3, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000002200000300000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000011c0)={&(0x7f0000000140)='kfree\x00', r4}, 0x10) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000340), 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, 0x0) r5 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r5, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000000), 0x4) sendmsg$ETHTOOL_MSG_RINGS_SET(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x204, 0x70bd2d, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x20000884}, 0x4) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), r2) sendmsg$NL80211_CMD_RADAR_DETECT(r5, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="080028bd7000fbdbdf255e0000000800a100090000000800a100ffff0000080026003c140000050018010600000008002700b50000000000000001000000050019010a00000008009f0001000000"], 0x54}, 0x1, 0x0, 0x0, 0x41}, 0x40) sendmsg$NFT_BATCH(r7, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a58000000060a0b040000000000000000020000002c0004802800018008000100636d70001c0002800800014000000015080002400000000008000380040001000900010073797a30000000000952abade30db8e1974500020073797a32000000001400000011000100000000"], 0x80}}, 0x0) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f00000000c0)={'syz_tun\x00', &(0x7f0000000100)=@ethtool_link_settings={0x2}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) setsockopt$MRT6_ADD_MFC_PROXY(r9, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x4e20, 0xfffffffd, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7}, {0xa, 0x4e24, 0xb8, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}, 0x1, {[0x8, 0x7fff, 0xc3a9, 0x2, 0x6, 0x1000, 0x0, 0x1246800]}}, 0x5c) r11 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r11, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=@newtaction={0x128, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x114, 0x1, [@m_tunnel_key={0x110, 0x1, 0x0, 0x0, {{0xf}, {0x50, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0x5, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @private0={0xfc, 0x0, '\x00', 0x1}}, @TCA_TUNNEL_KEY_NO_CSUM={0x5, 0xe}]}, {0x91, 0x6, "51c91336a3ef021367fd772607df72112dd3e52e80bbdda5a6a2ca6cc933b165d9d6dca29680a50f1a84adea596fadc97f9694e7a99fd56e55350a82f5c3a4e9bd9479d7a377c4487a961170867d5a140cd57b4dbdb40193e95b698f47ac74ad8f433fa8bd6e203e416bf5f3a0bfb6327df3b3de3b8e02c71475250cdeda06d633c3455702f598df9c511820d0"}, {0xc}, {0xc, 0x8, {0x1}}}}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x4000}, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)=@o_path={&(0x7f00000005c0)='./file0\x00', 0x0, 0x4010, r11}, 0x18) bind$packet(r1, &(0x7f0000000440)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @local}, 0x14) 5.57672333s ago: executing program 2 (id=2822): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000040)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) accept(r1, &(0x7f00000003c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r3 = syz_io_uring_setup(0x10d, &(0x7f0000000140), &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_CONNECT={0x10, 0xa, 0x0, 0xffffffffffffffff, 0x0, 0x0}) io_uring_enter(r3, 0x47f9, 0x0, 0x0, 0x0, 0x0) clock_nanosleep(0x9, 0x0, &(0x7f00000007c0)={0x0, 0x989680}, 0x0) (fail_nth: 6) 5.576072661s ago: executing program 3 (id=2823): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x4000002, 0x50032, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x55, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00008, 0x0, 0x50032, 0xffffffffffffffff, 0x0) 4.669636467s ago: executing program 0 (id=2824): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001480)) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$chown(0x6, r2, 0x0, 0x0) request_key(&(0x7f0000000080)='logon\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f00000003c0)='\x00', r2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r3, 0x11, 0x64, &(0x7f0000000040)=0x2, 0x4) bind$inet6(r3, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x9a, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x0) 4.667108907s ago: executing program 1 (id=2825): sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020800000100000000000001000000000100140003"], 0x18}}, 0x0) io_setup(0x409, &(0x7f0000000600)=0x0) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000002740), 0x101002) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x4000000, 0x0, 0x1, 0x0, r1, &(0x7f00000000c0)="01", 0x24}]) 4.666855437s ago: executing program 2 (id=2826): r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r0, r1, 0x0) syz_io_uring_setup(0x2c91, &(0x7f0000000240)={0x0, 0xa69, 0x10100}, &(0x7f0000000380), &(0x7f0000000440)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000f30000000000000000000046d330bd084d7f0c00000000"], 0x48) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_test', 0x141a82, 0x0) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000980)='./file1\x00', 0x280809a, &(0x7f0000000f40)=ANY=[], 0xd, 0x2b2, &(0x7f00000006c0)="$eJzs3U9rY1UUAPDz0jR9OosUcaMIPtCFqzJ166ZRRhC7UiKoCw3ODEgSBqYQmArGruYTuPR7+BHcuPEbDLgV3E0XlSfvX/7ga402VXR+v9Xh3nfuPXm3TbLJeZ+/Mh3ffZDE2dMnkaZJdI7iKM6T2I9ONL6JbgAA/x/neR6/5mWY5JUNM7udGy0MALgx1ef/X/rgBwD+4z78+JP3B8fHdz7IsjRe6j+eDZOImD6eDav5wf34MiZxL25HPy4i8oUqfve94zvRzQr78fp0PhsWmdPPfqzXH/wSUeYfRj/22/MPs8pK/nw23I3nI4vB/d2m1H682J7/Zkt+DHvxxmsr9R9EP376Ih7EJO5GkbvM//owy97Jv3361afFNkV+0onhXnldKfcFCQAAAAAAAAAAAAAAAAAAAACA7TrIsqRq31P27ymG6v47Oxfl/EHW2F/vz1PlJ81CVX+gvOmWM8/ju6a/zu0sy/L6wmV+N17uerAAAAAAAAAAAAAAAAAAAAAAFE4ePbk1mkzuPTx5dDq+dtB0A2h+1v931zlaGXk1TsejncsX3Nt8r9VuA0WtV14c3W5s6ba0B2eLkeeKera+xV4sRj6KKmgOZqt7vfB2tejpeJTVU81NHo+SP9srbQ7u+9WpXly3sLz8k7jI1880XZS6ntXb0t3o3Wqd+i3P883Weevn6ozqkaRssbHZ7rt10PoCiyAtziJd/OMXUz9cvuClbxk7137TAQAAAAAAAAAAAAAAAAAAWi1/9NsyeXZlaufGigIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAf9jy+f9NkEbE+sgfgnmdfNU1ddCLhyf/8ksEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgGfB7AAAA//8rlFqg") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) writev(r4, &(0x7f0000000800)=[{&(0x7f0000000c00)="89e7ee2c7cdad9b4b47381c96558", 0xe}, {&(0x7f00000005c0)="c2c10b270d21c75ca6ebfb5b23be", 0xe}, {&(0x7f0000000280)='s', 0x1}], 0x3) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) sendfile(r2, r2, 0x0, 0x4) 4.666320427s ago: executing program 3 (id=2827): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000002c0)='kfree\x00', r0, 0x0, 0xffffffffffff64e2}, 0xffffffffffffffb4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, 0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000080)=0x8) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f0000001040)={{0x1, 0x1, 0x1018}, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00'}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffe72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5309, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB="00000000b50000000047eae04383000000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffc4, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40010) semtimedop(0x0, &(0x7f0000000200)=[{0x3, 0x8}, {0x0, 0x4}, {0x0, 0xa, 0x800}], 0x3, 0x0) semtimedop(0x0, &(0x7f00000000c0)=[{0x4, 0x2, 0x800}, {0x4, 0xb9f5, 0x800}, {0x4, 0x5, 0x1000}], 0x3, &(0x7f0000000140)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) syz_io_uring_setup(0x2c0c, &(0x7f0000000400)={0x0, 0x0, 0x4002}, 0x0, 0x0) 3.662458841s ago: executing program 0 (id=2828): sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="3800000002070102000300000000000000006700000309"], 0x38}}, 0x400801c) r0 = syz_io_uring_setup(0x24fa, &(0x7f0000000300)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="2f8c4c5262b24b38f13831a5d1695912eb7acc901e3e0d8207e261bef55066a5782503c89f71c1955db77c7a54de24282e0d9445"], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, {0x3}}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000040)={0x3, 0x6, 0xffff, 0x2, 0x3, 0x9}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 3.660102851s ago: executing program 1 (id=2829): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x5}, 0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1c0000000000000001"], 0x38}}], 0x2, 0x0) r3 = shmget$private(0x0, 0x13000, 0x1, &(0x7f0000feb000/0x13000)=nil) r4 = shmat(r3, &(0x7f0000ff7000/0x3000)=nil, 0x400c) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x8, &(0x7f0000000000)=[{0x33, 0x5, 0x5, 0x1}, {0xad, 0x24, 0x85, 0x1}, {0x4, 0x4, 0x0, 0x7fffffff}, {0x0, 0x2, 0x18, 0xb267}, {0xfeff, 0xe9, 0x2, 0x3ff}, {0x5, 0x0, 0x7, 0x4}, {0x6, 0xf8, 0x3, 0x1}, {0x8, 0xb, 0xff, 0x4cc3}]}) r5 = socket$inet_dccp(0x2, 0x6, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000240)='kfree\x00', r7}, 0x10) sendmsg$nl_route_sched(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001c40)=@newtaction={0xf0, 0x30, 0x1, 0x0, 0x0, {}, [{0xdc, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c}]]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}, @m_police={0x6c, 0x2, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c, 0x1, {0x1}}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xf0}}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x9003, 0xcf, 0x90, [0x20000200, 0x20000230], 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000002200000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000004333f6ed087000000fcff"]}, 0x108) shmdt(r4) 3.659299722s ago: executing program 2 (id=2830): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001480)={{{@in=@local, @in=@remote}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000001580)=0xe8) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) io_getevents(0x0, 0x1, 0x1, &(0x7f0000004600)=[{}], 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b708000000005aab7b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000008000000182300", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000008000000850000009500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r4}, 0x10) truncate(&(0x7f0000000140)='./file2\x00', 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0xc, @loopback}, 0x1c) 3.658845992s ago: executing program 3 (id=2831): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000000)='kfree\x00', r0}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_io_uring_setup(0x3b, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f0000000100)) (async) r2 = syz_io_uring_setup(0x3b, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x10840, &(0x7f0000000740)={[{@shortname_win95}, {@shortname_winnt}, {@utf8no}, {@uni_xlate}, {@fat=@showexec}, {@fat=@flush}, {@shortname_win95}, {@numtail}, {@rodir}, {@utf8no}, {@shortname_mixed}, {@fat=@umask={'umask', 0x3d, 0x6}}]}, 0x1, 0x26c, &(0x7f0000000340)="$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") openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x88040, 0x0) (async) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x88040, 0x0) fcntl$setlease(r5, 0x400, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x300, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r3, r4, &(0x7f0000000600)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r7, 0x0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000380)=""/197, 0xc5}], 0x1}, 0x0, 0x80002101}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYRES8=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYRES8=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) io_uring_enter(r2, 0xd81, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) (async) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) write(r6, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r9}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r9}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) (async) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r10, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x4b0}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[], 0x14}}, 0x0) open(&(0x7f0000000100)='./bus\x00', 0x40542, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) (async) r11 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) fallocate(r11, 0x0, 0x0, 0x1001f0) (async) fallocate(r11, 0x0, 0x0, 0x1001f0) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @none}, 0xe) 3.568368369s ago: executing program 1 (id=2832): add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_NAME(0xf, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) socket(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYRES32=r0], 0x0, 0x2, 0x0, 0x0, 0x41100, 0x44, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) kexec_load(0xf91, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r2, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000280)='.pending_reads\x00', 0x41100, 0x100) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100000100000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000380)='ext4_collapse_range\x00', r3}, 0x1e) r5 = eventfd(0x5) fchmod(r5, 0x17d) r6 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) mlockall(0x1) ioctl$EVIOCSKEYCODE_V2(r6, 0x80104592, &(0x7f0000000040)={0x0, 0x19, 0x0, 0x800fb0, "00207d2000000000201b14700c00200000000900"}) ioctl$EVIOCGRAB(r6, 0x40044590, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000180)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaa600080045d21c0000000000119078000000"], 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c0000003b000900000000000000000001000000180004"], 0x2c}}, 0x0) r8 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r8, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) 2.529877897s ago: executing program 0 (id=2833): r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x5, 0x4) sendmmsg$inet6(r0, &(0x7f0000005c80)=[{{&(0x7f0000000200)={0xa, 0x4e22, 0x0, @dev}, 0x1c, 0x0}}], 0x1, 0xb80b) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/uevent_helper', 0x202, 0x0) write$tun(r1, &(0x7f00000008c0)=ANY=[@ANYRESHEX=r1, @ANYRES8=0x0, @ANYBLOB="ddd8447f5b467cc14c3d13e132155426458ceee13dfc386dbc9243a962d8e3c3869e77d56448cb998b7da6d5642f137c3798b5385c311deb91f78fdbfb54584c9053430fc966463ce2f9076e75b2645383e9ab42a0ada12ba9fe729a001cfee60056bb093bf13f29ebeb87e1826f7d539a2d903ec47dae3a6e97208e36def626987b75aa8713c8084cbe53ff1a10a1531e5660a0376422398de4b7c2b047c7a54baf7da7ce3cd908da22191f59611dd595e039fa7be07fd3ee36d31749", @ANYRES64=r1, @ANYRES16=r1], 0x129) sendto$inet6(r0, &(0x7f00000006c0)="951fd7b24d7263b1356eb3bae2d68c3eede2e8d26910f05148a419f3ba3f2dce849b5fc6044d4b4cf350b0bb6223a6434429573517549901a5787f06ba4e80f9bb7e7f69a0c639cc345a0edb1c847e7bc75f303d64d5178f912427d400f3b0068cba8b00e3d5199c000000000000dc0e3d6cc04b9f094da7ea20a9c64f89e42fbb715ab5bcdf842388c9101a2c49b5799a9b2306af1a60b0806b54f2d02023a5c9851c37bc8c45cf343eb123c47107710a774b8d6475baf2edfbc2bc150150c182a752e67f43bd20023b0de0a0997535560b26561fe0b69a718ab75c3ef67a02e69600ca44917401f16b88851adee330b7ea12421d35fe6fb9ef9ea39404f78995927378874198b9f2fe1c43724dc58a523f2ce882fb8ca95bcc2a1b0475cefc170ad1995a3cbb4e393863d523adf58f9896d914781d74c9816359e51f63bdd1a04c401918050d7ab812", 0xffffffffffffffce, 0x0, &(0x7f0000000180)={0xa, 0x4e24, 0x7f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, 0x1c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000cc0)={r1, 0xe0, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000a40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000a80)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x68, &(0x7f0000000ac0)=[{}], 0x8, 0x10, &(0x7f0000000b00), &(0x7f0000000b40), 0x8, 0xe9, 0x8, 0x8, &(0x7f0000000b80)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000dc0)={0x6, 0x8, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xe8d9}, [@ldst={0x3, 0x2, 0x2, 0x1, 0x1, 0x4, 0x10}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x2}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}]}, &(0x7f0000000680)='syzkaller\x00', 0x2, 0x67, &(0x7f00000009c0)=""/103, 0x41000, 0x0, '\x00', r2, 0x25, r1, 0x8, &(0x7f0000000d00)={0x8, 0xab5}, 0x8, 0x10, &(0x7f0000000d40)={0x5, 0x9, 0x2, 0x1}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000d80)=[{0x1, 0x3, 0x10}], 0x10, 0xfffffffe, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r3 = getpgid(0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000e80)=""/72, &(0x7f0000000f00)=0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000880), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000140)="3d6ee2e04b91ab10143d9abe86dd", 0x0, 0xfffb, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xee, 0x14, 0x0, 0xfe, 0x0, 0x0, 0x28042, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x10000}}, r3, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x10401, 0x0) openat(r6, &(0x7f0000000500)='./file0\x00', 0x272200, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffcd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) fstatfs(r5, &(0x7f00000005c0)=""/115) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r7}, 0x10) r8 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r8, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[@ANYBLOB="101800002f140100000000006a88e40000090000000000000012fab9bb5c84827f87f3fa88a0ea"], 0x10}}, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xd, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000ecff0000007919b0000000000095000000000000001beacae6e0796d6c569c339f11212553d00e1ffd881052a171f54e1a353d0d9f92f4242ac34b0f9289f27622ef6f9784ef30024b9256571ce056c156d2417b55f8b12b7a3edeef744c229e0a297d57ddba7863dbde1993aea182f8555a2e38f05b74cdd7380a"], &(0x7f0000000080)='syzkaller\x00', 0x4, 0x98, &(0x7f00000000c0)=""/152, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 2.528955607s ago: executing program 1 (id=2834): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x22020400) ppoll(&(0x7f00000000c0)=[{r0, 0xc011}], 0xfdfe, 0x0, 0x0, 0x0) 2.520913818s ago: executing program 2 (id=2835): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) renameat2(r0, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) (fail_nth: 2) 2.520449957s ago: executing program 3 (id=2836): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0), &(0x7f00000003c0), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000001040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x149a82, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180100002100ff00000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r4}, 0x10) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x8401) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$USBDEVFS_SUBMITURB(r6, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x0, 0xd, 0x0, 0xfffd, 0x7995}, 0x8, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) r7 = openat$cgroup_netprio_ifpriomap(r3, &(0x7f0000000040), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r7, &(0x7f00000002c0)=ANY=[], 0x12) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f0000000180)) write$cgroup_int(r2, &(0x7f0000000000)=0xfe8e, 0x12) 1.320469639s ago: executing program 0 (id=2837): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001480)) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$chown(0x6, r2, 0x0, 0x0) request_key(&(0x7f0000000080)='logon\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f00000003c0)='\x00', r2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r3, 0x11, 0x64, &(0x7f0000000040)=0x2, 0x4) bind$inet6(r3, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x9a, &(0x7f0000000300)=ANY=[@ANYBLOB="0180c2000000ffffffffffff86dd6001070000641100fc010000000000000000000000000000ff02000000000000000000000000000100000e2200649038e451b6db3278020000000300000003"], 0x0) 1.320053929s ago: executing program 1 (id=2838): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x800, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x14) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x10) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 1.319916189s ago: executing program 2 (id=2839): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_pidfd_open(r1, 0x0) fcntl$setstatus(r2, 0x4, 0x800) waitid$P_PIDFD(0x3, r2, 0x0, 0x4, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x64045010) 1.274679503s ago: executing program 3 (id=2840): r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r0, r1, 