last executing test programs: 56.305633068s ago: executing program 1 (id=194): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x401}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2, 0x0, 0xfffffffffffffffe}, 0x18) r3 = socket(0x10, 0x2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f00000002c0)=@gcm_256={{0x303}, "740b965d7de40afe", "b4b87929195ee7b9cac20ba58a04a46997ffeb709073a25686b2d3a1b7a3f704", "863ec15f", "e78c05d8239b3d3c"}, 0x38) write$binfmt_script(r4, &(0x7f0000000780)={'#! ', './file0'}, 0xb) close_range(r3, r4, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRESOCT, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ifreq(r5, 0x8910, &(0x7f0000000000)={'ip6gretap0\x00', @ifru_mtu=0x6}) ioctl$sock_netdev_private(r5, 0x8914, &(0x7f0000000000)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='ext4_da_update_reserve_space\x00', r6}, 0x18) syz_io_uring_setup(0x5d12, &(0x7f00000014c0)={0x0, 0x8, 0x80, 0x0, 0x13c}, &(0x7f0000001680)=0x0, &(0x7f00000001c0)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000040)=0xfffffffc, 0x0, 0x4) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0028619e08ff4deac22804"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_emit_ethernet(0x36, &(0x7f0000001800)={@link_local, @random="50a245d5cde0", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x32, 0x0, @empty, @broadcast}, @timestamp_reply={0x11}}}}}, 0x0) fsetxattr(r8, &(0x7f0000000000)=@known='system.sockprotoname\x00', 0x0, 0x0, 0x2) 56.265329628s ago: executing program 1 (id=196): r0 = memfd_create(&(0x7f0000001d80)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xadNaC\xa6\xf9\xa7>c\x84\xd8\xfa\xf1\r\xb1\xfd\xbf!\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c!\x0f/\xb8g8\xb9\x8d\x19\xe2\xca\x01y\x83\xe7\ng\x87\xd93\xd8\x12\x8cXc5%\x03\x8d`\xdayC\x9b\x9a\xd9c\xe9\xb4\v\x99\x87\xe4\x00\x8a\x8eS\x8e\f\x05ZH\xa2\x0e\xbc\x9c\x95\b2Cf6\x9a\xe7\xb9\x86\xbe\xd0\xda\x91\xc1sl\x11PA\x93\xa5\x93\xc8\xf1w\x7fp6z\xbf\xe8[\'u\xb8\xd2$K\x12\rt\x87\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00r\xe2`\xdf\xd2\xb3\xaf\xe9\xc4!Z\xb4&\xa2\x12\xe2i\x91kC$A\xafR\xb3\xff\x1d=\xec\x10\xb4+\x13\'\x92>\x14\x00\a\xb6R\x8b\xdcz\xc3\xd1Y\xd6\xd9;s \xb0\x938\xb7D9\xdcN\xbd\xdbn\xe35\xa7\x02\x9c\xc1\xd9\x13?\xc9\xd7\xab\x9c\xf3\x82\xd1\xee^kk\xce\xdbn\x02\x1f\x80\t\xdbr\xa9\xcc\xf1\xcb\x9f@\x8c\xfc\x02W/p\x97\xb0\xbd\x8f\xdb|n2a\xee\x95u\x83\xca\x8a>}\xd3\xd0\xff6.pa\x17\xe3e\xd2\x7f\xf6\xbc\x9d\x112\x1b\x14p\xa1\xd6u\xefn\xb4\xa3\x05D\x8c\xc5l\xcc\b\xeb\xf42\xe9\xf15\xf3\xf2\xee\xd6\xed\t\xb3\xf7\x1a\x7f\xe6\xb4z\x19\xe1\xb4w\xf7\xa6\xd7\\\xfa\x96\xe2\xf9\xb1\x81\xba\xdfg\xadI\x1c\xde*_\xd5\xdf\xeeA\xcd \x91\xc9\xd4\xd1\xcd*.t\x80]\xd5~\xfb\xfb>\x9d\x91Kq]N\x87\x0f\x04L\xd4(\xf2G \xfdr~:\xc4\xc3\xfe\x14G\xadG~^l\xe0:(Y`\x0e\x90\xfa\x1c\xb6\f6\x92B\x92\xd3\xa9BG\xd2*AB\x1e\x01\xf0m+\x02\x87\x81aj;\xb6y.g\xeb\xc4\x0f\xd3\x85\xa5\x00\xa1\xa6iP\x0f\x02\x14\x90q\x94\xab\xb3\x0f\x01=\x06\x98\xa8\x87\xd9=\xce\xbef\x98\x87\xb5p\xf7\xd7\xeb\xfb\xf30\xb8\xf1\b\x06M\x18w\xdc\x0e\x98?\x04G\xf9\x99\xab\xc1\xc0z\xe9Fu\x03\x9aj\xc0]\xb47\xd5\xb8]\x98y@\x8c\x8fM\x8c],\x1b\x03\xaa\'gv\xeb\xbf\xa8d\"\x94e3Q\xfci\xdf\xad\x819\xd1\xf3\xaa\xc8i\xf2\x8a\xc4CU3\x87Ns\x9f\x9f\xcd\x05\x06', 0x7) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x2000002, 0x10012, r0, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$sock_timeval(r1, 0x1, 0x43, &(0x7f0000000000), 0x10) r2 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x10, &(0x7f0000000140), 0x4) read(r0, &(0x7f0000001900)=""/260, 0x119) r3 = open_tree(0xffffffffffffff9c, &(0x7f00000002c0)='\x00', 0x89901) unshare(0x4000400) move_mount(r3, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) kexec_load(0x0, 0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0xbfffd000, 0x800000}], 0x0) futimesat(r3, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)={{0x0, 0x2710}}) getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000080)=0x9, 0x4) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000040)=ANY=[@ANYBLOB="4c000000180001000000000000000000020000000000000900000000060015000500000028001680240001"], 0x4c}}, 0x0) r5 = socket(0x10, 0x803, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000b00)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xffffff81}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r5}}}}]}, 0x38}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000e00)=ANY=[], 0x48) 55.359650007s ago: executing program 1 (id=207): r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) (async) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000100)=0x7) (async) ptrace(0x8, r2) (async) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x1, 0x70bd2a, 0x8000000, {0x0, 0x0, 0x0, r1, {0xffe0, 0x3}, {0x10}}}, 0x24}, 0x1, 0x0, 0x0, 0x8041}, 0x0) 55.061316807s ago: executing program 1 (id=213): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000440)='./file2\x00', 0x10404, &(0x7f0000000380)={[{@errors_remount}, {@i_version}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@nobarrier}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$eJzs289rHFUcAPDvzCat/WViqT+aVo1WMfgjadJae/CiKHhQEPRQjzFJS+y2kSaCLUGjSD1Kwbt4FPwLPOlF1JPgVe9SKJJLq6eV2Z1Jdje7aZJustX9fGCS92be8t53Z97ue/N2AuhZw9mfJGJ/RPweEQO1bGOB4dq/W8uLU38vL04lUam89VdSLXdzeXGqKFq8bl+R6YtIP0viSIt65y9fOT9ZLs9cyvNjCxfeH5u/fOW52QuT52bOzVycOH365InxF05NPN+ROLO4bg59NHf08GvvXHtj6sy1d3/+Ninib4qjQ4bXO/hkpdLh6rrrQF066etiQ9iUUq2bRn+1/w9EKVZP3kC8+mlXGwdsq0qlUnmg/eGlCvA/lkS3WwB0R/FFn81/i22Hhh53hRsv1SZAWdy38q12pC/SvEx/0/y2k4Yj4szSP19lW2zPfQgAgAbfZ+OfZ1uN/9Kovy90b76GMhgR90XEwYg4FRGHIuL+iGrZByPioU3W37xIsnb8k17fUmAblI3/XszXthrHf8XoLwZLee5ANf7+5OxseeZ4/p6MRP/uLD++Th0/vPLbF+2O1Y//si2rvxgL5u243re78TXTkwuTdxJzvRufRAz1tYo/WVkJSCLicEQMbbGO2ae/Odru2O3jX0cH1pkqX0c8VTv/S9EUfyFZf31y7J4ozxwfK66KtX759eqb7eq/o/g7IDv/e1te/yvxDyb167Xzm6/j6h+ft53TbPX635W83bDvw8mFhUvjEbuS12uNrt8/0VRuYrV8Fv/Isdb9/2CsvhNHIiK7iB+OiEci4tG87Y9FxOMRcWyd+H96+Yn3th7/9srin97U+V9N7IrmPa0TpfM/ftdQ6eBm4s/O/8lqaiTfs5HPv420a2tXMwAAAPz3pBGxP5J0dCWdpqOjtd/wH4q9aXlufuGZs3MfXJyuPSMwGP1pcadroO5+6Hg+rS/yE035E/l94y9Le6r50am58nS3g4cet69N/8/8Wep264Bt53kt6F36P/Qu/R96l/4PvatF/9/TjXYAO6/V9//HXWgHsPOa+r9lP+gh5v/Qu/R/6F36P/Sk+T1x+4fkJSTWJCK9K5ohsU2Jbn8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMa/AQAA//9QOObV") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = open(0x0, 0x60840, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000006c0), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x1, 0x40000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x5, 0x4, 0x2003, 0xc, 0x0, 0xffffffffffffffff, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) getdents64(r3, &(0x7f0000001180)=""/4077, 0xfed) 54.938467336s ago: executing program 1 (id=216): syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001080), 0x0, 0x0) io_setup(0x3, &(0x7f0000000180)=0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) mremap(&(0x7f0000186000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f00000ad000/0x3000)=nil) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x201000, 0x1000}, 0x20) r4 = socket$rds(0x15, 0x5, 0x0) bind$rds(r4, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r6}, 0x10) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@rdma_args={0x48, 0x114, 0x1, {{0xfffffffd}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/43, 0x2b}], 0x1}}, @rdma_args={0x48, 0x114, 0x1, {{0x587}, {0x0}, 0x0}}], 0x90}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="54010000100013070000000000000000fc00000000000000000000000000000000000000000000000000000000000000000000004e2200"/64, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="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"], 0x154}, 0x1, 0x0, 0x0, 0x1}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000002, 0x1, @perf_config_ext={0x0, 0x1}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffd, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r8 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) modify_ldt$write(0x1, 0x0, 0x0) r9 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_SIOCGIFCONF(r9, 0x8912, &(0x7f00000000c0)=@buf={0x4f, &(0x7f0000000040)="13986b54f8b3ddeadc3d5ed6cd81beda3da8f1d40697b0e7c65cb48e102910295d7716199e8063073fd87ea15899067fb4917cd0f37963350ec5dbe6ac54e7ed2acc0889f230a016dae10e07ce9364"}) ioctl$sock_SIOCGIFCONF(r8, 0x8912, &(0x7f0000000240)=@buf) ioctl$sock_ifreq(r9, 0x8914, &(0x7f0000000000)={'bond0\x00', @ifru_hwaddr=@dev={'\xaa\xaa\xaa\xaa\xaa', 0x31}}) socket(0x10, 0x803, 0x4) r10 = getuid() setuid(r10) flistxattr(r7, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x40004}, 0x20044040) io_submit(r1, 0x1, &(0x7f0000000800)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 54.395918995s ago: executing program 1 (id=225): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="160000000000000004000000050000000000000034d93171f7407fab0b95ca82874b8d2372191eeed4e56a5e3e72cb195fd3fcfd5cebaa5d7f17b822ece94c07222f471a94041b7ec2cca8481fdd7d33c66d165356153e85e4d75bf9a7111d0cd22c742caad3b95d26b5932eaa8a7bed716fe92486221c95450d912422", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) bpf$TOKEN_CREATE(0x24, &(0x7f0000000340)={0x0, r0}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000050000000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004080)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f00000011c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r4, 0x0, 0x2}, 0x18) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="18000040", @ANYRES16=r5, @ANYBLOB="010000000000000000008300000004000e80"], 0x18}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r7}, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000400)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={&(0x7f0000000000)='kmem_cache_free\x00', r8}, 0x10) clock_nanosleep(0x2, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000017c0)=@newtaction={0xe6c, 0x30, 0x25, 0x0, 0x0, {}, [{0xe58, 0x1, [@m_pedit={0xe54, 0x1, 0x0, 0x0, {{0xa}, {0xe28, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x4}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0x2}, [{}, {0x2}, {}, {0x0, 0x20be}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x12}, {}, {0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x0, 0x40000000}, {}, {}, {0x80000}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {}, {}, {0x0, 0x0, 0x0, 0x1}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x7}, {0x0, 0x1}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe6c}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000007c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x9}, {0xf}, {0xe, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x1}}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x491, 0x0, 0x0, 0x0, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) lsm_get_self_attr(0x68, &(0x7f00000001c0)={0x0, 0x0, 0x34, 0x14, ""/20}, &(0x7f0000000200)=0x34, 0x0) unshare(0x12000080) 54.361852526s ago: executing program 32 (id=225): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="160000000000000004000000050000000000000034d93171f7407fab0b95ca82874b8d2372191eeed4e56a5e3e72cb195fd3fcfd5cebaa5d7f17b822ece94c07222f471a94041b7ec2cca8481fdd7d33c66d165356153e85e4d75bf9a7111d0cd22c742caad3b95d26b5932eaa8a7bed716fe92486221c95450d912422", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) bpf$TOKEN_CREATE(0x24, &(0x7f0000000340)={0x0, r0}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000050000000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004080)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f00000011c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r4, 0x0, 0x2}, 0x18) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="18000040", @ANYRES16=r5, @ANYBLOB="010000000000000000008300000004000e80"], 0x18}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r7}, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000400)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={&(0x7f0000000000)='kmem_cache_free\x00', r8}, 0x10) clock_nanosleep(0x2, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000017c0)=@newtaction={0xe6c, 0x30, 0x25, 0x0, 0x0, {}, [{0xe58, 0x1, [@m_pedit={0xe54, 0x1, 0x0, 0x0, {{0xa}, {0xe28, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x4}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0x2}, [{}, {0x2}, {}, {0x0, 0x20be}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x12}, {}, {0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {0x0, 0x40000000}, {}, {}, {0x80000}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {}, {}, {0x0, 0x0, 0x0, 0x1}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x7}, {0x0, 0x1}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe6c}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000007c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x9}, {0xf}, {0xe, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x1}}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x491, 0x0, 0x0, 0x0, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) lsm_get_self_attr(0x68, &(0x7f00000001c0)={0x0, 0x0, 0x34, 0x14, ""/20}, &(0x7f0000000200)=0x34, 0x0) unshare(0x12000080) 51.418088612s ago: executing program 2 (id=271): r0 = io_uring_setup(0x7939, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x1, 0x215}) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f00000008c0)=[{&(0x7f00000004c0)=""/203, 0xcb}, {&(0x7f0000000280)=""/133, 0x85}, {&(0x7f00000005c0)=""/250, 0xfa}, {&(0x7f00000001c0)=""/120, 0x78}, {&(0x7f0000000380)=""/171, 0xab}, {&(0x7f00000007c0)=""/200, 0xc8}, {&(0x7f00000006c0)=""/154, 0x9a}], 0x7) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[@ANYBLOB="380000001800dd8d000a000002000000020000000002000500000000060015000400000014001680100008800c000180060001"], 0x38}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) unshare(0x6a040000) socket$netlink(0x10, 0x3, 0x0) r2 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r3}, 0x10) sync() close_range(r0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd8fc, 0x800000000003}, 0x1320, 0xffffff7f, 0x3, 0x6, 0x0, 0x1, 0xfffb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="1c0000000306010200000000000000000000000005000100d1"], 0x1c}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 50.81118683s ago: executing program 2 (id=279): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000)="6cf9db44086b", &(0x7f0000000080)=@buf="d133b8ec88d0964631ca98d65c3340578072cfdcc660f6408728211588b2b82f4b504596953fdd467d303aca2ffebfee982e9f3e37e5c339fc43508a5bf5515952b674d0fa8e816ff403bac87c1fa803515e4003915b3d007db89b349407863630e83ded779257b0fcf3241767ea0a8aa291c4dba4ed5186001c29fa11280ef701b4319203baac4ac6b186e1f139ad72649467aa08759629f5021d2fc59843b5059aa33cfbf22e116914d1fe3233ba444e"}, 0x20) write$UHID_INPUT(r0, &(0x7f0000000940)={0x8, {"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", 0x1000}}, 0x1006) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x44, 0x9, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @empty}}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x10000047}, 0x4000084) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_int(r2, 0x1, 0x29, 0x0, &(0x7f0000000180)) 50.29201247s ago: executing program 2 (id=283): fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r0 = creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r0}, 0x8) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[], 0x69) sendmsg$NFT_MSG_GETTABLE(r0, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000440)={0x19c, 0x1, 0xa, 0x801, 0x0, 0x0, {0x3, 0x0, 0x8}, [@NFTA_TABLE_USERDATA={0x43, 0x6, "89b5441185ee2773045cf78156b1b041d1158b2853a52ed539dc14cbfa651c32c7065859188a5696f5a503072e2158200ee2038e61cc8c265d8005c1aa9462"}, @NFTA_TABLE_USERDATA={0xa2, 0x6, "37c09c57c5f20ddd830a444ee87699c123be0403bdee4bd674b315f1291c011adb63018d9b425cf277721c1818f0ab324f825bd5e7d08a2c8bcf854617b5edf3ad11ba6f4d0aab5a823dd6d6968d5e3b8ab5314057b3195f2ef6a3a5cd0c54492228b7a85a3e82ad8ed7dfe3b4a78ce8c35085f01af33f13a3cb07d5458fe154e375033404bb2e6ea97ff34202eef2cee0072ad76f40e58d116f9d319b95"}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_TABLE_USERDATA={0x95, 0x6, "0d88ff432ac3174c8dd8b785fb63eaf9116c0c1ad70b68bcffeaa92c030d65255d19dd244d503801dd0648c9238c0d39eb04cbc2a1569a70f7310c653a2699f7ed96df1ab8b9672f564155f195b21985bad9950b2a8c37c7fd674c6423e75f8a5c3365b525a2190da784271343ca77ac5bf297f15ade5cfaebc10a56e43ce79ee418f1bc258cb3d6117f2650a0f23f0fbe"}]}, 0x19c}, 0x1, 0x0, 0x0, 0x40040}, 0x10) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000002000)={0x1}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000080)) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x3}) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, @void, @value}, 0x94) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x21081e, &(0x7f00000001c0), 0x1, 0x509, &(0x7f0000001000)="$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") r1 = open_tree(0xffffffffffffff9c, 0x0, 0x89901) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) close(0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = msgget(0x1, 0x2b0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) msgrcv(r2, 0x0, 0x0, 0x2, 0x2000) msgrcv(r2, 0x0, 0x0, 0x2, 0x0) msgsnd(0x0, &(0x7f0000000d00)=ANY=[@ANYRES8], 0x401, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000400)={{0x2, 0x0, 0x0, 0x0, 0x0, 0x14, 0x7}, 0x0, 0x0, 0x28596bc9, 0x8c, 0x20000000000000a, 0x100, 0x200000000, 0x803, 0x9, 0x9}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000180)={0x0, 0x0, 0xa}) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000000)) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "69dcaf20127e9a854528f45826cb35be51ca73845d177dd8dba7221daeccfda56b75cfe286fdd14cb5b11b1cab614fec2236da7d88ea0f0700"}, 0x48, 0xfffffffffffffffe) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='mounts\x00') r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0), 0x628b01) mount$9p_fd(0x0, &(0x7f0000000100)='.\x00', &(0x7f0000000040), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000"], &(0x7f0000000040)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 48.962570218s ago: executing program 2 (id=289): set_mempolicy(0x6, &(0x7f00000003c0)=0x8000000000000001, 0xe0) socket$inet6(0xa, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='kfree\x00', r2}, 0x18) pipe2(0x0, 0x800) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, 0x0, 0x20000800) sendmsg$rds(r3, 0x0, 0x0) 48.138660407s ago: executing program 2 (id=293): r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200)=0xffffffffffffffff, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000440), &(0x7f0000000480)}, 0x20) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) write$P9_RVERSION(r2, &(0x7f0000000780)={0x13, 0x65, 0xffff, 0x9, 0x6, '9P2000'}, 0x13) pwrite64(r2, &(0x7f0000000140)='2', 0x1, 0x8000c61) lseek(r2, 0x1, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000580)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000500), &(0x7f0000000540)='%pK \x00'}, 0x20) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000200)=0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000740), 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x6, 0x3, &(0x7f0000000040)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x8e2d, 0x0, 0x0, 0x0, 0x82}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], &(0x7f00000001c0)='syzkaller\x00', 0x8, 0x99, &(0x7f0000000340)=""/153, 0x41100, 0x9172ee2999f13c63, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0xc, 0x0, 0xfffffeff}, 0x10, 0x0, 0x0, 0x5, &(0x7f00000005c0)=[r1, r2, r3, r4, r5], &(0x7f0000000600)=[{0x5, 0x5, 0xe, 0x2}, {0x2, 0x5, 0xa, 0x6}, {0x4, 0x3, 0xe, 0x1}, {0x3, 0x5, 0x2, 0x5}, {0x3, 0x3, 0x7, 0x8}], 0x10, 0x3ff, @value=r6}, 0x94) r7 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYRESDEC=r7, @ANYBLOB="0686dd4099f959c87360491dbb60ba74262aecd498b9abebcedc618f4353f56f4f9412115b94eab35d97243e6bb8a0f71133387437deacb2d2678616f008d1fc710d972d08fc8519632df6bacd3bdbfb0f5a3317048921df2f3fb2e6eec68c938deb224b362fdda61f2c4da54fa8ffaa8fea4345441649bd50e7", @ANYRES32=r7, @ANYBLOB="f554cbc12da6ac1cf0e8"], &(0x7f0000000000)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r8}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x48) kexec_load(0x0, 0x1, &(0x7f0000000140)=[{0x0, 0x3e00, 0x116094000, 0x41000000}], 0x0) 46.218200384s ago: executing program 2 (id=296): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000040)=""/54, 0x36) getdents64(r1, 0xfffffffffffffffe, 0x29) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x26, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x101}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ldst={0x3, 0x0, 0x6, 0xa, 0x2, 0x80, 0xf}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_fd={0x18, 0xb, 0x1, 0x0, r0}, @map_fd={0x18, 0x9, 0x1, 0x0, r0}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='syzkaller\x00', 0x6, 0x1, &(0x7f0000000040)=""/1, 0x41100, 0x12, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000340)=[r0, r0, r0, r0, r0, r0, 0xffffffffffffffff, r0], &(0x7f0000000380)=[{0x1, 0x1, 0x8, 0xa}, {0x4, 0x1, 0x3}, {0x2, 0x5, 0xe, 0x2}, {0x2, 0x5, 0xa, 0x7}, {0x2, 0x1, 0xe, 0x1}, {0x0, 0x1, 0x5, 0xc}, {0x0, 0x1, 0x2, 0x3}, {0x1, 0x2, 0xf, 0x2}, {0x2, 0x5, 0x9, 0x2}], 0x10, 0x1, @void, @value}, 0x94) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000600), 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000640)={r1, r2, 0x4, r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=ANY=[@ANYBLOB="1200000004000000080000000b"], 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r7, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r6}, 0x20) close(r5) 31.145312183s ago: executing program 33 (id=296): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000040)=""/54, 0x36) getdents64(r1, 0xfffffffffffffffe, 0x29) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x26, &(0x7f0000000200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x101}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ldst={0x3, 