last executing test programs: 3m34.820289224s ago: executing program 1 (id=2260): syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYRES8=0x0, @ANYRESDEC], 0x1, 0x140, &(0x7f00000003c0)="$eJzs27Fq21AUBuDj2m3ddvFcOgi6dDJtn6CluFAqaEnwkEwJOFnsYIgXJZMfJS8YCJ683ZAo2Imxhwy2IPq+RT/8CO4dpMMV6OjT2XAwnpyO/8+i3WhE60dkMW9EJ15FM0rTAABeknlKcZNSSm+n8e4qUkpVrwgA2DbzHwDqx/wHgPox/wGgfvYPDv/+zPPeXpa1I66nRb/ol9ey//0n733N7nWWd82Kot9c9N/KPnvav473D/33tf2b+PK57O+6X//ylf5DDLa/fQAAAKiFbraw9nzf7W7qy/To+8DK+b0VH1s72wYA8AyTi8vh8Wh0ci4IgrAIVb+ZgG1bPvRVrwQAAAAAAAAAAAAAANhkF78TVb1HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAWHUbAAD//0DvUik=") r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$bt_hci(r2, &(0x7f0000000000)={0x27}, 0x74) sendmmsg$unix(r2, &(0x7f0000000b00)=[{{&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0xa014}}, {{&(0x7f0000000e80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000740)=[{&(0x7f0000001dc0)="bb", 0xfdef}], 0x1, 0x0, 0x0, 0x24004844}}], 0x2, 0x0) 3m34.767367794s ago: executing program 1 (id=2261): socket$netlink(0x10, 0x3, 0xc) socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000080)) socket$nl_generic(0x10, 0x3, 0x10) epoll_create(0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000080)=0xfff, 0x4) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmmsg(r0, &(0x7f0000000440)=[{{&(0x7f0000000700)=@xdp={0x2c, 0x0, r2}, 0x80, &(0x7f00000004c0), 0x0, 0x0, 0x0, 0x2f00}}], 0x1, 0x0) 3m34.767101124s ago: executing program 1 (id=2262): timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000500)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) lsm_get_self_attr(0x64, &(0x7f0000000000), &(0x7f0000001280)=0xdb, 0x0) 3m34.734925984s ago: executing program 1 (id=2263): syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000200)='./file0\x00', 0x2000000, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'], 0x1, 0x55a, &(0x7f0000000b80)="$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") syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) madvise(&(0x7f0000000000/0x600000)=nil, 0x600707, 0x19) 3m34.633299403s ago: executing program 1 (id=2266): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000ac0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x18000000, {0x1}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x8}]}, @NFT_MSG_NEWSETELEM={0x38, 0xc, 0xa, 0x301, 0x0, 0x0, {0x1}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}, @NFTA_SET_ELEM_DATA={0x4}]}]}]}], {0x14, 0x10}}, 0xbc}}, 0x0) 3m34.601536943s ago: executing program 1 (id=2267): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c000000200021010000000000000000020000000000000000000000050016006700000008000b"], 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x0) 3m34.521091292s ago: executing program 32 (id=2267): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c000000200021010000000000000000020000000000000000000000050016006700000008000b"], 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x0) 13.479849859s ago: executing program 5 (id=7556): io_setup(0x3fe, &(0x7f0000000100)=0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x80042, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x19) io_submit(r0, 0x1, &(0x7f0000000000)=[0x0]) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000a9000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000040000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_genetlink_get_family_id$devlink(&(0x7f0000000340), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="4c000000020601080000000000000000000000400500010006000000050005000200000005000400000000000900020073797a310000000011000300686173683a69702c6d61726b"], 0x4c}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x48, 0x9, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0xffff}, [@IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x2}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x2}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x40c0080) 13.388604368s ago: executing program 5 (id=7563): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000180)=0x800001, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000b80)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "560400", 0x14, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x4}}}}}}}, 0x0) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b702000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = dup(r3) write$UHID_INPUT(r4, &(0x7f0000001040)={0xc, {"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", 0x1000}}, 0x1006) setresuid(0xee01, 0x0, 0x0) keyctl$restrict_keyring(0xf, 0xfffffffffffffffc, 0x0, 0x0) 13.289322508s ago: executing program 5 (id=7567): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000180)=0x800001, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000b80)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "560400", 0x14, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2, 0x0, 0x0, 0x4}}}}}}}, 0x0) close(r0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b702000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = dup(r4) write$UHID_INPUT(r5, &(0x7f0000001040)={0xc, {"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", 