last executing test programs: 3.219192751s ago: executing program 0 (id=2016): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="02000000040000000800"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x40, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080)}, 0x10010, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 3.130291927s ago: executing program 0 (id=2022): setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x2, &(0x7f0000000200)=@gcm_128={{0x303, 0x39}, "0000ffffbfff7f7e", "37a0906df45a6f4f40b151634357ea00", '\x00', "de3f106b925ded4d"}, 0x28) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a0000000400000008000000"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0}, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@generic={&(0x7f0000003040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00'}, 0x18) 3.116084118s ago: executing program 0 (id=2023): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r0, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000200)=@req3={0x10, 0x4, 0x9, 0x544a, 0x80000000, 0x1, 0x7}, 0x1c) set_mempolicy(0x8000, &(0x7f0000000040), 0x5) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00000000000000000000000020000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000d5e685bc948a1cbea4be5ee1b762239cce00", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000000000000000000010000008500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f0000000180), r1) socket(0x2, 0x80805, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x20, 0x7, 0x8, 0x8000009, 0x5, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup(r3) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) r5 = socket$vsock_stream(0x28, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x0, 0x0, &(0x7f0000000400)='syzkaller\x00', 0x10001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r6}, 0x18) connect$vsock_stream(r5, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0x10) unshare(0x2040600) r7 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000500)={r7, 0x0, 0x20000000}, 0x20) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x2000000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 2.267797731s ago: executing program 0 (id=2035): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x0, 0x800, 0x70bd2d, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x3936, 0x11}}}}, ["", "", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10}, 0x880) r2 = syz_open_dev$usbfs(&(0x7f0000000100), 0x75, 0x121301) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x80, 0x0, 0x0, 0x0, 0x1, 0x73b, &(0x7f0000000000)='8'}) 2.247627493s ago: executing program 0 (id=2036): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r2, 0x5411, 0x1000000000000) clock_gettime(0x1, &(0x7f0000000000)) r3 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00"/11], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r7 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080), 0x84000, 0x0) write$vga_arbiter(r7, &(0x7f00000000c0)=@unlock_all, 0xb) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x8, 0x3, 0x4c0, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x3f0, 0xffffffff, 0xffffffff, 0x3f0, 0xffffffff, 0xb, 0x0, {[{{@uncond, 0x0, 0x1a0, 0x1c0, 0x60030000, {0x0, 0xff000000}, [@common=@inet=@recent0={{0xf8}, {0x81, 0x0, 0x24, 0x0, 'syz1\x00'}}]}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0x1c8, 0x230, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@set2={{0x28}, {{0x0, 0x40}}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x520) 2.223494155s ago: executing program 0 (id=2039): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) r3 = getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000fd0f000002"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='kmem_cache_free\x00', r6}, 0x18) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f0000000180)={'wg2\x00', 0x0}) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000001fee)='R\x10rust\xe3c*s\xa8rVid8\xc4e', 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xc, 0x3, 0x5, 0x5, 0xfab649837dde40d9, r5, 0x5, '\x00', r7, r5, 0x1, 0x3, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r8, &(0x7f00000003c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000340)}}, 0x18) syz_emit_ethernet(0x7e, &(0x7f0000000580)={@local, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x1, 0x70, 0xfffd, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010100, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x3, 0x2c, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89, 0x800, @private, @local, {[@cipso={0x86, 0x21, 0x0, [{0x1, 0xb, "5e000000ff00000000"}, {0x0, 0x2}, {0x0, 0xe, "9606053d0006ff00800000b6"}]}, @timestamp_addr={0x44, 0x1c, 0xb1, 0x1, 0xa, [{@loopback, 0x2}, {@multicast1, 0xa6de}, {@loopback, 0xffff}]}]}}}}}}}, 0x0) r9 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r4, &(0x7f0000000100)={0x0, 0x4100, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r9, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}}, 0x0) 1.364279458s ago: executing program 3 (id=2057): socket$netlink(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) sendmsg$tipc(r2, &(0x7f0000000280)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 1.34063557s ago: executing program 3 (id=2058): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r1}, 0x10) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) writev(r2, &(0x7f00000025c0)=[{&(0x7f0000000240)='4', 0x1}, {0x0, 0x900}], 0x2) 1.321666251s ago: executing program 3 (id=2059): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r2, 0x5411, 0x1000000000000) clock_gettime(0x1, &(0x7f0000000000)) r3 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r7 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080), 0x84000, 0x0) write$vga_arbiter(r7, &(0x7f00000000c0)=@unlock_all, 0xb) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x8, 0x3, 0x4c0, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x3f0, 0xffffffff, 0xffffffff, 0x3f0, 0xffffffff, 0xb, 0x0, {[{{@uncond, 0x0, 0x1a0, 0x1c0, 0x60030000, {0x0, 0xff000000}, [@common=@inet=@recent0={{0xf8}, {0x81, 0x0, 0x24, 0x0, 'syz1\x00'}}]}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0x1c8, 0x230, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@set2={{0x28}, {{0x0, 0x40}}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x520) 1.290568034s ago: executing program 3 (id=2060): r0 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000100)='./control\x00', 0x0) getdents64(r0, &(0x7f0000fc4fbe)=""/80, 0x50) r1 = io_uring_setup(0x6c4a, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xffffffff, 0x80000000, 0x0, r0}) clock_gettime(0x0, &(0x7f00000010c0)={0x0}) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r3, 0x5412, 0x0) poll(&(0x7f0000000100)=[{r3, 0xcf9aa395655278ef}], 0x1, 0xe7f1) ioctl$TCSETSW(r3, 0x5403, &(0x7f0000000040)={0x3d18, 0x0, 0x0, 0x7, 0x0, "7e12105588e633bbb1df022dace17a32d211ee"}) ioctl$TIOCL_GETMOUSEREPORTING(r3, 0x5412, &(0x7f00000006c0)=0xa) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f0000000080)={0x18, 0x0, {0xfffe, @random="ab6b0ead351e", 'veth0\x00'}}, 0x1e) socket$pppoe(0x18, 0x1, 0x0) r5 = socket(0x18, 0x0, 0x0) connect$pppoe(r5, &(0x7f0000000080)={0x18, 0x0, {0x2, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'geneve1\x00'}}, 0x1e) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) futex_waitv(&(0x7f0000001080)=[{0x3, &(0x7f0000001040)=0x3, 0x82}], 0x1, 0x0, &(0x7f0000001100)={r2}, 0x1) close_range(r1, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 1.020426994s ago: executing program 1 (id=2067): ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000400)={'bridge_slave_0\x00', &(0x7f00000003c0)=@ethtool_ts_info}) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0047217afba9d15ffe2d000000800000002000"/41], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000800000007010000f8ff8e2470315c8a5de5fa8137a7b509961dffffbfa400000000000007040000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70400000800000085000000950000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000009000000000000000000000d000000000a000000000000090400000000000000000000030000000004000000220000000700000000612e5f30612e2e00"], &(0x7f0000000280)=""/154, 0x51, 0x9a, 0x0, 0x6, 0x10000, @value}, 0x28) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x10, &(0x7f0000000640)=ANY=[@ANYRES8, @ANYRES16=r1, @ANYRESOCT=r3, @ANYRES32=r2], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback=0x17, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x71, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r4}, 0x10) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) close(r0) 1.004220165s ago: executing program 1 (id=2068): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000200)=@gcm_128={{0x303, 0x39}, "0000ffffbfff7f7e", "37a0906df45a6f4f40b151634357ea00", '\x00', "de3f106b925ded4d"}, 0x28) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000c"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@generic={&(0x7f0000003040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00'}, 0x18) 940.679409ms ago: executing program 1 (id=2069): ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000400)={'bridge_slave_0\x00', &(0x7f00000003c0)=@ethtool_ts_info}) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0047217afba9d15ffe2d000000800000002000"/41], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000800000007010000f8ff8e2470315c8a5de5fa8137a7b509961dffffbfa400000000000007040000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70400000800000085000000950000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000009000000000000000000000d000000000a000000000000090400000000000000000000030000000004000000220000000700000000612e5f30612e2e00"], &(0x7f0000000280)=""/154, 0x51, 0x9a, 0x0, 0x6, 0x10000, @value}, 0x28) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x10, &(0x7f0000000640)=ANY=[@ANYRES8, @ANYRES16=r1, @ANYRESOCT=r3, @ANYRES32=r2], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback=0x17, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x71, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r4}, 0x10) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) close(r0) (fail_nth: 1) 940.06854ms ago: executing program 4 (id=2070): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r2, 0x5411, 0x1000000000000) clock_gettime(0x1, &(0x7f0000000000)) r3 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r7 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080), 0x84000, 0x0) write$vga_arbiter(r7, &(0x7f00000000c0)=@unlock_all, 0xb) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x8, 0x3, 0x4c0, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x3f0, 0xffffffff, 0xffffffff, 0x3f0, 0xffffffff, 0xb, 0x0, {[{{@uncond, 0x0, 0x1a0, 0x1c0, 0x60030000, {0x0, 0xff000000}, [@common=@inet=@recent0={{0xf8}, {0x81, 0x0, 0x24, 0x0, 'syz1\x00'}}]}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0x1c8, 0x230, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@set2={{0x28}, {{0x0, 0x40}}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x520) 854.380026ms ago: executing program 1 (id=2071): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000640)='kmem_cache_free\x00', r1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001340)='./file0\x00', &(0x7f0000001380)='securityfs\x00', 0x1008018, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) r6 = socket(0x10, 0x80002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000004c0)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r5, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="440000001300290a000000000000000007000000", @ANYRES32=r5, @ANYBLOB="00000000000000001c001a800800028008000200080000003e120000080002001040e5"], 0x44}}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'dvmrp0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000004380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@getnexthop={0x0, 0x6a, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@NHA_OIF={0x0, 0x5, r5}, @NHA_ID={0x0, 0x1, 0x2}, @NHA_OIF={0x0, 0x5, r7}, @NHA_GROUPS, @NHA_OIF, @NHA_FDB]}, 0x38}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x1018, 0xffffffffffffffff, {0x29}}, './file0\x00'}) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x7}, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r8}, 0x10) r9 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSRS485(r6, 0x542f, &(0x7f0000000380)={0x8, 0x0, 0x5}) ioctl$TCFLSH(r9, 0x5608, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000003c0)={0x0, 0x465f}, 0x8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x200000c0}, 0x1) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) mount_setattr(0xffffffffffffffff, &(0x7f0000001d80)='.\x00', 0x0, &(0x7f0000001dc0)={0xb}, 0x20) sendmmsg$inet6(r0, &(0x7f0000000200)=[{{&(0x7f00000000c0)={0xa, 0x4e23, 0x9, @loopback}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000000180)='\x00', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, 0x0, 0x8) 684.030488ms ago: executing program 4 (id=2072): syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x4000) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000000300)=[{&(0x7f00000005c0)=""/244, 0xf4}], 0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000001240)={0x0, 0x2, 0x0, 0x0, 0x0, "001bf1000000000000002000"}) r1 = syz_open_pts(r0, 0x400101) futex(0x0, 0x80000000000b, 0xffffffff, 0x0, 0xfffffffffffffffc, 0x0) r2 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r3}, 0x18) syz_io_uring_setup(0x68cf, &(0x7f0000000740)={0x0, 0x0, 0x80, 0x0, 0x235}, 0x0, &(0x7f00000003c0)) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000810"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) r6 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) 628.185683ms ago: executing program 4 (id=2073): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r2, 0x5411, 0x1000000000000) clock_gettime(0x1, &(0x7f0000000000)) r3 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00"/13], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r7 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080), 0x84000, 0x0) write$vga_arbiter(r7, &(0x7f00000000c0)=@unlock_all, 0xb) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x8, 0x3, 0x4c0, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x3f0, 0xffffffff, 0xffffffff, 0x3f0, 0xffffffff, 0xb, 0x0, {[{{@uncond, 0x0, 0x1a0, 0x1c0, 0x60030000, {0x0, 0xff000000}, [@common=@inet=@recent0={{0xf8}, {0x81, 0x0, 0x24, 0x0, 'syz1\x00'}}]}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0x1c8, 0x230, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@set2={{0x28}, {{0x0, 0x40}}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x520) 600.196445ms ago: executing program 4 (id=2076): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r1}, 0x10) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) writev(r2, &(0x7f00000025c0)=[{&(0x7f0000000240)='4', 0x1}, {0x0, 0x900}], 0x2) 580.980116ms ago: executing program 4 (id=2078): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f0000000300)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) syz_io_uring_setup(0x5172, &(0x7f0000000780)={0x0, 0x4f5e, 0x10100, 0x3, 0xc0}, &(0x7f0000000100), &(0x7f0000000140)) syz_extract_tcp_res$synack(&(0x7f0000000400), 0x1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1) 441.896657ms ago: executing program 3 (id=2080): bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@generic={&(0x7f0000003040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00'}, 0x18) 409.177649ms ago: executing program 3 (id=2081): r0 = creat(&(0x7f0000000240)='./bus\x00', 0x2) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r0, &(0x7f00000006c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000680)={&(0x7f0000000800)={0x14, r1, 0x0, 0x70bd2b, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4040011}, 0x40) r2 = socket$packet(0x11, 0x2, 0x300) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x18) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) ptrace$getregset(0x4204, 0x0, 0x3, &(0x7f0000000040)={&(0x7f0000000340)=""/147, 0x93}) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000404000000002e"], 0x0, 0x37, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0600000004000000020000100000000000000000", @ANYRES32, @ANYBLOB="fdffffff00"/20, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="020000000100"/28], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000300)='trans=rdma,') r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000200)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x56) connect$inet(r6, &(0x7f0000000380)={0x2, 0x4e24, @local}, 0x10) setgid(0xee00) setresuid(0x0, 0xee00, 0xee00) r7 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg(r8, &(0x7f0000002080)=[{{0x0, 0x0, 0x0}, 0xeb}], 0x1, 0x12000, 0x0) shmat(r7, &(0x7f0000ffd000/0x3000)=nil, 