0x0, 0x6, 0xa, 0x2, 0x80, 0xf}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @map_fd={0x18, 0xb, 0x1, 0x0, r0}, @map_fd={0x18, 0x9, 0x1, 0x0, r0}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='syzkaller\x00', 0x6, 0x1, &(0x7f0000000040)=""/1, 0x41100, 0x12, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000340)=[r0, r0, r0, r0, r0, r0, 0xffffffffffffffff, r0], &(0x7f0000000380)=[{0x1, 0x1, 0x8, 0xa}, {0x4, 0x1, 0x3}, {0x2, 0x5, 0xe, 0x2}, {0x2, 0x5, 0xa, 0x7}, {0x2, 0x1, 0xe, 0x1}, {0x0, 0x1, 0x5, 0xc}, {0x0, 0x1, 0x2, 0x3}, {0x1, 0x2, 0xf, 0x2}, {0x2, 0x5, 0x9, 0x2}], 0x10, 0x1, @void, @value}, 0x94) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000600), 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000640)={r1, r2, 0x4, r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=ANY=[@ANYBLOB="1200000004000000080000000b"], 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r7, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r6}, 0x20) close(r5) 3.476915714s ago: executing program 0 (id=1148): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x2, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x10, 0x0, 0x0, 0x41100, 0x24, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1c, 0xb, &(0x7f0000000700)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000bc0), r3) sendmsg$NLBL_CIPSOV4_C_ADD(r3, 0x0, 0x20000000) openat$cgroup_procs(r2, &(0x7f0000000440)='cgroup.procs\x00', 0x2, 0x0) r4 = syz_io_uring_setup(0x10d, &(0x7f0000000380)={0x0, 0x0, 0x80, 0xfffffffd}, &(0x7f0000000340)=0x0, &(0x7f0000000480)=0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000840)=ANY=[@ANYRESOCT=r6, @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb704000008000000b704000000000000850000005700000095"], 0x0, 0x8006, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r8}, 0x10) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x800, 0x0) ioctl$TIOCSETD(r9, 0x5423, &(0x7f0000000040)=0x14) ioctl$TIOCSETD(r9, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TIOCVHANGUP(r9, 0x5437, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f00000002c0)=@IORING_OP_SHUTDOWN={0x22, 0x9, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}) io_uring_enter(r4, 0x3516, 0x0, 0x20, 0x0, 0x0) r10 = mq_open(&(0x7f0000000600)='\xa1sx\x00\x00\x00\x00\x00\x01\x88\xbdd\x00\xb6e$_\xc4+\xbe\xf3\xca\xa2\xf68A\xa8\xda', 0x6e93ebbbcc0884f2, 0x10c, &(0x7f0000000700)={0x0, 0x1, 0x3}) mq_timedsend(r10, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r10, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) 3.315793644s ago: executing program 0 (id=1155): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000340)="5c00000013006bcd9e3fe3dc4e48aa31086b8703140000001f03000000000000040014000d000a000d0000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}, {&(0x7f0000000e00)="1bfb4448a12f6f3feb92fd5b7d34a411adb5e76b926b5dc707080dd16ab5de9bb23938", 0x23}, {&(0x7f0000000d80)="08280efe04053ca5585c0276babd767925f334e458f2a2695c3a8a0da320ececee7fbd718a20dc41e59537cb975b74f28a1336677be0cfd1cb895b4d6c1ed671eb62", 0x42}], 0x3, 0x0, 0x0, 0x1f000801}, 0x0) 3.263233054s ago: executing program 0 (id=1157): openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xc, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000000)=0x4) timer_create(0x2, &(0x7f0000000680)={0x0, 0x6, 0x0, @thr={&(0x7f0000000280)="0870ec118c4a9df8e82a6edaff9b275770feb2d7f8d2f7bb9251471b3c53a9f08d588cd1b2e3ff930658d2ad00396a515adcd30a4ace57aef4f72d66e6d384f985573760539a7f4143062c0ae80456373f88df648886e473bfdb5585ae6934593626414cf8a530b49012c77e0f56598b3f26d1e9cd3dd3a64c11eb795dd2455dce9e89cbb7f5260a4761c69b89ae4a45e9083749b8d83d537ddcf283c7d90492d117a98c8682acd09abb5f1c947f36350d83add2c3453cb7f9b9c9c65d30f764ca6c77ff695a16f84442", &(0x7f0000000040)}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r3, 0x0, 0x8000f28, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r4}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) r6 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IMADDTIMER(r6, 0x80044940, &(0x7f00000000c0)=0x32) accept4$phonet_pipe(r3, 0x0, &(0x7f0000000180), 0x80000) read(r1, &(0x7f0000001700)=""/4098, 0x1002) r7 = open_tree(0xffffffffffffff9c, &(0x7f0000000380)='\x00', 0x89801) close(r7) r8 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r8, &(0x7f0000000080)=[{{0x0, 0x0, 0x0}}], 0x40000000000012d, 0x2, 0x0) 1.306907312s ago: executing program 3 (id=1239): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000080), &(0x7f0000000340)='%pS \x00'}, 0x20) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) semop(0x0, 0x0, 0x0) (fail_nth: 11) 1.086351311s ago: executing program 3 (id=1240): r0 = syz_clone(0x8d002240, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) process_vm_readv(r0, &(0x7f00000015c0)=[{&(0x7f00000000c0)=""/171, 0xab}, {&(0x7f0000000240)=""/131, 0x83}, {&(0x7f0000000300)=""/215, 0xd7}, {&(0x7f0000000400)=""/191, 0xbf}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/219, 0xdb}, {&(0x7f0000000000)=""/126, 0x7e}], 0x7, &(0x7f0000001800)=[{&(0x7f0000001640)=""/15, 0xf}, {&(0x7f0000001680)=""/149, 0x95}, {&(0x7f0000001740)=""/166, 0xa6}], 0x3, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0xfffffffffffffff9}, 0x18) ptrace$pokeuser(0x6, r0, 0x358, 0x0) 1.068265241s ago: executing program 3 (id=1241): openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) socket(0x400000000010, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x0, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x2, 0x4001, @loopback}, 0x10, 0x0}, 0x34004000) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4e24, 0x1, @loopback, 0x83f}}, 0x4, 0x9}, &(0x7f0000000240)=0x90) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) r6 = open(&(0x7f00000005c0)='./bus\x00', 0x145842, 0x0) pwritev2(r6, 0x0, 0x0, 0x0, 0x0, 0xb) socket$nl_netfilter(0x10, 0x3, 0xc) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) unshare(0x2040400) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) syz_emit_ethernet(0x36, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaae130aeaaba3086dd606410000000000000000000000000ffffffffffffff02000000000000000000000000000145050000008dbbd022d2a7d7e9bd492585b00670d64aaa9835b879308c338beb000000"], 0x0) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000084ffffffff000000000300000000000000000000000200000000000000000000000000000a030000000000000000000002"], 0x0, 0x56, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1a0000000400004b0000000000000000008000008767c7c1c13c48fa04cdfa2da8f04802f56d0e2feaf998c3675ce6e8df4a80cda286dbda62487eb9f46c383b5e9b519a4c4429f67b85ce080cbf544e45a9bbe5debc8b31b25d803856f70d7b9faa3b6b86052febe8788972bf4b29221a15bea242945528f40abfbe3a2158f71c7526d2b1794962f93d11ea709c6ef192c9fdf706a79bf07591f1af18c5978aff85fb6619c3b2cc8885ff08d69bfaba6f139cbe917f249b167defc6f4a7ff215bc367a5e600"/213, @ANYRES32=0x1, @ANYBLOB="ffffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000400"/20, @ANYRES32=r9, @ANYBLOB='\x00\x00\x00\x00'], 0x50) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./bus\x00', 0x41, &(0x7f0000000080)={[{@bsdgroups}, {@nodiscard}, {@dioread_nolock}, {@init_itable_val}, {@grpjquota}, {@orlov}, {@discard}, {@grpid}, {@barrier}]}, 0x1, 0x510, &(0x7f0000000f80)="$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") 503.16654ms ago: executing program 4 (id=1253): r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7003, &(0x7f0000000400)=[{&(0x7f00000000c0)="ee", 0x3514}], 0x1}}], 0x400000000000181, 0x9200000000000000) r2 = dup3(r1, r0, 0x0) recvmmsg(r2, &(0x7f0000008840)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)=""/8, 0x8}], 0x1}, 0xffffffff}], 0x1, 0x40000001, 0x0) r3 = socket(0x1e, 0x4, 0x0) r4 = socket(0x1e, 0x4, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x7, 0x40, 0x7, 0xc, {{0x10, 0x4, 0x1, 0x31, 0x40, 0x68, 0x0, 0x30, 0x2f, 0x0, @empty, @multicast2, {[@timestamp={0x44, 0x8, 0x88, 0x0, 0x7, [0x0]}, @noop, @rr={0x7, 0x13, 0x2d, [@multicast2, @broadcast, @private=0xa010100, @loopback]}, @timestamp={0x44, 0x10, 0x50, 0x0, 0xb, [0x5, 0x0, 0xfff]}]}}}}}) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x6e, 0x0, 0x56, 0x2}, @fwd={0xe}]}, {0x0, [0x2e]}}, &(0x7f0000000380)=""/1, 0x43, 0x1, 0x1, 0xf88d, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x7, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffff8c, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@map_fd={0x18, 0x0, 0x1, 0x0, r5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @ldst={0x0, 0x1, 0x2, 0x6, 0x5, 0x39261300b6275646, 0xfffffffffffffff0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, @ldst={0x3, 0x1, 0x2, 0x1, 0x1, 0x0, 0xfffffffffffffffc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x7b, &(0x7f00000001c0)=""/123, 0x41000, 0x59, '\x00', r6, @fallback=0x2e, r7, 0x8, &(0x7f0000000480)={0x3, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r2, 0x2, &(0x7f00000004c0)=[r2], &(0x7f0000000500)=[{0x5, 0x4, 0xe, 0x6}, {0x5, 0x3, 0xb, 0x3}], 0x10, 0x9, @void, @value}, 0x94) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) dup3(r4, r3, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) socket(0x1e, 0x4, 0x0) (async) socket(0x1e, 0x2, 0x0) (async) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) (async) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) (async) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0xa9cc7003, &(0x7f0000000400)=[{&(0x7f00000000c0)="ee", 0x3514}], 0x1}}], 0x400000000000181, 0x9200000000000000) (async) dup3(r1, r0, 0x0) (async) recvmmsg(r2, &(0x7f0000008840)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)=""/8, 0x8}], 0x1}, 0xffffffff}], 0x1, 0x40000001, 0x0) (async) socket(0x1e, 0x4, 0x0) (async) socket(0x1e, 0x4, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x7, 0x40, 0x7, 0xc, {{0x10, 0x4, 0x1, 0x31, 0x40, 0x68, 0x0, 0x30, 0x2f, 0x0, @empty, @multicast2, {[@timestamp={0x44, 0x8, 0x88, 0x0, 0x7, [0x0]}, @noop, @rr={0x7, 0x13, 0x2d, [@multicast2, @broadcast, @private=0xa010100, @loopback]}, @timestamp={0x44, 0x10, 0x50, 0x0, 0xb, [0x5, 0x0, 0xfff]}]}}}}}) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@volatile={0x7, 0x0, 0x0, 0x9, 0x2}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x6e, 0x0, 0x56, 0x2}, @fwd={0xe}]}, {0x0, [0x2e]}}, &(0x7f0000000380)=""/1, 0x43, 0x1, 0x1, 0xf88d, 0x0, @void, @value}, 0x28) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x7, 0x16, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffff8c, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@map_fd={0x18, 0x0, 0x1, 0x0, r5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @ldst={0x0, 0x1, 0x2, 0x6, 0x5, 0x39261300b6275646, 0xfffffffffffffff0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, @ldst={0x3, 0x1, 0x2, 0x1, 0x1, 0x0, 0xfffffffffffffffc}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x7b, &(0x7f00000001c0)=""/123, 0x41000, 0x59, '\x00', r6, @fallback=0x2e, r7, 0x8, &(0x7f0000000480)={0x3, 0x4}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r2, 0x2, &(0x7f00000004c0)=[r2], &(0x7f0000000500)=[{0x5, 0x4, 0xe, 0x6}, {0x5, 0x3, 0xb, 0x3}], 0x10, 0x9, @void, @value}, 0x94) (async) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) (async) dup3(r4, r3, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) (async) 445.55346ms ago: executing program 6 (id=1255): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x947, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)}, 0x50) ptrace(0x10, r1) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000003c0)="18607651149d7b10b4024fbbdc08899b8f589df2dbb5d7a8d1b36cfab675cb3976ee8100e2878c9cfa178cac130eb046eda93df39ed4b41924dc225ad4028dd63defb87d698be5c749450b350a789dcfc6b2d6a696b5026d1e52f19274566d1da0f353dd65e330ebf71c5e823f2753c5fd76724828ef31b353e71805205c3dceb44cc4c7b3664e29fb") syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000480, &(0x7f0000000040), 0xfe, 0x76a, &(0x7f0000000fc0)="$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") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.numa_stat\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0x8004587d, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x6}) r3 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x20, 0x0, 0x0, 0xfffff038}, {0x6, 0x0, 0x0, 0x4}]}, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0xe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000080)='kfree\x00', r6, 0x0, 0x80000000000000}, 0x18) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_GET(r9, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000580)=ANY=[@ANYBLOB="34000000c08a9b43c7ac6e74ae00c05edccce2ff48a4977847e3ecfcb4564e31c42c491a6ddfce81e7f5093096538be393e576c4b35f3de706e420afb7cbd60a9e22f21fa84fe2e0a51da5efdb46e65e05d66da66146e5cb42dec3e5b833c08aa7d191fbfa2386ba68a74fbb7aaf3ef875e418c44db5f25933be74ccc5a9b1e77386eafd2b08dc1629a5ba5c58422c2c49ead1ac9a184eace94ffb6500056982febffa80309f6dd07d0645680800000000000000", @ANYRES16=r10, @ANYBLOB="010000000000fcdbdf251c000000200001801400020065727370616e3000000000000000000008000100", @ANYRES32=r8, @ANYBLOB], 0x34}}, 0x4000000) execve(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x48241, 0x0) 445.22708ms ago: executing program 4 (id=1256): unshare(0x68060200) unshare(0x10010200) ptrace(0x10, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc11a900e8d164a40, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001a40)=ANY=[@ANYBLOB="140000001000010000000000000000000100000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f6873720000000058000000160a0101000b000000000000010000000900020073797a32000000000900010073797a30000000002c000380180003801400010076657468305f746f5f6873720000000008000240004400"], 0xf8}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_SCRNMAP(r4, 0x4b41, 0x0) r5 = socket$nl_rdma(0x10, 0x3, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r5, 0x0, r6, 0x0, 0x400000008000f28, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r6, 0xc018937d, &(0x7f0000000040)={{0x1, 0x1, 0x18, r3, {0x3}}, './file0\x00'}) syz_emit_ethernet(0x104d, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000005, 0x80010, r3, 0xbc8aa000) r7 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$SO_TIMESTAMPING(r7, 0x1, 0x41, &(0x7f0000000200)=0x632a, 0x4) setsockopt$inet6_int(r7, 0x29, 0x31, 0x0, 0x0) sendmmsg$inet6(r7, 0x0, 0x0, 0x0) recvmmsg(r7, &(0x7f0000000800), 0x62, 0x12141, 0x0) 422.00471ms ago: executing program 6 (id=1258): r0 = syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x21000e, &(0x7f0000000380), 0xde, 0x52d, &(0x7f0000001500)="$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") r1 = openat(0xffffffffffffff9c, 0x0, 0x141042, 0x0) r2 = openat(r0, 0x0, 0x40500, 0x0) socket$inet(0x2, 0x1, 0x0) pwrite64(r2, &(0x7f0000000100), 0x0, 0x9000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0x40305829, 0x0) r3 = open(&(0x7f0000000780)='./file1\x00', 0x14927e, 0x0) fallocate(r3, 0x0, 0x0, 0x1001f0) fallocate(r3, 0x3, 0x1010000, 0x10000) 406.88139ms ago: executing program 4 (id=1259): wait4(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)) (async) syz_open_dev$usbmon(&(0x7f00000000c0), 0x8, 0x200) (async, rerun: 64) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x2, &(0x7f0000000140)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0xf}], &(0x7f0000000180)='syzkaller\x00', 0x2, 0x1, &(0x7f00000001c0)=""/1, 0x40f00, 0x6c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000200)=[{0x2, 0x1, 0xd, 0x7}, {0x2, 0x4, 0xd, 0x5}], 0x10, 0x118, @void, @value}, 0x94) (rerun: 64) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='cachefiles_lookup\x00', r0, 0x0, 0x9}, 0x18) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x301840, 0x11) getdents(r2, &(0x7f0000000380)=""/57, 0x39) fcntl$getownex(r1, 0x10, &(0x7f00000003c0)={0x0, 0x0}) wait4(r3, &(0x7f0000000400), 0x1, &(0x7f0000000440)) (async) sched_setscheduler(r3, 0x5, &(0x7f0000000500)=0x3d) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000580)=0x1c, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r4, 0x29, 0x36, &(0x7f00000005c0)={0x2e, 0x5, '\x00', [@ra={0x5, 0x2, 0xb}, @hao={0xc9, 0x10, @remote}, @ra={0x5, 0x2, 0xd}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x80000000}, @jumbo={0xc2, 0x4, 0x2}]}, 0x38) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@bloom_filter={0x1e, 0x4, 0x20, 0x2, 0x40000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x1, 0x2, @void, @value, @void, @value}, 0x50) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000840)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000007c0), &(0x7f0000000800)='%pI4 \x00'}, 0x20) (async, rerun: 32) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x3}, 0xc) (async, rerun: 32) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x5, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x1a, 0x5, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x851f, 0x0, 0x0, 0x0, 0xffffffd0}, [@btf_id={0x18, 0x3, 0x3, 0x0, 0x4}]}, &(0x7f0000000640)='GPL\x00', 0x4, 0x34, &(0x7f0000000680)=""/52, 0x41000, 0x8, '\x00', 0x0, @tracing=0x17, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000700)={0x3, 0x2, 0x40, 0x8}, 0x10, 0xffffffffffffffff, r0, 0x5, &(0x7f0000000940)=[r5, r6, r7, r8], &(0x7f0000000980)=[{0xa2, 0x2, 0x10, 0x1}, {0x5, 0x2, 0x9, 0xa}, {0x2, 0x2, 0x8, 0x6}, {0x2, 0x5, 0x7, 0x6}, {0x2, 0x4, 0x3}], 0x10, 0x8, @void, @value}, 0x94) r9 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) (async) r10 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000b00), 0x24c002, 0x0) ioctl$IMADDTIMER(r10, 0x80044940, &(0x7f0000000b40)=0x32) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000c00)={'gre0\x00', &(0x7f0000000b80)={'gre0\x00', 0x0, 0x40, 0x10, 0x3, 0x3, {{0x16, 0x4, 0x2, 0x33, 0x58, 0x66, 0x0, 0x6, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010102, {[@timestamp_addr={0x44, 0x14, 0x7a, 0x1, 0xb, [{@local, 0x80}, {@broadcast, 0x9}]}, @timestamp={0x44, 0x24, 0xf1, 0x0, 0x0, [0x80000000, 0x4, 0x8, 0x2, 0x6, 0xffff7fff, 0x8, 0xa]}, @ra={0x94, 0x4}, @generic={0x4f2a975472b44a1b, 0x4, "be18"}, @noop]}}}}}) (async) r12 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000e40)={&(0x7f0000000c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x19c, 0x19c, 0x3, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0xe, 0x73}, {0x0, 0x9c}]}, @union={0xf, 0x2, 0x0, 0x5, 0x0, 0x6, [{0x8, 0x0, 0x8000}, {0x5, 0x1, 0x1}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x1, 0x7}}, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{0x4, 0x4}, {0x3, 0x3}, {0xe, 0x4}, {0x10, 0x3}, {0xf, 0x1}, {0xb, 0x5}, {0x6, 0x1}, {0x10, 0x5}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x2, 0x9}}, @union={0xc, 0x7, 0x0, 0x5, 0x1, 0x8, [{0xa, 0x0, 0xe4e}, {0x3, 0x2, 0x5}, {0x3, 0x3, 0x4}, {0xd, 0x5, 0x7fffffff}, {0x0, 0x4, 0x5}, {0x2, 0x4, 0x1}, {0x1, 0x0, 0xffffffff}]}, @union={0x1, 0x4, 0x0, 0x5, 0x0, 0x8000, [{0x6, 0x2, 0xf7}, {0xc, 0x4, 0x3}, {0xa, 0x0, 0x8}, {0x7, 0x0, 0x8}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0xf}, {0xd, 0x2}, {0xc, 0x5}, {0xd, 0x1}, {0xe, 0x3}, {0x10, 0x4}, {0xb, 0x4}]}]}, {0x0, [0x30]}}, &(0x7f0000000e00)=""/9, 0x1b7, 0x9, 0x0, 0x1, 0x10000, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=@bloom_filter={0x1e, 0x911, 0x48000000, 0xf, 0x4000, r5, 0xc3, '\x00', r11, r12, 0x1, 0x3, 0x0, 0x7, @void, @value, @void, @value}, 0x50) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r9, 0x8010671f, &(0x7f0000001f00)={&(0x7f0000000f00)=""/4096, 0x1000}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001f80)={&(0x7f0000001f40)='alarmtimer_suspend\x00', r6, 0x0, 0xb}, 0x18) (async, rerun: 32) r13 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001fc0), 0x4) (rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000002000)=@bloom_filter={0x1e, 0x5, 0xe07b, 0x8000, 0x40400, 0x1, 0xfffffff7, '\x00', r11, r13, 0x2, 0x4, 0x4, 0xd, @void, @value, @void, @value}, 0x50) r14 = accept4$x25(0xffffffffffffffff, &(0x7f0000002080)={0x9, @remote}, &(0x7f00000020c0)=0x12, 0x800) ioctl$SIOCX25SDTEFACILITIES(r14, 0x89eb, &(0x7f0000002100)={0xfffa, 0x7, 0x5, 0x1, 0x8, 0xb, 0x20, "9b4a29c3fa7333e9f3b6691838a97fc2c4f651be", "90d595c1a2c4401710ef7ff8500ae7ece37c95df"}) (async) r15 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r15, &(0x7f0000002240)={&(0x7f0000002140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002200)={&(0x7f00000021c0)={0x34, 0x0, 0x400, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x5}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xc8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x4040091}, 0x24040010) 367.98635ms ago: executing program 5 (id=1260): r0 = socket$unix(0x1, 0x1, 0x0) socket(0x10, 0x3, 0x0) bind$unix(r0, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) io_uring_setup(0x7dcb, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) socket$inet(0x2, 0x2, 0x1b) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000340)='GPL\x00', 0x2, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x18) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x101002, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000ec0)=@newqdisc={0x80, 0x24, 0xd0f, 0x3, 0x0, {0x60, 0x0, 0x0, r4, {0x0, 0x2}, {0xffff, 0xffff}, {0x4}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x50, 0x2, {{0x3, 0x3, 0x1, 0x3, 0x400, 0x8}, [@TCA_NETEM_LOSS={0x2c, 0x5, 0x0, 0x1, [@NETEM_LOSS_GE={0x14, 0x2, {0x800, 0x7, 0x8, 0x400}}, @NETEM_LOSS_GE={0x14, 0x2, {0xfffff504, 0x7fffffff, 0x10, 0x4}}]}, @TCA_NETEM_DELAY_DIST={0x6, 0x2, "24e0"}]}}}]}, 0x80}, 0x1, 0x0, 0x0, 0x40001d4}, 0x8840) 367.80438ms ago: executing program 6 (id=1261): syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001080), 0x0, 0x0) io_setup(0x3, &(0x7f0000000180)=0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) mremap(&(0x7f0000186000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f00000ad000/0x3000)=nil) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x201000, 0x1000}, 