0x0) syz_io_uring_setup(0x2c91, &(0x7f0000000240)={0x0, 0xa69, 0x10100}, &(0x7f0000000380), &(0x7f0000000440)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000f30000000000000000000046d330bd084d7f0c00000000"], 0x48) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_test', 0x141a82, 0x0) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000980)='./file1\x00', 0x280809a, &(0x7f0000000f40)=ANY=[], 0xd, 0x2b2, &(0x7f00000006c0)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r5) socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) writev(r4, &(0x7f0000000800)=[{&(0x7f0000000c00)="89e7ee2c7cdad9b4b47381c96558", 0xe}, {&(0x7f00000005c0)="c2c10b270d21c75ca6ebfb5b23be", 0xe}, {&(0x7f0000000280)='s', 0x1}], 0x3) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) sendfile(r2, r2, 0x0, 0x4) 9.314039ms ago: executing program 0 (id=2841): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$chown(0x6, r4, 0x0, 0x0) request_key(&(0x7f0000000080)='logon\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f00000003c0)='\x00', r4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r5, 0x11, 0x64, &(0x7f0000000040)=0x2, 0x4) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r7 = socket$inet_smc(0x2b, 0x1, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000b40000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xff92, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r8}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'dvmrp1\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) r9 = epoll_create(0x3ff) r10 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_MOD(r9, 0x3, r10, &(0x7f0000000280)) bind$inet6(r5, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100)={0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r11, 0x1f2f, 0xf, 0x3ce, &(0x7f00000007c0)="9f449487219195806840106a05dd", 0x0, 0xfd33, 0x0, 0xb1, 0xffffffffffffff19, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e0798e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39", &(0x7f0000000480)="675901b49f4914256e6e8d2aa26c9567dbec07a38cc0bec64eeba31aad6c0da339f977f6873cf1c73e0218cc94c8c0b4b438ca1e7f4987540d92492448791407e6f37a521ba9b42d969a3ce903efb9a39fa05bdbe7424e36a542c3b00485fcef3be43c5d45a5b3d63291adda6d81d771cacea20e5f33ca681f54a044d1862f38b4dfc849614974842fef9114b4e01d957e5e8c523a62190362cfb27c82bb1d6f9efaada5bccb1ca44f56b191ebcd2580b61194842af36549aa2359742c48ed9d3c2a61c51c1ca0d724cf0bf1c0d6ed1705", 0x0, 0x0, 0x2}, 0x23) r12 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r12, &(0x7f0000007100)={0x0, 0x0, &(0x7f00000070c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a18000000120a00040000000000000000000000000400048020000000000a01040000000000000000030000000900010073797a300000000030000000160a0101000000000000000003000000040003800900020073797a31000000000900010473797a30", @ANYRESHEX=r1, @ANYRESDEC=r5, @ANYRES64=r2], 0x90}}, 0x40840) 8.719669ms ago: executing program 1 (id=2842): bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r3, 0x0, &(0x7f0000001700)=""/53}, 0x20) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)={0x0, @multicast2, @dev}, &(0x7f0000000280)=0xc) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC_PROXY(r6, 0x29, 0xd2, 0x0, 0x5c) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000640)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7, 0x0, 0x8}, 0x18) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) r8 = creat(&(0x7f00000000c0)='./file0\x00', 0xc9028ba210c11f88) r9 = dup2(r8, r8) ioctl$BLKTRACESETUP(r9, 0xc0481273, &(0x7f00000005c0)={'\x00', 0x0, 0xda61, 0x11, 0x1, 0x3}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000b8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$BLKTRACESETUP(r9, 0x1276, 0x0) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="ff", 0x1, 0xffffffffffffffff) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="54010000100033060000000000000000ac1e00010000000000000000000025f925b3ba8d0000fe368400"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000ff020000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000400000000000000000048000200656362286369706865725f6e756c6c29000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c0004000200000000000000fc0100"/268], 0x154}}, 0x0) 2.57258ms ago: executing program 2 (id=2843): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f00000008c0)={[{@bsdgroups}, {@nodiscard}, {@noblock_validity}, {@grpjquota}, {@grpjquota}, {@orlov}, {@abort}, {@nombcache}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x1}}]}, 0x64, 0x50a, &(0x7f0000000200)="$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") (async) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8) (async) r0 = socket$nl_route(0x10, 0x3, 0x0) (async) syz_emit_ethernet(0x0, 0x0, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="1e00000000000000050000000600000000000000", @ANYRES32=0x1, @ANYBLOB="00000000ed0e0000000000000000000000000000a18494e6a8d4d3b03e36621c1e2e577963a967632cc633346e2b6aaa4f6a75e8ad79534b9ddf19ad269a661f0cda472c57c9925a9299a1ab3341acb378ceb1cfa1b0ee732cb27ce54284ca4366797684b9c1d144f26640f16500"/124, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000001280)=ANY=[@ANYBLOB="180000000000000000000000000000001811000078c734658f7a255f373fdbf4f0e0a15def3dd6063d1ac5c8ea5f6f3d6c2c657e5950e9f2b0fb2a7f03773453a51e86e73434559012d6e229555b506a1e823346b3af3bf2f95fc42da7f64d78315d788187d5810b9379bf948ba9ebd406", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x3804c82, &(0x7f0000000000)={[{@orlov}, {@errors_remount}]}, 0x1, 0x784, &(0x7f00000007c0)="$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") (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0xffffff6a) (async) write$cgroup_pressure(0xffffffffffffffff, &(0x7f00000000c0)={'full', 0x20, 0xf3, 0x20, 0xfffffffffffffffb}, 0x2f) (async) socket$kcm(0x11, 0x200000000000002, 0x300) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x11}) (async) socket$kcm(0x10, 0x2, 0x4) (async) sendmsg$inet(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000001100)="65619e9adcab796e092fbcadf157a4662a25198957974ca6e971e34c7dbf1ffdecb708b331466c63b7c13be56f0da819a7bae14a7fe58ec1504a448561fb122c002f1c5c8038158ce84dabe932913b8f395f83b7c9dbb14f74def459405505e63959413152131c7ef93ba926d28c5e44110f32904708b8d2b47d4a4a0ea81df15ee53711bb395eb342a4c35111807c5c66b4138fb955026aaa51a1862bbf5aba96dd70c47e70f9ea63ed9ed6e6912e3696f24231213e015c6aff14a25aa9c2ccf04e669871a16697254892a31480305020bd38c7e91ee9d10e383b99", 0xdc}], 0x1, 0x0, 0x0, 0x1f000000}, 0x600) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) ioctl$FIBMAP(r3, 0x1, &(0x7f00000000c0)) (async) close(0xffffffffffffffff) (async) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r2}, 0x8) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x4008032, 0xffffffffffffffff, 0x0) (async) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) wait4(0x0, 0x0, 0x40000000, &(0x7f0000000f80)) (async) getsockname$packet(0xffffffffffffffff, &(0x7f00000015c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYRES32=r4, @ANYBLOB, @ANYRES32, @ANYBLOB], 0x38}}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8a}, 0x0) (async) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) 0s ago: executing program 3 (id=2844): add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) prctl$PR_SET_NAME(0xf, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) socket(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYRES32=r0], 0x0, 0x2, 0x0, 0x0, 0x41100, 0x44, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) kexec_load(0xf91, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r2, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000280)='.pending_reads\x00', 0x41100, 0x100) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100000100000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000380)='ext4_collapse_range\x00', r3}, 0x1e) r5 = eventfd(0x5) fchmod(r5, 0x17d) r6 = syz_open_dev$evdev(&(0x7f0000000180), 0x0, 0x0) mlockall(0x1) ioctl$EVIOCSKEYCODE_V2(r6, 0x80104592, &(0x7f0000000040)={0x0, 0x19, 0x0, 0x800fb0, "00207d2000000000201b14700c00200000000900"}) ioctl$EVIOCGRAB(r6, 0x40044590, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000180)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaa600080045d21c0000000000119078000000"], 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c0000003b000900000000000000000001000000180004"], 0x2c}}, 0x0) r8 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r8, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) kernel console output (not intermixed with test programs): 2][T11491] Nov 5 01:51:28 syzkaller kern.warn kernel: [ 148.855458][T11491] dump_stack_lvl+0xf2/0x150 Nov 5 01:51:28 syzkaller kern.warn kernel: [ 148.860065][T11[ 149.154560][T11524] FAULT_INJECTION: forcing a failure. [ 149.154560][T11524] name failslab, interval 1, probability 0, space 0, times 0 491] dump_stack[ 149.167705][T11524] CPU: 0 UID: 0 PID: 11524 Comm: syz.3.2512 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 +0x15/0x20 Nov [ 149.179784][T11524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 5 01:51:28 syzk[ 149.191219][T11524] Call Trace: aller kern.warn [ 149.195876][T11524] kernel: [ 148.8[ 149.200190][T11524] dump_stack_lvl+0xf2/0x150 64307][T11491] [ 149.206151][T11524] dump_stack+0x15/0x20 should_fail_ex+0[ 149.211667][T11524] should_fail_ex+0x223/0x230 x223/0x230 Nov [ 149.217753][T11524] ? sidtab_sid2str_get+0xb8/0x140 5 01:51:28 syzk[ 149.224305][T11524] should_failslab+0x8f/0xb0 aller kern.warn [ 149.230252][T11524] __kmalloc_node_track_caller_noprof+0xa6/0x380 kernel: [ 148.8[ 149.237963][T11524] kmemdup_noprof+0x2a/0x60 69056][T11491] [ 149.243830][T11524] sidtab_sid2str_get+0xb8/0x140 ? getname_flags+[ 149.250155][T11524] security_sid_to_context_core+0x1eb/0x2f0 0x81/0x3b0 Nov [ 149.257440][T11524] security_sid_to_context+0x27/0x30 5 01:51:28 syzk[ 149.264146][T11524] avc_audit_post_callback+0x10d/0x530 aller kern.warn [ 149.270970][T11524] ? __pfx_avc_audit_post_callback+0x10/0x10 kernel: [ 148.8[ 149.278436][T11524] common_lsm_audit+0x7cc/0xfc0 73763][T11491] [ 149.284651][T11524] slow_avc_audit+0xf9/0x140 should_failslab+[ 149.290637][T11524] avc_has_perm+0x129/0x160 0x8f/0xb0 Nov [ 149.296507][T11524] selinux_bpf+0xa1/0xc0 5 01:51:28 syzka[ 149.302175][T11524] security_bpf+0x45/0x80 ller kern.warn k[ 149.307799][T11524] __sys_bpf+0x19f/0x7a0 ernel: [ 148.87[ 149.313400][T11524] __x64_sys_bpf+0x43/0x50 8419][T11491] k[ 149.319213][T11524] x64_sys_call+0x2625/0x2d60 mem_cache_alloc_[ 149.325257][T11524] do_syscall_64+0xc9/0x1c0 noprof+0x4c/0x29[ 149.331119][T11524] ? clear_bhb_loop+0x55/0xb0 0 Nov 5 01:51:[ 149.332115][T11527] FAULT_INJECTION: forcing a failure. [ 149.332115][T11527] name failslab, interval 1, probability 0, space 0, times 0 [ 149.337264][T11524] ? clear_bhb_loop+0x55/0xb0 28 syzkaller ker[ 149.337365][T11524] entry_SYSCALL_64_after_hwframe+0x77/0x7f n.warn kernel: [[ 149.337428][T11524] RIP: 0033:0x7f2da2f7e719 148.883848][T1[ 149.369212][T11524] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 1491] getname_f[ 149.390187][T11524] RSP: 002b:00007f2da1bf1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 lags+0x81/0x3b0[ 149.400020][T11524] RAX: ffffffffffffffda RBX: 00007f2da3135f80 RCX: 00007f2da2f7e719 Nov 5 01:51:28[ 149.409287][T11524] RDX: 0000000000000094 RSI: 0000000020000200 RDI: 0000000000000005 syzkaller kern.[ 149.418713][T11524] RBP: 00007f2da1bf1090 R08: 0000000000000000 R09: 0000000000000000 warn kernel: [ [ 149.428068][T11524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 148.888437][T114[ 149.437379][T11524] R13: 0000000000000000 R14: 00007f2da3135f80 R15: 00007ffe8783e828 91] __se_sys_ne[ 149.446812][T11524] wstat+0x4f/0x280[ 149.451328][T11527] CPU: 1 UID: 0 PID: 11527 Comm: syz.1.2513 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 [ 149.463334][T11527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 149.473430][T11527] Call Trace: [ 149.476730][T11527] [ 149.479731][T11527] dump_stack_lvl+0xf2/0x150 [ 149.484429][T11527] dump_stack+0x15/0x20 [ 149.488616][T11527] should_fail_ex+0x223/0x230 [ 149.493421][T11527] ? getname_flags+0x81/0x3b0 [ 149.498116][T11527] should_failslab+0x8f/0xb0 [ 149.502731][T11527] kmem_cache_alloc_noprof+0x4c/0x290 [ 149.502777][T11527] getname_flags+0x81/0x3b0 [ 149.502807][T11527] getname+0x17/0x20 [ 149.502830][T11527] do_sys_openat2+0x67/0x120 [ 149.521142][T11527] __x64_sys_openat+0xf3/0x120 [ 149.525956][T11527] x64_sys_call+0x1025/0x2d60 [ 149.530693][T11527] do_syscall_64+0xc9/0x1c0 [ 149.535212][T11527] ? clear_bhb_loop+0x55/0xb0 Nov 5 01:51:2[ 149.539956][T11527] ? clear_bhb_loop+0x55/0xb0 8 syzkaller kern.warn kernel: [ [ 149.539978][T11527] entry_SYSCALL_64_after_hwframe+0x77/0x7f 148.893230][T11[ 149.540015][T11527] RIP: 0033:0x7f839dced0b0 491] ? fput+0x14e/0x190 Nov 5 01:51:28 syzkal[ 149.540072][T11527] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 19 8f 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 6c 8f 02 00 8b 44 ler kern.warn ke[ 149.540090][T11527] RSP: 002b:00007f839c966b70 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 rnel: [ 148.897[ 149.540107][T11527] RAX: ffffffffffffffda RBX: 0000000000101301 RCX: 00007f839dced0b0 221][T11491] ? [ 149.540118][T11527] RDX: 0000000000101301 RSI: 00007f839c966c10 RDI: 00000000ffffff9c ksys_write+0x17a[ 149.540129][T11527] RBP: 00007f839c966c10 R08: 0000000000000000 R09: 0000000000000000 /0x1b0 Nov 5 01:51:28 syzkalle[ 149.540142][T11527] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 r kern.warn kern[ 149.540234][T11527] R13: 0000000000000000 R14: 00007f839dea5f80 R15: 00007ffe35ddc448 el: [ 148.90192[ 149.540250][T11527] 6][T11491] __x64_sys_newstat+0x31/0x40 Nov 5 01:51:28 syzkaller kern.warn kernel: [ 148.906753][T11491] x64_sys_call+0x5e2/0x2d60 Nov 5 01:51:28 syzkaller kern.warn kernel: [ 148.911358][T11491] do_syscall_64+0xc9/0x1c0 Nov 5 01:51:28 syzkaller kern.warn kernel: [ 148.916400][T11491] ? clear_bhb_loop+0x55/0xb0 Nov 5 01:51:28 syzkaller kern.warn kernel: [ 148.921136][T11491] ? clear_bhb_loop+0x55/0xb0 Nov 5 01:51:28 syzkaller kern.warn kernel: [ 148.925907][T11491] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 5 01:51:28 syzkaller kern.warn kernel: [ 148.931862][T11491] RIP: 0033:0x7f296e84e719 Nov 5 01:51:28 syzkaller kern.warn kernel: [ 148.936284][T11491] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Nov 5 01:51:28 syzkaller kern.warn kernel: [ 148.956000][T11491] RSP: 002b:00007f296d4c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 Nov 5 01:51:28 syzkaller kern.warn kernel: [ 148.964442][T11491] RAX: ffffffffffffffda RBX: 00007f296ea05f80 RCX: 00007f296e84e719 Nov 5 01:51:28 syzkaller kern.warn kernel: [ 148.972528][T11491] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 Nov 5 01:51:28 syzkaller kern.warn kernel: [ 148.980601][T11491] RBP: 00007f296d4c7090 R08: 0000000000000000 R09: 0000000000000000 Nov 5 01:51:28 syzkaller kern.warn kernel: [ 148.988619][T11491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 Nov 5 01:51:28 syzkaller kern.warn kernel: [ 148.996624][T11491] R13: 0000000000000000 R14: 00007f296ea05f80 R15: 00007ffebe4962e8 Nov 5 01:51:28 syzkaller kern.warn kernel: [ 149.004626][T11491] Nov 5 01:51:29 syzkaller kern.notice kernel: [ 149.154560][T11524] FAULT_INJECTION: forcing a failure. Nov 5 01:51:29 syzkaller kern.notice kernel: [ 149.154560][T11524] name failslab, interval 1, probability 0, spac[ 149.820798][T11558] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(5) [ 149.828432][T11558] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) e 0, times 0 No[ 149.836252][T11558] vhci_hcd vhci_hcd.0: Device attached v 5 01:51:29 syzkaller kern.warn kernel: [ 149[ 149.846200][T11568] FAULT_INJECTION: forcing a failure. [ 149.846200][T11568] name fail_usercopy, interval 1, probability 0, space 0, times 0 .167705][T11524][ 149.848785][T11558] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 149.860115][T11568] CPU: 0 UID: 0 PID: 11568 Comm: syz.5.2530 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 [ 149.860194][T11568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 149.879856][T11558] vhci_hcd vhci_hcd.0: pdev(1) rhport(2) sockfd(9) [ 149.880378][T11568] Call Trace: [ 149.880387][T11568] CPU: 0 UID: 0 P[ 149.890483][T11558] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 149.896949][T11568] dump_stack_lvl+0xf2/0x150 ID: 11524 Comm: [ 149.900414][T11558] vhci_hcd vhci_hcd.0: Device attached [ 149.903222][T11568] dump_stack+0x15/0x20 syz.3.2512 Not t[ 149.903268][T11568] should_fail_ex+0x223/0x230 [ 149.903307][T11568] should_fail+0xb/0x10 ainted 6.12.0-rc[ 149.903343][T11568] should_fail_usercopy+0x1a/0x20 [ 149.914722][T11558] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN 6-syzkaller-0000[ 149.916534][T11568] _copy_from_user+0x1e/0xb0 5-g557329bcecc2 [ 149.916605][T11568] __sys_bpf+0x14e/0x7a0 #0 Nov 5 01:51[ 149.916637][T11568] __x64_sys_bpf+0x43/0x50 :29 syzkaller ke[ 149.916689][T11568] x64_sys_call+0x2625/0x2d60 rn.warn kernel: [ 149.924294][T11570] vhci_hcd: connection closed [ 149.179784][T[ 149.927511][T11568] do_syscall_64+0xc9/0x1c0 [ 149.927618][T11568] ? clear_bhb_loop+0x55/0xb0 11524] Hardware [ 149.927641][T11568] ? clear_bhb_loop+0x55/0xb0 name: Google Goo[ 149.934060][T11562] vhci_hcd: connection closed gle Compute Engi[ 149.937704][T11568] entry_SYSCALL_64_after_hwframe+0x77/0x7f ne/Google Comput[ 149.937825][T11568] RIP: 0033:0x7f5fe625e719 e Engine, BIOS G[ 149.937840][T11568] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 oogle 09/13/2024[ 149.952452][ T3346] vhci_hcd: stop threads Nov 5 01:51:2[ 149.958112][T11568] RSP: 002b:00007f5fe4ed1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 9 syzkaller kern[ 149.958141][T11568] RAX: ffffffffffffffda RBX: 00007f5fe6415f80 RCX: 00007f5fe625e719 [ 149.958159][T11568] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000001 .warn kernel: [ [ 149.958176][T11568] RBP: 00007f5fe4ed1090 R08: 0000000000000000 R09: 0000000000000000 [ 149.958194][T11568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 149.191219][T11[ 149.958247][T11568] R13: 0000000000000000 R14: 00007f5fe6415f80 R15: 00007fff793987d8 [ 149.958269][T11568] [ 149.985549][T11575] FAULT_INJECTION: forcing a failure. [ 149.985549][T11575] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 149.992404][ T3346] vhci_hcd: release socket 524] Call Trace:[ 149.998298][T11575] CPU: 0 UID: 0 PID: 11575 Comm: syz.3.2532 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 Nov 5 01:51:2[ 149.998335][T11575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 9 syzkaller kern[ 149.998382][T11575] Call Trace: [ 149.998390][T11575] .warn kernel: [ [ 149.998400][T11575] dump_stack_lvl+0xf2/0x150 149.195876][T11[ 149.998453][T11575] dump_stack+0x15/0x20 524] No[ 150.004477][ T3346] vhci_hcd: disconnect device v 5 01:51:29 sy[ 150.011599][T11575] should_fail_ex+0x223/0x230 zkaller kern.war[ 150.011638][T11575] should_fail+0xb/0x10 n kernel: [ 149[ 150.011673][T11575] should_fail_usercopy+0x1a/0x20 .200190][T11524][ 150.011715][T11575] _copy_from_user+0x1e/0xb0 [ 150.011740][T11575] kstrtouint_from_user+0x76/0xe0 dump_stack_lvl[ 150.047931][ T3346] vhci_hcd: stop threads +0xf2/0x150 Nov[ 150.053742][T11575] ? 0xffffffff81000000 5 01:51:29 syz[ 150.053761][T11575] ? selinux_file_permission+0x22a/0x360 kaller kern.warn[ 150.053791][T11575] proc_fail_nth_write+0x4f/0x150 kernel: [ 149.