0x7000) close(r6) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f00000002c0)={'veth0_to_team\x00', &(0x7f0000000840)=@ethtool_rxnfc={0x29, 0x10, 0x9f, {0x4, @ether_spec={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @broadcast, 0x9}, {0x0, @local, 0x4cf, 0xe0, [0x9, 0x8]}, @ah_ip4_spec={@rand_addr=0x64010101, @local, 0x1, 0x1}, {0x0, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2c}, 0xd2d, 0x9, [0x7, 0x6]}, 0x8, 0x53db}, 0x4, [0x8, 0x4, 0x961, 0x400]}}) io_uring_setup(0x7bda, &(0x7f0000000080)={0x0, 0x0, 0xf235b87e60a033ac, 0x0, 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) 290.678488ms ago: executing program 4 (id=2082): syz_mount_image$ext4(&(0x7f00000009c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8000, &(0x7f0000000080), 0x1, 0x504, &(0x7f0000000200)="$eJzs3d9rXFkdAPDvvUnapEmdrPqwLrhb3JV00c4kjbuNPpQK4tuCur7HkExCyCQTMpPdJpSS4h8giOiDTz75IvgHCNIX34tQ0HcRUYpt9cEHdeRO7jQxnUkGncxsJ58PnN5zf37Pmekc7rn3kBPAhXUtIu5ExEhEvBsRhXx7mqc4OEzZcc+f3VvOUhKNxod/TSLJt7WuleTLyfy08Yj4TnJsxzG1vf2NpUqlvJOvl+qb26Xa3v6N9c2ltfJaeWt+fu79hVsL7y3M9qyut7/xpx//4OffvP3rL3/8h8W/XL+fFWsq33e8Hr10WPWx5mfRMhoRO+cRbABG8vqMdXn85XMuDwAAp8vu8T8dEV9o3v8XYqR5NwcAAAAMk0YS8c8kogEAAAAMrbQ5BjZJi/lYgKlI02IxYjKm47NxJa1Ua/UvrVZ3t1YOx8pOx1i6ul4pz+ZjhadjLMnW55r5o/WbJ9bnI+K1iPhRYSJZvRzl4nK1sjLohx8AAABwQUye6P//vXDY/wcAAACGzPSgCwAAAACcO/1/AAAAGH4d+/+JyQAAAABgCHzrgw+y1GjNf73y0d7uRvWjGyvl2kZxc3e5uFzd2S6uVatrlXJxubp51vUq1er2V2Jr926pXq7VS7W9/cXN6u5WfbE5r/diudt5ogEAAIDeee2th79PIuLgaxPNlLmU79NXh+GWnn3IxLF8cp5lAfprZNAFAAbmfxvga1gwDIOz+vhPG40+lQQYlE4d+8rVw+V4pxMfnVOBAACAnpv5XOf3/8Bw6+L9fxt3el4OoP/y9/8dH+8Bw8ubfLi4jPEHzhrYf/r7f4OEAADgVTDVTElazN8FTkWaFosRV5vTAowlq+uV8mxEfCoiflcYu5ytzw260AAAAAAAAAAAAAAAAAAAAAAAAADwimk0kmicdOnlTQAAAMCrKyL9c5LP/zVTeGfq5POBS8k/Cs1lRHz80w9/cnepXt+Zy7Y/LRzNGpZvv9n3xxcAAABA5jf/vdrqp7f68QAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADQQ40kHmTL5efP7i33M/CTr0fEdEQWt5UO94zGeHM5HmMRceVvSYweOy+JiJEexD/Iqv16u/hJVqyYzktxMn4aERMDjj/Zg/hwkT3M2p877X5/aVxrLtv//kbz9P96cq1T+5e+aP9GOrR/V7uM8cbjX5Y6xn8Q8cZo+/anFT/pEP/tLuN/77v7+532NX4WMRMn46d5hKNYpfrmdqm2t39jfXNprbxW3pqfn3t/4dbCewuzpdX1Sjn/t22MH37+V/8+rf5XXoofL9rf0+r/Tpf1/9fju88+89LW+zdb8a+/3f77f/2U+Nn/iS/G0Sc108ofHOaPe/MXv33ztPqvdKj/eNz6auu4dvW/3mX93/329//Y5aEAQB/U9vY3liqV8s6pmUdx9jEXN5PdC2WZ2/0L2nr00Msrv5Vdb+I8Cz8Rn4jvS6abzIAbJgAAoOeObvoHXRIAAAAAAAAAAAAAAAAAAAC4uPrx58QGXUcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgG78JwAA//8svMq+") r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0, 0x0, 0x2ab}, 0x18) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1002, 0x3a, 0x1000, 0x3a, 0x4bd1bfda, 0x0, 0x7}, 0x1c) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x1001, 0x10000, 0x1}, 0x1c) socket$igmp(0x2, 0x3, 0x2) r2 = socket$kcm(0x10, 0x2, 0x0) close(0xffffffffffffffff) socket$kcm(0x10, 0x2, 0x0) r3 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r3, &(0x7f0000002980)={&(0x7f00000003c0)={0x2, 0x0, @dev}, 0x10, &(0x7f0000001400)=[{&(0x7f0000000400)="85", 0x1}], 0x1}, 0x4000000) setsockopt$sock_attach_bpf(r3, 0x84, 0x1e, &(0x7f0000000000), 0x10) sendmsg$kcm(r2, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="d8000000100081046881f782db44b904021d080b01000000e8fe55a11800150006001400000000120800040043000000a80016000a00034006000d00036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) timerfd_create(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800001500000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="d08fab434efbc4ad1700"/37], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000a00)={'ip_vti0\x00', &(0x7f0000000980)={'syztnl1\x00', 0x0, 0x7, 0x40, 0x7, 0x200, {{0x6, 0x4, 0x3, 0x3d, 0xffffffffffffff0c, 0x65, 0x0, 0xf7, 0x4, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x34}, {[@noop]}}}}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a40)=0xffffffffffffffff, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x13, &(0x7f0000000240)=0x100000001, 0x59) connect$inet6(r6, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x2, &(0x7f0000000b80)=@gcm_256={{0x304}, "76f7bc3e4ae1c84c", "af193cff4810ba5ac120d096eb00b40752095b4285514ca312c52e3a08756735", '8\x00', "bc3a20b10f4ad11e"}, 0x38) close(r6) 169.698447ms ago: executing program 2 (id=2085): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x0, 0x800, 0x70bd2d, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x3936, 0x11}}}}, ["", "", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10}, 0x880) r2 = syz_open_dev$usbfs(&(0x7f0000000100), 0x75, 0x121301) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000180)={0x80, 0x0, 0x0, 0x0, 0x1, 0x73b, &(0x7f0000000000)='8'}) 152.113068ms ago: executing program 2 (id=2086): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r2, 0x5411, 0x1000000000000) clock_gettime(0x1, &(0x7f0000000000)) r3 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00"/13], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r7 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080), 0x84000, 0x0) write$vga_arbiter(r7, &(0x7f00000000c0)=@unlock_all, 0xb) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x8, 0x3, 0x4c0, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x3f0, 0xffffffff, 0xffffffff, 0x3f0, 0xffffffff, 0xb, 0x0, {[{{@uncond, 0x0, 0x1a0, 0x1c0, 0x60030000, {0x0, 0xff000000}, [@common=@inet=@recent0={{0xf8}, {0x81, 0x0, 0x24, 0x0, 'syz1\x00'}}]}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0x1c8, 0x230, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@set2={{0x28}, {{0x0, 0x40}}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x520) 125.18715ms ago: executing program 2 (id=2087): setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x2, &(0x7f0000000200)=@gcm_128={{0x303, 0x39}, "0000ffffbfff7f7e", "37a0906df45a6f4f40b151634357ea00", '\x00', "de3f106b925ded4d"}, 0x28) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000c"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0}, 0x0, &(0x7f0000000340)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@generic={&(0x7f0000003040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00'}, 0x18) 108.989681ms ago: executing program 2 (id=2088): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r1}, 0x10) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) writev(r2, &(0x7f00000025c0)=[{&(0x7f0000000240)='4', 0x1}, {0x0, 0x900}], 0x2) 90.153733ms ago: executing program 2 (id=2089): munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000000000)={&(0x7f0000000040)={0x2, 0x0, @private=0xa010100}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000300)=[{&(0x7f0000002640)=""/102389, 0x18ff5}], 0x1, 0x1903d}}], 0x48}, 0x0) 68.767244ms ago: executing program 2 (id=2090): r0 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000100)='./control\x00', 0x0) getdents64(r0, &(0x7f0000fc4fbe)=""/80, 0x50) r1 = io_uring_setup(0x6c4a, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xffffffff, 0x80000000, 0x0, r0}) clock_gettime(0x0, &(0x7f00000010c0)={0x0}) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r3, 0x5412, 0x0) poll(&(0x7f0000000100)=[{r3, 0xcf9aa395655278ef}], 0x1, 0xe7f1) ioctl$TCSETSW(r3, 0x5403, &(0x7f0000000040)={0x3d18, 0x0, 0x0, 0x7, 0x0, "7e12105588e633bbb1df022dace17a32d211ee"}) ioctl$TIOCL_GETMOUSEREPORTING(r3, 0x5412, &(0x7f00000006c0)=0xa) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f0000000080)={0x18, 0x0, {0xfffe, @random="ab6b0ead351e", 'veth0\x00'}}, 0x1e) socket$pppoe(0x18, 0x1, 0x0) r5 = socket(0x18, 0x0, 0x0) connect$pppoe(r5, &(0x7f0000000080)={0x18, 0x0, {0x2, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'geneve1\x00'}}, 0x1e) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) futex_waitv(&(0x7f0000001080)=[{0x3, &(0x7f0000001040)=0x3, 0x82}], 0x1, 0x0, &(0x7f0000001100)={r2}, 0x1) close_range(r1, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 40.826186ms ago: executing program 1 (id=2091): r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x5}, 0x18) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) 0s ago: executing program 1 (id=2092): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f0000000300)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) syz_io_uring_setup(0x5172, &(0x7f0000000780)={0x0, 0x4f5e, 0x10100, 0x3, 0xc0}, &(0x7f0000000100), &(0x7f0000000140)) syz_extract_tcp_res$synack(&(0x7f0000000400), 0x1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1) kernel console output (not intermixed with test programs): bb5fa0 RCX: 00007f970499cde9 [ 74.994565][ T5398] RDX: 0000000000000005 RSI: 0000000000000000 RDI: ffffffffffffffff [ 74.994580][ T5398] RBP: 00007f9703007090 R08: 0000000000000000 R09: 0000000000000000 [ 74.994594][ T5398] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 74.994608][ T5398] R13: 0000000000000000 R14: 00007f9704bb5fa0 R15: 00007ffcb49d8338 [ 74.994631][ T5398] [ 75.194750][ T29] audit: type=1326 audit(1738988048.525:1566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5397 comm="syz.0.719" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f970499cde9 code=0x7ffc0000 [ 75.218260][ T29] audit: type=1326 audit(1738988048.525:1567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5397 comm="syz.0.719" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f970499cde9 code=0x7ffc0000 [ 75.241658][ T29] audit: type=1326 audit(1738988048.525:1568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5397 comm="syz.0.719" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f970499cde9 code=0x7ffc0000 [ 75.265041][ T29] audit: type=1326 audit(1738988048.555:1569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5397 comm="syz.0.719" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f970499cde9 code=0x7ffc0000 [ 75.291967][ T29] audit: type=1326 audit(1738988048.555:1570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5397 comm="syz.0.719" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f970499cde9 code=0x7ffc0000 [ 75.346190][ T5388] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.359427][ T5388] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.371231][ T5388] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.382958][ T5388] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.417888][ T5409] netlink: 24 bytes leftover after parsing attributes in process `syz.1.725'. [ 75.594956][ T5427] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 75.625653][ T5432] binfmt_misc: register: failed to install interpreter file ./file0 [ 75.634396][ T5411] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 75.643217][ T5411] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 75.677288][ T5418] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 75.685997][ T5418] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 75.791773][ T5447] netlink: 24 bytes leftover after parsing attributes in process `syz.2.738'. [ 76.261455][ T5468] binfmt_misc: register: failed to install interpreter file ./file0 [ 76.488576][ T5483] lo speed is unknown, defaulting to 1000 [ 76.745313][ T5501] vcan0: entered promiscuous mode [ 76.750687][ T5501] vlan2: entered promiscuous mode [ 76.756796][ T5501] vcan0: left promiscuous mode [ 76.794431][ T5506] netlink: 8 bytes leftover after parsing attributes in process `syz.4.756'. [ 76.821353][ T5509] binfmt_misc: register: failed to install interpreter file ./file0 [ 77.075833][ T5514] FAULT_INJECTION: forcing a failure. [ 77.075833][ T5514] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 77.089025][ T5514] CPU: 1 UID: 0 PID: 5514 Comm: syz.4.760 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 77.089053][ T5514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 77.089082][ T5514] Call Trace: [ 77.089089][ T5514] [ 77.089098][ T5514] dump_stack_lvl+0xf2/0x150 [ 77.089180][ T5514] dump_stack+0x15/0x1a [ 77.089206][ T5514] should_fail_ex+0x24a/0x260 [ 77.089313][ T5514] should_fail+0xb/0x10 [ 77.089398][ T5514] should_fail_usercopy+0x1a/0x20 [ 77.089467][ T5514] copy_fpstate_to_sigframe+0x640/0x7e0 [ 77.089495][ T5514] ? copy_fpstate_to_sigframe+0xea/0x7e0 [ 77.089518][ T5514] ? _raw_spin_unlock_irq+0x14/0x50 [ 77.089555][ T5514] ? fpu__alloc_mathframe+0x95/0xd0 [ 77.089634][ T5514] get_sigframe+0x2f3/0x430 [ 77.089666][ T5514] x64_setup_rt_frame+0xad/0x590 [ 77.089694][ T5514] arch_do_signal_or_restart+0x287/0x4b0 [ 77.089729][ T5514] syscall_exit_to_user_mode+0x62/0x120 [ 77.089757][ T5514] do_syscall_64+0xd6/0x1c0 [ 77.089787][ T5514] ? clear_bhb_loop+0x55/0xb0 [ 77.089897][ T5514] ? clear_bhb_loop+0x55/0xb0 [ 77.089923][ T5514] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 77.089952][ T5514] RIP: 0033:0x7fc2f5ddcde9 [ 77.089977][ T5514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 77.089999][ T5514] RSP: 002b:00007fc2f4447038 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 77.090101][ T5514] RAX: fffffffffffffffc RBX: 00007fc2f5ff5fa0 RCX: 00007fc2f5ddcde9 [ 77.090116][ T5514] RDX: 0000000000000026 RSI: 0000400000000440 RDI: 0000000000000005 [ 77.090128][ T5514] RBP: 00007fc2f4447090 R08: 0000000000000000 R09: 0000000000000000 [ 77.090140][ T5514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 77.090158][ T5514] R13: 0000000000000000 R14: 00007fc2f5ff5fa0 R15: 00007fff5c90e078 [ 77.090178][ T5514] [ 77.976814][ T5564] binfmt_misc: register: failed to install interpreter file ./file0 [ 78.767899][ T29] kauditd_printk_skb: 99 callbacks suppressed [ 78.767917][ T29] audit: type=1326 audit(1738988052.355:1670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5593 comm="syz.4.788" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fc2f5ddcde9 code=0x0 [ 78.928076][ T5601] binfmt_misc: register: failed to install interpreter file ./file0 [ 79.079253][ T5613] Cannot find set identified by id 0 to match [ 79.213032][ T5620] netlink: 20 bytes leftover after parsing attributes in process `syz.3.798'. [ 79.575830][ T29] audit: type=1400 audit(1738988053.165:1671): avc: denied { read write } for pid=5632 comm="syz.2.802" name="uhid" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 79.600264][ T29] audit: type=1400 audit(1738988053.165:1672): avc: denied { open } for pid=5632 comm="syz.2.802" path="/dev/uhid" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 79.623652][ T29] audit: type=1400 audit(1738988053.165:1673): avc: denied { ioctl } for pid=5632 comm="syz.2.802" path="/dev/uhid" dev="devtmpfs" ino=252 ioctlcmd=0x943c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 79.936188][ T5646] Cannot find set identified by id 0 to match [ 80.073605][ T5658] netlink: 24 bytes leftover after parsing attributes in process `syz.0.813'. [ 80.116615][ T5662] xt_hashlimit: max too large, truncated to 1048576 [ 80.124671][ T5662] Cannot find set identified by id 0 to match [ 80.151037][ T5666] IPv4: Oversized IP packet from 127.202.26.0 [ 80.158384][ T29] audit: type=1326 audit(1738988053.745:1674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5665 comm="syz.3.817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789f48cde9 code=0x7ffc0000 [ 80.181896][ T29] audit: type=1326 audit(1738988053.755:1675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5665 comm="syz.3.817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f789f48cde9 code=0x7ffc0000 [ 80.207847][ T29] audit: type=1326 audit(1738988053.755:1676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5665 comm="syz.3.817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789f48cde9 code=0x7ffc0000 [ 80.231454][ T29] audit: type=1326 audit(1738988053.755:1677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5665 comm="syz.3.817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f789f48cde9 code=0x7ffc0000 [ 80.254899][ T29] audit: type=1326 audit(1738988053.755:1678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5665 comm="syz.3.817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f789f48cde9 code=0x7ffc0000 [ 80.254936][ T29] audit: type=1326 audit(1738988053.755:1679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5665 comm="syz.3.817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f789f48cde9 code=0x7ffc0000 [ 80.406395][ T5675] tipc: Enabling of bearer rejected, failed to enable media [ 80.475021][ T5680] vlan2: entered allmulticast mode [ 80.548717][ T5686] netlink: 24 bytes leftover after parsing attributes in process `syz.2.825'. [ 80.683237][ T5687] xt_nat: multiple ranges no longer supported [ 80.691063][ T5691] netlink: 68 bytes leftover after parsing attributes in process `syz.2.827'. [ 80.753656][ T5695] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 80.998586][ T5706] FAULT_INJECTION: forcing a failure. [ 80.998586][ T5706] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 81.011943][ T5706] CPU: 1 UID: 0 PID: 5706 Comm: syz.4.832 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 81.011972][ T5706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 81.011982][ T5706] Call Trace: [ 81.011988][ T5706] [ 81.011995][ T5706] dump_stack_lvl+0xf2/0x150 [ 81.012066][ T5706] dump_stack+0x15/0x1a [ 81.012134][ T5706] should_fail_ex+0x24a/0x260 [ 81.012175][ T5706] should_fail_alloc_page+0xfd/0x110 [ 81.012208][ T5706] __alloc_frozen_pages_noprof+0x109/0x340 [ 81.012234][ T5706] alloc_pages_mpol+0xb4/0x260 [ 81.012275][ T5706] alloc_migration_target_by_mpol+0x121/0x240 [ 81.012322][ T5706] migrate_pages_batch+0x322/0x1930 [ 81.012408][ T5706] ? __pfx_alloc_migration_target_by_mpol+0x10/0x10 [ 81.012437][ T5706] migrate_pages+0xf02/0x1840 [ 81.012586][ T5706] ? __pfx_alloc_migration_target_by_mpol+0x10/0x10 [ 81.012615][ T5706] __se_sys_mbind+0xfd1/0x11c0 [ 81.012739][ T5706] __x64_sys_mbind+0x78/0x90 [ 81.012768][ T5706] x64_sys_call+0x2662/0x2dc0 [ 81.012842][ T5706] do_syscall_64+0xc9/0x1c0 [ 81.012946][ T5706] ? clear_bhb_loop+0x55/0xb0 [ 81.012970][ T5706] ? clear_bhb_loop+0x55/0xb0 [ 81.012994][ T5706] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 81.013017][ T5706] RIP: 0033:0x7fc2f5ddcde9 [ 81.013030][ T5706] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 81.013065][ T5706] RSP: 002b:00007fc2f4447038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 81.013081][ T5706] RAX: ffffffffffffffda RBX: 00007fc2f5ff5fa0 RCX: 00007fc2f5ddcde9 [ 81.013091][ T5706] RDX: 0000000000000000 RSI: 0000000000c00000 RDI: 0000400000400000 [ 81.013101][ T5706] RBP: 00007fc2f4447090 R08: 0000000000000000 R09: 0000000000000002 [ 81.013114][ T5706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.013127][ T5706] R13: 0000000000000000 R14: 00007fc2f5ff5fa0 R15: 00007fff5c90e078 [ 81.013148][ T5706] [ 81.256324][ T5710] netlink: 'syz.4.834': attribute type 3 has an invalid length. [ 81.317028][ T5719] netlink: 24 bytes leftover after parsing attributes in process `syz.4.837'. [ 81.489336][ T5732] siw: device registration error -23 [ 81.994914][ T5755] loop0: detected capacity change from 0 to 512 [ 82.035642][ T5755] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 82.047132][ T5755] EXT4-fs (loop0): orphan cleanup on readonly fs [ 82.064349][ T5755] EXT4-fs warning (device loop0): ext4_enable_quotas:7145: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 82.093739][ T5755] EXT4-fs (loop0): Cannot turn on quotas: error -117 [ 82.114460][ T5755] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm syz.0.850: bg 0: block 40: padding at end of block bitmap is not set [ 82.146180][ T5755] EXT4-fs error (device loop0) in ext4_mb_clear_bb:6550: Corrupt filesystem [ 82.169948][ T5755] EXT4-fs (loop0): 1 truncate cleaned up [ 82.202855][ T5755] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 82.258882][ T5759] netlink: 16 bytes leftover after parsing attributes in process `syz.4.851'. [ 82.277570][ T3307] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 82.443605][ T5763] netlink: 68 bytes leftover after parsing attributes in process `syz.0.852'. [ 82.478039][ T5769] Cannot find set identified by id 0 to match [ 82.507140][ T5765] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 82.619522][ T5789] dccp_invalid_packet: P.Data Offset(0) too small [ 82.627394][ T5779] autofs: Unknown parameter 'no9á ‘ýPƒ¹G!8°‰™…EŸ8-ö¤ ™ŠÇÅ–èEeÕ¬( IrÝ\•žu}ibˆŒÞêT0;´Œmy´[Gc¯î#Ï>QkÏübYü&“àÌ#“w„@/VV¼Lë~1ƒ2§÷lÿh–O„h'®ÈûrK1‚\kU{!e½úó¬Üš7»ßß [ 82.627394][ T5779] ÄUúeâ[¦ÓÎ%#s' [ 83.663859][ T5833] netlink: 8 bytes leftover after parsing attributes in process `syz.3.878'. [ 83.717093][ T5841] 9pnet_fd: Insufficient options for proto=fd [ 83.717475][ T5839] pim6reg1: entered promiscuous mode [ 83.728713][ T5839] pim6reg1: entered allmulticast mode [ 83.735503][ T5839] FAULT_INJECTION: forcing a failure. [ 83.735503][ T5839] name failslab, interval 1, probability 0, space 0, times 0 [ 83.748232][ T5839] CPU: 0 UID: 0 PID: 5839 Comm: syz.1.882 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 83.748262][ T5839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 83.748276][ T5839] Call Trace: [ 83.748283][ T5839] [ 83.748292][ T5839] dump_stack_lvl+0xf2/0x150 [ 83.748324][ T5839] dump_stack+0x15/0x1a [ 83.748346][ T5839] should_fail_ex+0x24a/0x260 [ 83.748385][ T5839] ? netdevice_event+0x2b6/0x610 [ 83.748423][ T5839] should_failslab+0x8f/0xb0 [ 83.748447][ T5839] __kmalloc_cache_noprof+0x4e/0x320 [ 83.748546][ T5839] netdevice_event+0x2b6/0x610 [ 83.748587][ T5839] ? __pfx_dev_map_notification+0x10/0x10 [ 83.748610][ T5839] ? __pfx_add_netdev_ips+0x10/0x10 [ 83.748644][ T5839] ? __pfx_is_eth_port_of_netdev_filter+0x10/0x10 [ 83.748689][ T5839] ? __pfx_add_default_gids+0x10/0x10 [ 83.748728][ T5839] ? __pfx_is_ndev_for_default_gid_filter+0x10/0x10 [ 83.748766][ T5839] ? __pfx_del_netdev_default_ips_join+0x10/0x10 [ 83.748819][ T5839] ? __pfx_is_eth_port_inactive_slave_filter+0x10/0x10 [ 83.748865][ T5839] ? nh_netdev_event+0x29b/0x3d0 [ 83.748903][ T5839] ? __pfx_netdevice_event+0x10/0x10 [ 83.748955][ T5839] raw_notifier_call_chain+0x6f/0x1d0 [ 83.748983][ T5839] call_netdevice_notifiers_info+0xae/0x100 [ 83.749027][ T5839] __dev_notify_flags+0xff/0x1a0 [ 83.749132][ T5839] dev_change_flags+0xab/0xd0 [ 83.749153][ T5839] dev_ifsioc+0x67f/0xa10 [ 83.749183][ T5839] dev_ioctl+0x7fa/0xab0 [ 83.749213][ T5839] sock_do_ioctl+0x11c/0x260 [ 83.749263][ T5839] sock_ioctl+0x40f/0x600 [ 83.749298][ T5839] ? __pfx_sock_ioctl+0x10/0x10 [ 83.749405][ T5839] __se_sys_ioctl+0xc9/0x140 [ 83.749426][ T5839] __x64_sys_ioctl+0x43/0x50 [ 83.749447][ T5839] x64_sys_call+0x1690/0x2dc0 [ 83.749478][ T5839] do_syscall_64+0xc9/0x1c0 [ 83.749617][ T5839] ? clear_bhb_loop+0x55/0xb0 [ 83.749651][ T5839] ? clear_bhb_loop+0x55/0xb0 [ 83.749684][ T5839] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 83.749780][ T5839] RIP: 0033:0x7f939847cde9 [ 83.749795][ T5839] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 83.749814][ T5839] RSP: 002b:00007f9396ae7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 83.749895][ T5839] RAX: ffffffffffffffda RBX: 00007f9398695fa0 RCX: 00007f939847cde9 [ 83.749910][ T5839] RDX: 0000400000000140 RSI: 0000000000008914 RDI: 0000000000000008 [ 83.749924][ T5839] RBP: 00007f9396ae7090 R08: 0000000000000000 R09: 0000000000000000 [ 83.749938][ T5839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 83.749952][ T5839] R13: 0000000000000000 R14: 00007f9398695fa0 R15: 00007ffe167f15e8 [ 83.749973][ T5839] [ 84.140531][ T29] kauditd_printk_skb: 52 callbacks suppressed [ 84.140548][ T29] audit: type=1326 audit(1738988057.735:1731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5853 comm="syz.0.888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f970499cde9 code=0x7ffc0000 [ 84.142155][ T29] audit: type=1326 audit(1738988057.735:1732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5853 comm="syz.0.888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f970499cde9 code=0x7ffc0000 [ 84.142253][ T29] audit: type=1326 audit(1738988057.735:1733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5853 comm="syz.0.888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f970499cde9 code=0x7ffc0000 [ 84.142330][ T29] audit: type=1326 audit(1738988057.735:1734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5853 comm="syz.0.888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f970499cde9 code=0x7ffc0000 [ 84.142354][ T29] audit: type=1326 audit(1738988057.735:1735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5853 comm="syz.0.888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f970499cde9 code=0x7ffc0000 [ 84.142464][ T29] audit: type=1326 audit(1738988057.735:1736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5853 comm="syz.0.888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f970499cde9 code=0x7ffc0000 [ 84.142494][ T29] audit: type=1326 audit(1738988057.735:1737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5853 comm="syz.0.888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f970499cde9 code=0x7ffc0000 [ 84.142520][ T29] audit: type=1326 audit(1738988057.735:1738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5853 comm="syz.0.888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7f970499cde9 code=0x7ffc0000 [ 84.142629][ T29] audit: type=1326 audit(1738988057.735:1739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5853 comm="syz.0.888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f970499cde9 code=0x7ffc0000 [ 84.142734][ T29] audit: type=1326 audit(1738988057.735:1740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5853 comm="syz.0.888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=223 compat=0 ip=0x7f970499cde9 code=0x7ffc0000 [ 84.715940][ T5882] team0 (unregistering): Port device team_slave_0 removed [ 84.726843][ T5882] team0 (unregistering): Port device team_slave_1 removed [ 84.765503][ T5884] pim6reg1: entered promiscuous mode [ 84.770995][ T5884] pim6reg1: entered allmulticast mode [ 84.869562][ T5887] lo speed is unknown, defaulting to 1000 [ 85.103112][ T5924] FAULT_INJECTION: forcing a failure. [ 85.103112][ T5924] name failslab, interval 1, probability 0, space 0, times 0 [ 85.115838][ T5924] CPU: 0 UID: 0 PID: 5924 Comm: syz.3.911 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 85.115933][ T5924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 85.115948][ T5924] Call Trace: [ 85.115955][ T5924] [ 85.115962][ T5924] dump_stack_lvl+0xf2/0x150 [ 85.115991][ T5924] dump_stack+0x15/0x1a [ 85.116015][ T5924] should_fail_ex+0x24a/0x260 [ 85.116119][ T5924] should_failslab+0x8f/0xb0 [ 85.116172][ T5924] kmem_cache_alloc_noprof+0x52/0x320 [ 85.116219][ T5924] ? alloc_empty_file+0xd0/0x200 [ 85.116249][ T5924] ? _raw_spin_unlock+0x26/0x50 [ 85.116281][ T5924] alloc_empty_file+0xd0/0x200 [ 85.116315][ T5924] alloc_file_pseudo+0xc9/0x160 [ 85.116347][ T5924] hugetlb_file_setup+0x290/0x3c0 [ 85.116443][ T5924] ksys_mmap_pgoff+0x172/0x330 [ 85.116510][ T5924] x64_sys_call+0x1940/0x2dc0 [ 85.116591][ T5924] do_syscall_64+0xc9/0x1c0 [ 85.116674][ T5924] ? clear_bhb_loop+0x55/0xb0 [ 85.116702][ T5924] ? clear_bhb_loop+0x55/0xb0 [ 85.116733][ T5924] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 85.116764][ T5924] RIP: 0033:0x7f789f48cde9 [ 85.116781][ T5924] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 85.116817][ T5924] RSP: 002b:00007f789daf7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 85.116906][ T5924] RAX: ffffffffffffffda RBX: 00007f789f6a5fa0 RCX: 00007f789f48cde9 [ 85.116919][ T5924] RDX: 0000000000000000 RSI: 0000000001400000 RDI: 0000400000000000 [ 85.116933][ T5924] RBP: 00007f789daf7090 R08: ffffffffffffffff R09: 0000000000000000 [ 85.116947][ T5924] R10: 00000000000c3072 R11: 0000000000000246 R12: 0000000000000001 [ 85.116960][ T5924] R13: 0000000000000000 R14: 00007f789f6a5fa0 R15: 00007ffe61cb8bf8 [ 85.116981][ T5924] [ 85.334966][ T5931] netlink: 16 bytes leftover after parsing attributes in process `syz.3.913'. [ 85.677794][ T5952] veth0_to_team: entered promiscuous mode [ 85.683874][ T5952] veth0_to_team: entered allmulticast mode [ 85.811110][ T5971] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=5971 comm=syz.3.928 [ 85.823627][ T5971] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=5971 comm=syz.3.928 [ 85.841295][ T35] hid-generic 0000:0003:0000.0001: unknown main item tag 0x0 [ 85.848934][ T35] hid-generic 0000:0003:0000.0001: unknown main item tag 0x0 [ 85.856552][ T35] hid-generic 0000:0003:0000.0001: unknown main item tag 0x0 [ 85.863998][ T35] hid-generic 0000:0003:0000.0001: item fetching failed at offset 9/10 [ 85.872849][ T35] hid-generic 0000:0003:0000.0001: probe with driver hid-generic failed with error -22 [ 86.003472][ T5991] FAULT_INJECTION: forcing a failure. [ 86.003472][ T5991] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 86.016687][ T5991] CPU: 0 UID: 0 PID: 5991 Comm: syz.3.936 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 86.016783][ T5991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 86.016798][ T5991] Call Trace: [ 86.016806][ T5991] [ 86.016815][ T5991] dump_stack_lvl+0xf2/0x150 [ 86.016849][ T5991] dump_stack+0x15/0x1a [ 86.016925][ T5991] should_fail_ex+0x24a/0x260 [ 86.016966][ T5991] should_fail+0xb/0x10 [ 86.017008][ T5991] should_fail_usercopy+0x1a/0x20 [ 86.017029][ T5991] _copy_from_user+0x1c/0xa0 [ 86.017055][ T5991] kstrtouint_from_user+0x76/0xe0 [ 86.017169][ T5991] ? 0xffffffff81000000 [ 86.017183][ T5991] ? selinux_file_permission+0x22a/0x360 [ 86.017213][ T5991] proc_fail_nth_write+0x4f/0x150 [ 86.017290][ T5991] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 86.017321][ T5991] vfs_write+0x27d/0x920 [ 86.017345][ T5991] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 86.017402][ T5991] ? __fget_files+0x17c/0x1c0 [ 86.017432][ T5991] ksys_write+0xe8/0x1b0 [ 86.017453][ T5991] __x64_sys_write+0x42/0x50 [ 86.017555][ T5991] x64_sys_call+0x287e/0x2dc0 [ 86.017588][ T5991] do_syscall_64+0xc9/0x1c0 [ 86.017618][ T5991] ? clear_bhb_loop+0x55/0xb0 [ 86.017651][ T5991] ? clear_bhb_loop+0x55/0xb0 [ 86.017721][ T5991] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 86.017753][ T5991] RIP: 0033:0x7f789f48b89f [ 86.017769][ T5991] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 86.017791][ T5991] RSP: 002b:00007f789daf7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 86.017813][ T5991] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f789f48b89f [ 86.017827][ T5991] RDX: 0000000000000001 RSI: 00007f789daf70a0 RDI: 0000000000000004 [ 86.017840][ T5991] RBP: 00007f789daf7090 R08: 0000000000000000 R09: 0000000000000000 [ 86.017851][ T5991] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 86.017862][ T5991] R13: 0000000000000000 R14: 00007f789f6a5fa0 R15: 00007ffe61cb8bf8 [ 86.017959][ T5991] [ 86.254933][ T5999] FAULT_INJECTION: forcing a failure. [ 86.254933][ T5999] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 86.268323][ T5999] CPU: 0 UID: 0 PID: 5999 Comm: syz.0.940 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 86.268362][ T5999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 86.268455][ T5999] Call Trace: [ 86.268463][ T5999] [ 86.268472][ T5999] dump_stack_lvl+0xf2/0x150 [ 86.268506][ T5999] dump_stack+0x15/0x1a [ 86.268532][ T5999] should_fail_ex+0x24a/0x260 [ 86.268639][ T5999] should_fail+0xb/0x10 [ 86.268676][ T5999] should_fail_usercopy+0x1a/0x20 [ 86.268699][ T5999] _copy_from_user+0x1c/0xa0 [ 86.268727][ T5999] copy_msghdr_from_user+0x54/0x2a0 [ 86.268757][ T5999] ? __fget_files+0x17c/0x1c0 [ 86.268793][ T5999] __sys_sendmsg+0x13e/0x230 [ 86.268845][ T5999] __x64_sys_sendmsg+0x46/0x50 [ 86.268953][ T5999] x64_sys_call+0x2734/0x2dc0 [ 86.268985][ T5999] do_syscall_64+0xc9/0x1c0 [ 86.269015][ T5999] ? clear_bhb_loop+0x55/0xb0 [ 86.269046][ T5999] ? clear_bhb_loop+0x55/0xb0 [ 86.269094][ T5999] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 86.269196][ T5999] RIP: 0033:0x7f970499cde9 [ 86.269214][ T5999] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 86.269233][ T5999] RSP: 002b:00007f9703007038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 86.269254][ T5999] RAX: ffffffffffffffda RBX: 00007f9704bb5fa0 RCX: 00007f970499cde9 [ 86.269345][ T5999] RDX: 0000000000000000 RSI: 0000400000001600 RDI: 0000000000000005 [ 86.269360][ T5999] RBP: 00007f9703007090 R08: 0000000000000000 R09: 0000000000000000 [ 86.269374][ T5999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 86.269439][ T5999] R13: 0000000000000000 R14: 00007f9704bb5fa0 R15: 00007ffcb49d8338 [ 86.269460][ T5999] [ 86.389620][ T6014] Cannot find set identified by id 0 to match [ 86.530210][ T6020] netlink: 16 bytes leftover after parsing attributes in process `syz.0.947'. [ 86.572274][ T6024] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 86.630374][ T6024] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 86.659894][ T6024] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 86.674941][ T6027] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 86.719974][ T6024] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 86.759926][ T6027] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 86.795325][ T6024] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.807003][ T6024] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.820729][ T6024] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.830872][ T6027] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 86.844143][ T6024] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.880173][ T6027] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 86.946407][ T6027] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.967739][ T6027] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.980734][ T6027] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.993357][ T6027] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.995514][ T6045] Cannot find set identified by id 0 to match [ 87.079689][ T6053] netlink: 12 bytes leftover after parsing attributes in process `syz.0.960'. [ 87.093259][ T6053] block device autoloading is deprecated and will be removed. [ 87.101665][ T6053] syz.0.960: attempt to access beyond end of device [ 87.101665][ T6053] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 87.116161][ T6053] netlink: 76 bytes leftover after parsing attributes in process `syz.0.960'. [ 87.452309][ T6078] netlink: 'syz.3.970': attribute type 4 has an invalid length. [ 87.474430][ T6078] netlink: 8 bytes leftover after parsing attributes in process `syz.3.970'. [ 87.487259][ T6078] netlink: 'syz.3.970': attribute type 4 has an invalid length. [ 87.613750][ T6082] netlink: 16 bytes leftover after parsing attributes in process `syz.3.972'. [ 88.356123][ T6115] lo speed is unknown, defaulting to 1000 [ 89.200968][ T6157] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 89.251267][ T6157] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 89.281067][ T6168] loop0: detected capacity change from 0 to 512 [ 89.321872][ T6157] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 89.350358][ T6157] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 89.967510][ T6201] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.030086][ T6201] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.120119][ T6201] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.180231][ T6201] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.190253][ T6218] FAULT_INJECTION: forcing a failure. [ 90.190253][ T6218] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 90.203475][ T6218] CPU: 1 UID: 0 PID: 6218 Comm: syz.3.1026 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 90.203501][ T6218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 90.203513][ T6218] Call Trace: [ 90.203519][ T6218] [ 90.203602][ T6218] dump_stack_lvl+0xf2/0x150 [ 90.203637][ T6218] dump_stack+0x15/0x1a [ 90.203662][ T6218] should_fail_ex+0x24a/0x260 [ 90.203703][ T6218] should_fail+0xb/0x10 [ 90.203791][ T6218] should_fail_usercopy+0x1a/0x20 [ 90.203815][ T6218] _copy_from_user+0x1c/0xa0 [ 90.203843][ T6218] get_timespec64+0x49/0x140 [ 90.203881][ T6218] __se_sys_nanosleep+0x46/0x2c0 [ 90.203919][ T6218] ? ksys_write+0x176/0x1b0 [ 90.203946][ T6218] ? native_tss_update_io_bitmap+0x17b/0x200 [ 90.203989][ T6218] __x64_sys_nanosleep+0x31/0x40 [ 90.204015][ T6218] x64_sys_call+0x1ea7/0x2dc0 [ 90.204048][ T6218] do_syscall_64+0xc9/0x1c0 [ 90.204077][ T6218] ? clear_bhb_loop+0x55/0xb0 [ 90.204111][ T6218] ? clear_bhb_loop+0x55/0xb0 [ 90.204156][ T6218] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 90.204189][ T6218] RIP: 0033:0x7f789f48cde9 [ 90.204207][ T6218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 90.204224][ T6218] RSP: 002b:00007f789daf7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000023 [ 90.204290][ T6218] RAX: ffffffffffffffda RBX: 00007f789f6a5fa0 RCX: 00007f789f48cde9 [ 90.204306][ T6218] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 90.204331][ T6218] RBP: 00007f789daf7090 R08: 0000000000000000 R09: 0000000000000000 [ 90.204343][ T6218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 90.204354][ T6218] R13: 0000000000000000 R14: 00007f789f6a5fa0 R15: 00007ffe61cb8bf8 [ 90.204372][ T6218] [ 90.279889][ T6214] 9pnet_fd: Insufficient options for proto=fd [ 90.329035][ T6222] Cannot find set identified by id 0 to match [ 90.454032][ T29] kauditd_printk_skb: 111 callbacks suppressed [ 90.454047][ T29] audit: type=1400 audit(1738988064.045:1852): avc: denied { write } for pid=6228 comm="syz.0.1030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 90.522069][ T6201] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.538610][ T6201] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.560161][ T6201] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.584234][ T6201] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.650483][ T6241] loop0: detected capacity change from 0 to 2048 [ 90.818248][ T6241] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 91.062538][ T3307] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 91.179863][ T3156] hid-generic 0000:0003:0000.0002: unknown main item tag 0x0 [ 91.188062][ T3156] hid-generic 0000:0003:0000.0002: hidraw0: HID v0.00 Device [syz0] on syz1 [ 91.225465][ T29] audit: type=1400 audit(1738988064.815:1853): avc: denied { connect } for pid=6248 comm="syz.4.1037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 91.734252][ T29] audit: type=1326 audit(1738988065.325:1854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6268 comm="syz.2.1044" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb28cdecde9 code=0x7ffc0000 [ 91.758603][ T29] audit: type=1326 audit(1738988065.325:1855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6268 comm="syz.2.1044" exe="/root/syz-executor" sig=0 arch=c000003e syscall=256 compat=0 ip=0x7fb28cdecde9 code=0x7ffc0000 [ 91.806415][ T6273] lo speed is unknown, defaulting to 1000 [ 91.888288][ T29] audit: type=1326 audit(1738988065.415:1856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6268 comm="syz.2.1044" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb28cdecde9 code=0x7ffc0000 [ 91.912043][ T29] audit: type=1326 audit(1738988065.415:1857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6268 comm="syz.2.1044" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb28cdecde9 code=0x7ffc0000 [ 91.935543][ T29] audit: type=1326 audit(1738988065.425:1858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6268 comm="syz.2.1044" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fb28cdecde9 code=0x7ffc0000 [ 91.958959][ T29] audit: type=1326 audit(1738988065.425:1859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6268 comm="syz.2.1044" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fb28cdece23 code=0x7ffc0000 [ 91.982204][ T29] audit: type=1326 audit(1738988065.435:1860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6268 comm="syz.2.1044" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fb28cdeb89f code=0x7ffc0000 [ 92.005638][ T29] audit: type=1326 audit(1738988065.435:1861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6268 comm="syz.2.1044" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7fb28cdece77 code=0x7ffc0000 [ 92.046107][ T6157] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.059564][ T6272] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(8) [ 92.066116][ T6272] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 92.073768][ T6272] vhci_hcd vhci_hcd.0: Device attached [ 92.086754][ T6157] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.113507][ T6157] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.139622][ T6157] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.204933][ T6279] 9pnet_fd: Insufficient options for proto=fd [ 92.236616][ T6282] loop0: detected capacity change from 0 to 512 [ 92.300698][ T6282] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 92.318371][ T6282] EXT4-fs (loop0): orphan cleanup on readonly fs [ 92.326164][ T6282] EXT4-fs warning (device loop0): ext4_enable_quotas:7145: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 92.352281][ T3377] usb 5-1: new low-speed USB device number 2 using vhci_hcd [ 92.369292][ T6282] EXT4-fs (loop0): Cannot turn on quotas: error -117 [ 92.378896][ T6282] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm syz.0.1047: bg 0: block 40: padding at end of block bitmap is not set [ 92.429817][ T6282] EXT4-fs error (device loop0) in ext4_mb_clear_bb:6550: Corrupt filesystem [ 92.438241][ T6274] vhci_hcd: connection reset by peer [ 92.448393][ T50] vhci_hcd: stop threads [ 92.452667][ T50] vhci_hcd: release socket [ 92.457115][ T50] vhci_hcd: disconnect device [ 92.474885][ T6282] EXT4-fs (loop0): 1 truncate cleaned up [ 92.509654][ T6282] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 92.643770][ T3307] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 92.689102][ T6294] FAULT_INJECTION: forcing a failure. [ 92.689102][ T6294] name failslab, interval 1, probability 0, space 0, times 0 [ 92.701876][ T6294] CPU: 1 UID: 0 PID: 6294 Comm: syz.4.1051 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 92.701901][ T6294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 92.701948][ T6294] Call Trace: [ 92.701955][ T6294] [ 92.701965][ T6294] dump_stack_lvl+0xf2/0x150 [ 92.702005][ T6294] dump_stack+0x15/0x1a [ 92.702063][ T6294] should_fail_ex+0x24a/0x260 [ 92.702103][ T6294] ? proc_do_submiturb+0x83a/0x1de0 [ 92.702127][ T6294] should_failslab+0x8f/0xb0 [ 92.702158][ T6294] __kmalloc_cache_noprof+0x4e/0x320 [ 92.702255][ T6294] ? mntput+0x49/0x70 [ 92.702273][ T6294] proc_do_submiturb+0x83a/0x1de0 [ 92.702293][ T6294] ? path_openat+0x1a20/0x1fc0 [ 92.702317][ T6294] ? should_fail_ex+0xd7/0x260 [ 92.702359][ T6294] usbdev_ioctl+0x1d86/0x3e00 [ 92.702465][ T6294] ? do_vfs_ioctl+0x96e/0x1530 [ 92.702491][ T6294] ? selinux_file_ioctl+0x2f7/0x380 [ 92.702518][ T6294] ? __fget_files+0x17c/0x1c0 [ 92.702552][ T6294] ? __pfx_usbdev_ioctl+0x10/0x10 [ 92.702657][ T6294] __se_sys_ioctl+0xc9/0x140 [ 92.702680][ T6294] __x64_sys_ioctl+0x43/0x50 [ 92.702757][ T6294] x64_sys_call+0x1690/0x2dc0 [ 92.702789][ T6294] do_syscall_64+0xc9/0x1c0 [ 92.702814][ T6294] ? clear_bhb_loop+0x55/0xb0 [ 92.702840][ T6294] ? clear_bhb_loop+0x55/0xb0 [ 92.702932][ T6294] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 92.702958][ T6294] RIP: 0033:0x7fc2f5ddcde9 [ 92.702976][ T6294] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 92.703004][ T6294] RSP: 002b:00007fc2f4447038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 92.703026][ T6294] RAX: ffffffffffffffda RBX: 00007fc2f5ff5fa0 RCX: 00007fc2f5ddcde9 [ 92.703041][ T6294] RDX: 0000400000000280 RSI: 000000008038550a RDI: 0000000000000006 [ 92.703118][ T6294] RBP: 00007fc2f4447090 R08: 0000000000000000 R09: 0000000000000000 [ 92.703128][ T6294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.703187][ T6294] R13: 0000000000000000 R14: 00007fc2f5ff5fa0 R15: 00007fff5c90e078 [ 92.703210][ T6294] [ 92.989051][ T6297] usb usb4: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 92.996626][ T6297] vhci_hcd: ClearPortFeature: USB_PORT_FEAT_SUSPEND req not supported for USB 3.0 roothub [ 93.448974][ T35] hid-generic 0000:0004:0005.0003: unknown main item tag 0x0 [ 93.456431][ T35] hid-generic 0000:0004:0005.0003: unknown main item tag 0x0 [ 93.463969][ T35] hid-generic 0000:0004:0005.0003: unknown main item tag 0x0 [ 93.471401][ T35] hid-generic 0000:0004:0005.0003: unknown main item tag 0x0 [ 93.478842][ T35] hid-generic 0000:0004:0005.0003: unknown main item tag 0x0 [ 93.486228][ T35] hid-generic 0000:0004:0005.0003: unknown main item tag 0x0 [ 93.493725][ T35] hid-generic 0000:0004:0005.0003: unknown main item tag 0x0 [ 93.501284][ T35] hid-generic 0000:0004:0005.0003: unknown main item tag 0x0 [ 93.508932][ T35] hid-generic 0000:0004:0005.0003: unknown main item tag 0x0 [ 93.516386][ T35] hid-generic 0000:0004:0005.0003: unknown main item tag 0x0 [ 93.523836][ T35] hid-generic 0000:0004:0005.0003: unknown main item tag 0x0 [ 93.531317][ T35] hid-generic 0000:0004:0005.0003: unknown main item tag 0x0 [ 93.538891][ T35] hid-generic 0000:0004:0005.0003: unknown main item tag 0x0 [ 93.546369][ T35] hid-generic 0000:0004:0005.0003: unknown main item tag 0x0 [ 93.553863][ T35] hid-generic 0000:0004:0005.0003: unknown main item tag 0x0 [ 93.561273][ T35] hid-generic 0000:0004:0005.0003: unknown main item tag 0x0 [ 93.568731][ T35] hid-generic 0000:0004:0005.0003: unknown main item tag 0x0 [ 93.577039][ T35] hid-generic 0000:0004:0005.0003: hidraw0: HID v0.00 Device [syz0] on syz0 [ 94.499270][ T6345] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1070'. [ 94.509351][ T6345] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 94.583844][ T3294] udevd[3294]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 95.215066][ T6361] netlink: 68 bytes leftover after parsing attributes in process `syz.0.1075'. [ 95.434171][ T6373] FAULT_INJECTION: forcing a failure. [ 95.434171][ T6373] name failslab, interval 1, probability 0, space 0, times 0 [ 95.447060][ T6373] CPU: 0 UID: 0 PID: 6373 Comm: syz.3.1081 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 95.447089][ T6373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 95.447104][ T6373] Call Trace: [ 95.447113][ T6373] [ 95.447122][ T6373] dump_stack_lvl+0xf2/0x150 [ 95.447159][ T6373] dump_stack+0x15/0x1a [ 95.447184][ T6373] should_fail_ex+0x24a/0x260 [ 95.447245][ T6373] should_failslab+0x8f/0xb0 [ 95.447276][ T6373] __kmalloc_noprof+0xab/0x3f0 [ 95.447317][ T6373] ? copy_splice_read+0xb5/0x5b0 [ 95.447343][ T6373] copy_splice_read+0xb5/0x5b0 [ 95.447385][ T6373] ? __kmalloc_noprof+0x284/0x3f0 [ 95.447452][ T6373] ? alloc_pipe_info+0x1cb/0x360 [ 95.447603][ T6373] ? __pfx_copy_splice_read+0x10/0x10 [ 95.447648][ T6373] splice_direct_to_actor+0x269/0x670 [ 95.447691][ T6373] ? __pfx_direct_splice_actor+0x10/0x10 [ 95.447721][ T6373] do_splice_direct+0xd7/0x150 [ 95.447761][ T6373] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 95.447794][ T6373] do_sendfile+0x398/0x660 [ 95.447890][ T6373] __x64_sys_sendfile64+0x110/0x150 [ 95.447921][ T6373] x64_sys_call+0xfbd/0x2dc0 [ 95.447960][ T6373] do_syscall_64+0xc9/0x1c0 [ 95.447990][ T6373] ? clear_bhb_loop+0x55/0xb0 [ 95.448023][ T6373] ? clear_bhb_loop+0x55/0xb0 [ 95.448124][ T6373] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 95.448157][ T6373] RIP: 0033:0x7f789f48cde9 [ 95.448175][ T6373] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 95.448201][ T6373] RSP: 002b:00007f789daf7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 95.448222][ T6373] RAX: ffffffffffffffda RBX: 00007f789f6a5fa0 RCX: 00007f789f48cde9 [ 95.448235][ T6373] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 95.448270][ T6373] RBP: 00007f789daf7090 R08: 0000000000000000 R09: 0000000000000000 [ 95.448284][ T6373] R10: 0000000000fffa83 R11: 0000000000000246 R12: 0000000000000001 [ 95.448299][ T6373] R13: 0000000000000000 R14: 00007f789f6a5fa0 R15: 00007ffe61cb8bf8 [ 95.448320][ T6373] [ 95.733761][ T6395] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 95.734200][ T6395] 9pnet_fd: Insufficient options for proto=fd [ 96.380473][ T29] kauditd_printk_skb: 37 callbacks suppressed [ 96.380489][ T29] audit: type=1400 audit(1738988069.975:1898): avc: denied { setopt } for pid=6419 comm="syz.4.1096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 96.496070][ T6428] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1099'. [ 96.505122][ T6428] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1099'. [ 96.875468][ T29] audit: type=1400 audit(1738988070.455:1899): avc: denied { connect } for pid=6439 comm="syz.1.1104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 96.895425][ T29] audit: type=1400 audit(1738988070.455:1900): avc: denied { name_connect } for pid=6439 comm="syz.1.1104" dest=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=dccp_socket permissive=1 [ 96.977688][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 96.985148][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 96.992645][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 96.995306][ T29] audit: type=1400 audit(1738988070.555:1901): avc: denied { map_create } for pid=6447 comm="syz.0.1109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 97.000046][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.000071][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.034429][ T29] audit: type=1400 audit(1738988070.555:1902): avc: denied { map_read map_write } for pid=6447 comm="syz.0.1109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 97.054394][ T29] audit: type=1400 audit(1738988070.555:1903): avc: denied { prog_load } for pid=6445 comm="syz.3.1107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 97.073572][ T29] audit: type=1400 audit(1738988070.555:1904): avc: denied { bpf } for pid=6445 comm="syz.3.1107" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 97.094151][ T29] audit: type=1400 audit(1738988070.555:1905): avc: denied { perfmon } for pid=6445 comm="syz.3.1107" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 97.115053][ T29] audit: type=1400 audit(1738988070.555:1906): avc: denied { prog_run } for pid=6445 comm="syz.3.1107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 97.134165][ T29] audit: type=1400 audit(1738988070.565:1907): avc: denied { read write } for pid=6445 comm="syz.3.1107" name="uhid" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 97.369202][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.376642][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.384153][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x4 [ 97.391599][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.399042][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.406568][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x4 [ 97.413993][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.421581][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.429108][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.436535][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.444060][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x4 [ 97.451614][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.459043][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.466475][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.473916][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.481523][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.488955][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.496428][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.503937][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.511450][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.518993][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.526410][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.534035][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.541504][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.548933][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.556408][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.563900][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.571337][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.578774][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.586189][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.593633][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.601102][ T24] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 97.610008][ T3377] usb 5-1: enqueue for inactive port 0 [ 97.615685][ T3377] usb 5-1: enqueue for inactive port 0 [ 97.623666][ T24] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz0] on syz0 [ 97.637552][ T3968] udevd[3968]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 98.338718][ T6489] ip6tnl1: entered promiscuous mode [ 98.344088][ T6489] ip6tnl1: entered allmulticast mode [ 98.580664][ T6491] FAULT_INJECTION: forcing a failure. [ 98.580664][ T6491] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 98.594414][ T6491] CPU: 0 UID: 0 PID: 6491 Comm: syz.1.1122 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 98.594445][ T6491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 98.594457][ T6491] Call Trace: [ 98.594462][ T6491] [ 98.594469][ T6491] dump_stack_lvl+0xf2/0x150 [ 98.594504][ T6491] dump_stack+0x15/0x1a [ 98.594551][ T6491] should_fail_ex+0x24a/0x260 [ 98.594594][ T6491] should_fail+0xb/0x10 [ 98.594626][ T6491] should_fail_usercopy+0x1a/0x20 [ 98.594644][ T6491] _copy_from_user+0x1c/0xa0 [ 98.594703][ T6491] kstrtouint_from_user+0x76/0xe0 [ 98.594734][ T6491] ? 