0x20) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r5}, 0x10) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@rdma_args={0x48, 0x114, 0x1, {{0xfffffffd}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/43, 0x2b}], 0x1}}, @rdma_args={0x48, 0x114, 0x1, {{0x587}, {0x0}, 0x0}}], 0x90}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000780)=ANY=[@ANYBLOB="54010000100013070000000000000000fc00000000000000000000000000000000000000000000000000000000000000000000004e2200"/64, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="ac1414bb000000000000000000000000000000003200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000002000400200000000000000048000200656362286369706865725f6e756c6c29000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c0004000200000000000000fe8800000000000000000000000000015f2a9d40180a1dcf386e57b8f29df209bcbf746717b070ced48cdf743072bb2f14f2a08ff35ed2353b021946dfd59d077df46febe1303835604dbc2b03632535f43ca1f141ca7609ac52f11feb07908c0bb257e80d71aa23239aad109dcd98c705abc1ac1cf774e76f1713f09c9c5e9e32eb94785e7b9760c50e4865913e423560bf1042aabcddcb3c4c3ec7d1e7"], 0x154}, 0x1, 0x0, 0x0, 0x1}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000002, 0x1, @perf_config_ext={0x0, 0x1}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffd, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) modify_ldt$write(0x1, 0x0, 0x0) r8 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_SIOCGIFCONF(r8, 0x8912, &(0x7f00000000c0)=@buf={0x4f, &(0x7f0000000040)="13986b54f8b3ddeadc3d5ed6cd81beda3da8f1d40697b0e7c65cb48e102910295d7716199e8063073fd87ea15899067fb4917cd0f37963350ec5dbe6ac54e7ed2acc0889f230a016dae10e07ce9364"}) ioctl$sock_SIOCGIFCONF(r7, 0x8912, &(0x7f0000000240)=@buf) ioctl$sock_ifreq(r8, 0x8914, &(0x7f0000000000)={'bond0\x00', @ifru_hwaddr=@dev={'\xaa\xaa\xaa\xaa\xaa', 0x31}}) socket(0x10, 0x803, 0x4) r9 = getuid() setuid(r9) flistxattr(r6, 0x0, 0x0) r10 = dup2(0xffffffffffffffff, r0) sendmsg$can_bcm(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x40004}, 0x20044040) io_submit(r1, 0x1, &(0x7f0000000800)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 366.15321ms ago: executing program 4 (id=1262): add_key$keyring(0x0, &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000300), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000640)=ANY=[@ANYBLOB="08010000", @ANYRES16=r1, @ANYBLOB="0100000000000000000001000000080001000000000014000480050603000000000005000300000000000800020001000000d00008800c00078f25000600000000002900078008000500000000000800060000000000080005000000000008000600000000003c0007800c00058008"], 0x108}}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r3 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000180)="1c0000005e007f62516a071c02f8abc36f1d73dbe1ce84ebc7c4c1c9", 0x1c}], 0x1}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={0x0, 0x7}, 0x1320, 0xffffffff, 0x3, 0x5, 0x0, 0x1, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='virtio_transport_alloc_pkt\x00', r4}, 0x18) r5 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r5, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0x10) 365.85356ms ago: executing program 5 (id=1263): socket(0x9, 0x2, 0x3) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@raw={'raw\x00', 0x8, 0x3, 0x298, 0xf8, 0xffffffff, 0xffffffff, 0xf8, 0xffffffff, 0x1c8, 0xffffffff, 0xffffffff, 0x1c8, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x3}, [], [], 'batadv0\x00', 'wg1\x00', {}, {}, 0x6, 0x0, 0x6}, 0x0, 0xd0, 0xf8, 0x0, {0x0, 0x4c00}, [@common=@inet=@socket2={{0x28}, 0x1}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2f8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) r1 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xfffffe21) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000500)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@access_uid}]}}) (fail_nth: 2) 301.54663ms ago: executing program 4 (id=1264): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x401}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2, 0x0, 0xfffffffffffffffe}, 0x18) r3 = socket(0x10, 0x2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f00000002c0)=@gcm_256={{0x303}, "740b965d7de40afe", "b4b87929195ee7b9cac20ba58a04a46997ffeb709073a25686b2d3a1b7a3f704", "863ec15f", "e78c05d8239b3d3c"}, 0x38) write$binfmt_script(r4, &(0x7f0000000780)={'#! ', './file0'}, 0xb) close_range(r3, r4, 0x0) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ifreq(r5, 0x8910, &(0x7f0000000000)={'ip6gretap0\x00', @ifru_mtu=0x6}) ioctl$sock_netdev_private(r5, 0x8914, &(0x7f0000000000)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='ext4_da_update_reserve_space\x00', r6}, 0x18) syz_io_uring_setup(0x5d12, &(0x7f00000014c0)={0x0, 0x8, 0x80, 0x0, 0x13c}, &(0x7f0000001680)=0x0, &(0x7f00000001c0)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000040)=0xfffffffc, 0x0, 0x4) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0028619e08ff4deac22804"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000001800)={@link_local, @random="50a245d5cde0", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x32, 0x0, @empty, @broadcast}, @timestamp_reply={0x11}}}}}, 0x0) fsetxattr(r8, &(0x7f0000000000)=@known='system.sockprotoname\x00', 0x0, 0x0, 0x2) 301.13527ms ago: executing program 4 (id=1265): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000001000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x18) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000003200)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) pipe2(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@uname={'uname', 0x3d, '\xd0\xae\xde\xc1\xaa \xff\xd8\x1d\x1b\xf8\x93)!|\xb0X\xa3\x96\xed\xa2\xab@\xa2m\x93\xdd\b<\x00t\xdc\xabl\xab!\xae\x16\xc4\xcd\xf9{\xdc5_;A\xd2{eC\x014\\\xb3\xc4\xce\xc3yS2-\x01\xbe\xaarW\x96O\xd3\x0f\xe2\xd7/\x17\x1d\xa7.8\x9f8-\xea<\x8d\x91\x90j\xea\xd5\xd5\xae\xcc\xc0\x97\xef\x10\x92\xea\x98|+\x00\x00\x00\x00\x00\x00\x00\x00'}}]}}) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) recvmsg(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x20000) socket$netlink(0x10, 0x3, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) socket(0x2, 0x80805, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+|[@\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bind$tipc(0xffffffffffffffff, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) r6 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x3, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 122.52435ms ago: executing program 5 (id=1266): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r0, @ANYRES8=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) socket$nl_route(0x10, 0x3, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000004c0)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) (async, rerun: 32) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) (rerun: 32) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) (async) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, 0x0, 0x0) (async, rerun: 32) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000100), 0x2, 0x500, &(0x7f0000000500)="$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") (async, rerun: 32) open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xb, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x201000, 0x0) r3 = open(&(0x7f0000000540)='./bus\x00', 0x4000, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x100000, 0x0, 0x0, 0x6, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) preadv2(r3, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYRESOCT=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) prlimit64(0x0, 0xe, 0x0, 0x0) (async) timer_settime(0x0, 0x0, 0x0, 0x0) (async) pipe(0x0) timer_create(0x3, &(0x7f0000533fa0)={0x0, 0x23, 0x800000000004}, 0x0) (async) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) (async) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, 0x0, 0x300) (async) r4 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x33fe0}, 0x33fe0}}, 0x0) (async) io_getevents(0x0, 0xfdfffffffffffffa, 0x0, &(0x7f0000000700), &(0x7f00000003c0)={0x77359400}) timer_gettime(0x0, &(0x7f00000006c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) (async) socket$netlink(0x10, 0x3, 0x0) epoll_create1(0x0) epoll_create1(0x0) 121.89954ms ago: executing program 0 (id=1267): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="1b00000000000000"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000001d40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) close_range(r2, 0xffffffffffffffff, 0x10000000000000) 104.68644ms ago: executing program 3 (id=1268): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='fsi_master_gpio_cmd_rel_addr\x00', r1}, 0x18) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000008c0), 0x4) bind$inet6(r2, &(0x7f0000000f80)={0xa, 0x0, 0x0, @loopback, 0xa7a}, 0x1c) 87.12052ms ago: executing program 6 (id=1269): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x8001) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) 62.52523ms ago: executing program 3 (id=1270): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) unlink(0x0) 62.12374ms ago: executing program 0 (id=1271): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000011c0)=ANY=[@ANYBLOB="2c000000170a010800000000000000000200000809000100730700000000000009000200"], 0x2c}, 0x1, 0x0, 0x0, 0x4008410}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000340), 0x4c0000) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f0000000380)={0xd, 0x0, 0xc8}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) creat(&(0x7f00000002c0)='./file0\x00', 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x280080, 0x0) renameat2(r0, &(0x7f0000000080)='./file0\x00', r6, &(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x11, &(0x7f0000000100)={[{@nombcache}, {@resgid}, {@norecovery}, {@commit={'commit', 0x3d, 0x5}}, {@nombcache}]}, 0x8, 0x5fb, &(0x7f00000004c0)="$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") 61.896339ms ago: executing program 3 (id=1272): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000940)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r3}, 0x10) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) r4 = semget$private(0x0, 0x4000000009, 0x0) semop(r4, &(0x7f00000002c0)=[{0x1, 0x8698, 0x1000}], 0x1) semop(r4, &(0x7f0000000100)=[{0x2, 0x7f, 0x800}, {0x3, 0xfffb}], 0x2) semctl$IPC_RMID(r4, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) semtimedop(r4, &(0x7f00000001c0)=[{0x2, 0x4, 0x800}, {0x2, 0x9, 0x800}], 0x2, &(0x7f0000000400)={r5, r6+10000000}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r7, 0x1}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000380)={0x1, 0x10, 0xfa00, {&(0x7f0000000300), r7}}, 0xfffffffffffffe8e) 47.27519ms ago: executing program 5 (id=1273): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000060000000000000000008500000007000000850000000e00000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000012c0)={&(0x7f0000000040)='kfree\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000001c0)='cpu<00\t&&') 46.80728ms ago: executing program 6 (id=1274): r0 = socket(0x6, 0x5, 0x0) connect$vsock_stream(r0, &(0x7f0000000180)={0x28, 0x0, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001700)=ANY=[], 0x254}}, 0x40808) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000060000000e00000004000000f2cb1a", @ANYRES32, @ANYRES8=r5], 0x0, 0xfffffffd, 0xffffff27, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000540)='rxrpc_connect_call\x00', 0xffffffffffffffff, 0x0, 0xffffffffffffffff}, 0xb) syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x400c84, &(0x7f0000000340), 0x1, 0x786, &(0x7f0000001900)="$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") sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x4040) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x1, 0x70bd2a, 0x8000000, {0x0, 0x0, 0x0, r2, {0x1f, 0x3}}}, 0x24}, 0x1, 0x0, 0x0, 0x20008040}, 0x4000000) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x2710, @host}, 0x10) 36.76471ms ago: executing program 5 (id=1275): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x7, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x401}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2, 0x0, 0xfffffffffffffffe}, 0x18) r3 = socket(0x10, 0x2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f00000002c0)=@gcm_256={{0x303}, "740b965d7de40afe", "b4b87929195ee7b9cac20ba58a04a46997ffeb709073a25686b2d3a1b7a3f704", "863ec15f", "e78c05d8239b3d3c"}, 0x38) write$binfmt_script(r4, &(0x7f0000000780)={'#! ', './file0'}, 0xb) close_range(r3, r4, 0x0) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_ifreq(r5, 0x8910, &(0x7f0000000000)={'ip6gretap0\x00', @ifru_mtu=0x6}) ioctl$sock_netdev_private(r5, 0x8914, &(0x7f0000000000)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='ext4_da_update_reserve_space\x00', r6}, 0x18) syz_io_uring_setup(0x5d12, &(0x7f00000014c0)={0x0, 0x8, 0x80, 0x0, 0x13c}, &(0x7f0000001680)=0x0, &(0x7f00000001c0)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000040)=0xfffffffc, 0x0, 0x4) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0028619e08ff4deac22804"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r9, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000001800)={@link_local, @random="50a245d5cde0", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x32, 0x0, @empty, @broadcast}, @timestamp_reply={0x11}}}}}, 0x0) fsetxattr(r8, &(0x7f0000000000)=@known='system.sockprotoname\x00', 0x0, 0x0, 0x2) 599.629µs ago: executing program 0 (id=1276): syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x1000008, &(0x7f00000000c0)={[{@errors_remount}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000}}]}, 0x4, 0x4f3, &(0x7f0000000540)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x441, 0x104) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) socket$packet(0x11, 0x2, 0x300) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@gettaction={0x14, 0x5a, 0xc6b747b6bf1c6b95, 0x0, 0x25dfd9ff}, 0x14}}, 0x24000000) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x6, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) pwrite64(r1, &(0x7f0000000140)='2', 0x1, 0x8000c61) r3 = socket$unix(0x1, 0x5, 0x0) bind$unix(r3, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r3, 0x3f) fallocate(r0, 0x8, 0x4000, 0x4000) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x1000008, &(0x7f00000000c0)={[{@errors_remount}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000}}]}, 0x4, 0x4f3, &(0x7f0000000540)="$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") (async) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x441, 0x104) (async) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) (async) socket$packet(0x11, 0x2, 0x300) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@gettaction={0x14, 0x5a, 0xc6b747b6bf1c6b95, 0x0, 0x25dfd9ff}, 0x14}}, 0x24000000) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x6, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) (async) pwrite64(r1, &(0x7f0000000140)='2', 0x1, 0x8000c61) (async) socket$unix(0x1, 0x5, 0x0) (async) bind$unix(r3, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) (async) listen(r3, 0x3f) (async) fallocate(r0, 0x8, 0x4000, 0x4000) (async) 191.859µs ago: executing program 6 (id=1277): mq_open(&(0x7f0000000100)='!selinu\xff\x7f\x00\x00inu\x01\x15x\x00T\x8b\xb5\xf3\xcb\xdd\xe3\xbf2\x86\x01\x84\xdd\x8a\x8f_l\xa1L\xb1\xef\x90\xe8bk-\n\xc6\x00\xaf\xb2\xc9w+C\xb2\x8e9\xb8\xec\x1a\xe5\xaeq\x8fZ\xffm\x1c\x18\x11\x93\xb5z \xc2\x8bd\x98\xa8\x93e\xb9\x82{\xa0-\xaf\xcdP\x9f\xe5Iv\xce*\xa8\xa3\x14i\x05\x8f\x9b\x1eB\x9f\x9d#E\x19\xdc\xfe\xc7\xeb\xb5\xcd\xc8\xe2U\xce\x00'/128, 0x6e93ebbbcc0884f2, 0x0, &(0x7f00000000c0)={0x6, 0x1, 0x3}) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000010001000900000001"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000740)=ANY=[], &(0x7f0000000700)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000003c0)={&(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{0x42, 0x3}, 0x2}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x15}, 0x240000d0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$NL80211_CMD_AUTHENTICATE(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4080}, 0x8000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000280)={0x0, 0x0, 0xd, 0x0, 0x4}, 0xc) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000bc0)=ANY=[@ANYRES64=r0, @ANYRES32], 0x20}, 0x1, 0x0, 0x0, 0x40040}, 0x20008000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x18) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r5, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000380)='sys_enter\x00', r6}, 0x18) socket$netlink(0x10, 0x3, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/185) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{}, &(0x7f0000000000), &(0x7f00000005c0)=r2}, 0x20) io_uring_setup(0x3eae, &(0x7f0000000640)={0x0, 0x10000, 0x4000, 0x0, 0xfffffffd}) r7 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r7}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) pread64(r8, &(0x7f0000000300)=""/150, 0x96, 0x0) 0s ago: executing program 5 (id=1278): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a50000000060a0b040000000000000000020000002400048020000180070001006374000014000280080004400000000008000240000000110900010073797a30000000000900020073797a32"], 0x78}}, 0x0) kernel console output (not intermixed with test programs): vsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 71.692435][ T134] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 71.724902][ T5384] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 71.762453][ T5373] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.769625][ T5373] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.786908][ T5373] bridge_slave_0: entered allmulticast mode [ 71.796883][ T5373] bridge_slave_0: entered promiscuous mode [ 71.805554][ T134] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 71.818896][ T5373] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.826047][ T5373] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.836279][ T5373] bridge_slave_1: entered allmulticast mode [ 71.843068][ T5373] bridge_slave_1: entered promiscuous mode [ 71.870103][ T5373] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 71.882410][ T5384] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 71.911768][ T134] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 71.936658][ T5373] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 71.950172][ T5384] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.007521][ T5384] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.030127][ T5384] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 72.058364][ T5373] team0: Port device team_slave_0 added [ 72.073854][ T5373] team0: Port device team_slave_1 added [ 72.092111][ T134] bridge_slave_1: left allmulticast mode [ 72.097860][ T134] bridge_slave_1: left promiscuous mode [ 72.103584][ T134] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.124424][ T134] bridge_slave_0: left allmulticast mode [ 72.130188][ T134] bridge_slave_0: left promiscuous mode [ 72.135925][ T134] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.183328][ T5413] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 72.192104][ T5413] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 72.231984][ T134] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 72.242113][ T134] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 72.254870][ T134] bond0 (unregistering): Released all slaves [ 72.289624][ T5373] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 72.296696][ T5373] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 72.322710][ T5373] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 72.335516][ T5373] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 72.342528][ T5373] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 72.368543][ T5373] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 72.442445][ T5373] hsr_slave_0: entered promiscuous mode [ 72.448401][ T5373] hsr_slave_1: entered promiscuous mode [ 72.454391][ T5373] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 72.463959][ T5373] Cannot create hsr debugfs directory [ 72.522379][ T134] hsr_slave_0: left promiscuous mode [ 72.528463][ T134] hsr_slave_1: left promiscuous mode [ 72.535842][ T134] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 72.543305][ T134] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 72.559468][ T134] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 72.566959][ T134] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 72.597713][ T134] veth1_macvtap: left promiscuous mode [ 72.609041][ T134] veth0_macvtap: left promiscuous mode [ 72.620187][ T134] veth1_vlan: left promiscuous mode [ 72.631131][ T134] veth0_vlan: left promiscuous mode [ 72.728916][ T134] team0 (unregistering): Port device team_slave_1 removed [ 72.742233][ T134] team0 (unregistering): Port device team_slave_0 removed [ 72.947849][ T5373] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 72.958171][ T5373] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 72.967485][ T5373] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 72.976436][ T5373] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 73.022135][ T5373] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.036092][ T5373] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.050991][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.058136][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.095329][ T5373] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 73.105858][ T5373] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 73.118172][ T50] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.125270][ T50] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.194081][ T5373] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 73.377513][ T5458] syz!: rxe_newlink: already configured on team_slave_0 [ 73.377850][ T5373] veth0_vlan: entered promiscuous mode [ 73.389227][ T29] kauditd_printk_skb: 426 callbacks suppressed [ 73.389243][ T29] audit: type=1400 audit(1740882298.085:5237): avc: denied { getopt } for pid=5457 comm="syz.3.541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 73.412216][ T5373] veth1_vlan: entered promiscuous mode [ 73.416159][ T29] audit: type=1400 audit(1740882298.085:5238): avc: denied { write } for pid=5457 comm="syz.3.541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 73.438935][ T5373] veth0_macvtap: entered promiscuous mode [ 73.456573][ T5373] veth1_macvtap: entered promiscuous mode [ 73.482022][ T5373] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 73.492692][ T5373] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 73.502582][ T5373] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 73.513126][ T5373] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 73.523068][ T5373] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 73.533574][ T5373] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 73.543498][ T5373] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 73.554186][ T5373] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 73.558574][ T5462] loop3: detected capacity change from 0 to 164 [ 73.567963][ T5373] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 73.581821][ T5373] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 73.592355][ T5373] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 73.599100][ T29] audit: type=1400 audit(1740882298.305:5239): avc: denied { mount } for pid=5461 comm="syz.3.543" name="/" dev="loop3" ino=1792 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 [ 73.602307][ T5373] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 73.634976][ T5373] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 73.644933][ T5373] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 73.655389][ T5373] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 73.665258][ T5373] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 73.675765][ T5373] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 73.686729][ T5373] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 73.695486][ T5373] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.704339][ T5373] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.713135][ T5373] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.721855][ T5373] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 73.748525][ T29] audit: type=1400 audit(1740882298.455:5240): avc: denied { mounton } for pid=5373 comm="syz-executor" path="/root/syzkaller.K7MIzr/syz-tmp" dev="sda1" ino=1953 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 73.803985][ T29] audit: type=1400 audit(1740882298.455:5241): avc: denied { mount } for pid=5373 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 73.826309][ T29] audit: type=1400 audit(1740882298.455:5242): avc: denied { mounton } for pid=5373 comm="syz-executor" path="/root/syzkaller.K7MIzr/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 73.853251][ T29] audit: type=1400 audit(1740882298.455:5243): avc: denied { mounton } for pid=5373 comm="syz-executor" path="/root/syzkaller.K7MIzr/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=12573 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 73.880921][ T29] audit: type=1400 audit(1740882298.495:5244): avc: denied { mounton } for pid=5373 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=502 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 73.903934][ T29] audit: type=1400 audit(1740882298.495:5245): avc: denied { mount } for pid=5373 comm="syz-executor" name="/" dev="gadgetfs" ino=3753 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 73.927327][ T5462] syz.3.543: attempt to access beyond end of device [ 73.927327][ T5462] loop3: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 73.965317][ T5478] netlink: 'syz.4.547': attribute type 27 has an invalid length. [ 74.003476][ T5478] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.010734][ T5478] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.043424][ T29] audit: type=1400 audit(1740882298.755:5246): avc: denied { connect } for pid=5483 comm="syz.0.549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 74.082060][ T5478] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 74.091888][ T5478] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 74.121793][ T5478] netdevsim netdevsim4 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 74.130369][ T5478] netdevsim netdevsim4 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 74.138840][ T5478] netdevsim netdevsim4 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 74.147306][ T5478] netdevsim netdevsim4 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 74.187118][ T5492] FAULT_INJECTION: forcing a failure. [ 74.187118][ T5492] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 74.200350][ T5492] CPU: 1 UID: 0 PID: 5492 Comm: syz.4.551 Not tainted 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 74.200377][ T5492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 74.200391][ T5492] Call Trace: [ 74.200397][ T5492] [ 74.200436][ T5492] dump_stack_lvl+0xf2/0x150 [ 74.200496][ T5492] dump_stack+0x15/0x1a [ 74.200521][ T5492] should_fail_ex+0x24a/0x260 [ 74.200556][ T5492] should_fail+0xb/0x10 [ 74.200588][ T5492] should_fail_usercopy+0x1a/0x20 [ 74.200700][ T5492] _copy_to_user+0x20/0xa0 [ 74.200723][ T5492] simple_read_from_buffer+0xa0/0x110 [ 74.200813][ T5492] proc_fail_nth_read+0xf9/0x140 [ 74.200916][ T5492] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 74.200951][ T5492] vfs_read+0x19b/0x6f0 [ 74.201046][ T5492] ? __rcu_read_unlock+0x4e/0x70 [ 74.201075][ T5492] ? __fget_files+0x17c/0x1c0 [ 74.201114][ T5492] ksys_read+0xe8/0x1b0 [ 74.201140][ T5492] __x64_sys_read+0x42/0x50 [ 74.201216][ T5492] x64_sys_call+0x2874/0x2dc0 [ 74.201245][ T5492] do_syscall_64+0xc9/0x1c0 [ 74.201325][ T5492] ? clear_bhb_loop+0x55/0xb0 [ 74.201386][ T5492] ? clear_bhb_loop+0x55/0xb0 [ 74.201477][ T5492] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 74.201507][ T5492] RIP: 0033:0x7f3d631bbb7c [ 74.201525][ T5492] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 74.201601][ T5492] RSP: 002b:00007f3d61827030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 74.201623][ T5492] RAX: ffffffffffffffda RBX: 00007f3d633d5fa0 RCX: 00007f3d631bbb7c [ 74.201643][ T5492] RDX: 000000000000000f RSI: 00007f3d618270a0 RDI: 0000000000000005 [ 74.201657][ T5492] RBP: 00007f3d61827090 R08: 0000000000000000 R09: 0000000000000000 [ 74.201672][ T5492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 74.201698][ T5492] R13: 0000000000000000 R14: 00007f3d633d5fa0 R15: 00007ffcf27d09f8 [ 74.201716][ T5492] [ 74.511914][ T5502] loop6: detected capacity change from 0 to 512 [ 74.524841][ T5502] EXT4-fs (loop6): encrypted files will use data=ordered instead of data journaling mode [ 74.541879][ T5502] EXT4-fs (loop6): 1 orphan inode deleted [ 74.547666][ T5502] EXT4-fs (loop6): 1 truncate cleaned up [ 74.555467][ T5502] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 74.599479][ T5373] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 74.682808][ T5519] netlink: 11562 bytes leftover after parsing attributes in process `syz.3.563'. [ 74.854585][ T5538] loop6: detected capacity change from 0 to 2048 [ 74.902657][ T5538] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 74.928138][ T5548] netlink: 16 bytes leftover after parsing attributes in process `syz.3.574'. [ 74.988972][ T5552] FAULT_INJECTION: forcing a failure. [ 74.988972][ T5552] name failslab, interval 1, probability 0, space 0, times 0 [ 75.001892][ T5552] CPU: 0 UID: 0 PID: 5552 Comm: syz.3.576 Not tainted 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 75.001917][ T5552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 75.001931][ T5552] Call Trace: [ 75.001937][ T5552] [ 75.001946][ T5552] dump_stack_lvl+0xf2/0x150 [ 75.001977][ T5552] dump_stack+0x15/0x1a [ 75.002064][ T5552] should_fail_ex+0x24a/0x260 [ 75.002099][ T5552] should_failslab+0x8f/0xb0 [ 75.002132][ T5552] kmem_cache_alloc_node_noprof+0x59/0x320 [ 75.002160][ T5552] ? __alloc_skb+0x10b/0x310 [ 75.002258][ T5552] __alloc_skb+0x10b/0x310 [ 75.002278][ T5552] netlink_alloc_large_skb+0xad/0xe0 [ 75.002313][ T5552] netlink_sendmsg+0x3b4/0x6e0 [ 75.002355][ T5552] ? __pfx_netlink_sendmsg+0x10/0x10 [ 75.002430][ T5552] __sock_sendmsg+0x140/0x180 [ 75.002522][ T5552] ____sys_sendmsg+0x326/0x4b0 [ 75.002599][ T5552] __sys_sendmsg+0x19d/0x230 [ 75.002637][ T5552] __x64_sys_sendmsg+0x46/0x50 [ 75.002661][ T5552] x64_sys_call+0x2734/0x2dc0 [ 75.002686][ T5552] do_syscall_64+0xc9/0x1c0 [ 75.002787][ T5552] ? clear_bhb_loop+0x55/0xb0 [ 75.002819][ T5552] ? clear_bhb_loop+0x55/0xb0 [ 75.002844][ T5552] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 75.002891][ T5552] RIP: 0033:0x7f836cc1d169 [ 75.002937][ T5552] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 75.002999][ T5552] RSP: 002b:00007f836b281038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 75.003019][ T5552] RAX: ffffffffffffffda RBX: 00007f836ce35fa0 RCX: 00007f836cc1d169 [ 75.003032][ T5552] RDX: 0000000000000840 RSI: 00004000000002c0 RDI: 0000000000000004 [ 75.003045][ T5552] RBP: 00007f836b281090 R08: 0000000000000000 R09: 0000000000000000 [ 75.003057][ T5552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 75.003104][ T5552] R13: 0000000000000000 R14: 00007f836ce35fa0 R15: 00007ffc7b8bd5e8 [ 75.003132][ T5552] [ 75.005439][ T5538] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5538 comm=syz.6.571 [ 75.213533][ T5558] loop3: detected capacity change from 0 to 2048 [ 75.235563][ T5561] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 75.287070][ T5558] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 75.315473][ T5373] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 75.316714][ T5567] netlink: 100 bytes leftover after parsing attributes in process `syz.5.582'. [ 75.334336][ T5557] netlink: 4 bytes leftover after parsing attributes in process `syz.3.578'. [ 75.384879][ T5571] ------------[ cut here ]------------ [ 75.390437][ T5571] WARNING: CPU: 0 PID: 5571 at mm/page_alloc.c:4715 __alloc_frozen_pages_noprof+0x204/0x340 [ 75.400617][ T5571] Modules linked in: [ 75.404527][ T5571] CPU: 0 UID: 0 PID: 5571 Comm: syz.4.584 Not tainted 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 75.415187][ T5571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 75.425352][ T5571] RIP: 0010:__alloc_frozen_pages_noprof+0x204/0x340 [ 75.432068][ T5571] Code: 00 48 3b 44 24 30 0f 85 b5 00 00 00 48 89 e8 48 83 c4 38 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc c6 05 1b ec 31 05 01 90 <0f> 0b 90 41 83 fd 0a 0f 87 fc fe ff ff e9 52 fe ff ff a9 00 00 08 [ 75.451723][ T5571] RSP: 0018:ffffc9000f17ba88 EFLAGS: 00010246 [ 75.457830][ T5571] RAX: e9494c0b6668b600 RBX: 0000000000040dc0 RCX: 0000000000000000 [ 75.466155][ T5571] RDX: 0000000000000000 RSI: 0000000000000016 RDI: 0000000000040dc0 [ 75.474233][ T5571] RBP: 0000000000040dc0 R08: ffffffff81cbf0fe R09: 0000000000000000 [ 75.482292][ T5571] R10: ffff888117582c10 R11: 0001888117582c20 R12: 0000000400000000 [ 75.490464][ T5571] R13: 0000000000000016 R14: 0000000000000000 R15: 0000000000000000 [ 75.498474][ T5571] FS: 00007f3d618276c0(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 [ 75.507470][ T5571] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 75.514108][ T5571] CR2: 0000400000001000 CR3: 0000000124444000 CR4: 00000000003506f0 [ 75.522204][ T5571] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 75.530210][ T5571] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 75.538249][ T5571] Call Trace: [ 75.541765][ T5571] [ 75.544801][ T5571] ? __warn+0x141/0x350 [ 75.549170][ T5571] ? report_bug+0x315/0x420 [ 75.553702][ T5571] ? __alloc_frozen_pages_noprof+0x204/0x340 [ 75.559740][ T5571] ? handle_bug+0x60/0x90 [ 75.564081][ T5571] ? exc_invalid_op+0x1a/0x50 [ 75.568845][ T5571] ? asm_exc_invalid_op+0x1a/0x20 [ 75.573970][ T5571] ? hashtab_init+0x4e/0xf0 [ 75.578553][ T5571] ? __alloc_frozen_pages_noprof+0x204/0x340 [ 75.584570][ T5571] ? bpf_trace_run2+0xf4/0x1d0 [ 75.589438][ T5571] __alloc_pages_noprof+0x9/0x20 [ 75.594498][ T5571] ___kmalloc_large_node+0x7a/0x120 [ 75.599748][ T5571] __kmalloc_large_node_noprof+0x17/0xa0 [ 75.605487][ T5571] __kmalloc_noprof+0x2b8/0x3f0 [ 75.610404][ T5571] ? hashtab_init+0x82/0xf0 [ 75.614935][ T5571] hashtab_init+0x82/0xf0 [ 75.619382][ T5571] symtab_init+0x2a/0x40 [ 75.623647][ T5571] policydb_read+0x52b/0x1320 [ 75.628463][ T5571] security_load_policy+0xbf/0x8d0 [ 75.633610][ T5571] ? rep_movs_alternative+0x4a/0x70 [ 75.638878][ T5571] sel_write_load+0x1d1/0x360 [ 75.643693][ T5571] ? __pfx_sel_write_load+0x10/0x10 [ 75.648915][ T5571] vfs_write+0x27d/0x920 [ 75.653193][ T5571] ? __fget_files+0x17c/0x1c0 [ 75.657915][ T5571] ksys_write+0xe8/0x1b0 [ 75.662188][ T5571] __x64_sys_write+0x42/0x50 [ 75.666784][ T5571] x64_sys_call+0x287e/0x2dc0 [ 75.671518][ T5571] do_syscall_64+0xc9/0x1c0 [ 75.676195][ T5571] ? clear_bhb_loop+0x55/0xb0 [ 75.680975][ T5571] ? clear_bhb_loop+0x55/0xb0 [ 75.685677][ T5571] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 75.691703][ T5571] RIP: 0033:0x7f3d631bd169 [ 75.696111][ T5571] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 75.715933][ T5571] RSP: 002b:00007f3d61827038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 75.724513][ T5571] RAX: ffffffffffffffda RBX: 00007f3d633d5fa0 RCX: 00007f3d631bd169 [ 75.732568][ T5571] RDX: 0000000000002000 RSI: 0000400000000000 RDI: 0000000000000003 [ 75.740573][ T5571] RBP: 00007f3d6323e2a0 R08: 0000000000000000 R09: 0000000000000000 [ 75.748564][ T5571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 75.756559][ T5571] R13: 0000000000000000 R14: 00007f3d633d5fa0 R15: 00007ffcf27d09f8 [ 75.764625][ T5571] [ 75.767645][ T5571] ---[ end trace 0000000000000000 ]--- [ 75.773182][ T5571] SELinux: failed to load policy [ 75.790307][ T5578] netlink: 100 bytes leftover after parsing attributes in process `syz.6.581'. [ 75.835742][ T5582] loop4: detected capacity change from 0 to 2048 [ 75.851552][ T5582] EXT4-fs: Ignoring removed mblk_io_submit option [ 75.913227][ T5586] team0 (unregistering): Port device team_slave_0 removed [ 75.930000][ T5582] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 75.991475][ T5589] program syz.5.588 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 76.001339][ T5589] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 76.052429][ T5586] team0 (unregistering): Port device team_slave_1 removed [ 76.074528][ T5582] EXT4-fs error (device loop4): ext4_validate_block_bitmap:441: comm syz.4.587: bg 0: block 234: padding at end of block bitmap is not set [ 76.135647][ T5582] EXT4-fs (loop4): Remounting filesystem read-only [ 76.146901][ T5594] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop4 ino=12 [ 76.159889][ T5582] syz.4.587 (5582) used greatest stack depth: 8936 bytes left [ 76.233988][ T3300] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 76.261339][ T3304] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 76.355324][ T5602] SELinux: Context system_u:object_r:semanage_exec_t:s0 is not valid (left unmapped). [ 76.432375][ T5614] netlink: 44 bytes leftover after parsing attributes in process `syz.4.598'. [ 76.441318][ T5614] netlink: 8 bytes leftover after parsing attributes in process `syz.4.598'. [ 76.514872][ T5621] IPVS: set_ctl: invalid protocol: 255 100.1.1.2:20002 [ 76.526982][ T5623] FAULT_INJECTION: forcing a failure. [ 76.526982][ T5623] name failslab, interval 1, probability 0, space 0, times 0 [ 76.539676][ T5623] CPU: 1 UID: 0 PID: 5623 Comm: syz.3.602 Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 76.539711][ T5623] Tainted: [W]=WARN [ 76.539718][ T5623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 76.539730][ T5623] Call Trace: [ 76.539736][ T5623] [ 76.539746][ T5623] dump_stack_lvl+0xf2/0x150 [ 76.539887][ T5623] dump_stack+0x15/0x1a [ 76.539909][ T5623] should_fail_ex+0x24a/0x260 [ 76.539944][ T5623] ? audit_log_d_path+0x8e/0x150 [ 76.539983][ T5623] should_failslab+0x8f/0xb0 [ 76.540045][ T5623] __kmalloc_cache_noprof+0x4e/0x320 [ 76.540110][ T5623] audit_log_d_path+0x8e/0x150 [ 76.540149][ T5623] audit_log_d_path_exe+0x42/0x70 [ 76.540208][ T5623] audit_log_task+0x1ec/0x250 [ 76.540249][ T5623] audit_seccomp+0x68/0x130 [ 76.540287][ T5623] __seccomp_filter+0x6fa/0x1180 [ 76.540346][ T5623] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 76.540385][ T5623] ? vfs_write+0x644/0x920 [ 76.540455][ T5623] __secure_computing+0x9f/0x1c0 [ 76.540491][ T5623] syscall_trace_enter+0xd1/0x1f0 [ 76.540521][ T5623] ? fpregs_assert_state_consistent+0x83/0xa0 [ 76.540551][ T5623] do_syscall_64+0xaa/0x1c0 [ 76.540658][ T5623] ? clear_bhb_loop+0x55/0xb0 [ 76.540685][ T5623] ? clear_bhb_loop+0x55/0xb0 [ 76.540715][ T5623] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 76.540748][ T5623] RIP: 0033:0x7f836cc1d169 [ 76.540767][ T5623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 76.540869][ T5623] RSP: 002b:00007f836b281038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a0 [ 76.540892][ T5623] RAX: ffffffffffffffda RBX: 00007f836ce35fa0 RCX: 00007f836cc1d169 [ 76.540907][ T5623] RDX: 0000000000000000 RSI: 0000400000000200 RDI: 0000000000000007 [ 76.540956][ T5623] RBP: 00007f836b281090 R08: 0000000000000000 R09: 0000000000000000 [ 76.540968][ T5623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 76.541007][ T5623] R13: 0000000000000000 R14: 00007f836ce35fa0 R15: 00007ffc7b8bd5e8 [ 76.541026][ T5623] [ 76.782464][ T5621] loop4: detected capacity change from 0 to 1764 [ 76.800309][ T5621] ISOFS: unable to read i-node block [ 76.805711][ T5621] isofs_fill_super: get root inode failed [ 76.879583][ T5635] netlink: 16 bytes leftover after parsing attributes in process `syz.4.606'. [ 76.952582][ T5646] loop4: detected capacity change from 0 to 256 [ 76.958951][ T5645] netlink: 44 bytes leftover after parsing attributes in process `syz.3.609'. [ 76.967952][ T5645] netlink: 8 bytes leftover after parsing attributes in process `syz.3.609'. [ 77.034372][ T5654] netlink: 'syz.4.610': attribute type 1 has an invalid length. [ 77.096756][ T5663] smc: removing ib device syz! [ 77.141292][ T5669] FAULT_INJECTION: forcing a failure. [ 77.141292][ T5669] name failslab, interval 1, probability 0, space 0, times 0 [ 77.154190][ T5669] CPU: 1 UID: 0 PID: 5669 Comm: syz.3.618 Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 77.154227][ T5669] Tainted: [W]=WARN [ 77.154235][ T5669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 77.154251][ T5669] Call Trace: [ 77.154258][ T5669] [ 77.154267][ T5669] dump_stack_lvl+0xf2/0x150 [ 77.154295][ T5669] dump_stack+0x15/0x1a [ 77.154374][ T5669] should_fail_ex+0x24a/0x260 [ 77.154418][ T5669] should_failslab+0x8f/0xb0 [ 77.154452][ T5669] kmem_cache_alloc_noprof+0x52/0x320 [ 77.154496][ T5669] ? skb_clone+0x154/0x1f0 [ 77.154523][ T5669] skb_clone+0x154/0x1f0 [ 77.154604][ T5669] __netlink_deliver_tap+0x2bd/0x4f0 [ 77.154642][ T5669] netlink_unicast+0x64a/0x670 [ 77.154708][ T5669] netlink_sendmsg+0x5cc/0x6e0 [ 77.154782][ T5669] ? __pfx_netlink_sendmsg+0x10/0x10 [ 77.154822][ T5669] __sock_sendmsg+0x140/0x180 [ 77.154857][ T5669] ____sys_sendmsg+0x326/0x4b0 [ 77.154963][ T5669] __sys_sendmsg+0x19d/0x230 [ 77.155010][ T5669] __x64_sys_sendmsg+0x46/0x50 [ 77.155036][ T5669] x64_sys_call+0x2734/0x2dc0 [ 77.155062][ T5669] do_syscall_64+0xc9/0x1c0 [ 77.155172][ T5669] ? clear_bhb_loop+0x55/0xb0 [ 77.155200][ T5669] ? clear_bhb_loop+0x55/0xb0 [ 77.155287][ T5669] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 77.155317][ T5669] RIP: 0033:0x7f836cc1d169 [ 77.155332][ T5669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 77.155422][ T5669] RSP: 002b:00007f836b281038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 77.155442][ T5669] RAX: ffffffffffffffda RBX: 00007f836ce35fa0 RCX: 00007f836cc1d169 [ 77.155456][ T5669] RDX: 0000000000004886 RSI: 0000400000000240 RDI: 0000000000000003 [ 77.155476][ T5669] RBP: 00007f836b281090 R08: 0000000000000000 R09: 0000000000000000 [ 77.155490][ T5669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 77.155504][ T5669] R13: 0000000000000000 R14: 00007f836ce35fa0 R15: 00007ffc7b8bd5e8 [ 77.155526][ T5669] [ 77.425440][ T5667] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 77.436864][ T3434] IPVS: starting estimator thread 0... [ 77.483246][ T5667] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 77.513392][ T5676] macvlan2: entered promiscuous mode [ 77.527518][ T5676] netlink: 'syz.0.619': attribute type 13 has an invalid length. [ 77.529320][ T5671] IPVS: using max 2064 ests per chain, 103200 per kthread [ 77.545666][ T5676] batman_adv: Cannot find parent device. Skipping batadv-on-batadv check for gretap1 [ 77.558910][ T5676] gretap1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 77.566796][ T5676] gretap1: entered promiscuous mode [ 77.572065][ T5676] gretap1: entered allmulticast mode [ 77.581203][ T5667] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 77.640997][ T5667] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 77.652003][ T5674] bridge0: port 3(syz_tun) entered blocking state [ 77.658512][ T5674] bridge0: port 3(syz_tun) entered disabled state [ 77.665090][ T5674] syz_tun: entered allmulticast mode [ 77.671062][ T5674] syz_tun: entered promiscuous mode [ 77.676547][ T5674] bridge0: port 3(syz_tun) entered blocking state [ 77.683024][ T5674] bridge0: port 3(syz_tun) entered forwarding state [ 77.692546][ T5674] netlink: 'syz.3.620': attribute type 2 has an invalid length. [ 77.707229][ T5667] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.718542][ T5667] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.729886][ T5667] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.741454][ T5667] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.798504][ T5684] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=16384 sclass=netlink_route_socket pid=5684 comm=syz.6.624 [ 77.964704][ T5699] loop4: detected capacity change from 0 to 164 [ 78.088215][ T5699] syz.4.629: attempt to access beyond end of device [ 78.088215][ T5699] loop4: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 78.426472][ T5731] loop5: detected capacity change from 0 to 1024 [ 78.433330][ T5731] EXT4-fs: Ignoring removed oldalloc option [ 78.434491][ T5733] FAULT_INJECTION: forcing a failure. [ 78.434491][ T5733] name failslab, interval 1, probability 0, space 0, times 0 [ 78.439648][ T5731] EXT4-fs: Ignoring removed i_version option [ 78.452154][ T5733] CPU: 1 UID: 0 PID: 5733 Comm: syz.3.643 Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 78.452193][ T5733] Tainted: [W]=WARN [ 78.452203][ T5733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 78.452219][ T5733] Call Trace: [ 78.452228][ T5733] [ 78.452237][ T5733] dump_stack_lvl+0xf2/0x150 [ 78.452279][ T5733] dump_stack+0x15/0x1a [ 78.452359][ T5733] should_fail_ex+0x24a/0x260 [ 78.452395][ T5733] ? call_usermodehelper_setup+0x72/0x190 [ 78.452425][ T5733] should_failslab+0x8f/0xb0 [ 78.452537][ T5733] __kmalloc_cache_noprof+0x4e/0x320 [ 78.452602][ T5733] call_usermodehelper_setup+0x72/0x190 [ 78.452630][ T5733] ? __pfx_free_modprobe_argv+0x10/0x10 [ 78.452701][ T5733] __request_module+0x25a/0x3e0 [ 78.452728][ T5733] ? strcmp+0x21/0x50 [ 78.452767][ T5733] ? crypto_alg_mod_lookup+0x84/0x450 [ 78.452855][ T5733] crypto_alg_mod_lookup+0xa2/0x450 [ 78.452972][ T5733] crypto_alloc_tfm_node+0xaa/0x250 [ 78.453023][ T5733] crypto_alloc_aead+0x2f/0x40 [ 78.453051][ T5733] tls_set_sw_offload+0x579/0xa90 [ 78.453115][ T5733] tls_setsockopt+0xa21/0xf20 [ 78.453162][ T5733] sock_common_setsockopt+0x64/0x80 [ 78.453206][ T5733] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 78.453254][ T5733] __sys_setsockopt+0x187/0x200 [ 78.453294][ T5733] __x64_sys_setsockopt+0x66/0x80 [ 78.453324][ T5733] x64_sys_call+0x282e/0x2dc0 [ 78.453432][ T5733] do_syscall_64+0xc9/0x1c0 [ 78.453472][ T5733] ? clear_bhb_loop+0x55/0xb0 [ 78.453506][ T5733] ? clear_bhb_loop+0x55/0xb0 [ 78.453541][ T5733] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 78.453610][ T5733] RIP: 0033:0x7f836cc1d169 [ 78.453638][ T5733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 78.453661][ T5733] RSP: 002b:00007f836b281038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 78.453685][ T5733] RAX: ffffffffffffffda RBX: 00007f836ce35fa0 RCX: 00007f836cc1d169 [ 78.453701][ T5733] RDX: 0000000000000002 RSI: 000000000000011a RDI: 0000000000000003 [ 78.453716][ T5733] RBP: 00007f836b281090 R08: 0000000000000038 R09: 0000000000000000 [ 78.453731][ T5733] R10: 0000400000000140 R11: 0000000000000246 R12: 0000000000000001 [ 78.453746][ T5733] R13: 0000000000000000 R14: 00007f836ce35fa0 R15: 00007ffc7b8bd5e8 [ 78.453770][ T5733] [ 78.694002][ T5739] FAULT_INJECTION: forcing a failure. [ 78.694002][ T5739] name failslab, interval 1, probability 0, space 0, times 0 [ 78.706812][ T5739] CPU: 0 UID: 0 PID: 5739 Comm: +}[@ Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 78.706849][ T5739] Tainted: [W]=WARN [ 78.706858][ T5739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 78.706874][ T5739] Call Trace: [ 78.706882][ T5739] [ 78.706892][ T5739] dump_stack_lvl+0xf2/0x150 [ 78.706926][ T5739] dump_stack+0x15/0x1a [ 78.706952][ T5739] should_fail_ex+0x24a/0x260 [ 78.707040][ T5739] ? alloc_fs_context+0x44/0x4e0 [ 78.707075][ T5739] should_failslab+0x8f/0xb0 [ 78.707159][ T5739] __kmalloc_cache_noprof+0x4e/0x320 [ 78.707188][ T5739] alloc_fs_context+0x44/0x4e0 [ 78.707219][ T5739] ? strncmp+0x34/0x70 [ 78.707262][ T5739] fs_context_for_mount+0x21/0x30 [ 78.707324][ T5739] do_new_mount+0xf3/0x690 [ 78.707362][ T5739] path_mount+0x49b/0xb30 [ 78.707399][ T5739] __se_sys_mount+0x27f/0x2d0 [ 78.707476][ T5739] ? __bpf_trace_sys_enter+0x10/0x30 [ 78.707505][ T5739] __x64_sys_mount+0x67/0x80 [ 78.707539][ T5739] x64_sys_call+0x2c84/0x2dc0 [ 78.707596][ T5739] do_syscall_64+0xc9/0x1c0 [ 78.707657][ T5739] ? clear_bhb_loop+0x55/0xb0 [ 78.707695][ T5739] ? clear_bhb_loop+0x55/0xb0 [ 78.707722][ T5739] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 78.707769][ T5739] RIP: 0033:0x7f01473ed169 [ 78.707787][ T5739] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 78.707808][ T5739] RSP: 002b:00007f0145a51038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 78.707831][ T5739] RAX: ffffffffffffffda RBX: 00007f0147605fa0 RCX: 00007f01473ed169 [ 78.707846][ T5739] RDX: 0000400000000080 RSI: 0000400000000300 RDI: 0000000000000000 [ 78.707861][ T5739] RBP: 00007f0145a51090 R08: 0000400000000240 R09: 0000000000000000 [ 78.707874][ T5739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 78.707887][ T5739] R13: 0000000000000000 R14: 00007f0147605fa0 R15: 00007ffc3a527778 [ 78.707910][ T5739] [ 78.924487][ T5731] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 78.943989][ T5731] netlink: 'syz.5.642': attribute type 13 has an invalid length. [ 78.952269][ T29] kauditd_printk_skb: 463 callbacks suppressed [ 78.952287][ T29] audit: type=1326 audit(1740882303.655:5710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5748 comm="syz.0.647" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f01473ed169 code=0x7ffc0000 [ 78.982130][ T29] audit: type=1326 audit(1740882303.655:5711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5748 comm="syz.0.647" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f01473ed169 code=0x7ffc0000 [ 79.005615][ T29] audit: type=1326 audit(1740882303.655:5712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5748 comm="syz.0.647" exe="/root/syz-executor" sig=0 arch=c000003e syscall=113 compat=0 ip=0x7f01473ed169 code=0x7ffc0000 [ 79.029046][ T29] audit: type=1326 audit(1740882303.655:5713): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5748 comm="syz.0.647" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f01473ed169 code=0x7ffc0000 [ 79.052778][ T29] audit: type=1326 audit(1740882303.655:5714): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5748 comm="syz.0.647" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f01473ed169 code=0x7ffc0000 [ 79.076506][ T29] audit: type=1326 audit(1740882303.655:5715): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5748 comm="syz.0.647" exe="/root/syz-executor" sig=0 arch=c000003e syscall=252 compat=0 ip=0x7f01473ed169 code=0x7ffc0000 [ 79.076536][ T29] audit: type=1326 audit(1740882303.655:5716): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5748 comm="syz.0.647" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f01473ed169 code=0x7ffc0000 [ 79.104289][ T5751] FAULT_INJECTION: forcing a failure. [ 79.104289][ T5751] name failslab, interval 1, probability 0, space 0, times 0 [ 79.123938][ T29] audit: type=1326 audit(1740882303.655:5717): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5748 comm="syz.0.647" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f01473ed169 code=0x7ffc0000 [ 79.136562][ T5751] CPU: 1 UID: 0 PID: 5751 Comm: syz.6.649 Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 79.136681][ T5751] Tainted: [W]=WARN [ 79.136689][ T5751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 79.136706][ T5751] Call Trace: [ 79.136713][ T5751] [ 79.136721][ T5751] dump_stack_lvl+0xf2/0x150 [ 79.136828][ T5751] dump_stack+0x15/0x1a [ 79.136855][ T5751] should_fail_ex+0x24a/0x260 [ 79.136963][ T5751] should_failslab+0x8f/0xb0 [ 79.137002][ T5751] kmem_cache_alloc_noprof+0x52/0x320 [ 79.137030][ T5751] ? audit_log_start+0x34c/0x6b0 [ 79.137074][ T5751] audit_log_start+0x34c/0x6b0 [ 79.137196][ T5751] audit_seccomp+0x4b/0x130 [ 79.137234][ T5751] __seccomp_filter+0x6fa/0x1180 [ 79.137266][ T5751] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 79.137370][ T5751] ? vfs_write+0x644/0x920 [ 79.137422][ T5751] __secure_computing+0x9f/0x1c0 [ 79.137451][ T5751] syscall_trace_enter+0xd1/0x1f0 [ 79.137548][ T5751] ? fpregs_assert_state_consistent+0x83/0xa0 [ 79.137578][ T5751] do_syscall_64+0xaa/0x1c0 [ 79.137635][ T5751] ? clear_bhb_loop+0x55/0xb0 [ 79.137669][ T5751] ? clear_bhb_loop+0x55/0xb0 [ 79.137703][ T5751] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 79.137800][ T5751] RIP: 0033:0x7fb53c72d169 [ 79.137865][ T5751] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 79.137887][ T5751] RSP: 002b:00007fb53ad97038 EFLAGS: 00000246 ORIG_RAX: 00000000000000fc [ 79.137910][ T5751] RAX: ffffffffffffffda RBX: 00007fb53c945fa0 RCX: 00007fb53c72d169 [ 79.137926][ T5751] RDX: 0000000000000000 RSI: 000000000000ee01 RDI: 0000000000000003 [ 79.137941][ T5751] RBP: 00007fb53ad97090 R08: 0000000000000000 R09: 0000000000000000 [ 79.137962][ T5751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 79.137977][ T5751] R13: 0000000000000000 R14: 00007fb53c945fa0 R15: 00007ffee7b65a68 [ 79.138076][ T5751] [ 79.138086][ T5751] audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 [ 79.160189][ T29] audit: type=1400 audit(1740882303.655:5718): avc: denied { create } for pid=5730 comm="syz.5.642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 79.446587][ T5731] net_ratelimit: 1 callbacks suppressed [ 79.446599][ T5731] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 79.504100][ T4736] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 79.583258][ T5776] loop6: detected capacity change from 0 to 164 [ 79.645619][ T5777] gretap1: entered allmulticast mode [ 79.652315][ T5777] bridge0: port 4(gretap1) entered blocking state [ 79.658852][ T5777] bridge0: port 4(gretap1) entered disabled state [ 79.666267][ T5777] gretap1: entered promiscuous mode [ 79.672009][ T5777] bridge0: port 4(gretap1) entered blocking state [ 79.678483][ T5777] bridge0: port 4(gretap1) entered forwarding state [ 79.719450][ C1] bridge0: received packet on gretap1 with own address as source address (addr:66:21:e8:9a:04:de, vlan:0) [ 80.102378][ T5798] FAULT_INJECTION: forcing a failure. [ 80.102378][ T5798] name failslab, interval 1, probability 0, space 0, times 0 [ 80.115209][ T5798] CPU: 1 UID: 0 PID: 5798 Comm: syz.6.664 Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 80.115245][ T5798] Tainted: [W]=WARN [ 80.115251][ T5798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 80.115263][ T5798] Call Trace: [ 80.115269][ T5798] [ 80.115277][ T5798] dump_stack_lvl+0xf2/0x150 [ 80.115304][ T5798] dump_stack+0x15/0x1a [ 80.115346][ T5798] should_fail_ex+0x24a/0x260 [ 80.115382][ T5798] ? tcp_md5_do_add+0xd6/0x1c0 [ 80.115458][ T5798] should_failslab+0x8f/0xb0 [ 80.115494][ T5798] __kmalloc_cache_noprof+0x4e/0x320 [ 80.115524][ T5798] tcp_md5_do_add+0xd6/0x1c0 [ 80.115548][ T5798] tcp_v6_parse_md5_keys+0x3d7/0x430 [ 80.115655][ T5798] do_tcp_setsockopt+0xe0a/0x1590 [ 80.115698][ T5798] ? selinux_socket_setsockopt+0x1c9/0x200 [ 80.115730][ T5798] tcp_setsockopt+0x50/0xb0 [ 80.115758][ T5798] sock_common_setsockopt+0x64/0x80 [ 80.115801][ T5798] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 80.115842][ T5798] __sys_setsockopt+0x187/0x200 [ 80.115867][ T5798] __x64_sys_setsockopt+0x66/0x80 [ 80.115890][ T5798] x64_sys_call+0x282e/0x2dc0 [ 80.115922][ T5798] do_syscall_64+0xc9/0x1c0 [ 80.115978][ T5798] ? clear_bhb_loop+0x55/0xb0 [ 80.116004][ T5798] ? clear_bhb_loop+0x55/0xb0 [ 80.116035][ T5798] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 80.116067][ T5798] RIP: 0033:0x7fb53c72d169 [ 80.116085][ T5798] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 80.116149][ T5798] RSP: 002b:00007fb53ad97038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 80.116172][ T5798] RAX: ffffffffffffffda RBX: 00007fb53c945fa0 RCX: 00007fb53c72d169 [ 80.116184][ T5798] RDX: 000000000000000e RSI: 0000000000000006 RDI: 0000000000000006 [ 80.116195][ T5798] RBP: 00007fb53ad97090 R08: 00000000000000d8 R09: 0000000000000000 [ 80.116209][ T5798] R10: 0000400000000300 R11: 0000000000000246 R12: 0000000000000001 [ 80.116223][ T5798] R13: 0000000000000000 R14: 00007fb53c945fa0 R15: 00007ffee7b65a68 [ 80.116245][ T5798] [ 80.420229][ C1] bridge0: received packet on gretap1 with own address as source address (addr:66:21:e8:9a:04:de, vlan:0) [ 80.446192][ T5809] __nla_validate_parse: 8 callbacks suppressed [ 80.446212][ T5809] netlink: 8 bytes leftover after parsing attributes in process `syz.5.670'. [ 80.470295][ T5809] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 80.561358][ T5809] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 80.637906][ T5809] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 80.711079][ T5809] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 81.159653][ T5845] lo: entered allmulticast mode [ 81.172518][ T5845] lo: left allmulticast mode [ 81.224961][ T5845] loop6: detected capacity change from 0 to 512 [ 81.252263][ T5845] EXT4-fs (loop6): encrypted files will use data=ordered instead of data journaling mode [ 81.272560][ T5845] EXT4-fs (loop6): 1 truncate cleaned up [ 81.279038][ T5845] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 81.321167][ T5373] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 81.404277][ T5855] loop6: detected capacity change from 0 to 128 [ 81.414911][ T5855] FAT-fs (loop6): error, corrupted file size (i_pos 548, 512) [ 81.422592][ T5855] FAT-fs (loop6): Filesystem has been set read-only [ 81.459564][ C1] bridge0: received packet on gretap1 with own address as source address (addr:66:21:e8:9a:04:de, vlan:0) [ 81.529382][ C1] bridge0: received packet on gretap1 with own address as source address (addr:66:21:e8:9a:04:de, vlan:0) [ 81.731674][ T5883] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 81.740199][ T5883] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 81.957631][ T5902] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5902 comm=syz.4.709 [ 82.500714][ T5937] program syz.3.724 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 82.511446][ T5937] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 82.536724][ T5945] FAULT_INJECTION: forcing a failure. [ 82.536724][ T5945] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 82.549873][ T5945] CPU: 0 UID: 0 PID: 5945 Comm: syz.3.726 Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 82.549910][ T5945] Tainted: [W]=WARN [ 82.549919][ T5945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 82.549948][ T5945] Call Trace: [ 82.549956][ T5945] [ 82.549971][ T5945] dump_stack_lvl+0xf2/0x150 [ 82.550007][ T5945] dump_stack+0x15/0x1a [ 82.550033][ T5945] should_fail_ex+0x24a/0x260 [ 82.550071][ T5945] should_fail+0xb/0x10 [ 82.550138][ T5945] should_fail_usercopy+0x1a/0x20 [ 82.550175][ T5945] _copy_to_user+0x20/0xa0 [ 82.550197][ T5945] simple_read_from_buffer+0xa0/0x110 [ 82.550273][ T5945] proc_fail_nth_read+0xf9/0x140 [ 82.550367][ T5945] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 82.550398][ T5945] vfs_read+0x19b/0x6f0 [ 82.550481][ T5945] ? __rcu_read_unlock+0x4e/0x70 [ 82.550507][ T5945] ? __fget_files+0x17c/0x1c0 [ 82.550547][ T5945] ksys_read+0xe8/0x1b0 [ 82.550577][ T5945] __x64_sys_read+0x42/0x50 [ 82.550635][ T5945] x64_sys_call+0x2874/0x2dc0 [ 82.550667][ T5945] do_syscall_64+0xc9/0x1c0 [ 82.550702][ T5945] ? clear_bhb_loop+0x55/0xb0 [ 82.550735][ T5945] ? clear_bhb_loop+0x55/0xb0 [ 82.550769][ T5945] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 82.550858][ T5945] RIP: 0033:0x7f836cc1bb7c [ 82.550875][ T5945] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 82.550958][ T5945] RSP: 002b:00007f836b281030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 82.550983][ T5945] RAX: ffffffffffffffda RBX: 00007f836ce35fa0 RCX: 00007f836cc1bb7c [ 82.550995][ T5945] RDX: 000000000000000f RSI: 00007f836b2810a0 RDI: 0000000000000005 [ 82.551008][ T5945] RBP: 00007f836b281090 R08: 0000000000000000 R09: 0000000000000000 [ 82.551058][ T5945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 82.551072][ T5945] R13: 0000000000000000 R14: 00007f836ce35fa0 R15: 00007ffc7b8bd5e8 [ 82.551092][ T5945] [ 82.761661][ T5947] ip6t_rpfilter: unknown options [ 82.770356][ T5952] xt_TCPMSS: Only works on TCP SYN packets [ 82.814127][ T5952] netlink: 20 bytes leftover after parsing attributes in process `syz.3.728'. [ 82.833354][ T5809] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.845732][ T5809] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.861588][ T5809] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.894256][ T5809] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.999505][ T5979] FAULT_INJECTION: forcing a failure. [ 82.999505][ T5979] name failslab, interval 1, probability 0, space 0, times 0 [ 83.012262][ T5979] CPU: 0 UID: 0 PID: 5979 Comm: syz.5.740 Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 83.012294][ T5979] Tainted: [W]=WARN [ 83.012301][ T5979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 83.012313][ T5979] Call Trace: [ 83.012318][ T5979] [ 83.012325][ T5979] dump_stack_lvl+0xf2/0x150 [ 83.012368][ T5979] dump_stack+0x15/0x1a [ 83.012394][ T5979] should_fail_ex+0x24a/0x260 [ 83.012430][ T5979] should_failslab+0x8f/0xb0 [ 83.012497][ T5979] kmem_cache_alloc_noprof+0x52/0x320 [ 83.012518][ T5979] ? getname_flags+0x81/0x3b0 [ 83.012582][ T5979] getname_flags+0x81/0x3b0 [ 83.012623][ T5979] getname_uflags+0x24/0x30 [ 83.012676][ T5979] __x64_sys_execveat+0x5e/0x90 [ 83.012708][ T5979] x64_sys_call+0x291e/0x2dc0 [ 83.012802][ T5979] do_syscall_64+0xc9/0x1c0 [ 83.012836][ T5979] ? clear_bhb_loop+0x55/0xb0 [ 83.012875][ T5979] ? clear_bhb_loop+0x55/0xb0 [ 83.012909][ T5979] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 83.013004][ T5979] RIP: 0033:0x7fbbb2dad169 [ 83.013019][ T5979] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 83.013055][ T5979] RSP: 002b:00007fbbb1417038 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 83.013074][ T5979] RAX: ffffffffffffffda RBX: 00007fbbb2fc5fa0 RCX: 00007fbbb2dad169 [ 83.013086][ T5979] RDX: 0000000000000000 RSI: 0000400000000000 RDI: 0000000000000007 [ 83.013100][ T5979] RBP: 00007fbbb1417090 R08: 0000000000001000 R09: 0000000000000000 [ 83.013113][ T5979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 83.013127][ T5979] R13: 0000000000000000 R14: 00007fbbb2fc5fa0 R15: 00007fff91fb3528 [ 83.013191][ T5979] [ 83.243866][ T5994] FAULT_INJECTION: forcing a failure. [ 83.243866][ T5994] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 83.257116][ T5994] CPU: 0 UID: 0 PID: 5994 Comm: syz.5.748 Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 83.257210][ T5994] Tainted: [W]=WARN [ 83.257217][ T5994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 83.257232][ T5994] Call Trace: [ 83.257240][ T5994] [ 83.257250][ T5994] dump_stack_lvl+0xf2/0x150 [ 83.257360][ T5994] dump_stack+0x15/0x1a [ 83.257386][ T5994] should_fail_ex+0x24a/0x260 [ 83.257486][ T5994] should_fail+0xb/0x10 [ 83.257516][ T5994] should_fail_usercopy+0x1a/0x20 [ 83.257548][ T5994] _copy_from_user+0x1c/0xa0 [ 83.257566][ T5994] copy_msghdr_from_user+0x54/0x2a0 [ 83.257653][ T5994] ? __fget_files+0x17c/0x1c0 [ 83.257693][ T5994] __sys_sendmsg+0x13e/0x230 [ 83.257818][ T5994] __x64_sys_sendmsg+0x46/0x50 [ 83.257848][ T5994] x64_sys_call+0x2734/0x2dc0 [ 83.257880][ T5994] do_syscall_64+0xc9/0x1c0 [ 83.257983][ T5994] ? clear_bhb_loop+0x55/0xb0 [ 83.258016][ T5994] ? clear_bhb_loop+0x55/0xb0 [ 83.258106][ T5994] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 83.258132][ T5994] RIP: 0033:0x7fbbb2dad169 [ 83.258149][ T5994] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 83.258171][ T5994] RSP: 002b:00007fbbb1417038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 83.258192][ T5994] RAX: ffffffffffffffda RBX: 00007fbbb2fc5fa0 RCX: 00007fbbb2dad169 [ 83.258206][ T5994] RDX: 0000000000000000 RSI: 0000400000000040 RDI: 0000000000000006 [ 83.258267][ T5994] RBP: 00007fbbb1417090 R08: 0000000000000000 R09: 0000000000000000 [ 83.258335][ T5994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 83.258408][ T5994] R13: 0000000000000000 R14: 00007fbbb2fc5fa0 R15: 00007fff91fb3528 [ 83.258425][ T5994] [ 83.477515][ T6003] loop3: detected capacity change from 0 to 512 [ 83.497151][ T6003] EXT4-fs (loop3): revision level too high, forcing read-only mode [ 83.505822][ T6003] EXT4-fs (loop3): orphan cleanup on readonly fs [ 83.510046][ T6006] program syz.5.752 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 83.522921][ T6006] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 83.549324][ T6003] EXT4-fs warning (device loop3): ext4_enable_quotas:7145: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 83.565626][ T6003] EXT4-fs (loop3): Cannot turn on quotas: error -117 [ 83.573014][ T6003] EXT4-fs error (device loop3): ext4_validate_block_bitmap:441: comm syz.3.751: bg 0: block 40: padding at end of block bitmap is not set [ 83.588522][ T6003] EXT4-fs error (device loop3) in ext4_mb_clear_bb:6550: Corrupt filesystem [ 83.597842][ T6003] EXT4-fs (loop3): 1 truncate cleaned up [ 83.604986][ T6003] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 83.629443][ T3300] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 83.637421][ T6018] gretap0: entered promiscuous mode [ 83.655138][ T6018] netlink: 8 bytes leftover after parsing attributes in process `syz.5.756'. [ 83.702694][ T6018] gretap0: left promiscuous mode [ 83.796862][ T6034] FAULT_INJECTION: forcing a failure. [ 83.796862][ T6034] name failslab, interval 1, probability 0, space 0, times 0 [ 83.809723][ T6034] CPU: 0 UID: 0 PID: 6034 Comm: è@ Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 83.809752][ T6034] Tainted: [W]=WARN [ 83.809769][ T6034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 83.809784][ T6034] Call Trace: [ 83.809792][ T6034] [ 83.809802][ T6034] dump_stack_lvl+0xf2/0x150 [ 83.809835][ T6034] dump_stack+0x15/0x1a [ 83.809862][ T6034] should_fail_ex+0x24a/0x260 [ 83.809965][ T6034] should_failslab+0x8f/0xb0 [ 83.810000][ T6034] kmem_cache_alloc_node_noprof+0x59/0x320 [ 83.810023][ T6034] ? __alloc_skb+0x10b/0x310 [ 83.810048][ T6034] __alloc_skb+0x10b/0x310 [ 83.810071][ T6034] ? audit_log_start+0x34c/0x6b0 [ 83.810219][ T6034] audit_log_start+0x368/0x6b0 [ 83.810251][ T6034] ? set_termios+0x49f/0x4e0 [ 83.810276][ T6034] audit_seccomp+0x4b/0x130 [ 83.810313][ T6034] __seccomp_filter+0x6fa/0x1180 [ 83.810350][ T6034] ? n_tty_ioctl_helper+0x8d/0x240 [ 83.810378][ T6034] ? n_tty_ioctl+0xfd/0x200 [ 83.810417][ T6034] __secure_computing+0x9f/0x1c0 [ 83.810451][ T6034] syscall_trace_enter+0xd1/0x1f0 [ 83.810476][ T6034] do_syscall_64+0xaa/0x1c0 [ 83.810510][ T6034] ? clear_bhb_loop+0x55/0xb0 [ 83.810542][ T6034] ? clear_bhb_loop+0x55/0xb0 [ 83.810576][ T6034] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 83.810627][ T6034] RIP: 0033:0x7fbbb2dabb7c [ 83.810641][ T6034] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 83.810659][ T6034] RSP: 002b:00007fbbb1417030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 83.810733][ T6034] RAX: ffffffffffffffda RBX: 00007fbbb2fc5fa0 RCX: 00007fbbb2dabb7c [ 83.810745][ T6034] RDX: 000000000000000f RSI: 00007fbbb14170a0 RDI: 0000000000000007 [ 83.810756][ T6034] RBP: 00007fbbb1417090 R08: 0000000000000000 R09: 0000000000000000 [ 83.810775][ T6034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 83.810789][ T6034] R13: 0000000000000000 R14: 00007fbbb2fc5fa0 R15: 00007fff91fb3528 [ 83.810811][ T6034] [ 84.034216][ T6038] netlink: 8 bytes leftover after parsing attributes in process `syz.4.766'. [ 84.043112][ T6038] netlink: 16 bytes leftover after parsing attributes in process `syz.4.766'. [ 84.058951][ T6042] netem: incorrect gi model size [ 84.065788][ T29] kauditd_printk_skb: 457 callbacks suppressed [ 84.065803][ T29] audit: type=1400 audit(1740882308.775:6172): avc: denied { write } for pid=6040 comm="syz.5.767" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 84.165546][ T6050] loop5: detected capacity change from 0 to 164 [ 84.192724][ T29] audit: type=1400 audit(1740882308.905:6173): avc: denied { name_bind } for pid=6053 comm="syz.4.774" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 84.214390][ T29] audit: type=1400 audit(1740882308.905:6174): avc: denied { node_bind } for pid=6053 comm="syz.4.774" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 84.289176][ T29] audit: type=1326 audit(1740882308.995:6175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6059 comm="syz.3.775" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f836cc1d169 code=0x7ffc0000 [ 84.312621][ T29] audit: type=1326 audit(1740882308.995:6176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6059 comm="syz.3.775" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f836cc1d169 code=0x7ffc0000 [ 84.335999][ T29] audit: type=1326 audit(1740882308.995:6177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6059 comm="syz.3.775" exe="/root/syz-executor" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7f836cc1d169 code=0x7ffc0000 [ 84.359356][ T29] audit: type=1326 audit(1740882308.995:6178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6059 comm="syz.3.775" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f836cc1d169 code=0x7ffc0000 [ 84.419693][ T29] audit: type=1326 audit(1740882309.125:6179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6068 comm="syz.3.780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f836cc1d169 code=0x7ffc0000 [ 84.420825][ T6071] program syz.3.780 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 84.443210][ T29] audit: type=1326 audit(1740882309.125:6180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6068 comm="syz.3.780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f836cc1d169 code=0x7ffc0000 [ 84.475924][ T29] audit: type=1326 audit(1740882309.125:6181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6068 comm="syz.3.780" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f836cc1d169 code=0x7ffc0000 [ 84.501481][ T6071] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 84.600641][ T6050] syz.5.771: attempt to access beyond end of device [ 84.600641][ T6050] loop5: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 84.914700][ T6109] loop5: detected capacity change from 0 to 512 [ 84.942129][ T6109] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 84.954921][ T6109] ext4 filesystem being mounted at /74/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 84.994143][ T6124] netlink: 8 bytes leftover after parsing attributes in process `syz.3.800'. [ 85.003722][ T6127] netlink: 'syz.0.798': attribute type 29 has an invalid length. [ 85.003848][ T6124] netlink: 'syz.3.800': attribute type 10 has an invalid length. [ 85.019388][ T6124] netlink: 40 bytes leftover after parsing attributes in process `syz.3.800'. [ 85.039279][ T6124] batadv0: entered promiscuous mode [ 85.044561][ T6124] batadv0: entered allmulticast mode [ 85.051447][ T6124] bridge0: port 5(batadv0) entered blocking state [ 85.057937][ T6124] bridge0: port 5(batadv0) entered disabled state [ 85.065493][ T6124] bridge0: port 5(batadv0) entered blocking state [ 85.071971][ T6124] bridge0: port 5(batadv0) entered forwarding state [ 85.081929][ T50] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 85.091244][ T50] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 85.125032][ T6129] block device autoloading is deprecated and will be removed. [ 85.134345][ T4736] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 85.140708][ T6129] syz.6.801: attempt to access beyond end of device [ 85.140708][ T6129] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 85.220146][ T6141] xt_l2tp: v2 tid > 0xffff: 150994944 [ 85.394166][ T6174] netlink: 68 bytes leftover after parsing attributes in process `syz.6.820'. [ 85.502178][ T6193] netlink: 3 bytes leftover after parsing attributes in process `+}[@'. [ 85.510810][ T6193] 0ªX¹¦À: renamed from caif0 [ 85.517776][ T6193] 0ªX¹¦À: entered allmulticast mode [ 85.523197][ T6193] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 85.750464][ T6217] veth1_to_bridge: entered allmulticast mode [ 85.758044][ T6217] veth1_to_bridge: left allmulticast mode [ 85.824471][ T6226] netlink: 'syz.5.837': attribute type 10 has an invalid length. [ 85.832473][ T6226] netlink: 40 bytes leftover after parsing attributes in process `syz.5.837'. [ 85.843900][ T6226] batadv0: entered promiscuous mode [ 85.849183][ T6226] batadv0: entered allmulticast mode [ 85.855429][ T6226] bridge0: port 3(batadv0) entered blocking state [ 85.862049][ T6226] bridge0: port 3(batadv0) entered disabled state [ 85.869985][ T6226] bridge0: port 3(batadv0) entered blocking state [ 85.876531][ T6226] bridge0: port 3(batadv0) entered forwarding state [ 85.966327][ T6234] loop6: detected capacity change from 0 to 2048 [ 86.026105][ T6238] FAULT_INJECTION: forcing a failure. [ 86.026105][ T6238] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 86.039371][ T6238] CPU: 0 UID: 0 PID: 6238 Comm: syz.0.843 Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 86.039407][ T6238] Tainted: [W]=WARN [ 86.039415][ T6238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 86.039429][ T6238] Call Trace: [ 86.039435][ T6238] [ 86.039442][ T6238] dump_stack_lvl+0xf2/0x150 [ 86.039519][ T6238] dump_stack+0x15/0x1a [ 86.039544][ T6238] should_fail_ex+0x24a/0x260 [ 86.039577][ T6238] should_fail+0xb/0x10 [ 86.039604][ T6238] should_fail_usercopy+0x1a/0x20 [ 86.039713][ T6238] strncpy_from_user+0x25/0x210 [ 86.039741][ T6238] ? io_getxattr_prep+0x126/0x1f0 [ 86.039798][ T6238] ? __kmalloc_cache_noprof+0x186/0x320 [ 86.039823][ T6238] import_xattr_name+0x22/0x60 [ 86.039854][ T6238] io_getxattr_prep+0x14a/0x1f0 [ 86.039897][ T6238] io_submit_sqes+0x608/0x1070 [ 86.039994][ T6238] __se_sys_io_uring_enter+0x1c0/0x1b00 [ 86.040029][ T6238] ? htab_map_hash+0x15a/0x1d0 [ 86.040053][ T6238] ? htab_lru_map_delete_elem+0x28d/0x400 [ 86.040164][ T6238] ? __rcu_read_unlock+0x4e/0x70 [ 86.040190][ T6238] ? bpf_trace_run2+0x123/0x1d0 [ 86.040216][ T6238] ? __bpf_trace_sys_enter+0x10/0x30 [ 86.040239][ T6238] ? trace_sys_enter+0xcd/0x110 [ 86.040265][ T6238] __x64_sys_io_uring_enter+0x78/0x90 [ 86.040355][ T6238] x64_sys_call+0xb5e/0x2dc0 [ 86.040411][ T6238] do_syscall_64+0xc9/0x1c0 [ 86.040448][ T6238] ? clear_bhb_loop+0x55/0xb0 [ 86.040476][ T6238] ? clear_bhb_loop+0x55/0xb0 [ 86.040508][ T6238] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 86.040614][ T6238] RIP: 0033:0x7f01473ed169 [ 86.040631][ T6238] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 86.040762][ T6238] RSP: 002b:00007f0145a51038 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 86.040784][ T6238] RAX: ffffffffffffffda RBX: 00007f0147605fa0 RCX: 00007f01473ed169 [ 86.040865][ T6238] RDX: 0000000000000000 RSI: 00000000000047bc RDI: 0000000000000004 [ 86.040877][ T6238] RBP: 00007f0145a51090 R08: 0000000000000000 R09: 0000000000000000 [ 86.040890][ T6238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 86.040986][ T6238] R13: 0000000000000000 R14: 00007f0147605fa0 R15: 00007ffc3a527778 [ 86.041005][ T6238] [ 86.043927][ T6234] Alternate GPT is invalid, using primary GPT. [ 86.056527][ T6236] loop5: detected capacity change from 0 to 1024 [ 86.060100][ T6234] loop6: p1 p2 p3 [ 86.110152][ T11] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 86.110171][ T11] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 86.361462][ T6245] netlink: 696 bytes leftover after parsing attributes in process `syz.4.845'. [ 86.405000][ T6245] bond_slave_1: entered promiscuous mode [ 86.431317][ T6245] 9pnet: Could not find request transport: n [ 86.443222][ T6245] netlink: 12 bytes leftover after parsing attributes in process `syz.4.845'. [ 86.525248][ T6257] veth1_to_bridge: entered allmulticast mode [ 86.532035][ T6254] veth1_to_bridge: left allmulticast mode [ 86.549522][ T6244] bond_slave_1: left promiscuous mode [ 86.664441][ T6272] team0 (unregistering): Port device team_slave_0 removed [ 86.685718][ T6272] team0 (unregistering): Port device team_slave_1 removed [ 86.717601][ T6280] netlink: 140 bytes leftover after parsing attributes in process `syz.5.860'. [ 86.726684][ T6280] netlink: 16 bytes leftover after parsing attributes in process `syz.5.860'. [ 86.735694][ T6280] netlink: 5 bytes leftover after parsing attributes in process `syz.5.860'. [ 86.754307][ T6280] loop5: detected capacity change from 0 to 736 [ 86.771035][ T6280] rock: directory entry would overflow storage [ 86.777274][ T6280] rock: sig=0x3b10, size=4, remaining=3 [ 87.136053][ T6332] loop6: detected capacity change from 0 to 1024 [ 87.142861][ T6333] FAULT_INJECTION: forcing a failure. [ 87.142861][ T6333] name failslab, interval 1, probability 0, space 0, times 0 [ 87.155531][ T6333] CPU: 0 UID: 0 PID: 6333 Comm: +}[@ Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 87.155586][ T6333] Tainted: [W]=WARN [ 87.155594][ T6333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 87.155634][ T6333] Call Trace: [ 87.155640][ T6333] [ 87.155648][ T6333] dump_stack_lvl+0xf2/0x150 [ 87.155675][ T6333] dump_stack+0x15/0x1a [ 87.155761][ T6333] should_fail_ex+0x24a/0x260 [ 87.155794][ T6333] should_failslab+0x8f/0xb0 [ 87.155829][ T6333] __kmalloc_noprof+0xab/0x3f0 [ 87.155857][ T6333] ? io_cache_alloc_new+0x2b/0xa0 [ 87.155905][ T6333] ? __io_alloc_req_refill+0xfc/0x240 [ 87.155943][ T6333] io_cache_alloc_new+0x2b/0xa0 [ 87.156004][ T6333] io_prep_rw+0x33d/0x670 [ 87.156107][ T6333] io_prep_read+0x24/0x30 [ 87.156143][ T6333] io_submit_sqes+0x608/0x1070 [ 87.156198][ T6333] __se_sys_io_uring_enter+0x1c0/0x1b00 [ 87.156239][ T6333] ? htab_map_hash+0x15a/0x1d0 [ 87.156329][ T6333] ? htab_lru_map_delete_elem+0x28d/0x400 [ 87.156359][ T6333] ? __rcu_read_unlock+0x4e/0x70 [ 87.156422][ T6333] ? bpf_trace_run2+0x123/0x1d0 [ 87.156449][ T6333] ? __bpf_trace_sys_enter+0x10/0x30 [ 87.156595][ T6333] ? trace_sys_enter+0xcd/0x110 [ 87.156627][ T6333] __x64_sys_io_uring_enter+0x78/0x90 [ 87.156671][ T6333] x64_sys_call+0xb5e/0x2dc0 [ 87.156752][ T6333] do_syscall_64+0xc9/0x1c0 [ 87.156789][ T6333] ? clear_bhb_loop+0x55/0xb0 [ 87.156822][ T6333] ? clear_bhb_loop+0x55/0xb0 [ 87.156925][ T6333] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 87.156958][ T6333] RIP: 0033:0x7fbbb2dad169 [ 87.156977][ T6333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 87.156998][ T6333] RSP: 002b:00007fbbb1417038 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 87.157136][ T6333] RAX: ffffffffffffffda RBX: 00007fbbb2fc5fa0 RCX: 00007fbbb2dad169 [ 87.157185][ T6333] RDX: 0000000000000000 RSI: 00000000000048e9 RDI: 0000000000000004 [ 87.157199][ T6333] RBP: 00007fbbb1417090 R08: 0000000000000000 R09: 0000000000000000 [ 87.157210][ T6333] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 87.157227][ T6333] R13: 0000000000000000 R14: 00007fbbb2fc5fa0 R15: 00007fff91fb3528 [ 87.157246][ T6333] [ 87.386252][ T6332] EXT4-fs (loop6): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 87.393411][ T6335] netlink: 48 bytes leftover after parsing attributes in process `syz.3.880'. [ 87.406134][ T6332] EXT4-fs (loop6): revision level too high, forcing read-only mode [ 87.414425][ T6332] EXT4-fs (loop6): orphan cleanup on readonly fs [ 87.422310][ T6332] EXT4-fs error (device loop6) in ext4_reserve_inode_write:5838: Corrupt filesystem [ 87.445884][ T6332] EXT4-fs (loop6): Remounting filesystem read-only [ 87.453263][ T6332] EXT4-fs (loop6): 1 orphan inode deleted [ 87.465051][ T6332] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: none. [ 87.484053][ T6332] SELinux: (dev loop6, type ext4) getxattr errno 5 [ 87.487651][ T6347] syz_tun: entered allmulticast mode [ 87.491099][ T6332] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 87.620443][ T6365] program syz.3.891 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 87.630115][ T6365] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 87.639380][ T6365] netlink: 372 bytes leftover after parsing attributes in process `syz.3.891'. [ 87.676542][ T6373] loop0: detected capacity change from 0 to 512 [ 87.688573][ T6373] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 87.698943][ T6375] FAULT_INJECTION: forcing a failure. [ 87.698943][ T6375] name failslab, interval 1, probability 0, space 0, times 0 [ 87.698984][ T6371] SELinux: policydb string length -1437728760 does not match expected length 8 [ 87.711625][ T6375] CPU: 0 UID: 0 PID: 6375 Comm: syz.5.892 Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 87.711751][ T6375] Tainted: [W]=WARN [ 87.711760][ T6375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 87.711775][ T6375] Call Trace: [ 87.711784][ T6375] [ 87.711794][ T6375] dump_stack_lvl+0xf2/0x150 [ 87.711867][ T6375] dump_stack+0x15/0x1a [ 87.711890][ T6375] should_fail_ex+0x24a/0x260 [ 87.711926][ T6375] should_failslab+0x8f/0xb0 [ 87.711962][ T6375] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 87.712046][ T6375] ? sock_alloc_inode+0x34/0xa0 [ 87.712104][ T6375] sock_alloc_inode+0x34/0xa0 [ 87.712197][ T6375] ? __pfx_sock_alloc_inode+0x10/0x10 [ 87.712245][ T6375] alloc_inode+0x3c/0x160 [ 87.712286][ T6375] new_inode_pseudo+0x15/0x20 [ 87.712327][ T6375] do_accept+0xa3/0x390 [ 87.712423][ T6375] __sys_accept4+0xc3/0x150 [ 87.712450][ T6375] __x64_sys_accept+0x44/0x50 [ 87.712475][ T6375] x64_sys_call+0x29f0/0x2dc0 [ 87.712514][ T6375] do_syscall_64+0xc9/0x1c0 [ 87.712597][ T6375] ? clear_bhb_loop+0x55/0xb0 [ 87.712632][ T6375] ? clear_bhb_loop+0x55/0xb0 [ 87.712732][ T6375] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 87.712766][ T6375] RIP: 0033:0x7fbbb2dad169 [ 87.712786][ T6375] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 87.712809][ T6375] RSP: 002b:00007fbbb13f6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002b [ 87.712832][ T6375] RAX: ffffffffffffffda RBX: 00007fbbb2fc6080 RCX: 00007fbbb2dad169 [ 87.712847][ T6375] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 87.712862][ T6375] RBP: 00007fbbb13f6090 R08: 0000000000000000 R09: 0000000000000000 [ 87.712885][ T6375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 87.712900][ T6375] R13: 0000000000000001 R14: 00007fbbb2fc6080 R15: 00007fff91fb3528 [ 87.712924][ T6375] [ 87.776220][ T6373] EXT4-fs (loop0): 1 truncate cleaned up [ 87.777441][ T6371] SELinux: failed to load policy [ 87.784660][ T6373] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 87.982053][ T6389] futex_wake_op: syz.3.896 tries to shift op by -1; fix this program [ 87.983642][ T3298] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 88.110933][ T6413] loop0: detected capacity change from 0 to 164 [ 88.300219][ T6413] syz.0.906: attempt to access beyond end of device [ 88.300219][ T6413] loop0: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 89.104877][ T6483] netlink: 8 bytes leftover after parsing attributes in process `syz.4.933'. [ 89.143089][ T6485] loop0: detected capacity change from 0 to 512 [ 89.198332][ T6485] EXT4-fs (loop0): 1 orphan inode deleted [ 89.210394][ T11] __quota_error: 463 callbacks suppressed [ 89.210412][ T11] Quota error (device loop0): do_check_range: Getting dqdh_entries 15 out of range 0-14 [ 89.225975][ T11] EXT4-fs error (device loop0): ext4_release_dquot:6950: comm kworker/u8:0: Failed to release dquot type 1 [ 89.273312][ T6485] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 89.287617][ T6483] netlink: 'syz.4.933': attribute type 5 has an invalid length. [ 89.383183][ T6485] ext4 filesystem being mounted at /172/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 89.424185][ T29] audit: type=1326 audit(1740882314.135:6641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6489 comm="syz.5.935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbbb2dad169 code=0x7ffc0000 [ 89.461216][ T29] audit: type=1326 audit(1740882314.165:6642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6489 comm="syz.5.935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbbb2dad169 code=0x7ffc0000 [ 89.466654][ T6490] loop5: detected capacity change from 0 to 512 [ 89.500414][ T29] audit: type=1326 audit(1740882314.175:6643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6489 comm="syz.5.935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fbbb2dad169 code=0x7ffc0000 [ 89.523916][ T29] audit: type=1326 audit(1740882314.175:6644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6489 comm="syz.5.935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fbbb2dad1a3 code=0x7ffc0000 [ 89.547115][ T29] audit: type=1326 audit(1740882314.175:6645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6489 comm="syz.5.935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fbbb2dabc1f code=0x7ffc0000 [ 89.570408][ T29] audit: type=1326 audit(1740882314.175:6646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6489 comm="syz.5.935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7fbbb2dad1f7 code=0x7ffc0000 [ 89.593690][ T29] audit: type=1326 audit(1740882314.175:6647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6489 comm="syz.5.935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fbbb2dabad0 code=0x7ffc0000 [ 89.617108][ T29] audit: type=1326 audit(1740882314.175:6648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6489 comm="syz.5.935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fbbb2dacd6b code=0x7ffc0000 [ 89.644374][ T29] audit: type=1326 audit(1740882314.235:6649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6489 comm="syz.5.935" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fbbb2dabdca code=0x7ffc0000 [ 89.686818][ T3298] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 89.696566][ T6490] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm syz.5.935: bg 0: block 248: padding at end of block bitmap is not set [ 89.712361][ T3913] EXT4-fs error (device loop0): ext4_release_dquot:6950: comm kworker/u8:9: Failed to release dquot type 1 [ 89.732571][ T6490] EXT4-fs error (device loop5): ext4_acquire_dquot:6927: comm syz.5.935: Failed to acquire dquot type 1 [ 89.745718][ T6490] EXT4-fs (loop5): 1 truncate cleaned up [ 89.757704][ T6490] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 89.773617][ T6500] tmpfs: Bad value for 'mpol' [ 89.780953][ T6490] ext4 filesystem being mounted at /100/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 89.792576][ T6502] FAULT_INJECTION: forcing a failure. [ 89.792576][ T6502] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 89.805918][ T6502] CPU: 1 UID: 0 PID: 6502 Comm: syz.6.940 Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 89.805954][ T6502] Tainted: [W]=WARN [ 89.805961][ T6502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 89.805992][ T6502] Call Trace: [ 89.805999][ T6502] [ 89.806006][ T6502] dump_stack_lvl+0xf2/0x150 [ 89.806036][ T6502] dump_stack+0x15/0x1a [ 89.806121][ T6502] should_fail_ex+0x24a/0x260 [ 89.806151][ T6502] should_fail_alloc_page+0xfd/0x110 [ 89.806183][ T6502] __alloc_frozen_pages_noprof+0x109/0x340 [ 89.806231][ T6502] alloc_pages_mpol+0xb4/0x260 [ 89.806315][ T6502] alloc_pages_noprof+0xe8/0x130 [ 89.806338][ T6502] __pud_alloc+0x4b/0x440 [ 89.806357][ T6502] handle_mm_fault+0x1916/0x2ac0 [ 89.806375][ T6502] ? __rcu_read_unlock+0x4e/0x70 [ 89.806397][ T6502] ? mt_find+0x72a/0x890 [ 89.806431][ T6502] ? check_vma_flags+0x222/0x310 [ 89.806457][ T6502] __get_user_pages+0xf6a/0x2350 [ 89.806488][ T6502] ? down_read+0x171/0x4b0 [ 89.806516][ T6502] get_user_pages_remote+0x1df/0x790 [ 89.806600][ T6502] get_arg_page+0x96/0x1e0 [ 89.806624][ T6502] copy_string_kernel+0x128/0x2b0 [ 89.806649][ T6502] do_execveat_common+0x615/0x7e0 [ 89.806681][ T6502] __x64_sys_execveat+0x75/0x90 [ 89.806779][ T6502] x64_sys_call+0x291e/0x2dc0 [ 89.806805][ T6502] do_syscall_64+0xc9/0x1c0 [ 89.806835][ T6502] ? clear_bhb_loop+0x55/0xb0 [ 89.806914][ T6502] ? clear_bhb_loop+0x55/0xb0 [ 89.806940][ T6502] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 89.806966][ T6502] RIP: 0033:0x7fb53c72d169 [ 