[ 150.053914][T11575] ? __pfx_proc_fail_nth_write+0x10/0x10 206151][T11524] [ 150.063164][ T3346] vhci_hcd: release socket dump_stack+0x15[ 150.071056][T11575] vfs_write+0x281/0x920 /0x20 Nov 5 01[ 150.071093][T11575] ? __pfx_proc_fail_nth_read+0x10/0x10 :51:29 syzkaller[ 150.071169][T11575] ? __rcu_read_unlock+0x4e/0x70 kern.warn kerne[ 150.080461][ T3346] vhci_hcd: disconnect device l: [ 149.211667[ 150.088357][T11575] ? __fget_files+0x1d4/0x210 ][T11524] shoul[ 150.088383][T11575] ksys_write+0xeb/0x1b0 d_fail_ex+0x223/[ 150.088494][T11575] __x64_sys_write+0x42/0x50 0x230 Nov 5 01[ 150.088538][T11575] x64_sys_call+0x27dd/0x2d60 :51:29 syzkaller[ 150.097759][ T3390] vhci_hcd: vhci_device speed not set kern.warn kerne[ 150.100717][T11575] do_syscall_64+0xc9/0x1c0 l: [ 149.217753][T11524] ? sid[ 150.294454][T11575] ? clear_bhb_loop+0x55/0xb0 tab_sid2str_get+0xb8/0x140 Nov 5 01:51:29 syzk[ 150.294521][T11575] ? clear_bhb_loop+0x55/0xb0 aller kern.warn [ 150.294544][T11575] entry_SYSCALL_64_after_hwframe+0x77/0x7f kernel: [ 149.2[ 150.294576][T11575] RIP: 0033:0x7f2da2f7d1ff 24305][T11524] [ 150.294591][T11575] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 [ 150.294615][T11575] RSP: 002b:00007f2da1bf1030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 should_failslab+[ 150.294633][T11575] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2da2f7d1ff 0x8f/0xb0 Nov [ 150.294645][T11575] RDX: 0000000000000001 RSI: 00007f2da1bf10a0 RDI: 0000000000000004 5 01:51:29 syzka[ 150.294657][T11575] RBP: 00007f2da1bf1090 R08: 0000000000000000 R09: 0000000000000000 ller kern.warn k[ 150.294668][T11575] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 ernel: [ 149.23[ 150.294680][T11575] R13: 0000000000000000 R14: 00007f2da3135f80 R15: 00007ffe8783e828 0252][T11524] _[ 150.294696][T11575] _kmalloc_node_track_caller_noprof+0xa6/0x380 Nov 5 01:51:29 syzkaller kern.warn kernel: [ 149.237963][T11524] kmemdup_noprof+0x2a/0x60 Nov 5 01:51:29 syzkaller kern.warn kernel: [ 149.243830][T11524] sidtab_sid2str_get+0xb8/0x140 Nov 5 01:51:29 syzkaller kern.warn kernel: [ 149.250155][T11524] security_sid_to_context_core+0x1eb/0x2f0 Nov 5 01:51:29 syzkaller kern.warn kernel: [ 149.257440][T11524] security_sid_to_context+0x27/0x30 Nov 5 01:51:29 syzkaller kern.warn kernel: [ 149.264146][T11524] avc_audit_post_callback+0x10d/0x530 Nov 5 01:51:29 syzkaller kern.warn kernel: [ 149.270970][T11524] ? __pfx_avc_audit_post_callback+0x10/0x10 Nov 5 01:51:29 syzkaller kern.warn kernel: [ 149.278436][T11524] common_lsm_audit+0x7cc/0xfc0 Nov 5 01:51:29 syzkaller kern.warn kernel: [ 149.284651][T11524][ 150.477386][T11593] FAULT_INJECTION: forcing a failure. [ 150.477386][T11593] name failslab, interval 1, probability 0, space 0, times 0 slow_avc_audit[ 150.490268][T11593] CPU: 0 UID: 0 PID: 11593 Comm: syz.3.2536 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 +0xf9/0x140 Nov[ 150.502352][T11593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 5 01:51:29 syz[ 150.513775][T11593] Call Trace: kaller kern.warn[ 150.518424][T11593] kernel: [ 149.[ 150.522762][T11593] dump_stack_lvl+0xf2/0x150 290637][T11524] [ 150.528718][T11593] dump_stack+0x15/0x20 avc_has_perm+0x[ 150.534238][T11593] should_fail_ex+0x223/0x230 129/0x160 Nov [ 150.540282][T11593] ? __kvmalloc_node_noprof+0x72/0x170 5 01:51:29 syzka[ 150.547189][T11593] should_failslab+0x8f/0xb0 ller kern.warn k[ 150.553094][T11593] __kmalloc_node_noprof+0xa8/0x380 ernel: [ 149.29[ 150.559658][T11593] __kvmalloc_node_noprof+0x72/0x170 6507][T11524] s[ 150.566303][T11593] seq_read_iter+0x144/0x930 elinux_bpf+0xa1/[ 150.572281][T11593] ? audit_log_end+0x1d0/0x1e0 0xc0 Nov 5 01:[ 150.578427][T11593] seq_read+0x1ed/0x230 51:29 syzkaller [ 150.583944][T11593] ? __seccomp_filter+0x6fa/0x1180 kern.warn kernel[ 150.590423][T11593] ? __pfx_seq_read+0x10/0x10 : [ 149.302175][ 150.596461][T11593] vfs_read+0x1a2/0x700 [T11524] securi[ 150.601984][T11593] ? __fget_files+0x1d4/0x210 ty_bpf+0x45/0x80[ 150.608027][T11593] __x64_sys_pread64+0xf7/0x150 Nov 5 01:51:2[ 150.614285][T11593] x64_sys_call+0x264d/0x2d60 9 syzkaller kern[ 150.620270][T11593] do_syscall_64+0xc9/0x1c0 Nov 5 01:51:29 [ 150.626133][T11593] ? clear_bhb_loop+0x55/0xb0 Nov 5 01:51:29 [ 150.632165][T11593] ? clear_bhb_loop+0x55/0xb0 Nov 5 01:51:29 [ 150.638200][T11593] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 5 01:51:29 [ 150.645449][T11593] RIP: 0033:0x7f2da2f7e719 Nov 5 01:51:29 [ 150.651233][T11593] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Nov 5 01:51:29 [ 150.672197][T11593] RSP: 002b:00007f2da1bd0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 Nov 5 01:51:29 [ 150.682084][T11593] RAX: ffffffffffffffda RBX: 00007f2da3136058 RCX: 00007f2da2f7e719 Nov 5 01:51:29 [ 150.691419][T11593] RDX: 0000000000018ff2 RSI: 000000002001a240 RDI: 0000000000000004 Nov 5 01:51:29 [ 150.700749][T11593] RBP: 00007f2da1bd0090 R08: 0000000000000000 R09: 0000000000000000 Nov 5 01:51:29 [ 150.710084][T11593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 Nov 5 01:51:29 [ 150.719440][T11593] R13: 0000000000000000 R14: 00007f2da3136058 R15: 00007ffe8783e828 syzkaller kern.i[ 150.728787][T11593] nfo kernel: [ 149.820798][T11558] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(5) Nov 5 01:51:29 syzkaller kern.info kernel: [ 149.828432][T11558] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) Nov 5 01:51:29 syzkaller kern.info kernel: [ 149.836252][T11558] vhci_hcd vhci_hcd.0: Device attached Nov 5 01:51:29 syzkaller kern.notice kernel: [ 149.846200][T11568] FAULT_INJECTION: forcing a failure. Nov 5 01:51:29 syzkaller kern.notice kernel: [ 149.846200][T11568] name fail_usercopy, interval 1, probability 0, space 0, times 0 Nov 5 01:51:29 syzkaller kern.er[ 150.784660][T11598] pim6reg1: entered promiscuous mode r kernel: [ 149.848785][T11558][ 150.790477][T11598] pim6reg1: entered allmulticast mode vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN Nov 5 01:51:29 syzkaller kern.warn kernel: [ 149.860115][T11568] CPU: 0 UID: 0 PID: 11568 Comm: syz.5.2530 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 Nov 5 01:51:29 syzkaller kern.warn kernel: [ 149.860194][T11568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 5 01:51:29 syzkaller kern.info kernel: [ 149.879856][T11558] vhci_hcd vhci_hcd.0: pdev(1) rhport(2) sockfd(9) Nov 5 01:51:29 syzkaller kern.warn kernel: [ 149.880378][T11568] Call Trace: Nov 5 01:51:29 syzkaller kern.warn kernel: [ 149.880387][T11568] Nov 5 01:51:29 syzkaller kern.info kernel: [ 149.890483][T11558] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) Nov 5 01:51:29 syzkaller kern.warn kernel: [ 149.896949][T11568] dump_stack_lvl+0xf2/0x150 Nov 5 01:51:29 syzkaller kern.info kernel: [ 149.900414][T11558] vhci_hcd vhci_hcd.0: Device attached Nov 5 01:51:29 syzkaller kern.warn kernel: [ 149.903222][T11568] dump_stack+0x15/0x20 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 149.903268][T11568] should_fail_ex+0x223/0x230 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 149.903307][T11568] should_fail+0xb/0x10 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 149.903343][T11568] should_fail_usercopy+0x1a/0x20 Nov 5 01:51:30 syzkaller kern.err kernel: [ 149.914722][T11558] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN Nov 5 01:51:30 syzkaller kern.warn kernel: [ 149.916534][T11568] _copy_from_user+0x1e/0xb0 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 149.916605][T11568] __sys_bpf+0x14e/0x7a0 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 149.916637][T11568] __x64_sys_bpf+0x43/0x50 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 149.916689][T11568] x64_sys_call+0x2625/0x2d60 Nov 5 01:51:30 syzkaller kern.info kernel: [ 149.924294][T11570] vhci_hcd: connection closed Nov 5 01:51:30 syzkaller kern.warn kernel: [ 149.927511][T11568] do_syscall_64+0xc9/0x1c0 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 149.927618][T11568] ? clear_bhb_loop+0x55/0xb0 Nov 5 01:51Nov 5 01:51:30 Nov 5 01:51:30 Nov 5 01:51:30 Nov 5 01:51:30 Nov 5 01:51:30 Nov 5 01:51:30 Nov 5 01:51:30 Nov 5 01:51:30 Nov 5 01:51:30 syzkaller kern.notice kernel: [ 150.477386][T11593] FAULT_INJECTION: forcing a failure. Nov 5 01:51:30 syzkaller kern.notice kernel: [ 150.477386][T11593] name failslab, interval 1, probab[ 151.017925][T11629] FAULT_INJECTION: forcing a failure. [ 151.017925][T11629] name failslab, interval 1, probability 0, space 0, times 0 ility 0, space 0[ 151.031553][T11629] CPU: 1 UID: 0 PID: 11629 Comm: syz.2.2553 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 [ 151.043593][T11629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 151.053709][T11629] Call Trace: [ 151.057068][T11629] [ 151.059996][T11629] dump_stack_lvl+0xf2/0x150 [ 151.064611][T11629] dump_stack+0x15/0x20 [ 151.068798][T11629] should_fail_ex+0x223/0x230 [ 151.073559][T11629] ? __list_lru_init+0x72/0x2e0 [ 151.078494][T11629] should_failslab+0x8f/0xb0 [ 151.083106][T11629] __kmalloc_noprof+0xa5/0x370 [ 151.088070][T11629] __list_lru_init+0x72/0x2e0 [ 151.092844][T11629] alloc_super+0x558/0x5b0 [ 151.097370][T11629] ? __pfx_kernfs_test_super+0x10/0x10 [ 151.102891][T11629] sget_fc+0x259/0x670 [ 151.107036][T11629] ? __pfx_kernfs_set_super+0x10/0x10 [ 151.112486][T11629] kernfs_get_tree+0xe2/0x470 [ 151.117239][T11629] sysfs_get_tree+0x25/0xa0 [ 151.121776][T11629] vfs_get_tree+0x56/0x1e0 [ 151.126221][T11629] vfs_cmd_create+0x83/0x130 [ 151.130855][T11629] __se_sys_fsconfig+0x6d8/0x9b0 [ 151.135893][T11629] __x64_sys_fsconfig+0x67/0x80 [ 151.140773][T11629] x64_sys_call+0x10fe/0x2d60 [ 151.145563][T11629] do_syscall_64+0xc9/0x1c0 [ 151.150108][T11629] ? clear_bhb_loop+0x55/0xb0 [ 151.154815][T11629] ? clear_bhb_loop+0x55/0xb0 [ 151.159503][T11629] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 151.165531][T11629] RIP: 0033:0x7f41b232e719 [ 151.169955][T11629] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 151.189611][T11629] RSP: 002b:00007f41b0fa1038 EFLAGS: 00000246 ORIG_RAX: 00000000000001af [ 151.198071][T11629] RAX: ffffffffffffffda RBX: 00007f41b24e5f80 RCX: 00007f41b232e719 [ 151.206069][T11629] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000003 [ 151.214119][T11629] RBP: 00007f41b0fa1090 R08: 0000000000000000 R09: 0000000000000000 [ 151.222097][T11629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 151.230136][T11629] R13: 0000000000000000 R14: 00007f41b24e5f80 R15: 00007fff598c5da8 [ 151.238182][T11629] , times 0 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 150.490268][T11593] CPU: 0 UID: 0 PID: 11593 Comm: syz.3.2536 Not tainted 6.12.0-rc6-s[ 151.253210][ T29] kauditd_printk_skb: 1775 callbacks suppressed yzkaller-00005-g[ 151.253226][ T29] audit: type=1400 audit(1730771490.921:29393): avc: denied { read } for pid=2997 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 557329bcecc2 #0[ 151.283448][ T29] audit: type=1400 audit(1730771490.921:29394): avc: denied { read } for pid=2997 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Nov 5 01:51:30[ 151.306838][ T29] audit: type=1400 audit(1730771490.921:29395): avc: denied { read } for pid=2997 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.[ 151.330249][ T29] audit: type=1400 audit(1730771490.921:29396): avc: denied { read } for pid=2997 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 warn kernel: [ [ 151.343412][T11635] audit: audit_backlog=65 > audit_backlog_limit=64 150.502352][T115[ 151.354003][ T29] audit: type=1400 audit(1730771490.921:29397): avc: denied { read } for pid=2997 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 93] Hardware nam[ 151.361723][T11635] audit: audit_lost=90 audit_rate_limit=0 audit_backlog_limit=64 e: Google Google[ 151.385368][ T29] audit: type=1400 audit(1730771490.921:29398): avc: denied { read } for pid=2997 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Compute Engine/[ 151.394234][T11635] audit: backlog limit exceeded Google Compute E[ 151.417519][ T29] audit: type=1400 audit(1730771490.921:29399): avc: denied { read } for pid=2997 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ngine, BIOS Google 09/13/2024 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 150.513775][T11593] Call Trace: Nov 5 01:51:30 syzkaller kern.warn kernel: [ 150.518424][T11593] Nov 5 01:51:30 syzkaller kern.warn kernel: [ 150.522762][T11593] dump_stack_lvl+0xf2/0x150 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 150.528718][T11593] dump_stack+0x15/0x20 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 150.534238][T11593] should_fail_ex+0x223/0x230 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 150.540282][T11593] ? __kvmalloc_node_noprof+0x72/0x170 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 150.547189][T11593] should_failslab+0x8f/0xb0 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 150.553094][T11593] __kmalloc_node_noprof+0xa8/0x380 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 150.559658][T11593] __kvmalloc_node_noprof+0x72/0x170 Nov 5 01:51:30 syzkallNov 5 01:51:30 Nov 5 01:51:30 Nov 5 01:51:30 Nov 5 01:51:30 syzkaller kern.info kernel: [ 150.784660][T11598] pim6reg1: entered promiscuous mode Nov 5 01[ 151.537742][T11643] FAULT_INJECTION: forcing a failure. [ 151.537742][T11643] name failslab, interval 1, probability 0, space 0, times 0 :51:30 syzkaller[ 151.552112][T11643] CPU: 1 UID: 0 PID: 11643 Comm: syz.2.2559 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 [ 151.564079][T11643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 151.574199][T11643] Call Trace: [ 151.577495][T11643] [ 151.580443][T11643] dump_stack_lvl+0xf2/0x150 [ 151.585064][T11643] dump_stack+0x15/0x20 [ 151.589344][T11643] should_fail_ex+0x223/0x230 [ 151.594056][T11643] ? sidtab_sid2str_get+0xb8/0x140 [ 151.599237][T11643] should_failslab+0x8f/0xb0 [ 151.603895][T11643] __kmalloc_node_track_caller_noprof+0xa6/0x380 [ 151.610246][T11643] kmemdup_noprof+0x2a/0x60 [ 151.614912][T11643] sidtab_sid2str_get+0xb8/0x140 [ 151.619875][T11643] security_sid_to_context_core+0x1eb/0x2f0 [ 151.625869][T11643] security_sid_to_context+0x27/0x30 [ 151.631239][T11643] avc_audit_post_callback+0x10d/0x530 [ 151.636738][T11643] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 151.642747][T11643] common_lsm_audit+0x7cc/0xfc0 [ 151.647775][T11643] slow_avc_audit+0xf9/0x140 [ 151.652451][T11643] avc_has_perm+0x129/0x160 [ 151.656997][T11643] selinux_bpf+0xa1/0xc0 [ 151.661278][T11643] security_bpf+0x45/0x80 [ 151.665712][T11643] __sys_bpf+0x19f/0x7a0 [ 151.670032][T11643] __x64_sys_bpf+0x43/0x50 [ 151.674549][T11643] x64_sys_call+0x2625/0x2d60 [ 151.679259][T11643] do_syscall_64+0xc9/0x1c0 [ 151.683841][T11643] ? clear_bhb_loop+0x55/0xb0 [ 151.688551][T11643] ? clear_bhb_loop+0x55/0xb0 [ 151.693353][T11643] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 151.699280][T11643] RIP: 0033:0x7f41b232e719 [ 151.703713][T11643] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 151.723496][T11643] RSP: 002b:00007f41b0fa1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 151.731957][T11643] RAX: ffffffffffffffda RBX: 00007f41b24e5f80 RCX: 00007f41b232e719 [ 151.739932][T11643] RDX: 0000000000000090 RSI: 00000000200002c0 RDI: 0000000000000005 [ 151.748175][T11643] RBP: 00007f41b0fa1090 R08: 0000000000000000 R09: 0000000000000000 [ 151.756169][T11643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 151.764229][T11643] R13: 0000000000000000 R14: 00007f41b24e5f80 R15: 00007fff598c5da8 [ 151.772214][T11643] kern.info kernel: [ 150.790477][T11598] pim6reg1: entered allmulticast mode Nov 5 01:51:30 syzkaller kern.notice kernel: [ 151.017925][T11629] FAULT_INJECTION: forcing a failure. Nov 5 01:51:30 syzkaller kern.notice kernel: [ 151.017925][T11629] name failslab, interval 1, probability 0, space 0, times 0 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.031553][T11629] CPU: 1 UID: 0 PID: 11629 Comm: syz.2.2553 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.043593][T11629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.053709][T11629] Call Trace: Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.057068][T11629] Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.059996][T11629] dump_stack_lvl+0xf2/0x150 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.064611][T11629] dump_stack+0x15/0x20 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.068798][T11629] should_fail_ex+0x223/0x230 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.073559][T11629] ? __list_lru_init+0x72/0x2e0 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.078494][T11629] should_failslab+0x8f/0xb0 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.083106][T11629] __kmalloc_noprof+0xa5/0x370 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.088070][T11629] __list_lru_init+0x72/0x2e0 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.092844][T11629] alloc_super+0x558/0x5b0 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.097370][T11629] ? __pfx_kernfs_test_super+0x10/0x10 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.102891][T11629] sget_fc+0x259/0x670 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.107036][T11629] ? __pfx_kernfs_set_super+0x10/0x10 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.112486][T11629] kernfs_get_tree+0xe2/0x470 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.117239][T11629] sysfs_get_tree+0x25/0xa0 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.121776][T11629] vfs_get_tree+0x56/0x1e0 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.126221[ 151.967414][T11655] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(5) [ 151.974897][T11655] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) ][T11629] vfs_c[ 151.982689][T11655] vhci_hcd vhci_hcd.0: Device attached md_create+0x83/0x130 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.130855][T11629] __se_sys_fsconfig+0x6d8/0x9b0 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.135893][T11629] __x64_sys_fsconfig+0x67/0x80 Nov [ 152.008319][T11655] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN 5 01:51:30 syzkaller kern.warn kernel: [ 151.140773][T11629] x64_sys_call+0x10fe/0x2d60 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.145563][T11629] do_syscall_64+0xc9/0x1c0 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.150108][T11629] ? clear_bhb_loop+0x55/0xb0 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.154815][T11629] ? clear_bhb_loop+0x55/0xb0 Nov 5 01:51:30 syzkaller kern.warn kerNov 5 01:51:30 Nov 5 01:51:30 syzkaller kern.warn kernel: [ 151.253210][ T29] kauditd_printk_skb: 1775 callbacks suppressed Nov 5 01:51:30 syzkaller kern.notice kernel: [ 151.253226][ Nov 5 01:51:31 Nov 5 01:51:31 syzkaller kern.notice kernel: [ 151.537742][T11643] FAULT_INJECTION: forcing a [ 152.080561][T11655] vhci_hcd vhci_hcd.0: pdev(3) rhport(2) sockfd(9) [ 152.087888][T11655] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) failure. Nov 5[ 152.095517][T11655] vhci_hcd vhci_hcd.0: Device attached 01:51:31 syzkaller kern.notice kernel: [ 151.537742][T11643] name failslab, interval 1, probability 0, space 0[ 152.111603][T11671] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN , times 0 Nov 5 01:51:31 syzkaller kern.warn kernel: [ 151.552112][T11643] CPU: 1 UID: 0 PID: 11643 Comm: syz.2.2559 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 Nov 5 01:51:31 syzkaller kern.warn kernel: [ 151.564079][T11643] Hardware name: Google Google[ 152.143311][T11667] vhci_hcd: connection closed Compute Engine/[ 152.143517][T11661] vhci_hcd: connection closed Google Compute E[ 152.149172][ T11] vhci_hcd: stop threads ngine, BIOS Goog[ 152.160928][ T11] vhci_hcd: release socket le 09/13/2024 N[ 152.166231][T11678] FAULT_INJECTION: forcing a failure. [ 152.166231][T11678] name failslab, interval 1, probability 0, space 0, times 0 [ 152.166593][ T11] vhci_hcd: disconnect device [ 152.168802][ T3677] vhci_hcd: vhci_device speed not set [ 152.180538][T11678] CPU: 1 UID: 0 PID: 11678 Comm: syz.1.2573 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 [ 152.186578][ T11] vhci_hcd: stop threads [ 152.190453][T11678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 152.190469][T11678] Call Trace: [ 152.190476][T11678] [ 152.190483][T11678] dump_stack_lvl+0xf2/0x150 [ 152.201240][ T11] vhci_hcd: release socket [ 152.205446][T11678] dump_stack+0x15/0x20 [ 152.205469][T11678] should_fail_ex+0x223/0x230 [ 152.215543][ T11] vhci_hcd: disconnect device [ 152.218795][T11678] ? sel_commit_bools_write+0xcd/0x260 [ 152.249807][T11678] should_failslab+0x8f/0xb0 [ 152.249836][T11678] __kmalloc_node_track_caller_noprof+0xa6/0x380 [ 152.260756][T11678] memdup_user_nul+0x2c/0xd0 [ 152.265377][T11678] sel_commit_bools_write+0xcd/0x260 [ 152.270681][T11678] ? __pfx_sel_commit_bools_write+0x10/0x10 [ 152.276681][T11678] vfs_write+0x281/0x920 ov 5 01:51:31 s[ 152.280985][T11678] ? __rcu_read_unlock+0x4e/0x70 yzkaller