0x1000}}, 0x1006) syz_genetlink_get_family_id$mptcp(&(0x7f00000001c0), r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') writev(r7, &(0x7f0000000000)=[{&(0x7f0000000400)="f64adfba90", 0x5}], 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setresuid(0xee01, 0x0, 0x0) keyctl$restrict_keyring(0xf, 0xfffffffffffffffc, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x4b0}}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e02003c000b05d25a806f8c6394f90124fc600c05000f90c60100053582c137153e370a48018004f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x5}, 0x0) 13.163556537s ago: executing program 5 (id=7569): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./bus\x00', 0x40, &(0x7f0000000340), 0x1, 0x500, &(0x7f0000000a40)="$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") chdir(&(0x7f0000000300)='./file0\x00') statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0xd5a527333bff4787, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) waitid(0x1, r0, &(0x7f0000000000), 0x8, &(0x7f0000000180)) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000079e02200850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) 13.011559197s ago: executing program 5 (id=7571): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) clock_gettime(0xa00, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r0}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001940)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{0x0, 0x0, 0x9c}, {}]}, [{}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, {0x1}, {0x0, 0x0, 0x80000000}, {}, {0x0, 0x0, 0x0, 0x2000}, {0x0, 0x0, 0x0, 0x0, 0x400}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, {0x0, 0x2000000}, {0x0, 0x1, 0x0, 0x0, 0xfffffffe, 0x8001}, {0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, {}, {0x0, 0x0, 0x100}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {0xfffffffc}, {}, {0x0, 0x0, 0x0, 0x0, 0xfffffffe}, {}, {0x0, 0x4}, {}, {0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0xfffffffe}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, {0xd5}, {}, {0x0, 0x0, 0x0, 0xffffffff}, {}, {}, {0x0, 0x0, 0x0, 0xfffffffe}, {}, {0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x1}, {}, {0x0, 0x10}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x800, 0x8}, {0x2}, {}, {0x0, 0x0, 0x0, 0x3}, {}, {}, {0x0, 0x5, 0x0, 0x2}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, {}, {}, {0xffffffff}, {}, {0x0, 0x0, 0x0, 0xffffffff}, {}, {}, {0x0, 0x0, 0x0, 0x4}, {}, {0x0, 0x0, 0x0, 0x2}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, {0x0, 0x800000}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, {}, {}, {}, {}, {}, {}, {0xa7}, {}, {}, {0x0, 0x0, 0x52c0}, {}, {}, {0x0, 0x0, 0x1000}, {0xfffffffc}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, {}, {0x0, 0xffffffff}, {}, {0x4, 0x0, 0x0, 0x0, 0x1}, {}, {0x0, 0x9}, {}, {0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x10000000}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xb}], [{}, {}, {}, {}, {}, {}, {0x2}, {}, {}, {}, {}, {}, {}, {0x2}, {}, {}, {}, {}, {}, {}, {}, {0x3}, {}, {}, {}, {}, {}, {0x4}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {0x0, 0x1}, {}, {}, {}, {0x5}, {}, {}, {}, {0x5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x2}, {}, {0x0, 0x1}, {}, {}, {}, {}, {0x0, 0x1}, {}, {0x1}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) 12.622891015s ago: executing program 5 (id=7579): bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000a00)=ANY=[@ANYBLOB="1b00000000000000000000000020000000000000", @ANYRES32, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000af9ec914556db8982f5edcf62e56673f996af8b10548b1552a94e507f9d3986e56286d69fc8c913d7e43339a1d4b4a5f60b13fa3"], 0x50) socket(0x2b, 0x80801, 0x1) socket(0x2b, 0x1, 0x1) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000000c0)="6880a642beaf34317f0dd3122a90ad0d2b", 0x11}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) mq_notify(0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x60) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) close(r2) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/net\x00') r3 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="85000000080000004e00000000000000850000007d00000095000000000000007ab9e683b171b4b09980af6c1ebeda4ac0d3e3aa71a9ab17e14e1b0be949499ca6a5b2c467b6d3d1c0ae1e9820331afd90cc832c761aa3adf9be48c401c7f893694bf8cd19b7173cd4688904f7310af046fd490d3f2cf49b5f68aecf0bc659dc3d53c2"], &(0x7f0000000140)='GPL\x00', 0x0, 0xbd, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x15) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000440)={r3, 0x0, 0x11, 0x0, &(0x7f0000000600)="61df712bc884fef053a7a9a26e9b722780", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x3c, 0x1, 0x0, 0x0, 0x0, 0x4, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x3}, 0x13008, 0x3, 0xfffffffe, 0x5, 0x2, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000005c0)={@ifindex, 0x11, 0x0, 0x4, &(0x7f0000000240), 