0xffffffff81000000 [ 98.594767][ T6491] ? selinux_file_permission+0x22a/0x360 [ 98.594796][ T6491] proc_fail_nth_write+0x4f/0x150 [ 98.594826][ T6491] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 98.594887][ T6491] vfs_write+0x27d/0x920 [ 98.594906][ T6491] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 98.594931][ T6491] ? __fget_files+0x17c/0x1c0 [ 98.595026][ T6491] ksys_write+0xe8/0x1b0 [ 98.595053][ T6491] __x64_sys_write+0x42/0x50 [ 98.595077][ T6491] x64_sys_call+0x287e/0x2dc0 [ 98.595306][ T6491] do_syscall_64+0xc9/0x1c0 [ 98.595358][ T6491] ? clear_bhb_loop+0x55/0xb0 [ 98.595391][ T6491] ? clear_bhb_loop+0x55/0xb0 [ 98.595420][ T6491] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 98.595445][ T6491] RIP: 0033:0x7f939847b89f [ 98.595459][ T6491] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 98.595510][ T6491] RSP: 002b:00007f9396aa5030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 98.595610][ T6491] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f939847b89f [ 98.595653][ T6491] RDX: 0000000000000001 RSI: 00007f9396aa50a0 RDI: 000000000000000b [ 98.595666][ T6491] RBP: 00007f9396aa5090 R08: 0000000000000000 R09: 0000000000000000 [ 98.595679][ T6491] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 98.595693][ T6491] R13: 0000000000000000 R14: 00007f9398696160 R15: 00007ffe167f15e8 [ 98.595788][ T6491] [ 98.610001][ T3377] vhci_hcd: vhci_device speed not set [ 99.221417][ T6515] ip6tnl1: entered promiscuous mode [ 99.226707][ T6515] ip6tnl1: entered allmulticast mode [ 99.297725][ T6510] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 99.409918][ T6510] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 99.490146][ T6510] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 99.530163][ T6510] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 99.624304][ T6510] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.635680][ T6510] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.648002][ T6510] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.660095][ T6510] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 99.850689][ T6572] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 99.899638][ T6572] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 99.959878][ T6572] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 100.019544][ T6572] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 100.192287][ T6593] netlink: 'syz.1.1153': attribute type 10 has an invalid length. [ 100.204103][ T6593] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 100.213184][ T6593] team0: Failed to send options change via netlink (err -105) [ 100.220841][ T6593] team0: Port device dummy0 added [ 100.269237][ T6599] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 100.288596][ T6599] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 100.601903][ T6629] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 100.617164][ T8] lo speed is unknown, defaulting to 1000 [ 100.859993][ T6649] Invalid ELF header magic: != ELF [ 100.865883][ T6649] netlink: 9286 bytes leftover after parsing attributes in process `syz.4.1174'. [ 100.939974][ T6653] FAULT_INJECTION: forcing a failure. [ 100.939974][ T6653] name failslab, interval 1, probability 0, space 0, times 0 [ 100.952740][ T6653] CPU: 1 UID: 0 PID: 6653 Comm: syz.4.1176 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 100.952806][ T6653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 100.952822][ T6653] Call Trace: [ 100.952829][ T6653] [ 100.952836][ T6653] dump_stack_lvl+0xf2/0x150 [ 100.952890][ T6653] dump_stack+0x15/0x1a [ 100.952913][ T6653] should_fail_ex+0x24a/0x260 [ 100.952955][ T6653] should_failslab+0x8f/0xb0 [ 100.952987][ T6653] kmem_cache_alloc_noprof+0x52/0x320 [ 100.953021][ T6653] ? skb_clone+0x154/0x1f0 [ 100.953064][ T6653] skb_clone+0x154/0x1f0 [ 100.953089][ T6653] dev_queue_xmit_nit+0x14b/0x680 [ 100.953108][ T6653] ? __rcu_read_unlock+0x4e/0x70 [ 100.953197][ T6653] dev_hard_start_xmit+0xcc/0x3f0 [ 100.953221][ T6653] ? validate_xmit_skb+0x645/0x830 [ 100.953246][ T6653] __dev_queue_xmit+0x100a/0x2090 [ 100.953272][ T6653] ? __dev_queue_xmit+0x186/0x2090 [ 100.953373][ T6653] __netlink_deliver_tap+0x3be/0x4f0 [ 100.953407][ T6653] netlink_unicast+0x64a/0x670 [ 100.953461][ T6653] netlink_sendmsg+0x5cc/0x6e0 [ 100.953495][ T6653] ? __pfx_netlink_sendmsg+0x10/0x10 [ 100.953525][ T6653] __sock_sendmsg+0x140/0x180 [ 100.953542][ T6653] ____sys_sendmsg+0x312/0x410 [ 100.953593][ T6653] __sys_sendmsg+0x19d/0x230 [ 100.953636][ T6653] __x64_sys_sendmsg+0x46/0x50 [ 100.953666][ T6653] x64_sys_call+0x2734/0x2dc0 [ 100.953694][ T6653] do_syscall_64+0xc9/0x1c0 [ 100.953716][ T6653] ? clear_bhb_loop+0x55/0xb0 [ 100.953741][ T6653] ? clear_bhb_loop+0x55/0xb0 [ 100.953765][ T6653] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 100.953788][ T6653] RIP: 0033:0x7fc2f5ddcde9 [ 100.953867][ T6653] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 100.953915][ T6653] RSP: 002b:00007fc2f4447038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 100.953936][ T6653] RAX: ffffffffffffffda RBX: 00007fc2f5ff5fa0 RCX: 00007fc2f5ddcde9 [ 100.953950][ T6653] RDX: 0000000000000000 RSI: 0000400000000140 RDI: 0000000000000006 [ 100.953962][ T6653] RBP: 00007fc2f4447090 R08: 0000000000000000 R09: 0000000000000000 [ 100.953973][ T6653] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.953984][ T6653] R13: 0000000000000000 R14: 00007fc2f5ff5fa0 R15: 00007fff5c90e078 [ 100.954015][ T6653] [ 101.297445][ T6670] rdma_op ffff88811402fd80 conn xmit_rdma 0000000000000000 [ 101.428871][ T8] hid-generic 0000:0003:0000.0005: unknown main item tag 0x0 [ 101.430995][ T29] kauditd_printk_skb: 223 callbacks suppressed [ 101.431012][ T29] audit: type=1400 audit(1738988075.025:2131): avc: denied { write } for pid=6682 comm="syz.2.1190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 101.436309][ T8] hid-generic 0000:0003:0000.0005: unknown main item tag 0x0 [ 101.437635][ T8] hid-generic 0000:0003:0000.0005: hidraw0: HID v0.00 Device [syz0] on syz1 [ 101.503526][ T29] audit: type=1400 audit(1738988075.095:2132): avc: denied { write } for pid=6686 comm="syz.4.1191" name="snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 101.503603][ T6687] random: crng reseeded on system resumption [ 101.552363][ T29] audit: type=1400 audit(1738988075.095:2133): avc: denied { open } for pid=6686 comm="syz.4.1191" path="/dev/snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 101.599007][ T29] audit: type=1400 audit(1738988075.185:2134): avc: denied { mounton } for pid=6690 comm="syz.0.1192" path="/263/file0" dev="tmpfs" ino=1396 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 101.621784][ T29] audit: type=1400 audit(1738988075.195:2135): avc: denied { mount } for pid=6690 comm="syz.0.1192" name="/" dev="securityfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 101.649665][ T29] audit: type=1400 audit(1738988075.205:2136): avc: denied { read } for pid=6690 comm="syz.0.1192" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 101.649729][ T29] audit: type=1400 audit(1738988075.205:2137): avc: denied { open } for pid=6690 comm="syz.0.1192" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 101.649772][ T29] audit: type=1400 audit(1738988075.225:2138): avc: denied { ioctl } for pid=6690 comm="syz.0.1192" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9374 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 101.710763][ T29] audit: type=1400 audit(1738988075.305:2139): avc: denied { create } for pid=6696 comm="syz.1.1194" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 101.710797][ T29] audit: type=1400 audit(1738988075.305:2140): avc: denied { map } for pid=6696 comm="syz.1.1194" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=16241 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 101.747202][ T4294] udevd[4294]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 101.759040][ T3378] hid-generic 0000:0003:0000.0006: unknown main item tag 0x0 [ 101.835433][ T3378] hid-generic 0000:0003:0000.0006: unknown main item tag 0x0 [ 101.836119][ T3378] hid-generic 0000:0003:0000.0006: hidraw0: HID v0.00 Device [syz0] on syz1 [ 102.116985][ T6728] netlink: 'syz.4.1206': attribute type 4 has an invalid length. [ 102.130618][ T6728] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1206'. [ 102.141163][ T6728] netlink: 'syz.4.1206': attribute type 4 has an invalid length. [ 102.173659][ T6733] Cannot find set identified by id 0 to match [ 102.632494][ T6753] tap0: tun_chr_ioctl cmd 1074025677 [ 102.663433][ T6753] tap0: linktype set to 512 [ 102.684235][ T6748] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1213'. [ 103.514024][ T3294] udevd[3294]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 103.957641][ T6813] Invalid ELF header magic: != ELF [ 103.966488][ T6813] netlink: 9286 bytes leftover after parsing attributes in process `syz.0.1238'. [ 104.304465][ T6572] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.316798][ T6572] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.330185][ T6572] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.341466][ T6572] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.357354][ T6833] x_tables: duplicate underflow at hook 1 [ 105.043157][ T6859] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 105.080574][ T6863] blktrace: Concurrent blktraces are not allowed on sg0 [ 105.091690][ T6859] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 105.139702][ T6859] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 105.200002][ T6859] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 105.265360][ T6859] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.285749][ T6859] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.299457][ T6875] ip6tnl1: entered promiscuous mode [ 105.304796][ T6875] ip6tnl1: entered allmulticast mode [ 105.317090][ T6859] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.329660][ T6859] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 105.438480][ T6889] ip6tnl1: entered promiscuous mode [ 105.443731][ T6889] ip6tnl1: entered allmulticast mode [ 105.629243][ T6916] Cannot find set identified by id 0 to match [ 105.666388][ T6922] 9pnet_fd: Insufficient options for proto=fd [ 105.708339][ T6922] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1284'. [ 105.724005][ T6922] netlink: 3 bytes leftover after parsing attributes in process `syz.3.1284'. [ 105.767101][ T6934] dccp_invalid_packet: P.Data Offset(0) too small [ 105.788852][ T6934] autofs: Unknown parameter 'no9á ‘ýPƒ¹G!8°‰™…EŸ8-ö¤ ™ŠÇÅ–èEeÕ¬( IrÝ\•žu}ibˆŒÞêT0;´Œmy´[Gc¯î#Ï>QkÏübYü&“àÌ#“w„@/VV¼Lë~1ƒ2§÷lÿh–O„h'®ÈûrK1‚\kU{!e½úó¬Üš7»ßß [ 105.788852][ T6934] ÄUúeâ[¦ÓÎ%#s' [ 105.831736][ T6926] netlink: 68 bytes leftover after parsing attributes in process `syz.2.1286'. [ 105.945898][ T6946] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 106.227301][ T6948] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 106.237504][ T6950] Cannot find set identified by id 0 to match [ 106.277349][ T6952] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 106.310174][ T6952] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 106.360108][ T6952] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 106.400228][ T6952] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 106.609825][ T6964] Cannot find set identified by id 0 to match [ 106.690600][ T29] kauditd_printk_skb: 401 callbacks suppressed [ 106.690618][ T29] audit: type=1400 audit(1738988080.285:2542): avc: denied { read write } for pid=6961 comm="syz.2.1296" name="ppp" dev="devtmpfs" ino=139 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 106.720359][ T29] audit: type=1400 audit(1738988080.285:2543): avc: denied { open } for pid=6961 comm="syz.2.1296" path="/dev/ppp" dev="devtmpfs" ino=139 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 106.743650][ T29] audit: type=1400 audit(1738988080.285:2544): avc: denied { ioctl } for pid=6961 comm="syz.2.1296" path="/dev/ppp" dev="devtmpfs" ino=139 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 106.775756][ T6976] Cannot find set identified by id 0 to match [ 106.798272][ T29] audit: type=1400 audit(1738988080.325:2545): avc: denied { name_bind } for pid=6971 comm="syz.4.1300" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 106.820037][ T29] audit: type=1400 audit(1738988080.325:2546): avc: denied { node_bind } for pid=6971 comm="syz.4.1300" saddr=fe80::aa src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 106.941529][ T6983] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 106.974629][ T29] audit: type=1400 audit(1738988080.565:2547): avc: denied { create } for pid=6982 comm="syz.4.1305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 107.079232][ T29] audit: type=1400 audit(1738988080.675:2548): avc: denied { mount } for pid=6986 comm="syz.4.1307" name="/" dev="bdev" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bdev_t tclass=filesystem permissive=1 [ 107.133969][ T29] audit: type=1400 audit(1738988080.725:2549): avc: denied { create } for pid=6986 comm="syz.4.1307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 107.157486][ T29] audit: type=1400 audit(1738988080.755:2550): avc: denied { ioctl } for pid=6986 comm="syz.4.1307" path="socket:[18239]" dev="sockfs" ino=18239 ioctlcmd=0x89e3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 107.271239][ T6990] netlink: 68 bytes leftover after parsing attributes in process `syz.1.1308'. [ 107.385126][ T6992] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 107.684689][ T29] audit: type=1400 audit(1738988081.275:2551): avc: denied { setopt } for pid=7011 comm="syz.2.1314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 108.614977][ T7047] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 108.703511][ T7052] Cannot find set identified by id 0 to match [ 108.992860][ T6952] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.011327][ T6952] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.039524][ T6952] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.051283][ T6952] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.912985][ T7118] netlink: 68 bytes leftover after parsing attributes in process `syz.1.1361'. [ 110.026224][ T7125] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 110.830480][ T7163] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 110.943143][ T7165] netlink: 68 bytes leftover after