kern.wa[ 152.281088][T11678] ? __fget_files+0x1d4/0x210 rn kernel: [ 15[ 152.281108][T11678] __x64_sys_pwrite64+0xf7/0x150 1.574199][T11643] Call Trace: Nov 5 01:51:31 s[ 152.281165][T11678] x64_sys_call+0x9d5/0x2d60 yzkaller kern.warn kernel: [ 151.577495][T11643] Nov [ 152.281196][T11678] do_syscall_64+0xc9/0x1c0 5 01:51:31 syzkaller kern.warn kernel: [ 151.58[ 152.281297][T11678] ? clear_bhb_loop+0x55/0xb0 0443][T11643] d[ 152.281320][T11678] ? clear_bhb_loop+0x55/0xb0 ump_stack_lvl+0x[ 152.281342][T11678] entry_SYSCALL_64_after_hwframe+0x77/0x7f f2/0x150 Nov 5[ 152.281379][T11678] RIP: 0033:0x7f839dcee719 01:51:31 syzkal[ 152.281396][T11678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 ler kern.warn ke[ 152.281519][T11678] RSP: 002b:00007f839c967038 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 rnel: [ 151.585064][T11643] dump_stack+0x15/0x20 Nov 5 01:51:31 syzkaller kern.warn kernel: [ 151.589344][T11643] should_fail_ex+0x223/0x230 Nov 5 01:51[ 152.281537][T11678] RAX: ffffffffffffffda RBX: 00007f839dea5f80 RCX: 00007f839dcee719 :31 syzkaller kern.warn kernel: [ 151.594056][T11643] ? sidtab_sid2str_get+0xb8/0x140 Nov 5 [ 152.281549][T11678] RDX: 0000000000000001 RSI: 0000000020000080 RDI: 0000000000000003 01:51:31 syzkall[ 152.281561][T11678] RBP: 00007f839c967090 R08: 0000000000000000 R09: 0000000000000000 er kern.warn ker[ 152.281645][T11678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 nel: [ 151.5992[ 152.281657][T11678] R13: 0000000000000000 R14: 00007f839dea5f80 R15: 00007ffe35ddc448 Nov 5 01:51:31 [ 152.281672][T11678] syzkaller kern.w[ 152.282342][ T3677] usb 7-1: new high-speed USB device number 6 using vhci_hcd Nov 5 01:51:31 [ 152.282382][ T3677] usb 7-1: enqueue for inactive port 0 Nov 5 01:51:31 [ 152.282397][ T3677] usb 7-1: enqueue for inactive port 0 [ 152.282410][ T3677] usb 7-1: enqueue for inactive port 0 [ 152.369199][ T3677] vhci_hcd: vhci_device speed not set [ 152.471820][T11693] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(5) [ 152.489232][T11693] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) Nov 5 01:51:31 [ 152.497094][T11693] vhci_hcd vhci_hcd.0: Device attached Nov 5 01:51:31 Nov 5 01:51:31 Nov 5 01:51:31 Nov 5 01:51:31 syzkaller kern.wNov 5 01:51:31 Nov 5 01:51:31 Nov 5 01:51:31 syzkaller kern.info kernel: [ 151.967414][T1165[ 152.517963][T11693] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN 5] vhci_hcd vhci[ 152.527967][T11693] vhci_hcd vhci_hcd.0: pdev(1) rhport(2) sockfd(9) _hcd.0: pdev(3) [ 152.534924][T11693] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) rhport(0) sockfd[ 152.543742][T11693] vhci_hcd vhci_hcd.0: Device attached (5) Nov 5 01:5[ 152.551864][T11693] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN 1:31 syzkaller k[ 152.561124][T11694] vhci_hcd: connection closed ern.info kernel:[ 152.561290][ T3415] vhci_hcd: stop threads [ 151.974897][[ 152.561487][T11698] vhci_hcd: connection closed T11655] vhci_hcd[ 152.566215][ T3415] vhci_hcd: release socket vhci_hcd.0: dev[ 152.566227][ T3415] vhci_hcd: disconnect device id(0) speed(2) speed_str(full-sp[ 152.591203][ T3415] vhci_hcd: stop threads eed) Nov 5 01:[ 152.596833][ T3415] vhci_hcd: release socket 51:31 syzkaller [ 152.602646][ T3415] vhci_hcd: disconnect device kern.info kernel: [ 151.982689][T11655] vhci_hcd vhci_hcd.0: Device attached Nov 5 01:51:31 syzkaller kern.err kernel: [ 152.008319][T11655] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN Nov 5 01:51:31 syzkaller kern.info kernel: [ 152.080561][T11655] vhci_hcd vhci_hcd.0: pdev(3) rhport(2) sockfd(9) Nov 5 01:51:31 syzkaller kern.info kernel: [ 152.087888][T11655] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) Nov 5 01:51:31 syzkaller kern.info kernel: [ 152.095517][T11655] vhci_hcd vhci_hcd.0: Device attached Nov 5 01:51:31 syzkaller kern.err kernel: [ 152.111603][T11671] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN Nov 5 01:51:31 syzkaller kern.info kernel: [ 152.143311][T11667] vhci_hcd: connection closed Nov 5 01:51:31 syzkaller kern.info kernel: [ 152.143517][T11661] vhci_hcd: connection closed Nov 5 01:51:31 syzkaller kern.info kernel: [ 152.149172][ T11] vhci_hcd: stop threads Nov 5 01:51:31 syzkaller kern.info kernel: [ 152.160928][ T11] vhci_hcd: release socket Nov 5 01:51:31 syzkaller kern.notice kernel: [ 152.166231][T11678] FAULT_INJECTION: forcing a failure. Nov 5 01:51:31 syzkaller kern.notice kernel: [ 152.166231][T11678] name failslab, interval 1, probability 0, space 0, times 0 Nov 5 01:51:31 syzkaller kern.info kernel: [ 152.166593][ T11] vhci_hcd: disconnect device Nov 5 01:51:31 syzkaller kern.err kernel: [ 152.168802][ T3677] vhci_hcd: vhci_device speed not set Nov 5 01:51:31 syzkaller kern.warn kernel: [ 152.180538][T11678] CPU: 1 UID: 0 PID: 11678 Comm: syz.1.2573 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 Nov 5 01:51:31 syzkaller kern.info kernel: [ 152.186578][ T11] vhci_hcd: stop threads Nov 5 01:51:31 syzkaller kern.warn kernel: [ 152.190453][T11678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 5 01:51:31 syzkaller kern.warn kernel: [ 152.190469][T11678] Call Trace: Nov 5 01:51:31 syzkaller kern.warn kernel: [ 152.190476][T11678] Nov 5 01:51:31 syzkaller kern.warn kernel: [ 152.190483][T11678] dump_stack_lvl+0xf2/0x150 Nov 5 01:51:31 syzkaller kern.info kernel: [ 152.201240][ T11] vhci_hcd: release socket Nov 5 01:51:32 syzkaller kern.warn kernel: [ 152.205446][T11678] dump_stack+0x15/0x20 Nov 5 01:51:32 syzkaller kern.warn kernel: [ 152.205469][T11678] should_fail_ex+0x223/0x230 Nov 5 01:51:32 syzkaller kern.info kernel: [ 152.215543][ T11] vhci_hcd: disconnect device Nov 5 01:51:32 syzkaller kern.warn kernel: [ 152.218795][T11678] ? sel_commit_bools_write+0xcd/0x260 Nov 5 01:51:32 syzkaller kern.warn kernel: [ 152.249807][T11678] should_failslab+0x8f/0xb0 Nov 5 01:51:32 syzkaller kern.warn kernel: [ 152.249836][T11678] __kmalloc_node_track_caller_noprof+0xa6/0x380 Nov 5 01:51:32 syzkaller kern.warn kernel: [ 152.260756][T11678] memdup_user_nul+0x2c/0xd0 Nov 5 01:51:32 syzkaller kern.warn kernel: [ 152.265377][T11678] sel_commit_bools_write+0xcd/0x260 Nov 5 01:51:32 syzkaller kern.warn kernel: [ 152.270681][T11678] ? __pfx_sel_commit_bools_write+0x10/0x10 Nov 5 01:51:32 syzkaller kern.warn kernel: [ 152.276681][T11678] vfs_write+0x281/0x920 Nov 5 01:51:32 syzkaller kern.warn kernel: [ 152.280985][T11678] ? __rcu_read_unlock+0x4e/0x70 Nov 5 01:51:32 syzkaller kern.warn kernel: [ 152.281088][T11678] ? __fget_files+0x1d4/0x210 Nov 5 01:51:32 syzkaller kern.warn kernel: [ 152.281108][T11678] __x64_sys_pwrite64+0xf7/0x150 Nov 5 01:51:32 syzkaller kern.warn kernel: [ 152.281165][T11678] x64_sys_call+0x9d5/0x2d60 Nov 5 01:51:32 syzkaller kern.warn kernel: [ 152.281196][T11678] do_syscall_64+0xc9/0x1c0 Nov 5 01:51:32 syzkaller kern.warn kernel: [ 152.281297][T11678] ? clear_bhb_Nov 5 01:51:32 Nov 5 01:51:32 Nov 5 01:51:32 Nov 5 01:51:32 syzkaller kern.err kernel: [ 152.517963][T11693] vhci_hcd: FailNov 5 01:51:32 syzkaller kern.err kernel: [ 152.551864][T11693] vhci_hcd: Failed attach requesNov 5 01:51:32 syzkaller kern.info kernel: [ 152.591203][ T341[ 153.593416][T11748] pim6reg1: entered promiscuous mode [ 153.598801][T11748] pim6reg1: entered allmulticast mode Nov 5 01:51:33 syzkaller kern.info kernel: [ 153.593416][T11748] pim6reg1: entered promiscuous mode Nov 5 01:51:33 syzkaller kern.info kernel: [ 153.598801][T11748] pim6reg1: entered allmulticast mode [ 154.351054][T11805] FAULT_INJECTION: forcing a failure. [ 154.351054][T11805] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 154.364216][T11805] CPU: 0 UID: 0 PID: 11805 Comm: syz.3.2627 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 [ 154.375005][T11805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 154.385066][T11805] Call Trace: [ 154.388347][T11805] [ 154.391302][T11805] dump_stack_lvl+0xf2/0x150 [ 154.395912][T11805] dump_stack+0x15/0x20 [ 154.400094][T11805] should_fail_ex+0x223/0x230 [ 154.404894][T11805] should_fail+0xb/0x10 [ 154.409134][T11805] should_fail_usercopy+0x1a/0x20 [ 154.414176][T11805] _copy_to_user+0x20/0xa0 [ 154.418685][T11805] simple_read_from_buffer+0xa0/0x110 [ 154.424159][T11805] proc_fail_nth_read+0xf9/0x140 [ 154.429223][T11805] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 154.434884][T11805] vfs_read+0x1a2/0x700 [ 154.439075][T11805] ? __fget_files+0x1d4/0x210 [ 154.443770][T11805] ksys_read+0xeb/0x1b0 [ 154.447990][T11805] __x64_sys_read+0x42/0x50 [ 154.452530][T11805] x64_sys_call+0x27d3/0x2d60 [ 154.457268][T11805] do_syscall_64+0xc9/0x1c0 [ 154.461805][T11805] ? clear_bhb_loop+0x55/0xb0 [ 154.466511][T11805] ? clear_bhb_loop+0x55/0xb0 [ 154.471229][T11805] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 154.477167][T11805] RIP: 0033:0x7f2da2f7d15c [ 154.481596][T11805] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 154.501281][T11805] RSP: 002b:00007f2da1bf1030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 154.509791][T11805] RAX: ffffffffffffffda RBX: 00007f2da3135f80 RCX: 00007f2da2f7d15c [ 154.517853][T11805] RDX: 000000000000000f RSI: 00007f2da1bf10a0 RDI: 0000000000000003 [ 154.525852][T11805] RBP: 00007f2da1bf1090 R08: 0000000000000000 R09: 0000000000000000 [ 154.533857][T11805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 154.541869][T11805] R13: 0000000000000000 R14: 00007f2da3135f80 R15: 00007ffe8783e828 [ 154.549882][T11805] Nov 5 01:51:34 syzkaller kern.notice kernel: [ 154.351054][T11805] FAULT_INJECTION: forcing a failure. Nov 5 01:51:34 syzkaller kern.notice kernel: [ 154.351054][T11805] name fail_usercopy, interval 1, probability 0, space 0, times 0 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.364216][T11805] CPU: 0 UID: 0 PID: 11805 Comm: syz.3.2627 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.375005][T11805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.385066][T11805] Call Trace: Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.388347][T11805] Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.391302][T11805] dump_stack_lvl+0xf2/0x150 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 15[ 154.630681][T11824] FAULT_INJECTION: forcing a failure. [ 154.630681][T11824] name failslab, interval 1, probability 0, space 0, times 0 4.395912][T11805[ 154.643797][T11824] CPU: 1 UID: 0 PID: 11824 Comm: syz.0.2633 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 [ 154.655861][T11824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 154.666000][T11824] Call Trace: [ 154.669313][T11824] [ 154.672342][T11824] dump_stack_lvl+0xf2/0x150 [ 154.676978][T11824] dump_stack+0x15/0x20 [ 154.681168][T11824] should_fail_ex+0x223/0x230 [ 154.685940][T11824] ? dup_task_struct+0x6c/0x710 [ 154.690167][T11826] FAULT_INJECTION: forcing a failure. [ 154.690167][T11826] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 154.690825][T11824] should_failslab+0x8f/0xb0 [ 154.708544][T11824] kmem_cache_alloc_node_noprof+0x51/0x2b0 [ 154.714407][T11824] dup_task_struct+0x6c/0x710 [ 154.719147][T11824] ? kstrtoull+0x110/0x140 [ 154.723646][T11824] copy_process+0x3a9/0x1f90 [ 154.728428][T11824] ? 0xffffffff81000000 [ 154.732602][T11824] ? selinux_file_permission+0x22a/0x360 [ 154.738237][T11824] ? __rcu_read_unlock+0x4e/0x70 [ 154.743198][T11824] kernel_clone+0x167/0x5e0 [ 154.747730][T11824] ? vfs_write+0x596/0x920 [ 154.752175][T11824] ? __pfx_kfree_link+0x10/0x10 [ 154.757141][T11824] __x64_sys_clone+0xe8/0x120 [ 154.761909][T11824] x64_sys_call+0x2d23/0x2d60 [ 154.766645][T11824] do_syscall_64+0xc9/0x1c0 [ 154.771237][T11824] ? clear_bhb_loop+0x55/0xb0 [ 154.775944][T11824] ? clear_bhb_loop+0x55/0xb0 [ 154.780750][T11824] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 154.786751][T11824] RIP: 0033:0x7f296e84e719 [ 154.791185][T11824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 154.810831][T11824] RSP: 002b:00007f296d4a5fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 154.819348][T11824] RAX: ffffffffffffffda RBX: 00007f296ea06058 RCX: 00007f296e84e719 [ 154.827352][T11824] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 154.835339][T11824] RBP: 00007f296d4a6090 R08: 0000000000000000 R09: 0000000000000000 [ 154.843411][T11824] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 154.851382][T11824] R13: 0000000000000000 R14: 00007f296ea06058 R15: 00007ffebe4962e8 [ 154.859401][T11824] [ 154.862427][T11826] CPU: 0 UID: 0 PID: 11826 Comm: syz.5.2637 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 ] dump_stack+0x[ 154.873261][T11826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 154.884694][T11826] Call Trace: 15/0x20 Nov 5 [ 154.888062][T11826] 01:51:34 syzkall[ 154.892294][T11826] dump_stack_lvl+0xf2/0x150 er kern.warn ker[ 154.898318][T11826] dump_stack+0x15/0x20 nel: [ 154.4000[ 154.903922][T11826] should_fail_ex+0x223/0x230 94][T11805] sho[ 154.909976][T11826] should_fail+0xb/0x10 uld_fail_ex+0x22[ 154.915605][T11826] should_fail_usercopy+0x1a/0x20 3/0x230 Nov 5 [ 154.922024][T11826] _copy_to_user+0x20/0xa0 01:51:34 syzkall[ 154.927812][T11826] simple_read_from_buffer+0xa0/0x110 er kern.warn ker[ 154.934585][T11826] proc_fail_nth_read+0xf9/0x140 nel: [ 154.4048[ 154.940972][T11826] ? __pfx_proc_fail_nth_read+0x10/0x10 94][T11805] sho[ 154.947805][T11826] vfs_read+0x1a2/0x700 uld_fail+0xb/0x1[ 154.953427][T11826] ? __fget_files+0x1d4/0x210 0 Nov 5 01:51:[ 154.959482][T11826] ksys_read+0xeb/0x1b0 34 syzkaller ker[ 154.965012][T11826] __x64_sys_read+0x42/0x50 n.warn kernel: [[ 154.970886][T11826] x64_sys_call+0x27d3/0x2d60 154.409134][T1[ 154.977074][T11826] do_syscall_64+0xc9/0x1c0 1805] should_fa[ 154.982954][T11826] ? clear_bhb_loop+0x55/0xb0 il_usercopy+0x1a[ 154.989021][T11826] ? clear_bhb_loop+0x55/0xb0 /0x20 Nov 5 01[ 154.995074][T11826] entry_SYSCALL_64_after_hwframe+0x77/0x7f :51:34 syzkaller[ 155.002446][T11826] RIP: 0033:0x7f5fe625d15c kern.warn kerne[ 155.008251][T11826] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 l: [ 154.414176][T11805] _copy_to_user+0x20/0xa0 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.418685][T11805] simple_read_from_buffer+0xa0/0x110 Nov [ 155.029242][T11826] RSP: 002b:00007f5fe4ed1030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 5 01:51:34 syzkaller kern.warn [ 155.029290][T11826] RAX: ffffffffffffffda RBX: 00007f5fe6415f80 RCX: 00007f5fe625d15c kernel: [ 154.4[ 155.029311][T11826] RDX: 000000000000000f RSI: 00007f5fe4ed10a0 RDI: 0000000000000005 24159][T11805] [ 155.029330][T11826] RBP: 00007f5fe4ed1090 R08: 0000000000000000 R09: 0000000000000000 proc_fail_nth_re[ 155.029377][T11826] R10: 00000000000a0600 R11: 0000000000000246 R12: 0000000000000001 ad+0xf9/0x140 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.429223][T11805] ? __pfx_proc_fail_nth_read+0x10/0x10 Nov 5 [ 155.029394][T11826] R13: 0000000000000000 R14: 00007f5fe6415f80 R15: 00007fff793987d8 01:51:34 syzkaller kern.warn kernel: [ 154.434884][T11805] vfs[ 155.029446][T11826] _read+0x1a2/0x700 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.439075][T11805] ? __fget_files+0x1d4/0x210 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.443770][T11805] ksys_read+0xeb/0x1b0 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.447990][T11805] __x64_sys_read+0x42/0x50 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.452530][T11805] x64_sys_call+0x27d3/0x2d60 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.457268][T11805] do_syscall_64+0xc9/0x1c0 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.461805][T11805] ? clear_bhb_loop+0x55/0xb0 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.466511][T11805] ? clear_bhb_loop+0x55/0xb0 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.471229][T11805] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.477167][T11805] RIP: 0033:0x7f2da2f7d15c Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.481596][T11805] Code: ec 28 48 89 54 24 18 48 89 74 24 10[ 155.204144][T11842] FAULT_INJECTION: forcing a failure. [ 155.204144][T11842] name fail_usercopy, interval 1, probability 0, space 0, times 0 89 7c 24 08 e8 [ 155.217908][T11842] CPU: 0 UID: 0 PID: 11842 Comm: syz.3.2644 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 [ 155.230006][T11842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 69 8e 02 00 48 8[ 155.240075][T11842] Call Trace: b 54 24 18 48 8b[ 155.244806][T11842] 74 24 10 41 89 [ 155.249120][T11842] dump_stack_lvl+0xf2/0x150 c0 8b 7c 24 08 3[ 155.254997][T11842] dump_stack+0x15/0x20 1 c0 0f 05 <48> [ 155.260516][T11842] should_fail_ex+0x223/0x230 3d 00 f0 ff ff 7[ 155.266563][T11842] should_fail+0xb/0x10 7 34 44 89 c7 48[ 155.272075][T11842] should_fail_usercopy+0x1a/0x20 89 44 24 08 e8 [ 155.278535][T11842] _copy_from_user+0x1e/0xb0 bf 8e 02 00 48 [ 155.284538][T11842] __sys_bpf+0x14e/0x7a0 Nov 5 01:51:34 [ 155.290101][T11842] __x64_sys_bpf+0x43/0x50 syzkaller kern.w[ 155.295871][T11842] x64_sys_call+0x2625/0x2d60 arn kernel: [ 1[ 155.301926][T11842] do_syscall_64+0xc9/0x1c0 54.501281][T1180[ 155.307811][T11842] ? clear_bhb_loop+0x55/0xb0 5] RSP: 002b:000[ 155.313875][T11842] ? clear_bhb_loop+0x55/0xb0 07f2da1bf1030 EF[ 155.319932][T11842] entry_SYSCALL_64_after_hwframe+0x77/0x7f LAGS: 00000246 O[ 155.327162][T11842] RIP: 0033:0x7f2da2f7e719 RIG_RAX: 0000000[ 155.332941][T11842] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 000000000 Nov [ 155.353988][T11842] RSP: 002b:00007f2da1bf1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 5 01:51:34 syzka[ 155.363746][T11842] RAX: ffffffffffffffda RBX: 00007f2da3135f80 RCX: 00007f2da2f7e719 ller kern.warn k[ 155.373087][T11842] RDX: 0000000000000020 RSI: 0000000020000700 RDI: 0000000000000003 ernel: [ 154.50[ 155.382428][T11842] RBP: 00007f2da1bf1090 R08: 0000000000000000 R09: 0000000000000000 [ 155.391774][T11842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 9791][T11805] RA[ 155.399772][T11842] R13: 0000000000000000 R14: 00007f2da3135f80 R15: 00007ffe8783e828 X: fffffffffffff[ 155.409125][T11842] fda RBX: 00007f2da3135f80 RCX: 00007f2da2f7d15c Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.517853][T11805] RDX: 000000000000000f RSI: 00007f2da1bf10a0 RDI: 0000000000000003 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.525852][T11805] RBP: 00007f2da1bf1090 R08: 0000000000000000 R09: 0000000000000000 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.533857][T11805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.541869][T11805] R13: 0000000000000000 R14: 00007f2da3135f80 R15: 00007ffe8783e828 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.549882][T11805] Nov 5 01:51:34 syzkaller kern.notice kernel: [ 154.630681][T11824] FAULT_INJECTION: forcing a failure. Nov 5 01:51:34 syzkaller kern.notice kernel: [ 154.630681][T11824] name failslab, interval 1, probability 0, space 0, times 0 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.643797][T11824] CPU: 1 UID: 0 PID: 11824 Comm: syz.0.2633 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.655861][T11824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.666000][T11824] Call Trace: Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.669313][T11824] Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.672342][T11824] dump_stack_lvl+0xf2/0x150 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.676978][T11824] dump_stack+0x15/0x20 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.681168][T11824] should_fail_ex+0x223/0x230 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.685940][T11824] ? dup_task_struct+0x6c/0x710 Nov 5 01:51:34 syzkaller kern.notice kernel: [ 154.690167][T11826] FAULT_INJECTION: forcing a failure. Nov 5 01:51:34 syzkaller kern.notice kernel: [ 154.690167][T11826] name fail_usercopy, interval 1, probability 0, space 0, times 0 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.690825][T11824] should_failslab+0x8f/0xb0 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.708544][T11824] kmem_cache_alloc_node_noprof+0x51/0x2b0 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.714407][T11824] dup_task_struct+0x6c/0x710 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.719147][T11824] ? kstrtoull+0x110/0x140 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.723646][T11824] copy_process+0x3a9/0x1f90 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.728428][T11824] ? 