0x2f, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095", @ANYRES32, @ANYRESDEC, @ANYRESHEX], 0x0, 0xfff, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, @void, @value}, 0x94) 12.593337445s ago: executing program 33 (id=7579): bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000a00)=ANY=[@ANYBLOB="1b00000000000000000000000020000000000000", @ANYRES32, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000af9ec914556db8982f5edcf62e56673f996af8b10548b1552a94e507f9d3986e56286d69fc8c913d7e43339a1d4b4a5f60b13fa3"], 0x50) socket(0x2b, 0x80801, 0x1) socket(0x2b, 0x1, 0x1) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000000c0)="6880a642beaf34317f0dd3122a90ad0d2b", 0x11}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) mq_notify(0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x60) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) close(r2) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/net\x00') r3 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="85000000080000004e00000000000000850000007d00000095000000000000007ab9e683b171b4b09980af6c1ebeda4ac0d3e3aa71a9ab17e14e1b0be949499ca6a5b2c467b6d3d1c0ae1e9820331afd90cc832c761aa3adf9be48c401c7f893694bf8cd19b7173cd4688904f7310af046fd490d3f2cf49b5f68aecf0bc659dc3d53c2"], &(0x7f0000000140)='GPL\x00', 0x0, 0xbd, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x15) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000440)={r3, 0x0, 0x11, 0x0, &(0x7f0000000600)="61df712bc884fef053a7a9a26e9b722780", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x3c, 0x1, 0x0, 0x0, 0x0, 0x4, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x3}, 0x13008, 0x3, 0xfffffffe, 0x5, 0x2, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000005c0)={@ifindex, 0x11, 0x0, 0x4, &(0x7f0000000240), 0x2f, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095", @ANYRES32, @ANYRESDEC, @ANYRESHEX], 0x0, 0xfff, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, @void, @value}, 0x94) 3.456214855s ago: executing program 4 (id=7749): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x141341) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000200)=@usbdevfs_connect) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001380)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x7ff80, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001480)=ANY=[@ANYBLOB="54280f4a480013640000000000000000e00000012514b2abafd05ba4bda52f88bd000000030000000000000000ac14b2b9ba0ad8ef06014d7fb914bb00"/77, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="200100000000000000000000000000020000000032000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000400000000000000000048000200656362286369706865725f6e756c6c29000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c0004000100000000000000fe8000000000000000000000000000bb"], 0x154}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001440)=ANY=[@ANYRES16=r6], 0x1c}, 0x1, 0x0, 0x0, 0x4c0d0}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='sched_switch\x00', r8}, 0x10) recvmmsg$unix(r7, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000001340)=[{&(0x7f00000002c0)=""/4096, 0x1004}], 0x1}}], 0x8, 0x34000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f00000012c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500619f3bc7c07d00007d000000180100002020702500001800002020207b1af8ff000000bfa100000000000007010000f8ffffffb7020085000000730000009500"/94], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) 2.481558281s ago: executing program 4 (id=7768): r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) sendto$inet(r0, &(0x7f00000003c0)='M', 0x1, 0x0, &(0x7f00000001c0)={0x2, 0x4e22, @local}, 0x10) r1 = socket(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000080)="7800000018002507b9409b14ffff0b7a0204be04020714056406040c5c0009003f0006180a0000000d0085a168d0bf46d32345653610648d270005000a06024e49935ade4a460c89b6ec0cff3959547f509058ba86c902007a00004a32000400160008030a0000000000e000e218d1ddf66ed538f2523250", 0x78, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) syz_emit_ethernet(0x4a, &(0x7f0000000500)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "8a9646", 0x14, 0x4, 0x0, @empty, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) r4 = socket(0x2, 0x80805, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000001000)={0xfa, 0x100, 0x0, 0x8ea2, 0x1ff, 0xffff7fff, 0x9, 0x2f, r6}, &(0x7f0000001040)=0x20) sendto$inet(r0, &(0x7f0000000280)='p', 0x29fcb, 0x0, 0x0, 0x0) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x1000004, 0x42032, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) lseek(0xffffffffffffffff, 0xfffffffffffffffc, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="fd00000001000000000000000600000018110000b5e6019171bdeee8454b93c56e5b14f61a33fa3b48e06efe9491bc74a8899305925496d0019652dd6caa87095f4dc50083c8f72c5310995cae45346821432c2697ae368e1f390f0eff7c8e8cd5dc7ab303c8b482c271851d66f5a8c6330284d3f5153c7b2011a1d2601465b647a7fde056b3c5617c09bdea0b705c3115e132752db86bc1e9937411c01a5e0ed92733818615455e42af76", @ANYRES32, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 