89.806981][ T6502] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 89.806999][ T6502] RSP: 002b:00007fb53ad97038 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 89.807016][ T6502] RAX: ffffffffffffffda RBX: 00007fb53c945fa0 RCX: 00007fb53c72d169 [ 89.807046][ T6502] RDX: 0000000000000000 RSI: 0000400000000000 RDI: 0000000000000006 [ 89.807058][ T6502] RBP: 00007fb53ad97090 R08: 0000000000001000 R09: 0000000000000000 [ 89.807069][ T6502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 89.807080][ T6502] R13: 0000000000000000 R14: 00007fb53c945fa0 R15: 00007ffee7b65a68 [ 89.807098][ T6502] [ 90.045978][ T4736] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 90.057603][ T6504] loop0: detected capacity change from 0 to 256 [ 90.064754][ T6504] msdos: Unknown parameter 'dotdots' [ 90.143462][ T6513] loop0: detected capacity change from 0 to 2048 [ 90.173893][ T6513] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 90.306326][ T6513] bond1: entered promiscuous mode [ 90.311601][ T6513] bond1: entered allmulticast mode [ 90.322570][ T6513] 8021q: adding VLAN 0 to HW filter on device bond1 [ 90.361573][ T6534] program syz.3.948 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 90.372513][ T6534] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 90.421153][ T6541] x_tables: duplicate underflow at hook 1 [ 90.450750][ T6543] SELinux: security_context_str_to_sid (u) failed with errno=-22 [ 90.507553][ T6545] ALSA: seq fatal error: cannot create timer (-19) [ 90.545491][ T6548] loop5: detected capacity change from 0 to 2048 [ 90.562394][ T6548] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 90.576852][ T6507] loop6: detected capacity change from 0 to 1024 [ 90.627923][ T6507] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 90.654089][ T6507] EXT4-fs error (device loop6): ext4_mb_mark_diskspace_used:4115: comm syz.6.943: Allocating blocks 385-513 which overlap fs metadata [ 90.672852][ T6559] loop3: detected capacity change from 0 to 164 [ 90.694553][ T6507] EXT4-fs (loop6): pa ffff8881064557e0: logic 16, phys. 129, len 24 [ 90.702684][ T6507] EXT4-fs error (device loop6): ext4_mb_release_inode_pa:5366: group 0, free 0, pa_free 8 [ 90.719294][ T6507] EXT4-fs (loop6): Delayed block allocation failed for inode 15 at logical offset 16 with max blocks 52 with error 28 [ 90.731730][ T6507] EXT4-fs (loop6): This should not happen!! Data will be lost [ 90.731730][ T6507] [ 90.741466][ T6507] EXT4-fs (loop6): Total free blocks count 0 [ 90.747467][ T6507] EXT4-fs (loop6): Free/Dirty block details [ 90.753407][ T6507] EXT4-fs (loop6): free_blocks=128 [ 90.758528][ T6507] EXT4-fs (loop6): dirty_blocks=0 [ 90.763635][ T6507] EXT4-fs (loop6): Block reservation details [ 90.769702][ T6507] EXT4-fs (loop6): i_reserved_data_blocks=0 [ 90.807131][ T6559] syz.3.957: attempt to access beyond end of device [ 90.807131][ T6559] loop3: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 90.912473][ T6562] loop6: detected capacity change from 0 to 512 [ 90.920194][ T6562] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 90.964476][ T6562] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 90.977227][ T6562] ext4 filesystem being mounted at /76/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 91.041736][ T6572] program syz.3.961 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 91.054351][ T5373] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 91.057660][ T6572] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 91.129470][ T6578] loop6: detected capacity change from 0 to 2048 [ 91.197709][ T6578] GPT:first_usable_lbas don't match. [ 91.203112][ T6578] GPT:34 != 290 [ 91.206637][ T6578] GPT: Use GNU Parted to correct GPT errors. [ 91.212806][ T6578] loop6: p1 p2 p3 [ 91.219060][ T3298] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 91.235069][ T6588] 8021q: adding VLAN 0 to HW filter on device bond1 [ 91.280202][ T6587] __nla_validate_parse: 7 callbacks suppressed [ 91.280219][ T6587] netlink: 8 bytes leftover after parsing attributes in process `syz.3.967'. [ 91.295360][ T6587] netlink: 8 bytes leftover after parsing attributes in process `syz.3.967'. [ 91.305793][ T6588] bond0: (slave bond1): Enslaving as an active interface with an up link [ 91.425038][ T6606] x_tables: duplicate underflow at hook 2 [ 91.449519][ T6606] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 91.465680][ T6606] netlink: 'syz.6.973': attribute type 10 has an invalid length. [ 91.475256][ T6609] netlink: 'syz.4.974': attribute type 10 has an invalid length. [ 91.476210][ T4736] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 91.483078][ T6609] netlink: 40 bytes leftover after parsing attributes in process `syz.4.974'. [ 91.509672][ T6606] geneve1: entered promiscuous mode [ 91.522548][ T6606] bond0: (slave geneve1): Enslaving as an active interface with an up link [ 91.531396][ T6609] batadv0: entered promiscuous mode [ 91.536645][ T6609] batadv0: entered allmulticast mode [ 91.551955][ T6609] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 91.560511][ T6609] bridge0: port 3(batadv0) entered blocking state [ 91.567003][ T6609] bridge0: port 3(batadv0) entered disabled state [ 91.579931][ T6615] raw_sendmsg: syz.3.976 forgot to set AF_INET. Fix it! [ 91.637885][ T6620] FAULT_INJECTION: forcing a failure. [ 91.637885][ T6620] name failslab, interval 1, probability 0, space 0, times 0 [ 91.650655][ T6620] CPU: 0 UID: 0 PID: 6620 Comm: syz.6.977 Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 91.650693][ T6620] Tainted: [W]=WARN [ 91.650701][ T6620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 91.650810][ T6620] Call Trace: [ 91.650817][ T6620] [ 91.650826][ T6620] dump_stack_lvl+0xf2/0x150 [ 91.650861][ T6620] dump_stack+0x15/0x1a [ 91.650888][ T6620] should_fail_ex+0x24a/0x260 [ 91.650924][ T6620] ? sctp_endpoint_new+0x71/0x5b0 [ 91.650961][ T6620] should_failslab+0x8f/0xb0 [ 91.650997][ T6620] __kmalloc_cache_noprof+0x4e/0x320 [ 91.651024][ T6620] ? get_random_u16+0x1a4/0x250 [ 91.651068][ T6620] sctp_endpoint_new+0x71/0x5b0 [ 91.651109][ T6620] ? sctp_init_sock+0x4dd/0x6f0 [ 91.651204][ T6620] sctp_init_sock+0x607/0x6f0 [ 91.651273][ T6620] sctp_v6_init_sock+0x16/0x60 [ 91.651367][ T6620] sctp_v6_create_accept_sk+0x371/0x3d0 [ 91.651394][ T6620] ? __pfx_sctp_v6_create_accept_sk+0x10/0x10 [ 91.651440][ T6620] sctp_accept+0x33a/0x450 [ 91.651467][ T6620] ? __pfx_autoremove_wake_function+0x10/0x10 [ 91.651560][ T6620] inet_accept+0x62/0xc0 [ 91.651589][ T6620] do_accept+0x2c6/0x390 [ 91.651695][ T6620] __sys_accept4+0xc3/0x150 [ 91.651716][ T6620] __x64_sys_accept4+0x53/0x60 [ 91.651735][ T6620] x64_sys_call+0x2824/0x2dc0 [ 91.651762][ T6620] do_syscall_64+0xc9/0x1c0 [ 91.651800][ T6620] ? clear_bhb_loop+0x55/0xb0 [ 91.651829][ T6620] ? clear_bhb_loop+0x55/0xb0 [ 91.651856][ T6620] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 91.651959][ T6620] RIP: 0033:0x7fb53c72d169 [ 91.652010][ T6620] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.652028][ T6620] RSP: 002b:00007fb53ad97038 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 91.652047][ T6620] RAX: ffffffffffffffda RBX: 00007fb53c945fa0 RCX: 00007fb53c72d169 [ 91.652065][ T6620] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 91.652077][ T6620] RBP: 00007fb53ad97090 R08: 0000000000000000 R09: 0000000000000000 [ 91.652089][ T6620] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 91.652173][ T6620] R13: 0000000000000000 R14: 00007fb53c945fa0 R15: 00007ffee7b65a68 [ 91.652191][ T6620] [ 91.884707][ T28] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 91.894037][ T28] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 92.123308][ T6651] netlink: 'syz.4.989': attribute type 10 has an invalid length. [ 92.131116][ T6651] netlink: 40 bytes leftover after parsing attributes in process `syz.4.989'. [ 92.183460][ T6654] FAULT_INJECTION: forcing a failure. [ 92.183460][ T6654] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 92.196630][ T6654] CPU: 1 UID: 0 PID: 6654 Comm: syz.6.990 Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 92.196717][ T6654] Tainted: [W]=WARN [ 92.196724][ T6654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 92.196738][ T6654] Call Trace: [ 92.196824][ T6654] [ 92.196833][ T6654] dump_stack_lvl+0xf2/0x150 [ 92.196865][ T6654] dump_stack+0x15/0x1a [ 92.196889][ T6654] should_fail_ex+0x24a/0x260 [ 92.196922][ T6654] should_fail+0xb/0x10 [ 92.197023][ T6654] should_fail_usercopy+0x1a/0x20 [ 92.197058][ T6654] strncpy_from_user+0x25/0x210 [ 92.197095][ T6654] ? kmem_cache_alloc_noprof+0x18e/0x320 [ 92.197118][ T6654] ? getname_flags+0x81/0x3b0 [ 92.197248][ T6654] getname_flags+0xb0/0x3b0 [ 92.197284][ T6654] getname+0x17/0x20 [ 92.197316][ T6654] __x64_sys_execve+0x40/0x70 [ 92.197376][ T6654] x64_sys_call+0x1333/0x2dc0 [ 92.197457][ T6654] do_syscall_64+0xc9/0x1c0 [ 92.197490][ T6654] ? clear_bhb_loop+0x55/0xb0 [ 92.197547][ T6654] ? clear_bhb_loop+0x55/0xb0 [ 92.197608][ T6654] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 92.197636][ T6654] RIP: 0033:0x7fb53c72d169 [ 92.197677][ T6654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 92.197774][ T6654] RSP: 002b:00007fb53ad97038 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 92.197795][ T6654] RAX: ffffffffffffffda RBX: 00007fb53c945fa0 RCX: 00007fb53c72d169 [ 92.197808][ T6654] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 92.197821][ T6654] RBP: 00007fb53ad97090 R08: 0000000000000000 R09: 0000000000000000 [ 92.197834][ T6654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.197847][ T6654] R13: 0000000000000000 R14: 00007fb53c945fa0 R15: 00007ffee7b65a68 [ 92.197887][ T6654] [ 92.550031][ T6669] loop3: detected capacity change from 0 to 256 [ 92.561439][ T6669] FAT-fs (loop3): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 92.602622][ T6669] bond1: entered promiscuous mode [ 92.607756][ T6669] bond1: entered allmulticast mode [ 92.624513][ T6669] 8021q: adding VLAN 0 to HW filter on device bond1 [ 92.651525][ T6669] bond1 (unregistering): Released all slaves [ 92.708518][ T6676] loop0: detected capacity change from 0 to 8192 [ 92.741635][ T6679] program syz.6.1002 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 92.765419][ T6679] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 92.827063][ T6689] FAULT_INJECTION: forcing a failure. [ 92.827063][ T6689] name failslab, interval 1, probability 0, space 0, times 0 [ 92.839776][ T6689] CPU: 1 UID: 0 PID: 6689 Comm: syz.3.1005 Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 92.839812][ T6689] Tainted: [W]=WARN [ 92.839821][ T6689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 92.839836][ T6689] Call Trace: [ 92.839844][ T6689] [ 92.839916][ T6689] dump_stack_lvl+0xf2/0x150 [ 92.839948][ T6689] dump_stack+0x15/0x1a [ 92.839975][ T6689] should_fail_ex+0x24a/0x260 [ 92.840008][ T6689] ? rtnl_newlink+0x5d/0x1250 [ 92.840039][ T6689] should_failslab+0x8f/0xb0 [ 92.840100][ T6689] __kmalloc_cache_noprof+0x4e/0x320 [ 92.840125][ T6689] ? __pfx_rtnl_newlink+0x10/0x10 [ 92.840151][ T6689] rtnl_newlink+0x5d/0x1250 [ 92.840178][ T6689] ? xas_load+0x3ae/0x3d0 [ 92.840227][ T6689] ? xas_load+0x3ae/0x3d0 [ 92.840329][ T6689] ? _raw_spin_lock_irqsave+0x3c/0xb0 [ 92.840354][ T6689] ? __list_del_entry_valid_or_report+0x66/0x130 [ 92.840397][ T6689] ? _raw_spin_unlock_irqrestore+0x2b/0x60 [ 92.840423][ T6689] ? get_partial_node+0x2ca/0x310 [ 92.840479][ T6689] ? freeze_slab+0x5c/0x80 [ 92.840576][ T6689] ? __memcg_slab_free_hook+0xc9/0x1e0 [ 92.840602][ T6689] ? __rcu_read_unlock+0x4e/0x70 [ 92.840627][ T6689] ? avc_has_perm_noaudit+0x1cc/0x210 [ 92.840673][ T6689] ? selinux_capable+0x1f2/0x260 [ 92.840706][ T6689] ? security_capable+0x81/0x90 [ 92.840806][ T6689] ? ns_capable+0x7d/0xb0 [ 92.840828][ T6689] ? __pfx_rtnl_newlink+0x10/0x10 [ 92.840890][ T6689] rtnetlink_rcv_msg+0x651/0x710 [ 92.840922][ T6689] ? ref_tracker_free+0x3a5/0x410 [ 92.840958][ T6689] netlink_rcv_skb+0x12c/0x230 [ 92.841052][ T6689] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 92.841150][ T6689] rtnetlink_rcv+0x1c/0x30 [ 92.841179][ T6689] netlink_unicast+0x599/0x670 [ 92.841229][ T6689] netlink_sendmsg+0x5cc/0x6e0 [ 92.841291][ T6689] ? __pfx_netlink_sendmsg+0x10/0x10 [ 92.841386][ T6689] __sock_sendmsg+0x140/0x180 [ 92.841424][ T6689] ____sys_sendmsg+0x326/0x4b0 [ 92.841456][ T6689] __sys_sendmsg+0x19d/0x230 [ 92.841506][ T6689] __x64_sys_sendmsg+0x46/0x50 [ 92.841534][ T6689] x64_sys_call+0x2734/0x2dc0 [ 92.841565][ T6689] do_syscall_64+0xc9/0x1c0 [ 92.841594][ T6689] ? clear_bhb_loop+0x55/0xb0 [ 92.841643][ T6689] ? clear_bhb_loop+0x55/0xb0 [ 92.841676][ T6689] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 92.841763][ T6689] RIP: 0033:0x7f836cc1d169 [ 92.841779][ T6689] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 92.841800][ T6689] RSP: 002b:00007f836b281038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 92.841823][ T6689] RAX: ffffffffffffffda RBX: 00007f836ce35fa0 RCX: 00007f836cc1d169 [ 92.841838][ T6689] RDX: 0000000000000000 RSI: 0000400000000940 RDI: 0000000000000003 [ 92.841853][ T6689] RBP: 00007f836b281090 R08: 0000000000000000 R09: 0000000000000000 [ 92.841867][ T6689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.841882][ T6689] R13: 0000000000000000 R14: 00007f836ce35fa0 R15: 00007ffc7b8bd5e8 [ 92.841937][ T6689] [ 93.233042][ T6696] netlink: 'syz.3.1010': attribute type 10 has an invalid length. [ 93.240954][ T6696] netlink: 40 bytes leftover after parsing attributes in process `syz.3.1010'. [ 93.374152][ T6707] program syz.3.1013 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 93.384334][ T6707] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 93.481441][ T6712] x_tables: duplicate underflow at hook 2 [ 93.556585][ T6725] veth1_to_bridge: entered allmulticast mode [ 93.562876][ T6725] veth1_to_bridge: left allmulticast mode [ 93.571967][ T6730] netlink: 140 bytes leftover after parsing attributes in process `syz.3.1022'. [ 93.602266][ T6730] netlink: 16 bytes leftover after parsing attributes in process `syz.3.1022'. [ 93.611462][ T6730] netlink: 5 bytes leftover after parsing attributes in process `syz.3.1022'. [ 93.632251][ T6732] loop3: detected capacity change from 0 to 736 [ 93.649459][ T6728] veth1_to_bridge: entered allmulticast mode [ 93.655923][ T6732] rock: directory entry would overflow storage [ 93.662274][ T6732] rock: sig=0x3b10, size=4, remaining=3 [ 93.687069][ T6728] veth1_to_bridge: left allmulticast mode [ 93.801747][ T6749] loop0: detected capacity change from 0 to 2048 [ 93.824904][ T6759] loop3: detected capacity change from 0 to 164 [ 93.829716][ T6749] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 93.847129][ T6749] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1028'. [ 93.866271][ T6749] batman_adv: batadv0: Interface deactivated: dummy0 [ 93.873160][ T6749] batman_adv: batadv0: Removing interface: dummy0 [ 93.909751][ T6749] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 93.917285][ T6749] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 93.925110][ T6749] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 93.932615][ T6749] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 93.952531][ T6749] bridge0: port 3(batadv0) entered disabled state [ 94.078109][ T3298] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 94.173317][ T6759] syz.3.1031: attempt to access beyond end of device [ 94.173317][ T6759] loop3: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 94.198589][ T6774] loop0: detected capacity change from 0 to 164 [ 94.259818][ T29] kauditd_printk_skb: 303 callbacks suppressed [ 94.259837][ T29] audit: type=1326 audit(1740882318.965:6950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6758 comm="syz.3.1031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f836cc1d169 code=0x7ffc0000 [ 94.289813][ T29] audit: type=1326 audit(1740882318.965:6951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6758 comm="syz.3.1031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f836cc1d169 code=0x7ffc0000 [ 94.313364][ T29] audit: type=1326 audit(1740882318.965:6952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6758 comm="syz.3.1031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=302 compat=0 ip=0x7f836cc1d169 code=0x7ffc0000 [ 94.336770][ T29] audit: type=1326 audit(1740882318.965:6953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6758 comm="syz.3.1031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f836cc1d169 code=0x7ffc0000 [ 94.360356][ T29] audit: type=1326 audit(1740882318.965:6954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6758 comm="syz.3.1031" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f836cc1d169 code=0x7ffc0000 [ 94.445991][ T6780] FAULT_INJECTION: forcing a failure. [ 94.445991][ T6780] name failslab, interval 1, probability 0, space 0, times 0 [ 94.458873][ T6780] CPU: 0 UID: 0 PID: 6780 Comm: syz.3.1037 Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 94.458903][ T6780] Tainted: [W]=WARN [ 94.458909][ T6780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 94.458920][ T6780] Call Trace: [ 94.458926][ T6780] [ 94.458933][ T6780] dump_stack_lvl+0xf2/0x150 [ 94.458963][ T6780] dump_stack+0x15/0x1a [ 94.459138][ T6780] should_fail_ex+0x24a/0x260 [ 94.459199][ T6780] should_failslab+0x8f/0xb0 [ 94.459229][ T6780] __kmalloc_noprof+0xab/0x3f0 [ 94.459251][ T6780] ? tracepoint_probe_unregister+0x172/0x6a0 [ 94.459291][ T6780] ? __pfx_tp_stub_func+0x10/0x10 [ 94.459363][ T6780] tracepoint_probe_unregister+0x172/0x6a0 [ 94.459396][ T6780] ? __pfx___bpf_trace_sched_switch+0x10/0x10 [ 94.459427][ T6780] bpf_probe_unregister+0x37/0x50 [ 94.459498][ T6780] bpf_raw_tp_link_release+0x27/0x40 [ 94.459519][ T6780] bpf_link_free+0xb2/0x360 [ 94.459553][ T6780] bpf_link_release+0x52/0x70 [ 94.459582][ T6780] ? __pfx_bpf_link_release+0x10/0x10 [ 94.459634][ T6780] __fput+0x2ac/0x640 [ 94.459680][ T6780] ____fput+0x1c/0x30 [ 94.459772][ T6780] task_work_run+0x13a/0x1a0 [ 94.459813][ T6780] syscall_exit_to_user_mode+0xa8/0x120 [ 94.459875][ T6780] do_syscall_64+0xd6/0x1c0 [ 94.459913][ T6780] ? clear_bhb_loop+0x55/0xb0 [ 94.459947][ T6780] ? clear_bhb_loop+0x55/0xb0 [ 94.460008][ T6780] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 94.460034][ T6780] RIP: 0033:0x7f836cc1d169 [ 94.460049][ T6780] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 94.460088][ T6780] RSP: 002b:00007f836b281038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 94.460106][ T6780] RAX: 0000000000000000 RBX: 00007f836ce35fa0 RCX: 00007f836cc1d169 [ 94.460118][ T6780] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000000000000 [ 94.460129][ T6780] RBP: 00007f836b281090 R08: 0000000000000000 R09: 0000000000000000 [ 94.460141][ T6780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 94.460155][ T6780] R13: 0000000000000000 R14: 00007f836ce35fa0 R15: 00007ffc7b8bd5e8 [ 94.460177][ T6780] [ 94.813894][ T6774] syz.0.1035: attempt to access beyond end of device [ 94.813894][ T6774] loop0: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 94.852979][ T6793] FAULT_INJECTION: forcing a failure. [ 94.852979][ T6793] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 94.866282][ T6793] CPU: 0 UID: 0 PID: 6793 Comm: syz.3.1043 Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 94.866317][ T6793] Tainted: [W]=WARN [ 94.866326][ T6793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 94.866415][ T6793] Call Trace: [ 94.866422][ T6793] [ 94.866429][ T6793] dump_stack_lvl+0xf2/0x150 [ 94.866464][ T6793] dump_stack+0x15/0x1a [ 94.866544][ T6793] should_fail_ex+0x24a/0x260 [ 94.866577][ T6793] should_fail_alloc_page+0xfd/0x110 [ 94.866622][ T6793] __alloc_frozen_pages_noprof+0x109/0x340 [ 94.866659][ T6793] alloc_pages_mpol+0xb4/0x260 [ 94.866688][ T6793] vma_alloc_folio_noprof+0x1a0/0x310 [ 94.866737][ T6793] handle_mm_fault+0xdd7/0x2ac0 [ 94.866833][ T6793] exc_page_fault+0x3b9/0x650 [ 94.866868][ T6793] asm_exc_page_fault+0x26/0x30 [ 94.866900][ T6793] RIP: 0033:0x7f836cbca78b [ 94.866983][ T6793] Code: c0 8b 87 c0 00 00 00 66 0f 6c c0 85 c0 0f 85 44 01 00 00 c7 87 c0 00 00 00 ff ff ff ff 48 8d 84 24 20 21 00 00 48 8d 7c 24 20 <0f> 29 44 24 40 49 89 e4 48 89 44 24 50 8b 43 74 48 89 9c 24 00 01 [ 94.867006][ T6793] RSP: 002b:00007f836b27ee10 EFLAGS: 00010246 [ 94.867024][ T6793] RAX: 00007f836b280f30 RBX: 00007f836ce0c620 RCX: 0000000000000000 [ 94.867053][ T6793] RDX: 00007f836b280f78 RSI: 00007f836cc7cbd8 RDI: 00007f836b27ee30 [ 94.867067][ T6793] RBP: 0000000000000009 R08: 0000000000000000 R09: 0000000000000000 [ 94.867080][ T6793] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 94.867116][ T6793] R13: 0000000000000000 R14: 00007f836ce35fa0 R15: 00007ffc7b8bd5e8 [ 94.867139][ T6793] [ 94.867149][ T6793] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 94.891828][ T29] audit: type=1326 audit(1740882319.595:6955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6773 comm="syz.0.1035" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f01473ed169 code=0x7ffc0000 [ 95.119725][ T29] audit: type=1326 audit(1740882319.665:6956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6773 comm="syz.0.1035" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f01473ed169 code=0x7ffc0000 [ 95.143344][ T29] audit: type=1326 audit(1740882319.665:6957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6773 comm="syz.0.1035" exe="/root/syz-executor" sig=0 arch=c000003e syscall=302 compat=0 ip=0x7f01473ed169 code=0x7ffc0000 [ 95.166907][ T29] audit: type=1326 audit(1740882319.665:6958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6773 comm="syz.0.1035" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f01473ed169 code=0x7ffc0000 [ 95.190371][ T29] audit: type=1326 audit(1740882319.665:6959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6773 comm="syz.0.1035" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f01473ed169 code=0x7ffc0000 [ 95.234697][ T6805] loop3: detected capacity change from 0 to 128 [ 95.279865][ T6812] netlink: 36 bytes leftover after parsing attributes in process `syz.4.1050'. [ 95.312778][ T6820] FAULT_INJECTION: forcing a failure. [ 95.312778][ T6820] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 95.326017][ T6820] CPU: 1 UID: 0 PID: 6820 Comm: syz.5.1054 Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 95.326044][ T6820] Tainted: [W]=WARN [ 95.326050][ T6820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 95.326061][ T6820] Call Trace: [ 95.326066][ T6820] [ 95.326073][ T6820] dump_stack_lvl+0xf2/0x150 [ 95.326110][ T6820] dump_stack+0x15/0x1a [ 95.326134][ T6820] should_fail_ex+0x24a/0x260 [ 95.326168][ T6820] should_fail+0xb/0x10 [ 95.326219][ T6820] should_fail_usercopy+0x1a/0x20 [ 95.326247][ T6820] _copy_from_user+0x1c/0xa0 [ 95.326264][ T6820] do_ipt_set_ctl+0x423/0x8b0 [ 95.326286][ T6820] ? tcp_release_cb+0xfe/0x380 [ 95.326349][ T6820] nf_setsockopt+0x195/0x1b0 [ 95.326382][ T6820] ip_setsockopt+0xea/0x100 [ 95.326406][ T6820] tcp_setsockopt+0x93/0xb0 [ 95.326432][ T6820] sock_common_setsockopt+0x64/0x80 [ 95.326550][ T6813] loop6: detected capacity change from 0 to 128 [ 95.326562][ T6820] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 95.326673][ T6820] smc_setsockopt+0x182/0x7a0 [ 95.326715][ T6820] ? __pfx_smc_setsockopt+0x10/0x10 [ 95.326801][ T6820] __sys_setsockopt+0x187/0x200 [ 95.326829][ T6820] __x64_sys_setsockopt+0x66/0x80 [ 95.326910][ T6820] x64_sys_call+0x282e/0x2dc0 [ 95.326941][ T6820] do_syscall_64+0xc9/0x1c0 [ 95.326976][ T6820] ? clear_bhb_loop+0x55/0xb0 [ 95.327008][ T6820] ? clear_bhb_loop+0x55/0xb0 [ 95.327083][ T6820] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 95.327113][ T6820] RIP: 0033:0x7fbbb2dad169 [ 95.327130][ T6820] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 95.327151][ T6820] RSP: 002b:00007fbbb1417038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 95.327172][ T6820] RAX: ffffffffffffffda RBX: 00007fbbb2fc5fa0 RCX: 00007fbbb2dad169 [ 95.327252][ T6820] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000008 [ 95.327265][ T6820] RBP: 00007fbbb1417090 R08: 0000000000000248 R09: 0000000000000000 [ 95.327279][ T6820] R10: 0000400000000e40 R11: 0000000000000246 R12: 0000000000000001 [ 95.327292][ T6820] R13: 0000000000000000 R14: 00007fbbb2fc5fa0 R15: 00007fff91fb3528 [ 95.327313][ T6820] [ 95.354107][ T6824] loop5: detected capacity change from 0 to 164 [ 95.651244][ T6824] syz.5.1056: attempt to access beyond end of device [ 95.651244][ T6824] loop5: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 95.810117][ T6861] loop3: detected capacity change from 0 to 128 [ 95.925113][ T6879] loop6: detected capacity change from 0 to 1024 [ 95.943270][ T6877] program syz.3.1067 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 95.961570][ T6879] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 96.030090][ T6879] EXT4-fs error (device loop6): ext4_mb_mark_diskspace_used:4115: comm syz.6.1069: Allocating blocks 385-513 which overlap fs metadata [ 96.071051][ T6879] EXT4-fs (loop6): pa ffff8881064dd150: logic 16, phys. 129, len 24 [ 96.079316][ T6879] EXT4-fs error (device loop6): ext4_mb_release_inode_pa:5366: group 0, free 0, pa_free 8 [ 96.141431][ T6918] loop3: detected capacity change from 0 to 164 [ 96.148992][ T6919] loop5: detected capacity change from 0 to 512 [ 96.190872][ T6919] EXT4-fs (loop5): encrypted files will use data=ordered instead of data journaling mode [ 96.204337][ T5373] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 96.254872][ T6919] EXT4-fs (loop5): 1 truncate cleaned up [ 96.263033][ T6930] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=6930 comm=+}[@ [ 96.275026][ T6930] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=6930 comm=+}[@ [ 96.287203][ T6932] loop6: detected capacity change from 0 to 128 [ 96.294519][ T6919] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 96.377909][ T6911] EXT4-fs error (device loop5): ext4_xattr_ibody_find:2240: inode #15: comm +}[@: corrupted in-inode xattr: overlapping e_value [ 96.397855][ T6911] EXT4-fs warning (device loop5): ext4_xattr_set_entry:1772: inode #15: comm +}[@: unable to update i_inline_off [ 96.424646][ T6911] EXT4-fs error (device loop5): ext4_xattr_ibody_get:653: inode #15: comm +}[@: corrupted in-inode xattr: overlapping e_value [ 96.457911][ T6911] EXT4-fs error (device loop5): ext4_xattr_ibody_find:2240: inode #15: comm +}[@: corrupted in-inode xattr: overlapping e_value [ 96.645227][ T4736] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 96.703017][ T7000] loop6: detected capacity change from 0 to 256 [ 96.713124][ T7000] vfat: Unknown parameter 'uni_|late' [ 96.844852][ T7018] loop5: detected capacity change from 0 to 164 [ 96.936584][ T7026] FAULT_INJECTION: forcing a failure. [ 96.936584][ T7026] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 96.949773][ T7026] CPU: 0 UID: 0 PID: 7026 Comm: syz.3.1101 Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 96.949863][ T7026] Tainted: [W]=WARN [ 96.949870][ T7026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 96.949882][ T7026] Call Trace: [ 96.949888][ T7026] [ 96.949895][ T7026] dump_stack_lvl+0xf2/0x150 [ 96.949964][ T7026] dump_stack+0x15/0x1a [ 96.949990][ T7026] should_fail_ex+0x24a/0x260 [ 96.950075][ T7026] should_fail+0xb/0x10 [ 96.950108][ T7026] should_fail_usercopy+0x1a/0x20 [ 96.950146][ T7026] _copy_from_user+0x1c/0xa0 [ 96.950233][ T7026] eventfd_write+0x73/0x370 [ 96.950267][ T7026] ? __pfx_eventfd_write+0x10/0x10 [ 96.950306][ T7026] vfs_write+0x27d/0x920 [ 96.950368][ T7026] ? __fget_files+0x17c/0x1c0 [ 96.950408][ T7026] ksys_write+0xe8/0x1b0 [ 96.950441][ T7026] __x64_sys_write+0x42/0x50 [ 96.950525][ T7026] x64_sys_call+0x287e/0x2dc0 [ 96.950553][ T7026] do_syscall_64+0xc9/0x1c0 [ 96.950622][ T7026] ? clear_bhb_loop+0x55/0xb0 [ 96.950655][ T7026] ? clear_bhb_loop+0x55/0xb0 [ 96.950690][ T7026] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 96.950759][ T7026] RIP: 0033:0x7f836cc1d169 [ 96.950774][ T7026] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 96.950792][ T7026] RSP: 002b:00007f836b281038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 96.950810][ T7026] RAX: ffffffffffffffda RBX: 00007f836ce35fa0 RCX: 00007f836cc1d169 [ 96.950825][ T7026] RDX: 0000000000000008 RSI: 0000400000000040 RDI: 0000000000000003 [ 96.950839][ T7026] RBP: 00007f836b281090 R08: 0000000000000000 R09: 0000000000000000 [ 96.950854][ T7026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 96.950933][ T7026] R13: 0000000000000000 R14: 00007f836ce35fa0 R15: 00007ffc7b8bd5e8 [ 96.951004][ T7026] [ 97.305080][ T7035] program syz.5.1104 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 97.307200][ T1038] hid-generic 0004:0003:0000.0003: unknown main item tag 0x0 [ 97.321882][ T1038] hid-generic 0004:0003:0000.0003: unknown main item tag 0x0 [ 97.338895][ T1038] hid-generic 0004:0003:0000.0003: hidraw0: HID v0.00 Device [syz1] on syz1 [ 97.450085][ T7023] loop6: detected capacity change from 0 to 2048 [ 97.462308][ T7023] EXT4-fs: Ignoring removed bh option [ 97.482762][ T7023] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 97.537364][ T7066] __nla_validate_parse: 10 callbacks suppressed [ 97.537398][ T7066] netlink: 1300 bytes leftover after parsing attributes in process `syz.0.1112'. [ 97.581012][ T7066] loop0: detected capacity change from 0 to 2048 [ 97.702533][ T7083] loop3: detected capacity change from 0 to 512 [ 97.710309][ T7083] SELinux: security_context_str_to_sid (system_u) failed with errno=-22 [ 97.790498][ T5373] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 97.826518][ T7096] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1126'. [ 97.835760][ T7096] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 97.843689][ T7096] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 97.853178][ T7096] bridge0: port 3(batadv0) entered disabled state [ 97.978828][ T7101] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1128'. [ 97.987833][ T7101] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 97.995406][ T7101] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 98.003350][ T7101] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 98.010991][ T7101] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 98.143896][ T7115] netlink: 12 bytes leftover after parsing attributes in process `syz.6.1134'. [ 98.156546][ T7115] bridge0: port 3(batadv0) entered blocking state [ 98.163168][ T7115] bridge0: port 3(batadv0) entered disabled state [ 98.170060][ T7115] batadv0: entered allmulticast mode [ 98.175914][ T7115] batadv0: entered promiscuous mode [ 98.183525][ T7115] loop6: detected capacity change from 0 to 128 [ 98.191822][ T7115] EXT4-fs (loop6): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 98.204350][ T7115] ext4 filesystem being mounted at /109/mnt supports timestamps until 2038-01-19 (0x7fffffff) [ 98.322163][ T5373] EXT4-fs (loop6): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 98.412931][ T7132] netlink: 'syz.5.1141': attribute type 10 has an invalid length. [ 98.420989][ T7132] netlink: 40 bytes leftover after parsing attributes in process `syz.5.1141'. [ 98.467762][ T7139] sctp: [Deprecated]: syz.4.1144 (pid 7139) Use of struct sctp_assoc_value in delayed_ack socket option. [ 98.467762][ T7139] Use struct sctp_sack_info instead [ 98.503898][ T7123] loop0: detected capacity change from 0 to 8192 [ 98.512207][ T7139] netlink: 36 bytes leftover after parsing attributes in process `syz.4.1144'. [ 98.521766][ T7143] netlink: 140 bytes leftover after parsing attributes in process `syz.5.1146'. [ 98.531110][ T7143] netlink: 16 bytes leftover after parsing attributes in process `syz.5.1146'. [ 98.540108][ T7143] netlink: 5 bytes leftover after parsing attributes in process `syz.5.1146'. [ 98.557819][ T7143] loop5: detected capacity change from 0 to 736 [ 98.575384][ T7143] rock: directory entry would overflow storage [ 98.581659][ T7143] rock: sig=0x3b10, size=4, remaining=3 [ 98.660287][ T3481] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 98.669748][ T3481] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 98.673473][ T7154] program syz.6.1150 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 98.704016][ T7154] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 98.792795][ T7164] netlink: 'syz.0.1155': attribute type 10 has an invalid length. [ 98.800749][ T7164] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1155'. [ 99.047567][ T7188] FAULT_INJECTION: forcing a failure. [ 99.047567][ T7188] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 99.060680][ T7188] CPU: 0 UID: 0 PID: 7188 Comm: syz.3.1162 Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 99.060715][ T7188] Tainted: [W]=WARN [ 99.060721][ T7188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 99.060835][ T7188] Call Trace: [ 99.060842][ T7188] [ 99.060850][ T7188] dump_stack_lvl+0xf2/0x150 [ 99.060882][ T7188] dump_stack+0x15/0x1a [ 99.060986][ T7188] should_fail_ex+0x24a/0x260 [ 99.061029][ T7188] should_fail+0xb/0x10 [ 99.061056][ T7188] should_fail_usercopy+0x1a/0x20 [ 99.061149][ T7188] _copy_to_user+0x20/0xa0 [ 99.061171][ T7188] syslog_print_all+0x200/0x3c0 [ 99.061218][ T7188] do_syslog+0x431/0x7f0 [ 99.061258][ T7188] ? __bpf_trace_sys_enter+0x10/0x30 [ 99.061398][ T7188] ? trace_sys_enter+0xcd/0x110 [ 99.061430][ T7188] __x64_sys_syslog+0x43/0x50 [ 99.061490][ T7188] x64_sys_call+0x29be/0x2dc0 [ 99.061598][ T7188] do_syscall_64+0xc9/0x1c0 [ 99.061629][ T7188] ? clear_bhb_loop+0x55/0xb0 [ 99.061661][ T7188] ? clear_bhb_loop+0x55/0xb0 [ 99.061694][ T7188] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 99.061805][ T7188] RIP: 0033:0x7f836cc1d169 [ 99.061821][ T7188] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 99.061839][ T7188] RSP: 002b:00007f836b281038 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 99.061857][ T7188] RAX: ffffffffffffffda RBX: 00007f836ce35fa0 RCX: 00007f836cc1d169 [ 99.061869][ T7188] RDX: 00000000000000d7 RSI: 0000400000000000 RDI: 0000000000000004 [ 99.061926][ T7188] RBP: 00007f836b281090 R08: 0000000000000000 R09: 0000000000000000 [ 99.061937][ T7188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 99.061949][ T7188] R13: 0000000000000000 R14: 00007f836ce35fa0 R15: 00007ffc7b8bd5e8 [ 99.061967][ T7188] [ 99.273538][ T29] kauditd_printk_skb: 839 callbacks suppressed [ 99.273555][ T29] audit: type=1400 audit(1740882323.985:7799): avc: denied { read } for pid=7196 comm="syz.3.1166" dev="nsfs" ino=4026532395 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 99.324546][ T29] audit: type=1400 audit(1740882324.015:7800): avc: denied { prog_load } for pid=7196 comm="syz.3.1166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 99.343778][ T29] audit: type=1400 audit(1740882324.015:7801): avc: denied { read write } for pid=4736 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 99.368031][ T29] audit: type=1400 audit(1740882324.015:7802): avc: denied { create } for pid=7196 comm="syz.3.1166" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 99.389421][ T29] audit: type=1400 audit(1740882324.015:7803): avc: denied { map_create } for pid=7180 comm="syz.6.1160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 99.408728][ T29] audit: type=1400 audit(1740882324.015:7804): avc: denied { map_create } for pid=7180 comm="syz.6.1160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 99.427998][ T29] audit: type=1400 audit(1740882324.015:7805): avc: denied { prog_load } for pid=7180 comm="syz.6.1160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 99.447127][ T29] audit: type=1400 audit(1740882324.015:7806): avc: denied { prog_load } for pid=7180 comm="syz.6.1160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 99.469059][ T29] audit: type=1400 audit(1740882324.105:7807): avc: denied { name_bind } for pid=7200 comm="syz.5.1168" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 99.490901][ T29] audit: type=1400 audit(1740882324.105:7808): avc: denied { prog_load } for pid=7205 comm="syz.4.1170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 100.784413][ T7357] FAULT_INJECTION: forcing a failure. [ 100.784413][ T7357] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 100.797644][ T7357] CPU: 0 UID: 0 PID: 7357 Comm: syz.3.1239 Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 100.797713][ T7357] Tainted: [W]=WARN [ 100.797719][ T7357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 100.797730][ T7357] Call Trace: [ 100.797735][ T7357] [ 100.797742][ T7357] dump_stack_lvl+0xf2/0x150 [ 100.797817][ T7357] dump_stack+0x15/0x1a [ 100.797873][ T7357] should_fail_ex+0x24a/0x260 [ 100.797905][ T7357] should_fail+0xb/0x10 [ 100.797937][ T7357] should_fail_usercopy+0x1a/0x20 [ 100.797987][ T7357] _copy_to_user+0x20/0xa0 [ 100.798146][ T7357] simple_read_from_buffer+0xa0/0x110 [ 100.798211][ T7357] proc_fail_nth_read+0xf9/0x140 [ 100.798297][ T7357] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 100.798322][ T7357] vfs_read+0x19b/0x6f0 [ 100.798344][ T7357] ? __rcu_read_unlock+0x4e/0x70 [ 100.798398][ T7357] ? __fget_files+0x17c/0x1c0 [ 100.798428][ T7357] ksys_read+0xe8/0x1b0 [ 100.798450][ T7357] __x64_sys_read+0x42/0x50 [ 100.798472][ T7357] x64_sys_call+0x2874/0x2dc0 [ 100.798523][ T7357] do_syscall_64+0xc9/0x1c0 [ 100.798627][ T7357] ? clear_bhb_loop+0x55/0xb0 [ 100.798657][ T7357] ? clear_bhb_loop+0x55/0xb0 [ 100.798688][ T7357] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 100.798723][ T7357] RIP: 0033:0x7f836cc1bb7c [ 100.798738][ T7357] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 100.798834][ T7357] RSP: 002b:00007f836b281030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 100.798851][ T7357] RAX: ffffffffffffffda RBX: 00007f836ce35fa0 RCX: 00007f836cc1bb7c [ 100.798920][ T7357] RDX: 000000000000000f RSI: 00007f836b2810a0 RDI: 0000000000000003 [ 100.798930][ T7357] RBP: 00007f836b281090 R08: 0000000000000000 R09: 0000000000000000 [ 100.798969][ T7357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 100.798997][ T7357] R13: 0000000000000000 R14: 00007f836ce35fa0 R15: 00007ffc7b8bd5e8 [ 100.799021][ T7357] [ 101.287659][ T7374] FAULT_INJECTION: forcing a failure. [ 101.287659][ T7374] name failslab, interval 1, probability 0, space 0, times 0 [ 101.300484][ T7374] CPU: 0 UID: 0 PID: 7374 Comm: syz.6.1245 Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 101.300513][ T7374] Tainted: [W]=WARN [ 101.300520][ T7374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 101.300531][ T7374] Call Trace: [ 101.300539][ T7374] [ 101.300547][ T7374] dump_stack_lvl+0xf2/0x150 [ 101.300578][ T7374] dump_stack+0x15/0x1a [ 101.300601][ T7374] should_fail_ex+0x24a/0x260 [ 101.300633][ T7374] should_failslab+0x8f/0xb0 [ 101.300665][ T7374] kmem_cache_alloc_noprof+0x52/0x320 [ 101.300690][ T7374] ? vm_area_alloc+0xac/0x130 [ 101.300720][ T7374] vm_area_alloc+0xac/0x130 [ 101.300747][ T7374] mmap_region+0x819/0x1620 [ 101.300798][ T7374] do_mmap+0x98a/0xc30 [ 101.300830][ T7374] vm_mmap_pgoff+0x16d/0x2d0 [ 101.300864][ T7374] ksys_mmap_pgoff+0xd0/0x330 [ 101.300896][ T7374] ? syscall_trace_enter+0x104/0x1f0 [ 101.300932][ T7374] ? fpregs_assert_state_consistent+0x83/0xa0 [ 101.300959][ T7374] x64_sys_call+0x1940/0x2dc0 [ 101.300990][ T7374] do_syscall_64+0xc9/0x1c0 [ 101.301020][ T7374] ? clear_bhb_loop+0x55/0xb0 [ 101.301046][ T7374] ? clear_bhb_loop+0x55/0xb0 [ 101.301078][ T7374] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 101.301108][ T7374] RIP: 0033:0x7fb53c72d1a3 [ 101.301123][ T7374] Code: f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 41 89 ca 41 f7 c1 ff 0f 00 00 75 14 b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 25 c3 0f 1f 40 00 48 c7 c0 a8 ff ff ff 64 c7 [ 101.301140][ T7374] RSP: 002b:00007fb53ad96e18 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 101.301158][ T7374] RAX: ffffffffffffffda RBX: 00000000000005f9 RCX: 00007fb53c72d1a3 [ 101.301171][ T7374] RDX: 0000000000000003 RSI: 0000000008400000 RDI: 0000000000000000 [ 101.301184][ T7374] RBP: 00004000000004c2 R08: 00000000ffffffff R09: 0000000000000000 [ 101.301198][ T7374] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000004 [ 101.301212][ T7374] R13: 00007fb53ad96ef0 R14: 00007fb53ad96eb0 R15: 0000400000000380 [ 101.301234][ T7374] [ 101.724968][ T7416] xt_TCPMSS: Only works on TCP SYN packets [ 101.738141][ T7416] FAULT_INJECTION: forcing a failure. [ 101.738141][ T7416] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 101.751375][ T7416] CPU: 0 UID: 0 PID: 7416 Comm: syz.5.1263 Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 101.751480][ T7416] Tainted: [W]=WARN [ 101.751489][ T7416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 101.751504][ T7416] Call Trace: [ 101.751511][ T7416] [ 101.751519][ T7416] dump_stack_lvl+0xf2/0x150 [ 101.751556][ T7416] dump_stack+0x15/0x1a [ 101.751599][ T7416] should_fail_ex+0x24a/0x260 [ 101.751638][ T7416] should_fail+0xb/0x10 [ 101.751666][ T7416] should_fail_usercopy+0x1a/0x20 [ 101.751791][ T7416] _copy_from_user+0x1c/0xa0 [ 101.751815][ T7416] memdup_user+0x64/0xc0 [ 101.751864][ T7416] strndup_user+0x68/0xa0 [ 101.751891][ T7416] __se_sys_mount+0x4e/0x2d0 [ 101.751986][ T7416] ? __bpf_trace_sys_enter+0x10/0x30 [ 101.752012][ T7416] ? trace_sys_enter+0xcd/0x110 [ 101.752043][ T7416] __x64_sys_mount+0x67/0x80 [ 101.752083][ T7416] x64_sys_call+0x2c84/0x2dc0 [ 101.752120][ T7416] do_syscall_64+0xc9/0x1c0 [ 101.752214][ T7416] ? clear_bhb_loop+0x55/0xb0 [ 101.752245][ T7416] ? clear_bhb_loop+0x55/0xb0 [ 101.752278][ T7416] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 101.752310][ T7416] RIP: 0033:0x7fbbb2dad169 [ 101.752328][ T7416] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 101.752410][ T7416] RSP: 002b:00007fbbb1417038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 101.752427][ T7416] RAX: ffffffffffffffda RBX: 00007fbbb2fc5fa0 RCX: 00007fbbb2dad169 [ 101.752439][ T7416] RDX: 0000400000000080 RSI: 0000400000000000 RDI: 0000000000000000 [ 101.752450][ T7416] RBP: 00007fbbb1417090 R08: 0000400000000500 R09: 0000000000000000 [ 101.752461][ T7416] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 101.752472][ T7416] R13: 0000000000000000 R14: 00007fbbb2fc5fa0 R15: 00007fff91fb3528 [ 101.752490][ T7416] [ 102.098426][ T7449] ================================================================== [ 102.106562][ T7449] BUG: KCSAN: data-race in mas_walk / mas_wmb_replace [ 102.113361][ T7449] [ 102.115692][ T7449] write to 0xffff888108b9a300 of 8 bytes by task 7447 on cpu 1: [ 102.123342][ T7449] mas_wmb_replace+0x222/0x14d0 [ 102.128204][ T7449] mas_wr_store_entry+0x1530/0x23f0 [ 102.133417][ T7449] mas_store_prealloc+0x6bf/0x960 [ 102.138483][ T7449] mmap_region+0xf4e/0x1620 [ 102.142995][ T7449] do_mmap+0x98a/0xc30 [ 102.147077][ T7449] vm_mmap_pgoff+0x16d/0x2d0 [ 102.151683][ T7449] ksys_mmap_pgoff+0xd0/0x330 [ 102.156374][ T7449] x64_sys_call+0x1940/0x2dc0 [ 102.161069][ T7449] do_syscall_64+0xc9/0x1c0 [ 102.165588][ T7449] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 102.171506][ T7449] [ 102.173833][ T7449] read to 0xffff888108b9a300 of 8 bytes by task 7449 on cpu 0: [ 102.181375][ T7449] mas_walk+0x123/0x320 [ 102.185543][ T7449] lock_vma_under_rcu+0x95/0x270 [ 102.190488][ T7449] exc_page_fault+0x150/0x650 [ 102.195174][ T7449] asm_exc_page_fault+0x26/0x30 [ 102.200034][ T7449] [ 102.202445][ T7449] value changed: 0xffff888119362c41 -> 0xffff888108b9a300 [ 102.209548][ T7449] [ 102.211889][ T7449] Reported by Kernel Concurrency Sanitizer on: [ 102.218050][ T7449] CPU: 0 UID: 0 PID: 7449 Comm: syz.0.1276 Tainted: G W 6.14.0-rc4-syzkaller-00248-g03d38806a902 #0 [ 102.230204][ T7449] Tainted: [W]=WARN [ 102.234004][ T7449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 102.244062][ T7449] ==================================================================