0xffffffff81000000 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.732602][T11824] ? selinux_file_permission+0x22a/0x360 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 154.738237][T11824] ? __rcu_read_unlock+0x4e/0x70 Nov 5 01:51:34 syzkNov 5 01:51:34 Nov 5 01:51:34 syzkaller kern.warn kernel: [ 1Nov 5 01:51:34 syzkaller kern.warn kernel: [ 1Nov 5 01:51:34 Nov 5 01:51:34 Nov 5 01:51:34 Nov 5 01:51:34 Nov 5 01:51:34 Nov 5 01:51:35 syzkaller kern.notice kernel: [ 155.204144][T11842] FAULT_INJECTION: forcing a failure. Nov 5 01:51:35 syzkaller kern.notice kernel: [ 155.204144][T11842] name fail_usercopy, interval 1, probability 0, space 0, times 0 Nov 5 01:51:35 syzkaller kern.warn kernel: [ 155.217908][T11842] CPU: 0 UID: 0 PID: 11842 Comm: syz.3.2644 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 Nov 5 01:51:35 syzkaller kern.warn kernel: [ 155.230006][T11842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 5 01:51:35 syzkaller kern.warn kernel: [ 155.240075][T11842] Call Trace: Nov 5 01:51:35 syzkaller kern.warn kernel: [ 155.244806][T11842] Nov 5 01:51:35 syzkaller kern.warn kernel: [ 155.249120][T11842] dump_stack_lvl+0xf2/0x150 Nov 5 01:51:35 syzkaller kern.warn kernel: [ 155.254997][T11842] dump_stack+0x15/0x20 Nov 5 01:51:35 syzkaller kern.warn kernel: [ 155.260516][T11842] should_fail_ex+0x223/0x230 Nov 5 01:51:35 syzkaller kern.warn kernel: [ 155.266563][T11842] should_fail+0xb/0x10 Nov 5 01:51:35 syzkaller kern.warn kernel: [ 155.272075][T11842] should_faNov 5 01:51:35 Nov 5 01:51:35 Nov 5 01:51:35 [ 155.881364][T11884] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(5) [ 155.887976][T11884] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 155.895579][T11884] vhci_hcd vhci_hcd.0: Device attached Nov 5 01:51:35 syzkaller kern.info kernel: [ 155.881364][T11884] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(5) Nov 5 01:51:35 syzkaller kern.info kernel: [ 155.887976][T11884] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) Nov 5 01:51:35 syzkaller kern.info kernel: [ 155.895579][T11884] vhci_hcd vhci_hcd.0: Device attached [ 155.947512][T11887] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN Nov 5 01:51:35 syzkaller kern.err kernel: [ 155.947512][T11887] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 156.011200][T11884] vhci_hcd vhci_hcd.0: pdev(5) rhport(2) sockfd(7) [ 156.017759][T11884] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 156.025185][T11884] vhci_hcd vhci_hcd.0: Device attached Nov 5 01:51:35 syzkaller kern.info kernel: [ 156.011200][T11884] vhci_hcd vhci_hcd.0: pdev(5) [ 156.048067][T11887] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN rhport(2) sockfd(7) Nov 5 01:51:35 syzkaller kern.info kernel:[ 156.061491][T11888] vhci_hcd: connection closed [ 156.017759][[ 156.061555][T11885] vhci_hcd: connection closed T11884] vhci_hcd[ 156.067214][ T57] vhci_hcd: stop threads vhci_hcd.0: dev[ 156.078914][ T57] vhci_hcd: release socket id(0) speed(4) s[ 156.084691][ T57] vhci_hcd: disconnect device [ 156.089881][ T3677] vhci_hcd: vhci_device speed not set peed_str(wireless) Nov 5 01:51:35 syzkaller kern.info kernel: [ 156.025185][T11884] vhci_hcd vhci_hcd.0: Device attached Nov 5 01:51:35 syzkaller kern.err kernel: [ 156.048067][T11887] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN Nov 5 01:51:35 syzkaller kern.info kernel: [ 156.061491][T11888] vhci_hcd: connection closed Nov 5 01:51:35 syzkaller kern.info kernel: [[ 156.131046][ T57] vhci_hcd: stop threads 156.061555][T1[ 156.135773][ T57] vhci_hcd: release socket 1885] vhci_hcd: [ 156.141506][ T57] vhci_hcd: disconnect device connection closed Nov 5 01:51:35 syzkaller kern.info kernel: [ 156.067214][ T57] vhci_hcd: stop threads Nov 5 01:51:35 syzkaller kern.inf[ 156.159978][ T3677] usb 11-1: new full-speed USB device number 8 using vhci_hcd o kernel: [ 156[ 156.168698][ T3677] usb 11-1: enqueue for inactive port 0 .078914][ T57] vhci_hcd: release socket Nov 5 01:51:35 syzkaller kern.info k[ 156.180760][ T3677] usb 11-1: enqueue for inactive port 0 ernel: [ 156.084691][ T57] vhci_hcd: disconnect device Nov 5 01:51:35 syzkaller kern.err kernel: [ 156.089881][ T3677] vhci_hcd: vhci_devi[ 156.199158][ T3677] usb 11-1: enqueue for inactive port 0 ce speed not set Nov 5 01:51:35 syzkaller kern.info kernel: [ 156.131046][ T57] vhci_hcd: stop threads Nov 5 01:51:35 syzka[ 156.289853][ T29] kauditd_printk_skb: 1584 callbacks suppressed ller kern.info k[ 156.289868][ T29] audit: type=1400 audit(1730771495.961:30984): avc: denied { read } for pid=2997 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 156.301182][ T3677] vhci_hcd: vhci_device speed not set ernel: [ 156.13[ 156.319695][ T29] audit: type=1400 audit(1730771495.961:30985): avc: denied { read } for pid=2997 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 5773][ T57] vh[ 156.348676][ T29] audit: type=1400 audit(1730771495.961:30986): avc: denied { read } for pid=2997 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ci_hcd: release [ 156.372029][ T29] audit: type=1400 audit(1730771495.961:30987): avc: denied { read } for pid=2997 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 socket Nov 5 0[ 156.395438][ T29] audit: type=1400 audit(1730771495.961:30988): avc: denied { read } for pid=2997 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 1:51:35 syzkalle[ 156.418891][ T29] audit: type=1400 audit(1730771495.961:30989): avc: denied { read } for pid=2997 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 r kern.info kern[ 156.442454][ T29] audit: type=1400 audit(1730771495.961:30990): avc: denied { read } for pid=2997 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 el: [ 156.14150[ 156.465920][ T29] audit: type=1400 audit(1730771496.001:30991): avc: denied { read write } for pid=3313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 6][ T57] vhci_[ 156.465958][ T29] audit: type=1400 audit(1730771496.121:30992): avc: denied { read } for pid=2997 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 hcd: disconnect [ 156.468198][T11891] FAULT_INJECTION: forcing a failure. [ 156.468198][T11891] name fail_usercopy, interval 1, probability 0, space 0, times 0 device Nov 5 0[ 156.529405][T11891] CPU: 1 UID: 0 PID: 11891 Comm: syz.0.2663 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 [ 156.541343][T11891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 156.551438][T11891] Call Trace: [ 156.554789][T11891] [ 156.557773][T11891] dump_stack_lvl+0xf2/0x150 [ 156.562458][T11891] dump_stack+0x15/0x20 [ 156.566661][T11891] should_fail_ex+0x223/0x230 [ 156.571448][T11891] should_fail+0xb/0x10 [ 156.575706][T11891] should_fail_usercopy+0x1a/0x20 [ 156.580889][T11891] _copy_from_user+0x1e/0xb0 [ 156.585509][T11891] copy_msghdr_from_user+0x54/0x2a0 [ 156.590816][T11891] __sys_sendmsg+0x171/0x270 [ 156.595458][T11891] __x64_sys_sendmsg+0x46/0x50 [ 156.600263][T11891] x64_sys_call+0x2689/0x2d60 [ 156.604992][T11891] do_syscall_64+0xc9/0x1c0 [ 156.609642][T11891] ? clear_bhb_loop+0x55/0xb0 [ 156.614370][T11891] ? clear_bhb_loop+0x55/0xb0 [ 156.619088][T11891] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 156.625111][T11891] RIP: 0033:0x7f296e84e719 [ 156.629669][T11891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 156.631383][ T29] audit: type=1400 audit(1730771496.261:30993): avc: denied { read write } for pid=3320 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 156.649299][T11891] RSP: 002b:00007f296d4c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 156.649329][T11891] RAX: ffffffffffffffda RBX: 00007f296ea05f80 RCX: 00007f296e84e719 [ 156.649346][T11891] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 156.649385][T11891] RBP: 00007f296d4c7090 R08: 0000000000000000 R09: 0000000000000000 [ 156.649403][T11891] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 156.649420][T11891] R13: 0000000000000000 R14: 00007f296ea05f80 R15: 00007ffebe4962e8 [ 156.649451][T11891] 1:51:35 syzkaller kern.info kernel: [ 156.159978][ T3677] usb 11-1: new full-speed USB device number 8 using vhci_hcd Nov 5 01:51:35 syzkaller kern.err kernel: [ 156.168698][ T3677] usb 11-1: enqueue for inactive port 0 Nov 5 01:51:35 syzkaller kern.err kernel: [ 156.180760][ T3677] usb 11-1: enqueue for inactive port 0 Nov 5 01:51:35 syzkaller kern.err kernel: [ 156.199158][ T3677] usb 11-1: enqueue for inactive port 0 Nov 5 01:51:36 syzkaller kern.warn kernel: [ 156.289853][ T29] kauditd_printk_skb: 1584 callbacks suppressed Nov 5 01:51:36 syzkaller kern.notice kernel: [ 156.289868][ T29] audit: type=1400 audit(1730771495.961:30984): avc: denied { read } for pid=2997 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Nov 5 01:51:36 syzkaller kern.err kernel: [ 156.301182][ T3677] vhci_hcd: vhci_device speed not set Nov 5 01:51:36 syzkaller kern.notice kernel: [ 156.319695][ T29] audit: type=1400 audit(1730771495.961:30985): avc: denied { read } for pid=2997 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Nov 5 01:51:36 syzkaller kern.notice kernel: [ 156.348676][ T29] audit: type=1400 audit(1730771495.961:30986): avc: denied { read } for pid=2997 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Nov 5 01:51:36 syzkaller kern.notice kernel: [ 156.372029][ T29] audit: type=1400 audit(1730771495.961:30987): avc: denied { read } for pid=2997 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Nov 5 01:51:36 syzkaller kern.notice kernel: [ 156.395438][ T29] audit: type=1400 audit(1730771495.961:30988): avc: denied { read } for pid=2997 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Nov 5 01:51:36 syzkaller kern.notice kernel: [ 156.418891][ T29] audit: type=1400 audit(1730771495.961:30989): avc: denied { read } for pid=2997 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcont[ 156.922455][T11917] FAULT_INJECTION: forcing a failure. [ 156.922455][T11917] name fail_usercopy, interval 1, probability 0, space 0, times 0 ext=system_u:obj[ 156.936905][T11917] CPU: 0 UID: 0 PID: 11917 Comm: syz.0.2675 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 ect_r:var_t tcla[ 156.948950][T11917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ss Nov 5 01:51[ 156.960394][T11917] Call Trace: :36 syzkaller ke[ 156.965093][T11917] rn.notice kernel[ 156.969411][T11917] dump_stack_lvl+0xf2/0x150 : [ 156.442454][ 156.975361][T11917] dump_stack+0x15/0x20 [ T29] audit: [ 156.980879][T11917] should_fail_ex+0x223/0x230 type=1400 audit([ 156.986924][T11917] should_fail+0xb/0x10 1730771495.961:3[ 156.992513][T11917] should_fail_usercopy+0x1a/0x20 [ 156.998903][T11917] _copy_from_user+0x1e/0xb0 0990): avc: den[ 157.003549][T11917] copy_msghdr_from_user+0x54/0x2a0 ied { read } fo[ 157.004126][T11923] FAULT_INJECTION: forcing a failure. [ 157.004126][T11923] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 157.010076][T11917] __sys_sendmsg+0x171/0x270 r pid=2997 comm[ 157.010110][T11917] __x64_sys_sendmsg+0x46/0x50 ="syslogd" name=[ 157.010133][T11917] x64_sys_call+0x2689/0x2d60 "log" dev="sda1"[ 157.010199][T11917] do_syscall_64+0xc9/0x1c0 ino=1915 sconte[ 157.010225][T11917] ? clear_bhb_loop+0x55/0xb0 xt=system_u:syst[ 157.053245][T11917] ? clear_bhb_loop+0x55/0xb0 em_r:syslogd_t t[ 157.059265][T11917] entry_SYSCALL_64_after_hwframe+0x77/0x7f context=system_u[ 157.066518][T11917] RIP: 0033:0x7f296e84e719 :object_r:var_t [ 157.072297][T11917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 tclass Nov 5 0[ 157.093255][T11917] RSP: 002b:00007f296d4c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 1:51:36 syzkalle[ 157.103026][T11917] RAX: ffffffffffffffda RBX: 00007f296ea05f80 RCX: 00007f296e84e719 r kern.notice ke[ 157.112355][T11917] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 rnel: [ 156.465[ 157.121703][T11917] RBP: 00007f296d4c7090 R08: 0000000000000000 R09: 0000000000000000 920][ T29] aud[ 157.131044][T11917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 it: type=1400 au[ 157.140377][T11917] R13: 0000000000000000 R14: 00007f296ea05f80 R15: 00007ffebe4962e8 dit(1730771496.0[ 157.149786][T11917] 01:30991): avc: [ 157.154227][T11923] CPU: 1 UID: 0 PID: 11923 Comm: syz.5.2677 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 [ 157.166233][T11923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 157.176313][T11923] Call Trace: [ 157.179602][T11923] [ 157.182560][T11923] dump_stack_lvl+0xf2/0x150 [ 157.187201][T11923] dump_stack+0x15/0x20 [ 157.191381][T11923] should_fail_ex+0x223/0x230 [ 157.196207][T11923] should_fail+0xb/0x10 [ 157.200404][T11923] should_fail_usercopy+0x1a/0x20 [ 157.205445][T11923] _copy_from_user+0x1e/0xb0 [ 157.210063][T11923] kstrtouint_from_user+0x76/0xe0 [ 157.215193][T11923] ? 0xffffffff81000000 [ 157.219428][T11923] ? selinux_file_permission+0x22a/0x360 [ 157.225164][T11923] proc_fail_nth_write+0x4f/0x150 [ 157.230216][T11923] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 157.235908][T11923] vfs_write+0x281/0x920 [ 157.240190][T11923] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 157.241973][T11919] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(5) [ 157.245734][T11923] ? __rcu_read_unlock+0x4e/0x70 [ 157.252258][T11919] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 157.257177][T11923] ? __fget_files+0x1d4/0x210 [ 157.264874][T11919] vhci_hcd vhci_hcd.0: Device attached [ 157.269370][T11923] ksys_write+0xeb/0x1b0 denied { read [ 157.279138][T11923] __x64_sys_write+0x42/0x50 write } for pid[ 157.279188][T11923] x64_sys_call+0x27dd/0x2d60 =3313 comm="syz-[ 157.279222][T11923] do_syscall_64+0xc9/0x1c0 executor" name="[ 157.279252][T11923] ? clear_bhb_loop+0x55/0xb0 loop0" dev="devt[ 157.279276][T11923] ? clear_bhb_loop+0x55/0xb0 mpfs" ino=100 sc[ 157.279367][T11923] entry_SYSCALL_64_after_hwframe+0x77/0x7f ontext=root:sysa[ 157.279410][T11923] RIP: 0033:0x7f5fe625d1ff dm_r:sysadm_t tc[ 157.279428][T11923] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 [ 157.279515][T11923] RSP: 002b:00007f5fe4ed1030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 157.279541][T11923] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5fe625d1ff [ 157.279555][T11923] RDX: 0000000000000001 RSI: 00007f5fe4ed10a0 RDI: 0000000000000004 [ 157.279571][T11923] RBP: 00007f5fe4ed1090 R08: 0000000000000000 R09: 0000000000000000 [ 157.279586][T11923] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 157.279649][T11923] R13: 0000000000000000 R14: 00007f5fe6415f80 R15: 00007fff793987d8 [ 157.279746][T11923] [ 157.279913][T11924] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 157.281216][T11924] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 157.308319][T11934] netlink: 14 bytes leftover after parsing attributes in process `syz.1.2681'. [ 157.329814][T11929] vhci_hcd vhci_hcd.0: pdev(2) rhport(2) sockfd(10) ontext=system_u:[ 157.426888][T11929] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) object_r:f Nov [ 157.427317][T11929] vhci_hcd vhci_hcd.0: Device attached 5 01:51:36 syzkaller kern.notice kernel: [ 156.465958][ T29] audit: type=1400 audit(1730771496.121:30992): avc: denied { read } for pid=2997 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Nov 5 01:51:36 syzkaller kern.notice kernel: [ 156.468198][T11891] FAULT_INJECTION: forcing a failure. Nov 5 01:51:36 syzkaller kern.notice [ 157.477881][T11935] vhci_hcd: connection closed kernel: [ 156.4[ 157.478080][ T57] vhci_hcd: stop threads 68198][T11891] n[ 157.479896][T11921] vhci_hcd: connection closed ame fail_usercop[ 157.483534][ T57] vhci_hcd: release socket y, interval 1, p[ 157.483550][ T57] vhci_hcd: disconnect device robability 0, space 0, times 0 Nov 5 01:51:36 syzkaller kern.warn kernel: [ 156.529405][T11891] CPU: 1 UID: 0 PID: 11891 Comm: syz.0.2663 Not[ 157.518206][ T57] vhci_hcd: stop threads tainted 6.12.0-[ 157.523859][ T57] vhci_hcd: release socket rc6-syzkaller-00[ 157.523876][ T57] vhci_hcd: disconnect device 005-g557329bcecc2 #0 Nov 5 01:51:36 syzkaller kern.warn kernel: [ 156.541343][T11891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 5 01:51:36 syzkaller kern.warn kernel: [ 156.551438][T11891] Call Trace: Nov 5 01:51:36 syzkaller kern.warn kernel: [ 156.554789][T11891] Nov 5 01:51:36 syzkaller kern.warn kernel: [ 156.557773][T11891] dump_stack_lvl+0xf2/0x150 Nov 5 01:51:36 syzkaller kern.warn kernel: [ 156.562458][T11891] dump_stack+0x[ 157.580011][ T3391] vhci_hcd: vhci_device speed not set 15/0x20 Nov 5 01:51:36 syzkaller kern.warn kernel: [ 156.566661][T11891] should_fail_ex+0x223/0x230 Nov 5 01:51:36 syzkallNov 5 01:51:36 Nov 5 01:51:36 syzkaller kern.warn kernel: [ 1Nov 5 01:51:36 Nov 5 01:51:36 Nov 5 01:51:36 syzkaller kern.warn kernel: [ 156.649451][T11891] Nov 5 01:51:36 syzkaller kern.notice kernel: [ 156.922455][T11917] FAULT_INJECTION: forcing a failure. Nov 5 01:51:36 syzkaller kern.notice kernel: [ 156.922455][T11917] name fail_usercopy, interval 1, probability 0, space 0, times 0 Nov 5 01:51:36 syzkaller kern.warn kernel: [ 156.936905][T11917] CPU: 0 UID: 0 PID: 11917 Comm: syz.0.2675 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 Nov 5 01:51:36 syzkaller kern.warn kernel: [ 156.948950][T11917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 5 01:51:36 syzkaller kern.warn kernel: [ 156.960394][T11917] Call Trace: Nov 5 01:51:36 syzkaller kern.warn kernel: [ 156.965093][T11917] Nov 5 01:51:36 syzkaller kern.warn kernel: [ 156.969411][T11917] dump_stack_lvl+0xf2/0x150 Nov 5 01:51:36 syzkaller kern.warn kernel: [ 156.975361][T11917] dump_stack+0x15/0x20 Nov 5 01:51:36 syzkaller kern.warn kernel: [ 156.980879][T11917] should_fail_ex+0x223/0x230 Nov 5 01:51:36 syzkaller kern.warn kernel: [ 156.986924][T11917] should_fail+0xb/0x10 Nov 5 01:51:36 syzkaller kern.warn kernel: [ 156.992513][T11917] should_fail_usercopy+0x1a/0x20 Nov 5 01:51:36 syzkaller kern.warn kernel: [ 156.998903][T11917] _copy_from_user+0x1e/0xb0 Nov 5 01:51:36 syzkaller kern.warn kernel: [ 157.003549][T11917] copy_msghdr_from_user+0x54/0x2a0 Nov 5 01:51:37 syzkaller kern.notice kernel: [ 157.004126][T11923] FAULT_INJECTION: forcing a failure. Nov 5 01:51:37 syzkaller kern.notice kernel: [ 157.004126][T11923] name fail_usercopy, interval 1, probability 0, space 0, times 0 Nov 5 01:51:37 syzkaller kern.warn kernel: [ 157.010076][T11917] __sys_sendmsg+0x171/0x270 Nov 5 01:51:37 syzkaller kern.warn kernel: [ 157.010110][T11917] __x64_sys_sendmsg+0x46/0x50 Nov 5 01:51:37 syzkaller kern.warn kernel: [ 157.010133][T11917] x64_sys_call+0x2689/0x2d60 Nov 5 01:51:37 syzkaller kern.warn kernel: [ 157.010199][T11917] do_syscall_64+0xc9/0x1c0 Nov 5 01:51:37 syzkaller kern.warn kernel: [ 157.010225][T11917] ? clear_bhb_loop+0x55/0xb0 Nov 5 01:51:37 syzkaller kern.warn kernel: [ 157.053245][T11917] ? clear_bhb_loop+0x55/0xb0 Nov 5 01:51:37 syzkaller kern.warn kernel: [ 157.059265][T11917] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 5 01:51:37 syzkaller kern.warn kernel: [ 157.066518][T11917] RIP: 0033:0x7f296e84e719 Nov 5 01:51:37 syzkaller kern.warn kernel: [ 157.072297][T11917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48[ 157.835473][T11992] ref_tracker: memory allocation failure, unreliable refcount tracker. 