parsing attributes in process `syz.4.1381'. [ 111.056369][ T7186] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 111.732029][ T7198] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 111.747059][ T7200] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 111.859920][ T29] kauditd_printk_skb: 75 callbacks suppressed [ 111.859937][ T29] audit: type=1400 audit(1738988085.445:2627): avc: denied { create } for pid=7215 comm="syz.2.1403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 111.886196][ T29] audit: type=1400 audit(1738988085.465:2628): avc: denied { map_create } for pid=7219 comm="syz.4.1405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 111.905564][ T29] audit: type=1400 audit(1738988085.465:2629): avc: denied { map_read map_write } for pid=7219 comm="syz.4.1405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 111.925528][ T29] audit: type=1400 audit(1738988085.465:2630): avc: denied { prog_load } for pid=7219 comm="syz.4.1405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 111.944843][ T29] audit: type=1400 audit(1738988085.465:2631): avc: denied { bpf } for pid=7219 comm="syz.4.1405" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 111.965405][ T29] audit: type=1400 audit(1738988085.465:2632): avc: denied { perfmon } for pid=7219 comm="syz.4.1405" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 111.986338][ T29] audit: type=1400 audit(1738988085.465:2633): avc: denied { execmem } for pid=7219 comm="syz.4.1405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 112.006580][ T29] audit: type=1400 audit(1738988085.595:2634): avc: denied { connect } for pid=7215 comm="syz.2.1403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 112.122742][ T29] audit: type=1400 audit(1738988085.715:2635): avc: denied { create } for pid=7222 comm="syz.1.1406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 112.144144][ T29] audit: type=1400 audit(1738988085.735:2636): avc: denied { write } for pid=7222 comm="syz.1.1406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 112.165282][ T7223] netlink: 68 bytes leftover after parsing attributes in process `syz.1.1406'. [ 112.279606][ T7230] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 112.662125][ T7246] Cannot find set identified by id 0 to match [ 112.921448][ T7260] Cannot find set identified by id 0 to match [ 113.066354][ T7272] lo speed is unknown, defaulting to 1000 [ 113.224658][ T7272] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(8) [ 113.231324][ T7272] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 113.239010][ T7272] vhci_hcd vhci_hcd.0: Device attached [ 113.488246][ T4751] usb 9-1: new low-speed USB device number 2 using vhci_hcd [ 113.548992][ T7279] Cannot find set identified by id 0 to match [ 113.830671][ T7276] vhci_hcd: connection reset by peer [ 113.895609][ T50] vhci_hcd: stop threads [ 113.899989][ T50] vhci_hcd: release socket [ 113.904483][ T50] vhci_hcd: disconnect device [ 113.962619][ T7293] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 114.083451][ T7308] Cannot find set identified by id 0 to match [ 114.120873][ T7310] Cannot find set identified by id 0 to match [ 114.833179][ T7334] x_tables: duplicate underflow at hook 1 [ 115.679572][ T7360] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 115.992617][ T7365] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 116.213220][ T7369] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 116.230683][ T7369] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 116.280246][ T7369] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 116.372420][ T7369] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 116.457269][ T7391] loop0: detected capacity change from 0 to 512 [ 116.482402][ T7391] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 116.495899][ T7391] ext4 filesystem being mounted at /317/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 116.499532][ T7393] ip6tnl1: entered promiscuous mode [ 116.511719][ T7393] ip6tnl1: entered allmulticast mode [ 116.541752][ T7400] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 116.556667][ T7369] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 116.567575][ T7403] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 116.585468][ T7369] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 116.596197][ T7400] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 116.610125][ T7369] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 116.622038][ T7369] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 116.640983][ T7400] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 116.785366][ T7400] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 116.850307][ T7426] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 116.876507][ T7400] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 116.890679][ T7400] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 116.906849][ T7400] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 116.918667][ T7400] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 116.948269][ T29] kauditd_printk_skb: 275 callbacks suppressed [ 116.948285][ T29] audit: type=1400 audit(1738988090.535:2912): avc: denied { create } for pid=7444 comm="syz.1.1479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 116.974792][ T29] audit: type=1400 audit(1738988090.545:2913): avc: denied { setopt } for pid=7444 comm="syz.1.1479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 116.998628][ T29] audit: type=1400 audit(1738988090.585:2914): avc: denied { execmem } for pid=7444 comm="syz.1.1479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 117.025909][ T29] audit: type=1400 audit(1738988090.615:2915): avc: denied { create } for pid=7446 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 117.074570][ T29] audit: type=1400 audit(1738988090.645:2916): avc: denied { bind } for pid=7446 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 117.093514][ T29] audit: type=1400 audit(1738988090.645:2917): avc: denied { write } for pid=7446 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 117.112412][ T29] audit: type=1400 audit(1738988090.655:2918): avc: denied { append } for pid=7448 comm="syz.2.1481" name="001" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 117.152598][ T29] audit: type=1400 audit(1738988090.745:2919): avc: denied { create } for pid=7453 comm="syz.4.1483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 117.178301][ T7454] Cannot find set identified by id 0 to match [ 117.185128][ T29] audit: type=1400 audit(1738988090.765:2920): avc: denied { create } for pid=7453 comm="syz.4.1483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 117.205875][ T29] audit: type=1400 audit(1738988090.765:2921): avc: denied { bind } for pid=7453 comm="syz.4.1483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 117.939190][ T7398] EXT4-fs error (device loop0): ext4_validate_block_bitmap:432: comm ext4lazyinit: bg 0: block 18: invalid block bitmap [ 118.221078][ T3307] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 118.233848][ T4294] udevd[4294]: inotify_add_watch(7, /dev/loop1, 10) failed: No such file or directory [ 118.479833][ T7489] siw: device registration error -23 [ 118.951434][ T4751] usb 9-1: enqueue for inactive port 0 [ 118.957132][ T4751] usb 9-1: enqueue for inactive port 0 [ 119.029433][ T4751] vhci_hcd: vhci_device speed not set [ 119.431790][ T7526] Cannot find set identified by id 0 to match [ 119.688084][ T7570] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 120.399868][ T7606] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 121.171529][ T7637] Cannot find set identified by id 0 to match [ 121.190480][ T7639] 9pnet_fd: Insufficient options for proto=fd [ 121.358162][ T7665] Cannot find set identified by id 0 to match [ 121.413538][ T7673] Cannot find set identified by id 0 to match [ 121.435982][ T7676] 9pnet_fd: Insufficient options for proto=fd [ 121.538803][ T7684] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 121.734849][ T7703] Cannot find set identified by id 0 to match [ 121.759250][ T7705] 9pnet_fd: Insufficient options for proto=fd [ 122.068789][ T29] kauditd_printk_skb: 276 callbacks suppressed [ 122.068808][ T29] audit: type=1400 audit(1738988095.665:3198): avc: denied { map_create } for pid=7722 comm="syz.4.1573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 122.095249][ T29] audit: type=1400 audit(1738988095.665:3199): avc: denied { map_read map_write } for pid=7722 comm="syz.4.1573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 122.115226][ T29] audit: type=1400 audit(1738988095.665:3200): avc: denied { prog_load } for pid=7722 comm="syz.4.1573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 122.134330][ T29] audit: type=1400 audit(1738988095.665:3201): avc: denied { bpf } for pid=7722 comm="syz.4.1573" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 122.154954][ T29] audit: type=1400 audit(1738988095.665:3202): avc: denied { perfmon } for pid=7722 comm="syz.4.1573" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 122.176201][ T29] audit: type=1400 audit(1738988095.665:3203): avc: denied { prog_run } for pid=7722 comm="syz.4.1573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 122.199384][ T29] audit: type=1400 audit(1738988095.795:3204): avc: denied { create } for pid=7724 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 122.218467][ T29] audit: type=1400 audit(1738988095.795:3205): avc: denied { bind } for pid=7724 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 122.237779][ T29] audit: type=1400 audit(1738988095.795:3206): avc: denied { write } for pid=7724 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 122.256868][ T29] audit: type=1400 audit(1738988095.795:3207): avc: denied { create } for pid=7726 comm="syz.1.1575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 122.580060][ T4294] udevd[4294]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 122.782708][ T7781] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 122.825575][ T4294] udevd[4294]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 122.836994][ T7781] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 122.899690][ T7781] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 123.039663][ T7781] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 123.144285][ T7781] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 123.169174][ T7803] siw: device registration error -23 [ 123.177192][ T7781] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 123.201393][ T7781] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 123.228933][ T7781] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 123.999772][ T7836] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 124.018496][ T3294] udevd[3294]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 124.070078][ T7836] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 124.119697][ T7836] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 124.179855][ T7836] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 124.254765][ T7850] Cannot find set identified by id 0 to match [ 124.255273][ T7836] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 124.273695][ T7836] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 124.286161][ T7836] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 124.297163][ T7836] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 124.456244][ T3294] udevd[3294]: setting owner of /dev/loop0 to uid=0, gid=6 failed: No such file or directory [ 124.467084][ T3294] udevd[3294]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 124.697881][ T7880] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 124.782980][ T7884] netlink: 68 bytes leftover after parsing attributes in process `syz.4.1626'. [ 124.849191][ T7885] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 124.995028][ T4294] udevd[4294]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 125.215050][ T7892] Cannot find set identified by id 0 to match [ 125.596681][ T4294] udevd[4294]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 125.689774][ T7908] 9pnet_fd: Insufficient options for proto=fd [ 125.727345][ T7910] Cannot find set identified by id 0 to match [ 126.003758][ T7926] siw: device registration error -23 [ 126.168169][ T7936] 9pnet_fd: Insufficient options for proto=fd [ 126.313128][ T3294] udevd[3294]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 126.365776][ T4294] udevd[4294]: inotify_add_watch(7, /dev/loop1, 10) failed: No such file or directory [ 126.585176][ T7985] 9pnet_fd: Insufficient options for proto=fd [ 127.105425][ T29] kauditd_printk_skb: 234 callbacks suppressed [ 127.105443][ T29] audit: type=1400 audit(1738988100.685:3442): avc: denied { create } for pid=7996 comm="syz.2.1664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 127.131090][ T29] audit: type=1400 audit(1738988100.685:3443): avc: denied { bind } for pid=7996 comm="syz.2.1664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 127.150349][ T29] audit: type=1400 audit(1738988100.685:3444): avc: denied { write } for pid=7996 comm="syz.2.1664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 127.175402][ T29] audit: type=1400 audit(1738988100.765:3445): avc: denied { create } for pid=7994 comm="syz.1.1663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 127.199084][ T29] audit: type=1400 audit(1738988100.795:3446): avc: denied { write } for pid=7994 comm="syz.1.1663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 127.220556][ T7995] netlink: 68 bytes leftover after parsing attributes in process `syz.1.1663'. [ 127.263712][ T29] audit: type=1400 audit(1738988100.855:3447): avc: denied { create } for pid=8004 comm="syz.2.1667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 127.286539][ T7999] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 127.352261][ T29] audit: type=1400 audit(1738988100.855:3448): avc: denied { write } for pid=8001 comm="syz.3.1666" name="001" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 127.375343][ T29] audit: type=1400 audit(1738988100.855:3449): avc: denied { append } for pid=8006 comm="syz.3.1668" name="001" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 127.398728][ T29] audit: type=1400 audit(1738988100.885:3450): avc: denied { create } for pid=7994 comm="syz.1.1663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 127.419255][ T29] audit: type=1400 audit(1738988100.885:3451): avc: denied { write } for pid=7994 comm="syz.1.1663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 127.645909][ T8020] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 127.657742][ T8025] siw: device registration error -23 [ 127.701648][ T8020] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 127.760803][ T8020] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 127.800407][ T8020] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 127.846346][ T8020] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 127.875432][ T8020] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 127.906149][ T8020] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 127.941291][ T8020] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 128.208949][ T8045] Cannot find set identified by id 0 to match [ 128.400097][ T8052] netlink: 68 bytes leftover after parsing attributes in process `syz.4.1684'. [ 128.516223][ T8052] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 128.913771][ T8072] Cannot find set identified by id 0 to match [ 128.966961][ T8069] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 129.080207][ T8069] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 129.096009][ T8093] Cannot find set identified by id 0 to match [ 129.120205][ T8069] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 129.189992][ T8069] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 129.246122][ T8069] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 129.257951][ T8069] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 129.266738][ T8115] siw: device registration error -23 [ 129.271759][ T8069] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 129.283972][ T8069] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 129.410457][ T4294] udevd[4294]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 129.542299][ T8137] Cannot find set identified by id 0 to match [ 129.886416][ T8166] Cannot find set identified by id 0 to match [ 130.180541][ T4294] udevd[4294]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 130.273121][ T8193] Cannot find set identified by id 0 to match [ 130.703561][ T8207] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 130.965563][ T4294] udevd[4294]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 131.536668][ T8235] Cannot find set identified by id 0 to match [ 132.010703][ T8262] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 132.144968][ T29] kauditd_printk_skb: 372 callbacks suppressed [ 132.144985][ T29] audit: type=1400 audit(1738988105.735:3824): avc: denied { unmount } for pid=3307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 132.193771][ T29] audit: type=1400 audit(1738988105.785:3825): avc: denied { append } for pid=8268 comm="syz.0.1764" name="001" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 132.262539][ T29] audit: type=1400 audit(1738988105.855:3826): avc: denied { create } for pid=8274 comm="syz.0.1767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 132.282505][ T29] audit: type=1400 audit(1738988105.855:3827): avc: denied { setopt } for pid=8274 comm="syz.0.1767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 132.302555][ T29] audit: type=1400 audit(1738988105.875:3828): avc: denied { map_create } for pid=8274 comm="syz.0.1767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 132.321827][ T29] audit: type=1400 audit(1738988105.875:3829): avc: denied { prog_load } for pid=8274 comm="syz.0.1767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 132.341056][ T29] audit: type=1400 audit(1738988105.875:3830): avc: denied { bpf } for pid=8274 comm="syz.0.1767" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 132.361610][ T29] audit: type=1400 audit(1738988105.875:3831): avc: denied { perfmon } for pid=8274 comm="syz.0.1767" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 132.382641][ T29] audit: type=1400 audit(1738988105.875:3832): avc: denied { execmem } for pid=8274 comm="syz.0.1767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 132.428684][ T29] audit: type=1400 audit(1738988106.025:3833): avc: denied { create } for pid=8276 comm="syz.4.1768" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 132.453575][ T4294] udevd[4294]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 132.747181][ T8291] netlink: 68 bytes leftover after parsing attributes in process `syz.4.1773'. [ 132.823892][ T8296] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 133.561431][ T4294] udevd[4294]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 133.622899][ T8311] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 133.669501][ T8311] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 133.739925][ T8311] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 133.779651][ T8311] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 133.864825][ T8311] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 133.875689][ T8311] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 133.886676][ T8311] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 133.898058][ T8311] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 134.003496][ T8333] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 134.654082][ T8345] Cannot find set identified by id 0 to match [ 134.899738][ T8370] Cannot find set identified by id 0 to match [ 135.132721][ T3294] udevd[3294]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 135.155466][ T8389] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 135.477568][ T8402] Cannot find set identified by id 0 to match [ 135.535400][ T8408] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1821'. [ 135.544642][ T8408] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 135.552188][ T8408] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 135.560225][ T8408] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 135.567683][ T8408] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 135.769089][ T8420] Cannot find set identified by id 0 to match [ 135.869014][ T8430] Cannot find set identified by id 0 to match [ 135.915374][ T8434] dccp_invalid_packet: P.Data Offset(102) too large [ 135.924173][ T8434] FAULT_INJECTION: forcing a failure. [ 135.924173][ T8434] name failslab, interval 1, probability 0, space 0, times 0 [ 135.936921][ T8434] CPU: 1 UID: 0 PID: 8434 Comm: syz.4.1832 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 135.936960][ T8434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 135.936977][ T8434] Call Trace: [ 135.936984][ T8434] [ 135.936991][ T8434] dump_stack_lvl+0xf2/0x150 [ 135.937024][ T8434] dump_stack+0x15/0x1a [ 135.937098][ T8434] should_fail_ex+0x24a/0x260 [ 135.937138][ T8434] should_failslab+0x8f/0xb0 [ 135.937169][ T8434] kmem_cache_alloc_noprof+0x52/0x320 [ 135.937209][ T8434] ? audit_log_start+0x34c/0x6b0 [ 135.937257][ T8434] audit_log_start+0x34c/0x6b0 [ 135.937290][ T8434] audit_seccomp+0x4b/0x130 [ 135.937340][ T8434] __seccomp_filter+0x6fa/0x1180 [ 135.937360][ T8434] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 135.937382][ T8434] ? vfs_write+0x644/0x920 [ 135.937400][ T8434] ? putname+0xcf/0xf0 [ 135.937460][ T8434] __secure_computing+0x9f/0x1c0 [ 135.937478][ T8434] syscall_trace_enter+0xd1/0x1f0 [ 135.937498][ T8434] ? fpregs_assert_state_consistent+0x83/0xa0 [ 135.937532][ T8434] do_syscall_64+0xaa/0x1c0 [ 135.937617][ T8434] ? clear_bhb_loop+0x55/0xb0 [ 135.937641][ T8434] ? clear_bhb_loop+0x55/0xb0 [ 135.937681][ T8434] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 135.937705][ T8434] RIP: 0033:0x7fc2f5ddcde9 [ 135.937718][ T8434] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 135.937765][ T8434] RSP: 002b:00007fc2f4447038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 135.937863][ T8434] RAX: ffffffffffffffda RBX: 00007fc2f5ff5fa0 RCX: 00007fc2f5ddcde9 [ 135.937874][ T8434] RDX: 0000000000000010 RSI: 0000400000000540 RDI: 000000000000000f [ 135.937884][ T8434] RBP: 00007fc2f4447090 R08: 0000000000000000 R09: 0000000000000000 [ 135.937894][ T8434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 135.937904][ T8434] R13: 0000000000000000 R14: 00007fc2f5ff5fa0 R15: 00007fff5c90e078 [ 135.937921][ T8434] [ 136.179616][ T8436] dccp_invalid_packet: P.Data Offset(102) too large [ 136.233688][ T8443] Cannot find set identified by id 0 to match [ 136.280035][ T8447] FAULT_INJECTION: forcing a failure. [ 136.280035][ T8447] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 136.293305][ T8447] CPU: 0 UID: 0 PID: 8447 Comm: syz.0.1838 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 136.293338][ T8447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 136.293354][ T8447] Call Trace: [ 136.293360][ T8447] [ 136.293370][ T8447] dump_stack_lvl+0xf2/0x150 [ 136.293403][ T8447] dump_stack+0x15/0x1a [ 136.293430][ T8447] should_fail_ex+0x24a/0x260 [ 136.293513][ T8447] should_fail+0xb/0x10 [ 136.293550][ T8447] should_fail_usercopy+0x1a/0x20 [ 136.293573][ T8447] _copy_from_user+0x1c/0xa0 [ 136.293600][ T8447] copy_msghdr_from_user+0x54/0x2a0 [ 136.293690][ T8447] ? __fget_files+0x17c/0x1c0 [ 136.293732][ T8447] __sys_sendmsg+0x13e/0x230 [ 136.293810][ T8447] __x64_sys_sendmsg+0x46/0x50 [ 136.293911][ T8447] x64_sys_call+0x2734/0x2dc0 [ 136.293944][ T8447] do_syscall_64+0xc9/0x1c0 [ 136.293971][ T8447] ? clear_bhb_loop+0x55/0xb0 [ 136.294140][ T8447] ? clear_bhb_loop+0x55/0xb0 [ 136.294173][ T8447] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 136.294277][ T8447] RIP: 0033:0x7f970499cde9 [ 136.294296][ T8447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 136.294318][ T8447] RSP: 002b:00007f9703007038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 136.294338][ T8447] RAX: ffffffffffffffda RBX: 00007f9704bb5fa0 RCX: 00007f970499cde9 [ 136.294350][ T8447] RDX: 0000000000000000 RSI: 0000400000000140 RDI: 0000000000000005 [ 136.294361][ T8447] RBP: 00007f9703007090 R08: 0000000000000000 R09: 0000000000000000 [ 136.294400][ T8447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 136.294413][ T8447] R13: 0000000000000000 R14: 00007f9704bb5fa0 R15: 00007ffcb49d8338 [ 136.294431][ T8447] [ 136.523874][ T8464] Cannot find set identified by id 0 to match [ 136.639642][ T8470] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 136.696521][ T8495] FAULT_INJECTION: forcing a failure. [ 136.696521][ T8495] name failslab, interval 1, probability 0, space 0, times 0 [ 136.709382][ T8495] CPU: 1 UID: 0 PID: 8495 Comm: syz.3.1852 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 136.709411][ T8495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 136.709423][ T8495] Call Trace: [ 136.709429][ T8495] [ 136.709437][ T8495] dump_stack_lvl+0xf2/0x150 [ 136.709464][ T8495] dump_stack+0x15/0x1a [ 136.709489][ T8495] should_fail_ex+0x24a/0x260 [ 136.709582][ T8495] ? __se_sys_mount+0xf2/0x2d0 [ 136.709607][ T8495] should_failslab+0x8f/0xb0 [ 136.709638][ T8495] __kmalloc_cache_noprof+0x4e/0x320 [ 136.709740][ T8495] __se_sys_mount+0xf2/0x2d0 [ 136.709839][ T8495] ? fput+0x1c4/0x200 [ 136.709876][ T8495] ? ksys_write+0x176/0x1b0 [ 136.709903][ T8495] __x64_sys_mount+0x67/0x80 [ 136.709969][ T8495] x64_sys_call+0x2c84/0x2dc0 [ 136.709995][ T8495] do_syscall_64+0xc9/0x1c0 [ 136.710018][ T8495] ? clear_bhb_loop+0x55/0xb0 [ 136.710104][ T8495] ? clear_bhb_loop+0x55/0xb0 [ 136.710137][ T8495] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 136.710170][ T8495] RIP: 0033:0x7f789f48cde9 [ 136.710219][ T8495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 136.710236][ T8495] RSP: 002b:00007f789daf7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 136.710254][ T8495] RAX: ffffffffffffffda RBX: 00007f789f6a5fa0 RCX: 00007f789f48cde9 [ 136.710266][ T8495] RDX: 0000000000000000 RSI: 0000400000000240 RDI: 0000000000000000 [ 136.710278][ T8495] RBP: 00007f789daf7090 R08: 0000400000000000 R09: 0000000000000000 [ 136.710293][ T8495] R10: 0000000002200020 R11: 0000000000000246 R12: 0000000000000001 [ 136.710308][ T8495] R13: 0000000000000000 R14: 00007f789f6a5fa0 R15: 00007ffe61cb8bf8 [ 136.710343][ T8495] [ 136.921303][ T8498] Cannot find set identified by id 0 to match [ 136.947017][ T8506] SELinux: Context Ü is not valid (left unmapped). [ 136.963708][ T8507] tipc: Started in network mode [ 136.968802][ T8507] tipc: Node identity 7f000001, cluster identity 4711 [ 136.975624][ T8507] tipc: Enabling of bearer rejected, failed to enable media [ 136.986818][ T8507] tipc: Cannot configure node identity twice [ 137.144851][ T8518] FAULT_INJECTION: forcing a failure. [ 137.144851][ T8518] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 137.158018][ T8518] CPU: 1 UID: 0 PID: 8518 Comm: syz.4.1866 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 137.158045][ T8518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 137.158057][ T8518] Call Trace: [ 137.158063][ T8518] [ 137.158070][ T8518] dump_stack_lvl+0xf2/0x150 [ 137.158099][ T8518] dump_stack+0x15/0x1a [ 137.158124][ T8518] should_fail_ex+0x24a/0x260 [ 137.158239][ T8518] should_fail+0xb/0x10 [ 137.158308][ T8518] should_fail_usercopy+0x1a/0x20 [ 137.158324][ T8518] _copy_from_user+0x1c/0xa0 [ 137.158345][ T8518] copy_msghdr_from_user+0x54/0x2a0 [ 137.158362][ T8518] ? __fget_files+0x17c/0x1c0 [ 137.158389][ T8518] __sys_sendmsg+0x13e/0x230 [ 137.158480][ T8518] __x64_sys_sendmsg+0x46/0x50 [ 137.158505][ T8518] x64_sys_call+0x2734/0x2dc0 [ 137.158528][ T8518] do_syscall_64+0xc9/0x1c0 [ 137.158550][ T8518] ? clear_bhb_loop+0x55/0xb0 [ 137.158607][ T8518] ? clear_bhb_loop+0x55/0xb0 [ 137.158725][ T8518] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 137.158749][ T8518] RIP: 0033:0x7fc2f5ddcde9 [ 137.158762][ T8518] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.158778][ T8518] RSP: 002b:00007fc2f4447038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 137.158793][ T8518] RAX: ffffffffffffffda RBX: 00007fc2f5ff5fa0 RCX: 00007fc2f5ddcde9 [ 137.158804][ T8518] RDX: 0000000000000000 RSI: 00004000000000c0 RDI: 0000000000000008 [ 137.158858][ T8518] RBP: 00007fc2f4447090 R08: 0000000000000000 R09: 0000000000000000 [ 137.158868][ T8518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 137.158878][ T8518] R13: 0000000000000000 R14: 00007fc2f5ff5fa0 R15: 00007fff5c90e078 [ 137.158894][ T8518] [ 137.196070][ T8519] tipc: Enabling of bearer rejected, failed to enable media [ 137.341886][ T8518] tipc: Cannot configure node identity twice [ 137.423114][ T8530] Cannot find set identified by id 0 to match [ 137.470105][ T8538] tipc: Started in network mode [ 137.475077][ T8538] tipc: Node identity 7f000001, cluster identity 4711 [ 137.478306][ T29] kauditd_printk_skb: 333 callbacks suppressed [ 137.478386][ T29] audit: type=1400 audit(1738988111.065:4165): avc: denied { create } for pid=8535 comm="syz.2.1874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 137.481902][ T8538] tipc: Enabling of bearer rejected, failed to enable media [ 137.488044][ T29] audit: type=1400 audit(1738988111.065:4166): avc: denied { bind } for pid=8535 comm="syz.2.1874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 137.510121][ T8538] tipc: Cannot configure node identity twice [ 137.515857][ T29] audit: type=1400 audit(1738988111.065:4167): avc: denied { setopt } for pid=8535 comm="syz.2.1874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 137.570719][ T29] audit: type=1400 audit(1738988111.165:4168): avc: denied { ioctl } for pid=8535 comm="syz.2.1874" path="socket:[25800]" dev="sockfs" ino=25800 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 137.629256][ T29] audit: type=1400 audit(1738988111.225:4169): avc: denied { write } for pid=8545 comm="syz.2.1877" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 137.653942][ T8546] FAULT_INJECTION: forcing a failure. [ 137.653942][ T8546] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 137.667267][ T8546] CPU: 1 UID: 0 PID: 8546 Comm: syz.2.1877 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 137.667299][ T8546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 137.667313][ T8546] Call Trace: [ 137.667334][ T8546] [ 137.667343][ T8546] dump_stack_lvl+0xf2/0x150 [ 137.667378][ T8546] dump_stack+0x15/0x1a [ 137.667403][ T8546] should_fail_ex+0x24a/0x260 [ 137.667436][ T8546] should_fail+0xb/0x10 [ 137.667478][ T8546] should_fail_usercopy+0x1a/0x20 [ 137.667497][ T8546] _copy_from_user+0x1c/0xa0 [ 137.667523][ T8546] autofs_dev_ioctl+0xd6/0x660 [ 137.667557][ T8546] ? __pfx_autofs_dev_ioctl+0x10/0x10 [ 137.667661][ T8546] __se_sys_ioctl+0xc9/0x140 [ 137.667692][ T8546] __x64_sys_ioctl+0x43/0x50 [ 137.667715][ T8546] x64_sys_call+0x1690/0x2dc0 [ 137.667740][ T8546] do_syscall_64+0xc9/0x1c0 [ 137.667770][ T8546] ? clear_bhb_loop+0x55/0xb0 [ 137.667838][ T8546] ? clear_bhb_loop+0x55/0xb0 [ 137.667871][ T8546] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 137.667901][ T8546] RIP: 0033:0x7fb28cdecde9 [ 137.667916][ T8546] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.667934][ T8546] RSP: 002b:00007fb28b457038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 137.668021][ T8546] RAX: ffffffffffffffda RBX: 00007fb28d005fa0 RCX: 00007fb28cdecde9 [ 137.668033][ T8546] RDX: 0000400000000200 RSI: 00000000c018937e RDI: 0000000000000003 [ 137.668047][ T8546] RBP: 00007fb28b457090 R08: 0000000000000000 R09: 0000000000000000 [ 137.668061][ T8546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 137.668075][ T8546] R13: 0000000000000000 R14: 00007fb28d005fa0 R15: 00007ffe57b58378 [ 137.668096][ T8546] [ 137.903473][ T29] audit: type=1400 audit(1738988111.495:4170): avc: denied { bind } for pid=8555 comm="syz.2.1881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 137.941781][ T3968] udevd[3968]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 137.966902][ T8563] Cannot find set identified by id 0 to match [ 138.030781][ T29] audit: type=1326 audit(1738988111.625:4171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8573 comm="syz.1.1888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f939847cde9 code=0x7ffc0000 [ 138.033124][ T8574] netlink: 1842 bytes leftover after parsing attributes in process `syz.1.1888'. [ 138.056044][ T29] audit: type=1326 audit(1738988111.625:4172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8573 comm="syz.1.1888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f939847cde9 code=0x7ffc0000 [ 138.087638][ T29] audit: type=1326 audit(1738988111.625:4173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8573 comm="syz.1.1888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f939847cde9 code=0x7ffc0000 [ 138.111131][ T29] audit: type=1326 audit(1738988111.625:4174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8573 comm="syz.1.1888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f939847cde9 code=0x7ffc0000 [ 138.152702][ T8579] Cannot find set identified by id 0 to match [ 138.251982][ T8597] Cannot find set identified by id 0 to match [ 138.476017][ T8640] lo speed is unknown, defaulting to 1000 [ 138.507708][ T8647] FAULT_INJECTION: forcing a failure. [ 138.507708][ T8647] name failslab, interval 1, probability 0, space 0, times 0 [ 138.520536][ T8647] CPU: 1 UID: 0 PID: 8647 Comm: syz.2.1908 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 138.520615][ T8647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 138.520631][ T8647] Call Trace: [ 138.520637][ T8647] [ 138.520645][ T8647] dump_stack_lvl+0xf2/0x150 [ 138.520672][ T8647] dump_stack+0x15/0x1a [ 138.520699][ T8647] should_fail_ex+0x24a/0x260 [ 138.520741][ T8647] ? __se_sys_memfd_create+0x1ea/0x5a0 [ 138.520838][ T8647] should_failslab+0x8f/0xb0 [ 138.520870][ T8647] __kmalloc_cache_noprof+0x4e/0x320 [ 138.520906][ T8647] __se_sys_memfd_create+0x1ea/0x5a0 [ 138.520938][ T8647] __x64_sys_memfd_create+0x31/0x40 [ 138.520958][ T8647] x64_sys_call+0x2d4c/0x2dc0 [ 138.521004][ T8647] do_syscall_64+0xc9/0x1c0 [ 138.521035][ T8647] ? clear_bhb_loop+0x55/0xb0 [ 138.521069][ T8647] ? clear_bhb_loop+0x55/0xb0 [ 138.521104][ T8647] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 138.521207][ T8647] RIP: 0033:0x7fb28cdecde9 [ 138.521226][ T8647] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 138.521247][ T8647] RSP: 002b:00007fb28b456e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 138.521265][ T8647] RAX: ffffffffffffffda RBX: 0000000000000507 RCX: 00007fb28cdecde9 [ 138.521277][ T8647] RDX: 00007fb28b456ef0 RSI: 0000000000000000 RDI: 00007fb28ce6ec51 [ 138.521288][ T8647] RBP: 0000400000000f40 R08: 00007fb28b456bb7 R09: 00007fb28b456e40 [ 138.521300][ T8647] R10: 000000000000000a R11: 0000000000000202 R12: 0000400000000000 [ 138.521312][ T8647] R13: 00007fb28b456ef0 R14: 00007fb28b456eb0 R15: 0000400000000580 [ 138.521441][ T8647] [ 138.884188][ T8640] lo: entered promiscuous mode [ 138.889193][ T8640] tunl0: entered promiscuous mode [ 138.894432][ T8640] gre0: entered promiscuous mode [ 138.899554][ T8640] gretap0: entered promiscuous mode [ 138.904908][ T8640] erspan0: entered promiscuous mode [ 138.910264][ T8640] ip_vti0: entered promiscuous mode [ 138.915536][ T8640] ip6_vti0: entered promiscuous mode [ 138.920945][ T8640] sit0: entered promiscuous mode [ 138.925968][ T8640] ip6tnl0: entered promiscuous mode [ 138.931379][ T8640] ip6gre0: entered promiscuous mode [ 138.938601][ T8678] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 139.087796][ T4294] udevd[4294]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 139.216900][ T8701] FAULT_INJECTION: forcing a failure. [ 139.216900][ T8701] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 139.230046][ T8701] CPU: 0 UID: 0 PID: 8701 Comm: syz.1.1929 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 139.230093][ T8701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 139.230106][ T8701] Call Trace: [ 139.230111][ T8701] [ 139.230118][ T8701] dump_stack_lvl+0xf2/0x150 [ 139.230215][ T8701] dump_stack+0x15/0x1a [ 139.230237][ T8701] should_fail_ex+0x24a/0x260 [ 139.230271][ T8701] should_fail+0xb/0x10 [ 139.230307][ T8701] should_fail_usercopy+0x1a/0x20 [ 139.230378][ T8701] _copy_from_user+0x1c/0xa0 [ 139.230407][ T8701] copy_msghdr_from_user+0x54/0x2a0 [ 139.230432][ T8701] ? __fget_files+0x17c/0x1c0 [ 139.230469][ T8701] __sys_sendmsg+0x13e/0x230 [ 139.230582][ T8701] __x64_sys_sendmsg+0x46/0x50 [ 139.230617][ T8701] x64_sys_call+0x2734/0x2dc0 [ 139.230650][ T8701] do_syscall_64+0xc9/0x1c0 [ 139.230678][ T8701] ? clear_bhb_loop+0x55/0xb0 [ 139.230754][ T8701] ? clear_bhb_loop+0x55/0xb0 [ 139.230782][ T8701] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 139.230809][ T8701] RIP: 0033:0x7f939847cde9 [ 139.230838][ T8701] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 139.230859][ T8701] RSP: 002b:00007f9396ae7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 139.230955][ T8701] RAX: ffffffffffffffda RBX: 00007f9398695fa0 RCX: 00007f939847cde9 [ 139.230969][ T8701] RDX: 0000000000000000 RSI: 0000400000000040 RDI: 0000000000000007 [ 139.231037][ T8701] RBP: 00007f9396ae7090 R08: 0000000000000000 R09: 0000000000000000 [ 139.231050][ T8701] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 139.231064][ T8701] R13: 0000000000000000 R14: 00007f9398695fa0 R15: 00007ffe167f15e8 [ 139.231086][ T8701] [ 139.865938][ T4294] udevd[4294]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 139.996091][ T8731] syz.4.1942 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 140.012799][ T8731] dvmrp0: entered allmulticast mode [ 140.018908][ T8731] dvmrp0: left allmulticast mode [ 140.059343][ T8729] netlink: 68 bytes leftover after parsing attributes in process `syz.3.1941'. [ 140.123972][ T8732] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 141.259953][ T8771] set_match_v1_checkentry: 6 callbacks suppressed [ 141.259974][ T8771] Cannot find set identified by id 0 to match [ 141.469927][ T8777] Cannot find set identified by id 0 to match [ 141.697372][ T8794] siw: device registration error -23 [ 142.163773][ T8800] netlink: 68 bytes leftover after parsing attributes in process `syz.0.1967'. [ 142.226910][ T8801] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 142.454924][ T8812] Cannot find set identified by id 0 to match [ 142.531732][ T8814] Cannot find set identified by id 0 to match [ 142.719160][ T29] kauditd_printk_skb: 234 callbacks suppressed [ 142.719174][ T29] audit: type=1400 audit(1738988116.315:4409): avc: denied { create } for pid=8816 comm="syz.4.1976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 142.914136][ T29] audit: type=1400 audit(1738988116.345:4410): avc: denied { write } for pid=8816 comm="syz.4.1976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 142.933739][ T29] audit: type=1400 audit(1738988116.385:4411): avc: denied { create } for pid=8816 comm="syz.4.1976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 142.972128][ T8824] dvmrp0: entered allmulticast mode [ 142.978119][ T8824] dvmrp0: left allmulticast mode [ 143.881978][ T8841] Cannot find set identified by id 0 to match [ 143.893132][ T8843] Cannot find set identified by id 0 to match [ 143.917466][ T8847] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1988'. [ 144.028217][ T29] audit: type=1400 audit(1738988117.615:4412): avc: denied { create } for pid=8848 comm="syz.0.1989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 144.060099][ T29] audit: type=1400 audit(1738988117.655:4413): avc: denied { map_create } for pid=8848 comm="syz.0.1989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 144.079355][ T29] audit: type=1400 audit(1738988117.655:4414): avc: denied { perfmon } for pid=8848 comm="syz.0.1989" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 144.102442][ T8849] netlink: 68 bytes leftover after parsing attributes in process `syz.0.1989'. [ 144.117703][ T29] audit: type=1400 audit(1738988117.695:4415): avc: denied { map_read map_write } for pid=8848 comm="syz.0.1989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 144.137734][ T29] audit: type=1400 audit(1738988117.695:4416): avc: denied { prog_load } for pid=8848 comm="syz.0.1989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 144.156851][ T29] audit: type=1400 audit(1738988117.695:4417): avc: denied { bpf } for pid=8848 comm="syz.0.1989" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 144.177457][ T29] audit: type=1400 audit(1738988117.695:4418): avc: denied { prog_run } for pid=8848 comm="syz.0.1989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 144.199175][ T8854] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 144.218725][ T8860] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 144.247821][ T8868] Cannot find set identified by id 0 to match [ 144.280709][ T8860] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 144.329782][ T8860] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 144.373244][ T4294] udevd[4294]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 144.384776][ T8860] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 144.444688][ T8860] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 144.455555][ T8860] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 144.466931][ T8860] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 144.478083][ T8860] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 144.741353][ T8892] Cannot find set identified by id 0 to match [ 144.835388][ T8900] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 144.858393][ T8902] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 144.879785][ T8900] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 144.939858][ T8900] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 144.980145][ T8900] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 145.046366][ T8900] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 145.059846][ T8900] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 145.072003][ T8900] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 145.083792][ T8900] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 145.239746][ T8925] Cannot find set identified by id 0 to match [ 145.251743][ T4294] udevd[4294]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 145.287244][ T8930] Cannot find set identified by id 0 to match [ 145.355490][ T8934] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 145.409625][ T8934] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 145.450072][ T8934] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 145.499724][ T8934] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 145.565268][ T8934] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 145.576579][ T8934] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 145.587976][ T8934] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 145.599353][ T8934] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 146.136137][ T8966] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 146.179660][ T8966] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 146.229991][ T8966] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 146.289764][ T8966] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 146.650480][ T8987] set_match_v1_checkentry: 2 callbacks suppressed [ 146.650524][ T8987] Cannot find set identified by id 0 to match [ 146.694532][ T8991] Cannot find set identified by id 0 to match [ 146.847281][ T9002] dvmrp0: entered allmulticast mode [ 146.854756][ T9002] dvmrp0: left allmulticast mode [ 147.021781][ T9018] Cannot find set identified by id 0 to match [ 147.156418][ T9025] Cannot find set identified by id 0 to match [ 147.392963][ T9048] FAULT_INJECTION: forcing a failure. [ 147.392963][ T9048] name failslab, interval 1, probability 0, space 0, times 0 [ 147.406503][ T9048] CPU: 1 UID: 0 PID: 9048 Comm: syz.1.2069 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 147.406532][ T9048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 147.406545][ T9048] Call Trace: [ 147.406552][ T9048] [ 147.406560][ T9048] dump_stack_lvl+0xf2/0x150 [ 147.406591][ T9048] dump_stack+0x15/0x1a [ 147.406640][ T9048] should_fail_ex+0x24a/0x260 [ 147.406691][ T9048] ? igmp6_group_dropped+0x22e/0x5a0 [ 147.406726][ T9048] should_failslab+0x8f/0xb0 [ 147.406752][ T9048] __kmalloc_cache_noprof+0x4e/0x320 [ 147.406807][ T9048] igmp6_group_dropped+0x22e/0x5a0 [ 147.406842][ T9048] ? kstrtoull+0x110/0x140 [ 147.406870][ T9048] __ipv6_dev_mc_dec+0x1a2/0x400 [ 147.406929][ T9048] addrconf_leave_solict+0xac/0xd0 [ 147.406951][ T9048] __ipv6_dev_ac_dec+0x272/0x370 [ 147.407010][ T9048] __ipv6_sock_ac_close+0x162/0x1f0 [ 147.407037][ T9048] ipv6_sock_ac_close+0x7e/0xa0 [ 147.407062][ T9048] inet6_release+0x36/0x60 [ 147.407121][ T9048] sock_close+0x68/0x150 [ 147.407196][ T9048] ? __pfx_sock_close+0x10/0x10 [ 147.407278][ T9048] __fput+0x2ac/0x640 [ 147.407351][ T9048] __fput_sync+0x96/0xc0 [ 147.407382][ T9048] __x64_sys_close+0x55/0xe0 [ 147.407421][ T9048] x64_sys_call+0x266c/0x2dc0 [ 147.407448][ T9048] do_syscall_64+0xc9/0x1c0 [ 147.407569][ T9048] ? clear_bhb_loop+0x55/0xb0 [ 147.407595][ T9048] ? clear_bhb_loop+0x55/0xb0 [ 147.407622][ T9048] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 147.407649][ T9048] RIP: 0033:0x7f939847cde9 [ 147.407665][ T9048] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 147.407740][ T9048] RSP: 002b:00007f9396ae7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 147.407758][ T9048] RAX: ffffffffffffffda RBX: 00007f9398695fa0 RCX: 00007f939847cde9 [ 147.407770][ T9048] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 147.407782][ T9048] RBP: 00007f9396ae7090 R08: 0000000000000000 R09: 0000000000000000 [ 147.407794][ T9048] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 147.407843][ T9048] R13: 0000000000000000 R14: 00007f9398695fa0 R15: 00007ffe167f15e8 [ 147.407860][ T9048] [ 147.415095][ T9049] Cannot find set identified by id 0 to match [ 147.663011][ T4294] udevd[4294]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 147.710858][ T9059] Cannot find set identified by id 0 to match [ 147.754732][ T29] kauditd_printk_skb: 330 callbacks suppressed [ 147.754748][ T29] audit: type=1400 audit(1738988121.345:4749): avc: denied { map_create } for pid=9066 comm="syz.2.2077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 147.785371][ T29] audit: type=1400 audit(1738988121.345:4750): avc: denied { bpf } for pid=9066 comm="syz.2.2077" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 147.806106][ T29] audit: type=1400 audit(1738988121.345:4751): avc: denied { map_read map_write } for pid=9066 comm="syz.2.2077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 147.826113][ T29] audit: type=1400 audit(1738988121.345:4752): avc: denied { prog_load } for pid=9066 comm="syz.2.2077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 147.845166][ T29] audit: type=1400 audit(1738988121.345:4753): avc: denied { perfmon } for pid=9066 comm="syz.2.2077" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 147.866199][ T29] audit: type=1400 audit(1738988121.345:4754): avc: denied { create } for pid=9066 comm="syz.2.2077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 147.885607][ T29] audit: type=1400 audit(1738988121.345:4755): avc: denied { bind } for pid=9066 comm="syz.2.2077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 147.905140][ T29] audit: type=1400 audit(1738988121.345:4756): avc: denied { write } for pid=9066 comm="syz.2.2077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 147.924502][ T29] audit: type=1400 audit(1738988121.365:4757): avc: denied { create } for pid=9067 comm="syz.4.2078" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 147.945796][ T29] audit: type=1400 audit(1738988121.365:4758): avc: denied { map } for pid=9067 comm="syz.4.2078" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=28190 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 148.091954][ T4294] udevd[4294]: setting owner of /dev/loop0 to uid=0, gid=6 failed: No such file or directory [ 148.102629][ T4294] udevd[4294]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 148.104976][ T9083] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 148.187954][ T9087] Cannot find set identified by id 0 to match [ 148.301177][ T4294] udevd[4294]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 148.343667][ T3294] ================================================================== [ 148.351839][ T3294] BUG: KCSAN: data-race in set_nlink / set_nlink [ 148.358188][ T3294] [ 148.360520][ T3294] write to 0xffff888105bc6eb8 of 4 bytes by task 3000 on cpu 0: [ 148.368174][ T3294] set_nlink+0x98/0xb0 [ 148.372277][ T3294] kernfs_iop_permission+0x1c8/0x210 [ 148.377595][ T3294] inode_permission+0x18c/0x300 [ 148.382509][ T3294] link_path_walk+0x13e/0x830 [ 148.387200][ T3294] path_openat+0x1af/0x1fc0 [ 148.391719][ T3294] do_filp_open+0x107/0x230 [ 148.396225][ T3294] do_sys_openat2+0xab/0x120 [ 148.400835][ T3294] __x64_sys_openat+0xf3/0x120 [ 148.405614][ T3294] x64_sys_call+0x2b30/0x2dc0 [ 148.410330][ T3294] do_syscall_64+0xc9/0x1c0 [ 148.414860][ T3294] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 148.420773][ T3294] [ 148.423097][ T3294] read to 0xffff888105bc6eb8 of 4 bytes by task 3294 on cpu 1: [ 148.430826][ T3294] set_nlink+0x2b/0xb0 [ 148.434906][ T3294] kernfs_iop_permission+0x1c8/0x210 [ 148.440216][ T3294] inode_permission+0x18c/0x300 [ 148.445135][ T3294] link_path_walk+0x13e/0x830 [ 148.449822][ T3294] path_openat+0x1af/0x1fc0 [ 148.454349][ T3294] do_filp_open+0x107/0x230 [ 148.458880][ T3294] do_sys_openat2+0xab/0x120 [ 148.463503][ T3294] __x64_sys_openat+0xf3/0x120 [ 148.468320][ T3294] x64_sys_call+0x2b30/0x2dc0 [ 148.473020][ T3294] do_syscall_64+0xc9/0x1c0 [ 148.477556][ T3294] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 148.483491][ T3294] [ 148.485815][ T3294] value changed: 0x00000005 -> 0x00000003 [ 148.491533][ T3294] [ 148.493853][ T3294] Reported by Kernel Concurrency Sanitizer on: [ 148.499998][ T3294] CPU: 1 UID: 0 PID: 3294 Comm: udevd Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 148.510239][ T3294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 148.520303][ T3294] ================================================================== [ 148.774445][ T8966] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 148.785694][ T8966] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 148.796988][ T8966] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 148.808115][ T8966] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0