89 f8 48 89 f7 [ 157.843920][T11992] bridge0: port 3(geneve0) entered blocking state 48 89 d6 48 89 c[ 157.851769][T11992] bridge0: port 3(geneve0) entered disabled state a 4d 89 c2 4d 89[ 157.859900][T11992] geneve0: entered allmulticast mode c8 4c 8b 4c 24 [ 157.866771][T11992] geneve0: entered promiscuous mode 08 0f 05 <48> 3d[ 157.873549][T11992] bridge0: port 3(geneve0) entered blocking state 01 f0 ff ff 73 [ 157.880695][T11992] bridge0: port 3(geneve0) entered forwarding state 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Nov 5 01:51:37 syzkaller kern.warn kernel: [ 157.093255][T11917] RSP: 002b:00007f296d4c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e Nov 5 01:51:37 syzkaller kern.warn kernel: [ 157.103026][T11917] RAX: ffffffffffffffda RBX: 00007f296ea05f80 RCX: 00007f296e84e719 Nov 5 01:51:37 syzkaller kern.warn kernel: [ 157.112355][T11917] RDX: 000000000Nov 5 01:51:37 Nov 5 01:51:37 syzkaller kern.warn kernel: [ 157.140377][T11917] R13: 00000000Nov 5 01:51:37 Nov 5 01:51:37 Nov 5 01:51:37 Nov 5 01:51:37 syzkaller kern.warn kernel: [ 1Nov 5 01:51:37 Nov 5 01:51:37 syzkaller kern.warn kernel: [ 157.279586][T1192Nov 5 01:51:37 Nov 5 01:51:37 Nov 5 01:51:37 syzkaller kern.err kernel: [ 157.580011][ T3391] vhci_hcd: vhci_device speed not set Nov 5 01:51:37 syzkaller kern.err kernel: [ 157.835473][T11992] ref_tracker: memory allocation failure, unreliable refcount tracker. Nov 5 01:51:37 syzkaller kern.info kernel: [ 157.843920][T11992] bridge0: port 3(geneve0) entered blocking state Nov 5 01:51:37 syzkaller kern.info kernel: [ 157.851769][T11992] bridge0: port 3(geneve0) entered disabled state Nov 5 01:51:37 syzkaller kern.info kernel: [ 157.859900][T11992] geneve0: entered allmulticast mode Nov 5 01:51:37 syzkaller kern.info kernel: [ 157.866771][T11992] geneve0: entered promiscuous mode Nov 5 01:51:37 syzkaller kern.info kernel: [ 157.873549][T11992] bridge0: port 3(geneve0) entered blocking state Nov 5 01:51:37 syzkaller kern.info kernel: [ 157.880695][T11992] bridge0: port 3(geneve0) entered forwarding state [ 158.324535][T12030] serio: Serial port pts0 Nov 5 01:51:38 syzkaller kern.info kernel: [ 158.324535][T12030] serio: Serial port pts0 [ 159.300191][T12113] bridge0: port 3(geneve0) entered blocking state [ 159.306701][T12113] bridge0: port 3(geneve0) entered disabled state Nov 5 01:51:38 syzkaller kern.i[ 159.315763][T12113] geneve0: entered allmulticast mode nfo kernel: [ 159.300191][T12113] bridge0: port 3(geneve0) entered blocking state Nov 5 01:51[ 159.329970][T12113] geneve0: entered promiscuous mode :38 syzkaller kern.info kernel: [ 159.337803][T12113] bridge0: port 3(geneve0) entered blocking state [ 159.306701][T[ 159.344704][T12113] bridge0: port 3(geneve0) entered forwarding state 12113] bridge0: port 3(geneve0) entered disabled state Nov 5 01:51:39 syzkaller kern.info kernel: [ 159.315763][T12113] geneve0: entered allm[ 159.364983][T12116] FAULT_INJECTION: forcing a failure. [ 159.364983][T12116] name failslab, interval 1, probability 0, space 0, times 0 ulticast mode N[ 159.377668][T12116] CPU: 0 UID: 0 PID: 12116 Comm: syz.5.2761 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 ov 5 01:51:39 s[ 159.389742][T12116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 159.401165][T12116] Call Trace: yzkaller kern.in[ 159.404445][T12116] fo kernel: [ 15[ 159.408754][T12116] dump_stack_lvl+0xf2/0x150 9.329970][T12113[ 159.414711][T12116] dump_stack+0x15/0x20 ] geneve0: enter[ 159.420275][T12116] should_fail_ex+0x223/0x230 ed promiscuous m[ 159.426268][T12116] ? sidtab_sid2str_get+0xb8/0x140 ode Nov 5 01:5[ 159.432742][T12116] should_failslab+0x8f/0xb0 1:39 syzkaller k[ 159.438789][T12116] __kmalloc_node_track_caller_noprof+0xa6/0x380 ern.info kernel:[ 159.446482][T12116] ? vsnprintf+0xdd8/0xe30 [ 159.337803][[ 159.452315][T12116] kmemdup_noprof+0x2a/0x60 [ 159.458214][T12116] sidtab_sid2str_get+0xb8/0x140 T12113] bridge0:[ 159.463200][T12116] security_sid_to_context_core+0x1eb/0x2f0 port 3(geneve0)[ 159.470534][T12116] security_sid_to_context+0x27/0x30 entered blockin[ 159.477212][T12116] selinux_secid_to_secctx+0x22/0x30 g state Nov 5 [ 159.483883][T12116] security_secid_to_secctx+0x48/0x90 01:51:39 syzkall[ 159.490635][T12116] audit_log_task_context+0x8c/0x1b0 er kern.info ker[ 159.497328][T12116] audit_log_task+0xfb/0x180 nel: [ 159.3447[ 159.503308][T12116] audit_seccomp+0x68/0x130 04][T12113] brid[ 159.509188][T12116] __seccomp_filter+0x6fa/0x1180 ge0: port 3(gene[ 159.515530][T12116] ? __pfx_proc_fail_nth_write+0x10/0x10 ve0) entered for[ 159.522596][T12116] ? vfs_write+0x596/0x920 warding state [ 159.528445][T12116] ? __pfx_kfree_link+0x10/0x10 [ 159.534507][T12116] ? __rcu_read_unlock+0x4e/0x70 [ 159.539524][T12116] ? __fget_files+0x1d4/0x210 [ 159.544229][T12116] __secure_computing+0x9f/0x1c0 [ 159.549259][T12116] syscall_trace_enter+0xd1/0x1f0 [ 159.554358][T12116] ? fpregs_assert_state_consistent+0x83/0xa0 [ 159.560441][T12116] do_syscall_64+0xaa/0x1c0 [ 159.565008][T12116] ? clear_bhb_loop+0x55/0xb0 [ 159.569690][T12116] ? clear_bhb_loop+0x55/0xb0 [ 159.574375][T12116] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 159.580364][T12116] RIP: 0033:0x7f5fe625e719 [ 159.584778][T12116] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 159.604392][T12116] RSP: 002b:00007f5fe4ed1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 159.612864][T12116] RAX: ffffffffffffffda RBX: 00007f5fe6415f80 RCX: 00007f5fe625e719 [ 159.620916][T12116] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: ffffffffffffffff [ 159.628904][T12116] RBP: 00007f5fe4ed1090 R08: 0000000000000000 R09: 0000000000000000 [ 159.636896][T12116] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 159.644881][T12116] R13: 0000000000000000 R14: 00007f5fe6415f80 R15: 00007fff793987d8 [ 159.652860][T12116] Nov 5 01:51:39 syzkaller kern.notice kernel: [ 159.364983][T12116] FAULT_INJECTION: forcing a failure. Nov 5 01:51:39 syzkaller kern.notice kernel: [ 159.364983][T12116] name failslab, interval 1, probability 0, space 0, times 0 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.377668][T12116] CPU: 0 UID: 0 PID: 12116 Comm: syz.5.2761 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.389742][T12116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.401165][T12116] Call Trace: Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.404445][T12116] Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.408754][T12116] dump_stack_lvl+0xf2/0x150 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.414711][T12116] dump_stack+0x15/0x20 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.420275][T12116] should_fail_ex+0x223/0x230 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.426268][T12116] ? sidtab_sid2str_get+0xb8/0x140 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.432742][T12116] should_failslab+0x8f/0xb0 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.438789][T12116] __kmalloc_node_track_caller_noprof+0xa6/0x380 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.446482][T12116] ? vsnprintf+0xdd8/0xe30 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.452315][T12116] kmemdup_noprof+0x2a/0x60 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.458214][T12116] sidtab_sid2str_get+0xb8/0x140 Nov 5 [ 159.805741][T12133] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12133 comm=syz.1.2768 01:51:39 syzkaller kern.warn kernel: [ 159.463200][T12116] security_sid_to_context_core+0x1eb/0x2f0 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.470534][T12116] security_sid_to_context+0x27/0x30 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.477212][T12116] selinux_secid_to_secctx+0x22/0x30 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.483883][T12116] security_secid_to_secct[ 159.853245][T12133] FAULT_INJECTION: forcing a failure. [ 159.853245][T12133] name fail_usercopy, interval 1, probability 0, space 0, times 0 x+0x48/0x90 Nov[ 159.867233][T12133] CPU: 1 UID: 0 PID: 12133 Comm: syz.1.2768 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 [ 159.876237][T12143] FAULT_INJECTION: forcing a failure. [ 159.876237][T12143] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 159.879113][T12133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 159.879130][T12133] Call Trace: [ 159.879139][T12133] [ 159.908492][T12133] dump_stack_lvl+0xf2/0x150 [ 159.913238][T12133] dump_stack+0x15/0x20 [ 159.917404][T12133] should_fail_ex+0x223/0x230 [ 159.922212][T12133] should_fail+0xb/0x10 [ 159.926426][T12133] should_fail_usercopy+0x1a/0x20 [ 159.931478][T12133] _copy_from_user+0x1e/0xb0 [ 159.936156][T12133] kstrtouint_from_user+0x76/0xe0 [ 159.941237][T12133] ? 0xffffffff81000000 [ 159.945411][T12133] ? selinux_file_permission+0x22a/0x360 [ 159.951068][T12133] proc_fail_nth_write+0x4f/0x150 [ 159.956119][T12133] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 159.961778][T12133] vfs_write+0x281/0x920 [ 159.966069][T12133] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 159.971687][T12133] ? __rcu_read_unlock+0x4e/0x70 [ 159.976654][T12133] ? __fget_files+0x1d4/0x210 [ 159.981401][T12133] ? ksys_write+0xb8/0x1b0 [ 159.985940][T12133] ksys_write+0xeb/0x1b0 [ 159.990221][T12133] __x64_sys_write+0x42/0x50 [ 159.994847][T12133] x64_sys_call+0x27dd/0x2d60 [ 159.999584][T12133] do_syscall_64+0xc9/0x1c0 [ 160.004134][T12133] ? clear_bhb_loop+0x55/0xb0 [ 160.008898][T12133] ? clear_bhb_loop+0x55/0xb0 [ 160.013596][T12133] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 160.019530][T12133] RIP: 0033:0x7f839dced1ff [ 160.023997][T12133] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 [ 160.043618][T12133] RSP: 002b:00007f839c967030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 160.052090][T12133] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f839dced1ff [ 160.060063][T12133] RDX: 0000000000000001 RSI: 00007f839c9670a0 RDI: 0000000000000007 [ 160.068073][T12133] RBP: 00007f839c967090 R08: 0000000000000000 R09: 0000000000000000 [ 160.076127][T12133] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 160.084101][T12133] R13: 0000000000000000 R14: 00007f839dea5f80 R15: 00007ffe35ddc448 [ 160.092111][T12133] 5 01:51:39 syz[ 160.095133][T12143] CPU: 0 UID: 0 PID: 12143 Comm: syz.0.2773 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 kaller kern.warn kernel: [ 159.490635][T12116] audit_log_task_context+0x8c/0x1b0 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.497328][T12116] audit_log_task+0xfb/0x180 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.503308][T12116] audit_seccomp+0x68/0x130 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.509188][T12116] __seccomp_filter+0x6fa/0x1180 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.515530][T12116] ? __pfx_proc_fail_nth_write+0x10/0x10 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 15[ 160.107306][T12143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 9.522596][T12116] ? vfs_write+0x596/0x920 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.528445][T12116] ? __pfx_kfree_link+0x10/0x10 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.534507][T12116] ? __rcu_read_u[ 160.107366][T12143] Call Trace: nlock+0x4e/0x70 Nov 5 01:51:39 syzkaller kern.[ 160.107374][T12143] warn kernel: [ 159.539524][T12116] ? __fget_files+0x1d4/0x210 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.544229][T12116] __secure_computing+0x9f/0x1c0 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.549259][T12116] syscall_[ 160.107384][T12143] dump_stack_lvl+0xf2/0x150 trace_enter+0xd1/0x1f0 Nov 5 01:51:39 syzkalle[ 160.107418][T12143] dump_stack+0x15/0x20 r kern.warn kernel: [ 159.55435[ 160.107446][T12143] should_fail_ex+0x223/0x230 8][T12116] ? fpregs_assert_state_consistent+0x83/0xa0 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.56044[ 160.107490][T12143] should_fail+0xb/0x10 1][T12116] do_syscall_64+0xaa/0x1c0 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.565008][T12116] ? clea[ 160.107561][T12143] should_fail_usercopy+0x1a/0x20 r_bhb_loop+0x55/0xb0 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.569690][T12116] ? clear_bhb_loop+0x55/0xb0 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.574375][T12116] entry_[ 160.107587][T12143] _copy_from_user+0x1e/0xb0 SYSCALL_64_after_hwframe+0x77/0x7f Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.580364][T12116] RIP: 0033:0x7f5fe625e719 Nov 5 01:51:39[ 160.107619][T12143] __sys_bpf+0x14e/0x7a0 syzkaller kern.warn kernel: [ 159.584778][T12116] Code: ff ff [ 160.107661][T12143] __x64_sys_bpf+0x43/0x50 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca[ 160.107732][T12143] x64_sys_call+0x2625/0x2d60 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Nov 5 01:51:39 syzkaller kern.warn[ 160.107767][T12143] do_syscall_64+0xc9/0x1c0 kernel: [ 159.604392][T12116] RSP: 002b:00007f[ 160.107872][T12143] ? clear_bhb_loop+0x55/0xb0 5fe4ed1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.61286[ 160.107898][T12143] ? clear_bhb_loop+0x55/0xb0 4][T12116] RAX: ffffffffffffffdaNov 5 01:51:39 syzkaller kern.warn kernel: [ 159.805741][T12133] SELinux: unrecognized netlink[ 160.107924][T12143] entry_SYSCALL_64_after_hwframe+0x77/0x7f message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12133 comm=syz.1.2768 [ 160.107992][T12143] RIP: 0033:0x7f296e84e719 [ 160.108011][T12143] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 160.108047][T12143] RSP: 002b:00007f296d4c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 160.108073][T12143] RAX: ffffffffffffffda RBX: 00007f296ea05f80 RCX: 00007f296e84e719 [ 160.108089][T12143] RDX: 0000000000000020 RSI: 00000000200002c0 RDI: 0000000000000003 [ 160.108106][T12143] RBP: 00007f296d4c7090 R08: 0000000000000000 R09: 0000000000000000 [ 160.108122][T12143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 160.108139][T12143] R13: 0000000000000000 R14: 00007f296ea05f80 R15: 00007ffebe4962e8 [ 160.108202][T12143] Nov 5 01:51:39 syzkaller kern.notice kernel: [ 159.853245][T12133] FAULT_INJECTION: forcing a failure. Nov 5 01:51:39 syzkaller kern.notice kernel: [ 159.853245][T12133] name fail_usercopy, interval 1, probability 0, space 0, times 0 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.867233][T12133] CPU: 1 UID: 0 PID: 12133 Comm: syz.1.2768 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 Nov 5 01:51:39 syzkaller kern.notice kernel: [ 159.876237][T12143] FAULT_INJECTION: forcing a failure. Nov 5 01:51:39 syzkaller kern.notice kernel: [ 159.876237][T12143] name fail_usercopy, interval 1, probability 0, space 0, times 0 Nov 5 01:51:39 syzkaller [ 160.637707][T12185] pim6reg1: entered promiscuous mode kern.warn kernel[ 160.643411][T12185] pim6reg1: entered allmulticast mode : [ 159.879113][T12133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.879130][T12133] Call Trace: Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.879139][T12133] Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.908492][T12133] dump_stack_lvl+0xf2/0x150 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.913238][T12133] dump_stack+0x15/0x20 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.917404][T12133] should_fail_ex+0x223/0x230 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.922212][T12133] should_fail+0xb/0x10 Nov 5 01:51:39 syzkaller kern.warn kernel: [ 159.926426][T12133] should_fail_usercopy+0x1a/0x20 Nov 5 01:51:40 syzkaller kern.warn kernel: [ 159.931478][T12133] _copy_from_user+0x1e/0xb0 Nov 5 01:51:40 syzkaller kern.warn kernel: [ 159.936156][T12133] kstrtouint_from_user+0x76/0xe0 Nov 5 01:51:40 syzkaller kern.warn kernel: [ 159.941237][T12133] ? 0xffffffff81000000 Nov 5 01:51:40 syzkaller kern.warn kernel: [ 159.945411][T12133] ? selinux_file_permission+0x22a/0x360 Nov 5 01:51:40 syzkaller kern.warn kernel: [ 159.951068][T12133] proc_fail_nth_write+0x4f/0x150 Nov 5 01:51:40 syzkaller kern.warn kernel: [ 159.956119][T12133] ? __pfx_proc_fail_nth_write+0x10/0x10 Nov 5 01:51:40 syzkaller kern.warn kernel: [ 159.961778][T12133] vfs_write+0x281/0x920 Nov 5 01:51:40 syzkaller kern.warn kernel: [ 159.966069][T12133] ? __pfx_proc_fail_nth_read+0x10/0x10 Nov 5 01:51:40 syzkaller kern.warn kernel: [ 159.971687][T12133] ? __rcu_read_unlock+0x4e/0x70 Nov 5 01:51:40 syzkaller kern.warn kernel: [ 159.976654][T12133] ? __fget_files+0x1d4/0x210 Nov 5 01:51:40 syzkaller kern.warn kernel: [ 159.981401][T12133] ? ksys_write+0xb8/0x1b0 Nov 5 01:51:40 syzkaller kern.warn kernel: [ 159.985940][T12133] ksys_write+0xeb/0x1b0 Nov 5 01:51:40 syzkaller kern.warn kernel: [ 159.990221][T12133] __x64_sys_write+0x42/0x50 Nov 5 01:51:40 syzkaller kern.warn kernel: [ 159.994847][T12133] x64_sys_call+0x27dd/0x2d60 Nov 5 01:51:40 syzkaller kern.warn kernel: [ 159.999584][T12133] do_syscall_64+0xc9/0x1c0 Nov 5 01:51:40 syzkaller kern.warn kernel: [ 160.004134][T12133] ? clear_bhb_loop+0x55/0xb0 Nov 5 01:51:40 syzkaller kern.warn kernel: [ 160.008898][T12133] ? clear_bhb_loop+0x55/0xb0 Nov 5 01:51:40 syzkaller kern.warn kernel: [ 160.013596][T12133] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 5 01:51:40 syzkaller kern.warn kernel: [ 160.019530][T12133] RIP: 0033:0x7f839dced1ff Nov 5 01:51:40 syzkaller kern.warn kernel: [ 160.023997][T12133] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48 Nov 5 01:51:40 syzkaller kern.warn kernel: [ 160.043618][T12133] RSP: 002b:00007f839c967030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 Nov 5 01:51:40 syzkaller kern.warn kernel: [ 160.052090][T12133] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f839dced1ff Nov 5 01:51:40 syzkaller kern.warn kernel: [ 160.060063][T12133] RDX: 0000000000000001 RSI: 00007f839c9670a0 RDI: 0000000000000007 Nov 5 01:51:40 syzkaller kern.warn kernel: [ 160.068073][T12133] RBP: 00007f839c967090 R08: 0000000000000000 R09: 0000000000000000 Nov 5 01:51:40 syzkaller kern.warn kernel: [ 160.076127][T12133] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 Nov 5 01:51:40 syzkaller kern.warn kernel: [ 160.084101][T12133] R13: 0000000000000000 R14: 00007f839dea5Nov 5 01:51:40 Nov 5 01:51:40 Nov 5 01:51:40 Nov 5 01:51:40 syzkaller kern.wNov 5 01:51:40 Nov 5 01:51:40 Nov 5 01:51:40 syzkaller kern.info kernel: [ 160.637707][T12185] pim6reg1: entered promiscuous mode Nov 5 01:51:40 syzkaller kern.info kernel: [ 160.643411][T12185] pim6reg1: entered allmulticast mode [ 161.147805][T12202] FAULT_INJECTION: forcing a failure. [ 161.147805][T12202] name failslab, interval 1, probability 0, space 0, times 0 [ 161.160476][T12202] CPU: 1 UID: 0 PID: 12202 Comm: syz.3.2798 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 [ 161.171240][T12202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 161.181369][T12202] Call Trace: [ 161.184720][T12202] [ 161.187660][T12202] dump_stack_lvl+0xf2/0x150 [ 161.192277][T12202] dump_stack+0x15/0x20 [ 161.196493][T12202] should_fail_ex+0x223/0x230 [ 161.201194][T12202] ? vm_area_dup+0x2c/0x130 [ 161.205695][T12202] should_failslab+0x8f/0xb0 [ 161.210369][T12202] kmem_cache_alloc_noprof+0x4c/0x290 [ 161.215767][T12202] ? number+0x98d/0xa90 [ 161.219932][T12202] vm_area_dup+0x2c/0x130 [ 161.224341][T12202] __split_vma+0xf7/0x6a0 [ 161.228713][T12202] vma_modify+0x217/0xcd0 [ 161.233203][T12202] ? ttwu_do_activate+0x1fb/0x240 [ 161.238224][T12202] ? _raw_spin_unlock_irqrestore+0x2b/0x60 [ 161.244042][T12202] vma_modify_flags+0xf1/0x120 [ 161.248831][T12202] mlock_fixup+0x113/0x450 [ 161.253334][T12202] apply_vma_lock_flags+0x194/0x240 [ 161.258545][T12202] do_mlock+0x35b/0x510 [ 161.262804][T12202] ? __secure_computing+0x9f/0x1c0 [ 161.267966][T12202] __x64_sys_mlock+0x36/0x40 [ 161.272733][T12202] x64_sys_call+0x822/0x2d60 [ 161.277380][T12202] do_syscall_64+0xc9/0x1c0 [ 161.282001][T12202] ? clear_bhb_loop+0x55/0xb0 [ 161.286704][T12202] ? clear_bhb_loop+0x55/0xb0 [ 161.291447][T12202] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 161.297371][T12202] RIP: 0033:0x7f2da2f7e719 [ 161.301804][T12202] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 161.321437][T12202] RSP: 002b:00007f2da1bf1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 161.329864][T12202] RAX: ffffffffffffffda RBX: 00007f2da3135f80 RCX: 00007f2da2f7e719 [ 161.337860][T12202] RDX: 0000000000000000 RSI: 0000000000003000 RDI: 0000000020ffa000 [ 161.345840][T12202] RBP: 00007f2da1bf1090 R08: 0000000000000000 R09: 0000000000000000 [ 161.353857][T12202] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 161.361916][T12202] R13: 0000000000000000 R14: 00007f2da3135f80 R15: 00007ffe8783e828 [ 161.369937][T12202] [ 161.400580][ T29] kauditd_printk_skb: 1765 callbacks suppressed [ 161.400596][ T29] audit: type=1326 audit(1730771501.082:32758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12168 comm="syz.0.2784" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f296e84e719 code=0x7ffc0000 Nov 5 01:51:41 syzkaller kern.notice kernel: [ 161.147805][T12202] FAULT_INJEC[ 161.456287][ C1] bridge0: received packet on geneve0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) TION: forcing a failure. Nov 5[ 161.470120][ T2997] audit: audit_backlog=65 > audit_backlog_limit=64 01:51:41 syzkal[ 161.477210][ T2997] audit: audit_lost=91 audit_rate_limit=0 audit_backlog_limit=64 ler kern.notice [ 161.479479][ T29] audit: type=1326 audit(1730771501.082:32759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12168 comm="syz.0.2784" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f296e84e719 code=0x7ffc0000 kernel: [ 161.1[ 161.486261][ T2997] audit: backlog limit exceeded 47805][T12202] n[ 161.511107][ T29] audit: type=1326 audit(1730771501.092:32760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12201 comm="syz.3.2798" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f2da2f7d15c code=0x7ffc0000 ame failslab, in[ 161.511207][ T29] audit: type=1326 audit(1730771501.092:32761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12201 comm="syz.3.2798" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f2da2f7d1ff code=0x7ffc0000 terval 1, probab[ 161.566769][ T29] audit: type=1326 audit(1730771501.092:32762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12201 comm="syz.3.2798" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f2da2f7d3aa code=0x7ffc0000 ility 0, space 0[ 161.566803][ T29] audit: type=1326 audit(1730771501.092:32763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12201 comm="syz.3.2798" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2da2f7e719 code=0x7ffc0000 , times 0 Nov [ 161.616376][ T29] audit: type=1326 audit(1730771501.092:32764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12201 comm="syz.3.2798" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2da2f7e719 code=0x7ffc0000 5 01:51:41 syzkaller kern.warn kernel: [ 161.160476][T12202] CPU: 1 UID: 0 PID: 12202 Comm: syz.3.2798 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.171240][T12202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.181369][T12202] Call Trace: Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.184720][T12202] Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.187660][T12202] dump_stack_lvl+0xf2/0x150 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.192277][T12202] dump_stack+0x15/0x20 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.196493][T12202] should_fail_ex+0x223/0x230 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.201194][T12202] ? vm_area_dup+0x2c/0x130 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.205695][T12202] should_failslab+0x8f/0xb0 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.210369][T12202] kmem_cache_alloc_noprof+0x4c/0x290 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.215767][T12202] ? number+0x98d/0xa90 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.219932][T12202] vm_area_dup+0x2c/0x130 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.224341][T12202] __split_vma+0xf7/0x6a0 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.228713][T12202] vma_modify+0x217/0xcd0 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.233203][T12202] ? ttwu_do_activate+0x1fb/0x240 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.238224][T12202] ? _raw_spin_unlock_irqrestore+0x2b/0x60 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.244042][T12202] vma_modify_flags+0xf1/0x120 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.248831][T12202] mlock_fixup+0x113/0x450 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.253334][T12202] apply_vma_lock_flags+0x194/0x240 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.258545][T12202] do_mlock+0x35b/0x510 Nov 5 01:51:41 syzkaller kern.warn kernel[ 161.819871][ T5477] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. : [ 161.262804][T12202] ? __secure_computing+0x9f/0x1c0 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.267966][T12202] __x64_sys_mlock+0x36/0x40 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.272733][T12202] x64_sys_call+0x822/0x2d60 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.277380][T12202] do_syscall_64+0xc9/0x1c0 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.282001][T12202] ? clear_bhb_loop+0x55/0xb0 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.286704][T12202] ? clear_bhb_loop+0x55/0xb0 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.291447][T12202] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.297371][T12202] RIP: 0033:0x7f2da2f7e719 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.301804][T12202] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.321437][T12202] RSP: 002b:00007f2da1bf1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.329864][T12202] RAX: ffffffffffffffda RBX: 00007f2da3135f80 RCX: 00007f2da2f7e719 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.337860][T12202] RDX: 0000000000000000 RSI: 0000000000003000 RDI: 0000000020ffa000 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.345840][T12202] RBP: 00007f2da1bf1090 R08: 0000000000000000 R09: 0000000000000000 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.353857][T12202] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.361916][T12202] R13: 0000000000000000 R14: 00007f2da3135f80 R15: 00007ffe8783e828 Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.369937][T12202] Nov 5 01:51:41 syzkaller kern.warn kernel: [ 161.400580][ T29] kauditd_printk_skb: 1765 callbacks suppressed Nov 5 01:51:41 syzkaller kern.notice kernel: [ 161.400596][ T29] audit: type=1326 audit(1730771501.082:32758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12168 comm="syz.0.2784" exe="/root/syz-executor" sig=0 arch=c000003e syscallNov 5 01:51:41 Nov 5 01:51:41 Nov 5 01:51:41 syzkaller kern.notice kernel: [ 161.511207][ T29] audit: type=1326 audit(1730771501.092:32761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12201 comm="syz.3.Nov 5 01:51:41 Nov 5 01:51:41 syzkaller kern.info kernel: [ 161.819871][ T547[ 162.057784][ T57] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 7] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. Nov 5 01:51:41 syzkaller kern.info kernel: [ 162.057784][ T57] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 162.102256][ T57] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 Nov 5 01:51:41 syzkaller kern.info kernel: [ 162.102256][ T57] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 162.162389][ T57] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 Nov 5 01:51:41 syzkaller kern.info kernel: [ 162.162389][ T57] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 162.202350][ T57] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 Nov 5 01:51:41 syzkaller kern.info kernel: [ 162.202350][ T57] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 162.287918][ T57] bridge_slave_1: left allmulticast mode [ 162.293665][ T57] bridge_slave_1: left promiscuous mode [ 162.299348][ T57] bridge0: port 2(bridge_slave_1) entered disabled state Nov 5 01:51:41 syzkaller kern.info kernel: [ 1[ 162.313130][ T57] bridge_slave_0: left allmulticast mode 62.287918][ T5[ 162.319498][ T57] bridge_slave_0: left promiscuous mode 7] bridge_slave_[ 162.326527][ T57] bridge0: port 1(bridge_slave_0) entered disabled state 1: left allmulticast mode Nov 5 01:51:41 syzkaller kern.info kernel: [ 162.293665][ T57] bridge_slave_1: left promiscuous mode Nov 5 01:51:41 syzkaller kern.info kernel: [ 162.299348][ T57] bridge0: port 2(bridge_slave_1) entered disabled state Nov 5 01:51:42 syzkaller kern.info kernel: [ 162.313130][ T57] bridge_slave_0: left allmulticast mode Nov 5 01:51:42 syzkaller kern.info kernel: [ 162.319498][ T57] bridge_slave_0: left promiscuous mode Nov 5 01:51:42 syzkaller kern.info kernel: [ 162.326527][ T57] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.421828][ T57] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 162.432083][ T57] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface Nov 5 01:51:42 syzkaller kern.i[ 162.443104][ T57] bond0 (unregistering): Released all slaves nfo kernel: [ 162.421828][ T57] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface Nov 5 01:51:42 syzkaller kern.info kernel: [ 162.432083][ T57] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface Nov 5 01:51:42 syzkaller kern.info kernel: [ 162.443104][ T57] bond0 (unregistering): Released all slaves [ 162.503066][ T57] hsr_slave_0: left promiscuous mode [ 162.508693][ T57] hsr_slave_1: left promiscuous mode Nov 5 01:51:42 [ 162.515404][ T57] batman_adv: batadv0: Interface deactivated: batadv_slave_0 syzkaller kern.i[ 162.524278][ T57] batman_adv: batadv0: Removing interface: batadv_slave_0 nfo kernel: [ 1[ 162.533302][ T57] batman_adv: batadv0: Interface deactivated: batadv_slave_1 62.503066][ T5[ 162.541546][ T57] batman_adv: batadv0: Removing interface: batadv_slave_1 7] hsr_slave_0: [ 162.550138][ T57] veth1_macvtap: left promiscuous mode left promiscuous[ 162.550162][ T57] veth0_macvtap: left promiscuous mode mode Nov 5 01[ 162.550214][ T57] veth1_vlan: left promiscuous mode :51:42 syzkaller[ 162.550307][ T57] veth0_vlan: left promiscuous mode kern.info kernel: [ 162.508693][ T57] hsr_slave_1: left promiscuous mode Nov 5 01:51:42 syzkaller kern.info kernel: [ 162.515404][ T57] batman_adv: batadv0: Interface deactivated: batadv_slave_0 Nov 5 01:51:42 syzkaller kern.info kernel: [ 162.524278][ T57] batman_adv: batadv0: Removing interface: batadv_slave_0 Nov 5 01:51:42 syzkaller kern.info kernel: [ 162.533302][ T57] batman_adv: batadv0: Interface deactivated: batadv_slave_1 Nov 5 01:51:42 syzkaller kern.info kernel: [ 162.541546][ T57] batman_adv: batadv0: Removing interface: batadv_slave_1 Nov 5 01:51:42 syzkaller kern.info kernel: [ 162.550138][ T57] veth1_macvtap: left promiscuous mode Nov 5 01:51:42 syzkaller kern.info kernel: [ 162.550162][ T57] veth0_macvtap: left promiscuous mode Nov 5 01:51:42 syzkaller kern.info kernel: [ 162.550214][ T57] veth1_vlan: left promiscuous mode Nov 5 01:51:42 syzk[ 162.655404][ T57] team0 (unregistering): Port device team_slave_1 removed aller kern.info kernel: [ 162.550307][ T57] v[ 162.666221][ T57] team0 (unregistering): Port device team_slave_0 removed eth0_vlan: left promiscuous mode Nov 5 01:51:42 syzkaller kern.info kernel: [ 162.655404][ T57] team0 (unregistering): Port device team_slave_1 removed Nov 5 01:51:42 syzkaller kern.info kernel: [ 162.666221][ T57] team0 (unregistering): Port device team_slave_0 removed [ 165.039083][T12279] FAULT_INJECTION: forcing a failure. [ 165.039083][T12279] name failslab, interval 1, probability 0, space 0, times 0 [ 165.051757][T12279] CPU: 1 UID: 0 PID: 12279 Comm: syz.2.2822 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 [ 165.062533][T12279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 165.072665][T12279] Call Trace: [ 165.075942][T12279] [ 165.078884][T12279] dump_stack_lvl+0xf2/0x150 [ 165.083551][T12279] dump_stack+0x15/0x20 [ 165.087707][T12279] should_fail_ex+0x223/0x230 [ 165.092402][T12279] ? sidtab_sid2str_get+0xb8/0x140 [ 165.097560][T12279] should_failslab+0x8f/0xb0 [ 165.102174][T12279] __kmalloc_node_track_caller_noprof+0xa6/0x380 [ 165.108570][T12279] kmemdup_noprof+0x2a/0x60 [ 165.113096][T12279] sidtab_sid2str_get+0xb8/0x140 [ 165.118058][T12279] security_sid_to_context_core+0x1eb/0x2f0 [ 165.124051][T12279] security_sid_to_context+0x27/0x30 [ 165.129404][T12279] avc_audit_post_callback+0x10d/0x530 [ 165.134975][T12279] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 165.141064][T12279] common_lsm_audit+0x7cc/0xfc0 [ 165.146140][T12279] ? path_openat+0x1a5a/0x1fa0 [ 165.150929][T12279] slow_avc_audit+0xf9/0x140 [ 165.155718][T12279] selinux_capable+0x1a0/0x260 [ 165.160550][T12279] security_capable+0x81/0x90 [ 165.165248][T12279] capable+0x4c/0xb0 [ 165.169154][T12279] alarm_timer_nsleep+0xdf/0x370 [ 165.174192][T12279] ? __pfx_kfree_link+0x10/0x10 [ 165.179119][T12279] __se_sys_clock_nanosleep+0x20a/0x240 [ 165.184760][T12279] __x64_sys_clock_nanosleep+0x55/0x70 [ 165.190232][T12279] x64_sys_call+0x253f/0x2d60 [ 165.194939][T12279] do_syscall_64+0xc9/0x1c0 [ 165.199467][T12279] ? clear_bhb_loop+0x55/0xb0 [ 165.204176][T12279] ? clear_bhb_loop+0x55/0xb0 [ 165.209001][T12279] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 165.214931][T12279] RIP: 0033:0x7f41b232e719 [ 165.219357][T12279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 165.239014][T12279] RSP: 002b:00007f41b0f5f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000e6 [ 165.247572][T12279] RAX: ffffffffffffffda RBX: 00007f41b24e6130 RCX: 00007f41b232e719 [ 165.255579][T12279] RDX: 00000000200007c0 RSI: 0000000000000000 RDI: 0000000000000009 [ 165.263585][T12279] RBP: 00007f41b0f5f090 R08: 0000000000000000 R09: 0000000000000000 [ 165.271582][T12279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 165.279560][T12279] R13: 0000000000000000 R14: 00007f41b24e6130 R15: 00007fff598c5da8 [ 165.287603][T12279] Nov 5 01:51:44 syzkaller kern.notice kernel: [ 165.039083][T12279] FAULT_INJECTION: forcing a failure. Nov 5 01:51:44 syzkaller kern.notice kernel: [ 165.039083][T12279] name failslab, interval 1, probability 0, space 0, times 0 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.051757][T12279] CPU: 1 UID: 0 PID: 12279 Comm: syz.2.2822 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.062533][T12279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.072665][T12279] Call Trace: Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.075942][T12279] Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.078884][T12279] dump_stack_lvl+0xf2/0x150 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.083551][T12279] dump_stack+0x15/0x20 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.087707][T12279] should_fail_ex+0x223/0x230 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.092402][T12279] ? sidtab_sid2str_get+0xb8/0x140 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.097560][T12279] should_failslab+0x8f/0xb0 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.102174][T12279] __kmalloc_node_track_caller_noprof+0xa6/0x380 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.108570][T12279] kmemdup_noprof+0x2a/0x60 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.113096][T12279] sidtab_sid2str_get+0xb8/0x140 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.118058][T12279] security_sid_to_context_core+0x1eb/0x2f0 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.124051][T12279] security_sid_to_context+0x27/0x30 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.129404][T12279] avc_audit_post_callback+0x10d/0x530 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.134975][T12279] ? __pfx_avc_audit_post_callback+0x10/0x10 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.141064][T12279] common_lsm_audit+0x7cc/0xfc0 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.146140][T12279] ? path_openat+0x1a5a/0x1fa0 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.150929][T12279] slow_avc_audit+0xf9/0x140 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.155718][T12279] selinux_capable+0x1a0/0x260 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.160550][T12279] security_capable+0x81/0x90 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.165248][T12279] capable+0x4c/0xb0 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.169154][T12279] alarm_timer_nsleep+0xdf/0x370 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.174192][T12279] ? __pfx_kfree_link+0x10/0x10 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.179119][T12279] __se_sys_clock_nanosleep+0x20a/0x240 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.184760][T12279] __x64_sys_clock_nanosleep+0x55/0x70 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.190232][T12279] x64_sys_call+0x253f/0x2d60 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.194939][T12279] do_syscall_64+0xc9/0x1c0 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.199467][T12279] ? clear_bhb_loop+0x55/0xb0 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.204176][T12279] ? clear_bhb_loop+0x55/0xb0 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.209001][T12279] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.214931][T12279] RIP: 0033:0x7f41b232e719 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.219357][T12279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.239014][T12279] RSP: 002b:00007f41b0f5f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000e6 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.247572][T12279] RAX: ffffffffffffffda RBX: 00007f41b24e6130 RCX: 00007f41b232e719 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.255579][T12279] RDX: 00000000200007c0 RSI: 0000000000000000 RDI: 0000000000000009 Nov 5 01:51:44 syzkaller kern.warn kernel: [ 165.263585][T12279] RBP: 0Nov 5 01:51:44 [ 166.836941][ T29] kauditd_printk_skb: 432 callbacks suppressed [ 166.836955][ T29] audit: type=1400 audit(1730771506.502:33197): avc: denied { execmem } for pid=12289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Nov 5 01:51:46 [ 166.864324][ T29] audit: type=1400 audit(1730771506.502:33198): avc: denied { prog_load } for pid=12292 comm="syz.3.2831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 syzkaller kern.w[ 166.868006][T12297] audit: audit_backlog=65 > audit_backlog_limit=64 arn kernel: [ 1[ 166.884721][ T29] audit: type=1400 audit(1730771506.502:33199): avc: denied { map_create } for pid=12292 comm="syz.3.2831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 66.836941][ T2[ 166.892413][T12297] audit: audit_lost=92 audit_rate_limit=0 audit_backlog_limit=64 9] kauditd_print[ 166.892433][T12297] audit: backlog limit exceeded k_skb: 432 callb[ 166.900046][T12297] audit: audit_backlog=65 > audit_backlog_limit=64 acks suppressed[ 166.913224][ T29] audit: type=1400 audit(1730771506.502:33200): avc: denied { create } for pid=12292 comm="syz.3.2831" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 Nov 5 01:51:46[ 166.922292][T12297] audit: audit_lost=93 audit_rate_limit=0 audit_backlog_limit=64 syzkaller kern.[ 166.922326][T12297] audit: backlog limit exceeded notice kernel: [ 166.836955][ T29] audit: type=1400 audit(1730771506.502:33197): avc: denied { execmem } for pid=12289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Nov 5 01:51:46 syzkaller kern.notice kernel: [ 166.864324][ T29] audit: type=1400 audit(1730771506.502:33198): avc: denied { prog_load } for pid=12292 comm="syz.3.2831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 5 01:51:46 syzkaller kern.warn kernel: [ 166.868006][T12297] audit: audit_backlog=65 > audit_backlog_limit=64 Nov 5 01:51:46 syzkaller kern.notice kernel: [ 166.884721][ T29] audit: type=1400 audit(1730771506.502:33199): avc: denied { map_create } for pid=12292 comm="syz.3.2831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 5 01:51:46 syzkaller kern.warn kernel: [ 166.892413][T12297] audit: audit_lost=92 audit_rate_limit=0 audit_backlog_limit=64 Nov 5 01:51:46 syzkaller kern.err kernel: [ 166.892433][T12297] audit: backlog limit exceeded Nov 5 01:51:46 syzkaller kern.warn kernel: [ 166.900046][T12297] audit: audit_backlog=65 > audit_backlog_limit=64 Nov 5 01:51:46 syzkaller kern.notice kernel: [ 166.913224][ T29] audit: type=1400 audit(1730771506.502:33200): avc: denied { create } for pid=12292 comm="syz.3.2831" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inod Nov 5 01:51:46 syzkaller kern.warn kernel: [ 166.922292][T12297] audit: audit_lost=93 audit_rate_limit=0 audit_backlog_limit=64 Nov 5 01:51:46 syzkaller [ 167.118761][ C1] bridge0: received packet on geneve0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) kern.err kernel: [ 166.922326][T12297] audit: backlog limit exceeded Nov 5 01:51:46 syzkaller kern.warn kernel: [ 167.118761][ C1] bridge0: received packet on geneve0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 167.973523][T12309] FAULT_INJECTION: forcing a failure. [ 167.973523][T12309] name failslab, interval 1, probability 0, space 0, times 0 [ 167.986180][T12309] CPU: 0 UID: 0 PID: 12309 Comm: syz.2.2835 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 [ 167.997077][T12309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 168.007145][T12309] Call Trace: [ 168.010466][T12309] [ 168.013527][T12309] dump_stack_lvl+0xf2/0x150 [ 168.018200][T12309] dump_stack+0x15/0x20 [ 168.022428][T12309] should_fail_ex+0x223/0x230 [ 168.027175][T12309] ? __alloc_skb+0x10b/0x310 [ 168.031870][T12309] should_failslab+0x8f/0xb0 [ 168.036519][T12309] kmem_cache_alloc_node_noprof+0x51/0x2b0 [ 168.042385][T12309] __alloc_skb+0x10b/0x310 [ 168.046829][T12309] audit_log_start+0x368/0x6b0 [ 168.051596][T12309] audit_seccomp+0x4b/0x130 [ 168.056175][T12309] __seccomp_filter+0x6fa/0x1180 [ 168.061351][T12309] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 168.067064][T12309] ? vfs_write+0x596/0x920 [ 168.071490][T12309] ? handle_mm_fault+0x170a/0x2aa0 [ 168.076662][T12309] ? __rcu_read_unlock+0x4e/0x70 [ 168.081617][T12309] ? __fget_files+0x1d4/0x210 [ 168.086304][T12309] __secure_computing+0x9f/0x1c0 [ 168.091261][T12309] syscall_trace_enter+0xd1/0x1f0 [ 168.096316][T12309] ? fpregs_assert_state_consistent+0x83/0xa0 [ 168.102418][T12309] do_syscall_64+0xaa/0x1c0 [ 168.107068][T12309] ? clear_bhb_loop+0x55/0xb0 [ 168.111843][T12309] ? clear_bhb_loop+0x55/0xb0 [ 168.116603][T12309] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 168.122590][T12309] RIP: 0033:0x7f41b232e719 [ 168.127017][T12309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 168.146635][T12309] RSP: 002b:00007f41b0fa1038 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 168.155155][T12309] RAX: ffffffffffffffda RBX: 00007f41b24e5f80 RCX: 00007f41b232e719 [ 168.163129][T12309] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000029 [ 168.171225][T12309] RBP: 00007f41b0fa1090 R08: 0000000000000000 R09: 0000000000000000 [ 168.179197][T12309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 168.187186][T12309] R13: 0000000000000000 R14: 00007f41b24e5f80 R15: 00007fff598c5da8 [ 168.195240][T12309] Nov 5 01:51:47 syzkaller kern.notice kernel: [ 167.973523][T12309] FAULT_INJECTION: forcing a failure. Nov 5 01:51:47 syzkaller kern.notice kernel: [ 167.973523][T12309] name failslab, interval 1, probability 0, space 0, times 0 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 167.986180][T12309] CPU: 0 UID: 0 PID: 12309 Comm: syz.2.2835 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 167.997077][T12309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.007145][T12309] Call Trace: Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.010466][T12309] Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.013527][T12309] dump_stack_lvl+0xf2/0x150 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.018200][T12309] dump_stack+0x15/0x20 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.022428][T12309] should_fail_ex+0x223/0x230 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.027175][T12309] ? __alloc_skb+0x10b/0x310 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.031870][T12309] should_failslab+0x8f/0xb0 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.036519][T12309] kmem_cache_alloc_node_noprof+0x51/0x2b0 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.042385][T12309] __alloc_skb+0x10b/0x310 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.046829][T12309] audit_log_start+0x368/0x6b0 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.051596][T12309] audit_seccomp+0x4b/0x130 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.056175][T12309] __seccomp_filter+0x6fa/0x1180 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.061351][T12309] ? __pfx_proc_fail_nth_write+0x10/0x10 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.067064][T12309] ? vfs_write+0x596/0x920 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.071490][T12309] ? handle_mm_fault+0x170a/0x2aa0 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.076662][T12309] ? __rcu_read_unlock+0x4e/0x70 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.081617][T12309] ? __fget_files+0x1d4/0x210 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.086304][T12309] __secure_computing+0x9f/0x1c0 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.091261][T12309] syscall_trace_enter+0xd1/0x1f0 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.096316][T12309] ? fpregs_assert_state_consistent+0x83/0xa0 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.102418][T12309] do_syscall_64+0xaa/0x1c0 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.107068][T12309] ? clear_bhb_loop+0x55/0xb0 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.111843][T12309] ? clear_bhb_loop+0x55/0xb0 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.116603][T12309] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.122590][T12309] RIP: 0033:0x7f41b232e719 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.127017][T12309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.146635][T12309] RSP: 002b:00007f41b0fa1038 EFLAGS: 00000246 ORIG_RAX: 000000000000009d Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.155155][T12309] RAX: ffffffffffffffda RBX: 00007f41b24e5f80 RCX: 00007f41b232e719 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.163129][T12309] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000029 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.171225][T12309] RBP: 00007f41b0fa1090 R08: 0000000000000000 R09: 0000000000000000 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.179197][T12309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.187186][T12309] R13: 0000000000000000 R14: 00007f41b24e5f80 R15: 00007fff598c5da8 Nov 5 01:51:47 syzkaller kern.warn kernel: [ 168.195240][T12309] [ 170.504219][T12330] ================================================================== [ 170.512329][T12330] BUG: KCSAN: data-race in mas_replace_node / mtree_range_walk [ 170.519902][T12330] [ 170.522232][T12330] write to 0xffff88810427a400 of 8 bytes by task 12329 on cpu 1: [ 170.529954][T12330] mas_replace_node+0x1b5/0x440 [ 170.534830][T12330] mas_wr_store_entry+0x1f75/0x2d00 [ 170.540065][T12330] mas_store_prealloc+0x6bf/0x960 [ 170.545106][T12330] vma_complete+0x3a7/0x760 [ 170.549637][T12330] __split_vma+0x5d6/0x6a0 [ 170.554093][T12330] vma_modify+0x217/0xcd0 [ 170.558470][T12330] vma_modify_flags+0xf1/0x120 [ 170.563256][T12330] mprotect_fixup+0x31a/0x5e0 [ 170.567950][T12330] do_mprotect_pkey+0x655/0x970 [ 170.572815][T12330] __x64_sys_mprotect+0x48/0x60 [ 170.577676][T12330] x64_sys_call+0x26cf/0x2d60 [ 170.582373][T12330] do_syscall_64+0xc9/0x1c0 [ 170.586893][T12330] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 170.592805][T12330] [ 170.595128][T12330] read to 0xffff88810427a400 of 8 bytes by task 12330 on cpu 0: [ 170.602757][T12330] mtree_range_walk+0x33d/0x460 [ 170.607610][T12330] mas_walk+0x16e/0x320 [ 170.611762][T12330] lock_vma_under_rcu+0x95/0x260 [ 170.616710][T12330] exc_page_fault+0x150/0x650 [ 170.621411][T12330] asm_exc_page_fault+0x26/0x30 [ 170.626282][T12330] [ 170.628609][T12330] value changed: 0xffff88811ae5a60e -> 0xffff88810427a400 [ 170.635718][T12330] [ 170.638041][T12330] Reported by Kernel Concurrency Sanitizer on: [ 170.644187][T12330] CPU: 0 UID: 0 PID: 12330 Comm: syz.2.2843 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 [ 170.654956][T12330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 170.665032][T12330] ================================================================== Nov 5 01:51:50 syzkaller kern.err kernel: [ 170.504219][T12330] ================================================================== Nov 5 01:51:50 syzkaller kern.err kernel: [ 170.512329][T12330] BUG: KCSAN: data-race in mas_replace_node / mtree_range_walk Nov 5 01:51:50 syzkaller kern.err kernel: [ 170.519902][T12330] Nov 5 01:51:50 syzkaller kern.err kernel: [ 170.522232][T12330] write to 0xffff88810427a400 of 8 bytes by task 12329 on cpu 1: Nov 5 01:51:50 syzkaller kern.warn kernel: [ 170.529954][T12330] mas_replace_node+0x1b5/0x440 Nov 5 01:51:50 syzkaller kern.warn kernel: [ 170.534830][T12330] mas_wr_store_entry+0x1f75/0x2d00 Nov 5 01:51:50 syzkaller kern.warn kernel: [ 170.540065][T12330] mas_store_prealloc+0x6bf/0x960 Nov 5 01:51:50 syzkaller kern.warn kernel: [ 170.545106][T12330] vma_complete+0x3a7/0x760 Nov 5 01:51:50 syzkaller kern.warn kernel: [ 170.549637][T12330] __split_vma+0x5d6/0x6a0 Nov 5 01:51:50 syzkaller kern.warn kernel: [ 170.554093][T12330] vma_modify+0x217/0xcd0 Nov 5 01:51:50 syzkaller kern.warn kernel: [ 170.558470][T12330] vma_modify_flags+0xf1/0x120 Nov 5 01:51:50 syzkaller kern.warn kernel: [ 170.563256][T12330] mprotect_fixup+0x31a/0x5e0 Nov 5 01:51:50 syzkaller kern.warn kernel: [ 170.567950][T12330] do_mprotect_pkey+0x655/0x970 Nov 5 01:51:50 syzkaller kern.warn kernel: [ 170.572815][T12330] __x64_sys_mprotect+0x48/0x60 Nov 5 01:51:50 syzkaller kern.warn kernel: [ 170.577676][T12330] x64_sys_call+0x26cf/0x2d60 Nov 5 01:51:50 syzkaller kern.warn kernel: [ 170.582373][T12330] do_syscall_64+0xc9/0x1c0 Nov 5 01:51:50 syzkaller kern.warn kernel: [ 170.586893][T12330] entry_SYSCALL_64_after_hwframe+0x77/0x7f Nov 5 01:51:50 syzkaller kern.err kernel: [ 170.592805][T12330] Nov 5 01:51:50 syzkaller kern.err kernel: [ 170.595128][T12330] read to 0xffff88810427a400 of 8 bytes by task 12330 on cpu 0: Nov 5 01:51:50 syzkaller kern.warn kernel: [ 170.602757][T12330] mtree_range_walk+0x33d/0x460 Nov 5 01:51:50 syzkaller kern.warn kernel: [ 170.607610][T12330] mas_walk+0x16e/0x320 Nov 5 01:51:50 syzkaller kern.warn kernel: [ 170.611762][T12330] lock_vma_under_rcu+0x95/0x260 Nov 5 01:51:50 syzkaller kern.warn kernel: [ 170.616710][T12330] exc_page_fault+0x150/0x650 Nov 5 01:51:50 syzkaller kern.warn kernel: [ 170.621411][T12330] asm_exc_page_fault+0x26/0x30 Nov 5 01:51:50 syzkaller kern.err kernel: [ 170.626282][T12330] Nov 5 01:51:50 syzkaller kern.err kernel: [ 170.628609][T12330] value changed: 0xffff88811ae5a60e -> 0xffff88810427a400 Nov 5 01:51:50 syzkaller kern.err kernel: [ 170.635718][T12330] Nov 5 01:51:50 syzkaller kern.err kernel: [ 170.638041][T12330] Reported by Kernel Concurrency Sanitizer on: Nov 5 01:51:50 syzkaller kern.warn kernel: [ 170.644187][T12330] CPU: 0 UID: 0 PID: 12330 Comm: syz.2.2843 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0 Nov 5 01:51:50 syzkaller kern.warn kernel: [ 170.654956][T12330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Nov 5 01:51:50 syzkaller kern.err kernel: [ 170.665032][T12330] ================================================================== [ 171.897482][ T29] kauditd_printk_skb: 350 callbacks suppressed [ 171.897498][ T29] audit: type=1400 audit(1730771511.562:33549): avc: denied { write } for pid=3301 comm="syz-executor" path="pipe:[2239]" dev="pipefs" ino=2239 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 171.927047][ T29] audit: type=1400 audit(1730771511.562:33550): avc: denied { execmem } for pid=12337 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 171.927072][ T29] audit: type=1400 audit(1730771511.572:33551): avc: denied { write } for pid=3301 comm="syz-executor" path="pipe:[2239]" dev="pipefs" ino=2239 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 171.927099][ T29] audit: type=1400 audit(1730771511.572:33552): avc: denied { write } for pid=3301 comm="syz-executor" path="pipe:[2239]" dev="pipefs" ino=2239 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 171.927134][ T29] audit: type=1400 audit(1730771511.582:33553): avc: denied { read } for pid=2997 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 171.948869][ T29] audit: type=1326 audit(1730771511.612:33554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12338 comm="syz.0.2845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f296e84e719 code=0x7ffc0000 [ 171.948913][ T29] audit: type=1326 audit(1730771511.612:33555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12338 comm="syz.0.2845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f296e84e719 code=0x7ffc0000 Nov 5 01:51:51 [ 171.949008][ T29] audit: type=1326 audit(1730771511.612:33556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12338 comm="syz.0.2845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f296e84e719 code=0x7ffc0000 syzkaller kern.w[ 171.949036][ T29] audit: type=1400 audit(1730771511.612:33557): avc: denied { map_create } for pid=12338 comm="syz.0.2845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 arn kernel: [ 1[ 171.949063][ T29] audit: type=1326 audit(1730771511.612:33558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12338 comm="syz.0.2845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f296e84e719 code=0x7ffc0000 71.897482][ T2[ 171.989490][ T9333] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. 9] kauditd_printk_skb: 350 callbacks suppressed [ 172.186329][T10564] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. Nov 5 01:51:51 [ 172.213493][ T8018] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. syzkaller kern.notice kernel: [ 171.897498][ T29] audit: type=1400 audit(1730771511.562:33549): avc: denied { write } for pid=3301 comm="syz-executor" path="pipe:[2239]" [ 172.239353][T12343] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. dev="pipefs" ino=2239 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:s Nov 5 01:51:51 syzkaller kern.notice kernel: [ 171.927047][ T29] audit: type=1400 audit(1730771511.562:33550): avc: denied { execmem } for pid=12337 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Nov 5 01:51:51 syzkaller kern.notice kernel: [ 171.927072][ T29] audit: type=1400 audit(1730771511.572:33551): avc: denied { write } for pid=3301 comm="syz-executor" path="pipe:[2239]" dev="pipefs" ino=2239 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:s Nov 5 01:51:51 syzkaller kern.notice kernel: [ 171.927099][ T29] audit: type=1400 audit(1730771511.572:33552): avc: denied { write } for pid=3301 comm="syz-executor" path="pipe:[2239]" dev="pipefs" ino=2239 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:s Nov 5 01:51:51 syzkaller kern.notice kernel: [ 171.927134][ T29] audit: type=1400 audit(1730771511.582:33553): avc: denied { read } for pid=2997 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Nov 5 01:51:51 syzkaller kern.notice kernel: [ 171.948869][ T29] audit: type=1326 audit(1730771511.612:33554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12338 comm="syz.0.2845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 com Nov 5 01:51:51 syzkaller kern.notice kernel: [ 171.948913][ T29] audit: type=1326 audit(1730771511.612:33555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12338 comm="syz.0.2845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 com Nov 5 01:51:51 syzkaller kern.notice kernel: [ 171.949008][ T29] audit: type=1326 audit(1730771511.612:33556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12338 comm="syz.0.2845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 com Nov 5 01:51:51 syzkaller kern.notice kernel: [ 171.949036][ T29] audit: type=1400 audit(1730771511.[ 172.436265][ T50] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 612:33557): avc: denied { map_create } for pid=12338 comm="syz.0.2845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Nov 5 01:51:51 syzkaller kern.notice kernel: [ 171.949063][ T29] audit: type=1326 audit(1730771511.612:33558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12338 comm="syz.0.2845" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 com Nov 5 01:51:51 syzkaller auth.info sshd[3299]: Received disconnect from 10.128.0.163 port 37500:11: disconnected by user Nov 5 01:51:51 syzkaller auth.info sshd[3299]: Disconnected from user root 10.128.0.163 port 37500 Nov 5 01:51:51 syzkaller kern.info kernel: [ 171.989490][ T9333] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. Nov 5 01:51:51 syzkaller kern.info kernel: [ 172.186329][T10564] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000[ 172.532716][ T50] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 000000. Nov 5 01:51:51 syzkaller kern.info kernel: [ 172.213493][ T8018] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. Nov 5 01:51:51 syzkaller kern.info kernel: [ 172.239353][T12343] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. Nov 5 01:51:52 syzkaller kern.info kernel: [ 172.436265][ T50] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type[ 172.581501][ T50] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 2 family 0 port 6081 - 0 Nov 5 01:51:52 syzkaller kern.info kernel: [ 172.532716][ T50] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 Nov 5 01:51:52 syzkaller kern.info kernel: [ 172.581501][ T50] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 172.641363][ T50] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 Nov 5 01:51:52 syzkaller kern.info kernel: [ 172.641363][ T50] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 172.716307][ T50] bridge_slave_1: left allmulticast mode [ 172.722046][ T50] bridge_slave_1: left promiscuous mode [ 172.727719][ T50] bridge0: port 2(bridge_slave_1) entered disabled state Nov 5 01:51:52 [ 172.735638][ T50] bridge_slave_0: left allmulticast mode syzkaller kern.i[ 172.742360][ T50] bridge_slave_0: left promiscuous mode nfo kernel: [ 1[ 172.749392][ T50] bridge0: port 1(bridge_slave_0) entered disabled state 72.716307][ T50] bridge_slave_1: left allmulticast mode Nov 5 01:51:52 syzkaller kern.info kernel: [ 172.722046][ T50] bridge_slave_1: left promiscuous mode Nov 5 01:51:52 syzkaller kern.info kernel: [ 172.727719][ T50] bridge0: port 2(bridge_slave_1) entered disabled state Nov 5 01:51:52 syzkaller kern.info kernel: [ 172.735638][ T50] bridge_slave_0: left allmulticast mode Nov 5 01:51:52 syzkaller kern.info kernel: [ 172.742360][ T50] bridge_slave_0: left promiscuous mode Nov 5 01:51:52 syzkaller kern.info kernel: [ 172.749392][ T50] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.840718][ T50] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 172.851280][ T50] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface Nov 5 01:51:52 syzkaller kern.i[ 172.861717][ T50] bond0 (unregistering): Released all slaves nfo kernel: [ 172.840718][ T50] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface Nov 5 01:51:52 syzkaller kern.info kernel: [ 172.851280][ T50] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface Nov 5 01:51:52 syzkaller kern.info kernel: [ 172.861717][ T50] bond0 (unregistering): Released all slaves [ 172.922444][ T50] hsr_slave_0: left promiscuous mode [ 172.928035][ T50] hsr_slave_1: left promiscuous mode Nov 5 01:51:52 [ 172.934168][ T50] batman_adv: batadv0: Interface deactivated: batadv_slave_0 syzkaller kern.i[ 172.942599][ T50] batman_adv: batadv0: Removing interface: batadv_slave_0 nfo kernel: [ 1[ 172.951540][ T50] batman_adv: batadv0: Interface deactivated: batadv_slave_1 72.922444][ T5[ 172.959884][ T50] batman_adv: batadv0: Removing interface: batadv_slave_1 0] hsr_slave_0: left promiscuous[ 172.970407][ T50] veth1_macvtap: left promiscuous mode mode Nov 5 01[ 172.976609][ T50] veth0_macvtap: left promiscuous mode :51:52 syzkaller[ 172.983519][ T50] veth1_vlan: left promiscuous mode kern.info kerne[ 172.990118][ T50] veth0_vlan: left promiscuous mode l: [ 172.928035][ T50] hsr_slave_1: left promiscuous mode Nov 5 01:51:52 syzkaller kern.info kernel: [ 172.934168][ T50] batman_adv: batadv0: Interface deactivated: batadv_slave_0 Nov 5 01:51:52 syzkaller kern.info kernel: [ 172.942599][ T50] batman_adv: batadv0: Removing interface: batadv_slave_0 Nov 5 01:51:52 syzkaller kern.info kernel: [ 172.951540][ T50] batman_adv: batadv0: Interface deactivated: batadv_slave_1 Nov 5 01:51:52 syzkaller kern.info kernel: [ 172.959884][ T50] batman_adv: batadv0: Removing interface: batadv_slave_1 Nov 5 01:51:52 syzkaller kern.info kernel: [ 172.970407][ T50] veth1_macvtap: left promiscuous mode Nov 5 01:51:52 syzkaller kern.info kernel: [ 172.976609][ T50] veth0_macvtap: left promiscuous mode Nov 5 01:51:52 syzkaller kern.info kernel: [ 172.983519][ T50] veth1_vlan: left promiscuous mode Nov 5 01:51:52 syzk[ 173.073609][ T50] team0 (unregistering): Port device team_slave_1 removed aller kern.info kernel: [ 172.9[ 173.084162][ T50] team0 (unregistering): Port device team_slave_0 removed 90118][ T50] veth0_vlan: left promiscuous mode Nov 5 01:51:52 syzkaller kern.info kernel: [ 173.073609][ T50] team0 (unregistering): Port device team_slave_1 removed Nov 5 01:51:52 syzkaller kern.info kernel: [ 173.084162][ T50] team0 (unregistering): Port device team_slave_0 removed