2.411174151s ago: executing program 4 (id=7772): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) set_mempolicy(0x4005, &(0x7f0000000080)=0x7, 0x2) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000500)=@gcm_256={{0x303}, "2a4001011f891d5b", "11682d84dd05bb63db142ade2bd907f400", "fd6ed24e", "01000010ffffffff"}, 0x38) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000001c0)={0x2}, 0x8) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='illinois\x00', 0x9) sendto$inet(r3, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x0) recvfrom$inet(r3, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x700, 0x0, 0xfffffffffffffd25) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) sendmsg$ETHTOOL_MSG_WOL_SET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES16=r2, @ANYBLOB="010027bd700001dcdf250a00000018000180140002007663616e3000"/38], 0x2c}, 0x1, 0x0, 0x0, 0x4044010}, 0x4884) socket$xdp(0x2c, 0x3, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r5, @ANYRES64=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) 2.116403289s ago: executing program 6 (id=7778): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x141341) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000200)=@usbdevfs_connect) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001380)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x7ff80, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001480)=ANY=[@ANYBLOB="54280f4a480013640000000000000000e00000012514b2abafd05ba4bda52f88bd000000030000000000000000ac14b2b9ba0ad8ef06014d7fb914bb00"/77, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="200100000000000000000000000000020000000032000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000400000000000000000048000200656362286369706865725f6e756c6c29000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c0004000100000000000000fe8000000000000000000000000000bb"], 0x154}}, 0x0) r7 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001440)=ANY=[@ANYRES16=r6], 0x1c}, 0x1, 0x0, 0x0, 0x4c0d0}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='sched_switch\x00', r8}, 0x10) recvmmsg$unix(r7, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000001340)=[{&(0x7f00000002c0)=""/4096, 0x1004}], 0x1}}], 0x8, 0x34000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f00000012c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500619f3bc7c07d00007d000000180100002020702500001800002020207b1af8ff000000bfa100000000000007010000f8ffffffb7020085000000730000009500"/94], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) 1.682755287s ago: executing program 4 (id=7784): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000046c0)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x8000000, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_PTAB={0xffffffffffffff9f, 0x3, [0x2, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x40000000, 0x1000, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7e150a0b, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x5d2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x1007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x40000, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e98263b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd2d1, 0x0, 0x0, 0xb2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x7, 0xc3f3, 0x1, 0x0, 0x800, 0x9, 0x800, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0xfffffffe, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1000, 0x100, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x0, 0x3, 0x0, 0x0, 0x0, 0xc0000000}, {0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x7, 0x10, 0x2000000}}]}}]}, 0x45c}}, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000004c0)=[{0x1, 0x3, 0xa, 0x8}]}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b0000000000000000000000000004", @ANYRESHEX=r3, @ANYRES64=r3], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0xf, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000a80)={'dummy0\x00', 0x0}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000400)) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000540), 0x10000, 0x0) ioctl$PPPIOCSACTIVE(r7, 0x40107446, &(0x7f00000005c0)={0x3, &(0x7f0000000580)=[{0x0, 0x1, 0x6, 0x9}, {0x9, 0xe, 0x5, 0x10001}, {0xfffe, 0x8, 0x8, 0x8}]}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000300)=ANY=[@ANYBLOB="4c0000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000240012800b0001006d616373656300001400028005000d000000000005000c000000000008000500", @ANYRES32=r6, @ANYBLOB="1e803c9a89fa8e842bdfce3b0839835b8134997b2fbd26813f3d98b8c29cafe73f464683884db3fbba7531e70698be7a0a44a2cc278c22d4bc8d7fd56902eb7d1e0eb7220c3e1c4b8900a4d301f9e479b424c2d9e0499ce2720f3b080000007872acc560d60c6bfe593e555ca09713c1716ff9c8d711e5042980ded540ac8a85f838a0a2653b3822ad1f05cdb51464f3deb0fd38473c027dbdb0a1"], 0x4c}}, 0x0) r8 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x2}, 0x8) r9 = openat$binfmt(0xffffffffffffff9c, 0x0, 0x41, 0x1ff) write$binfmt_script(r9, &(0x7f0000000180)={'#! ', './file1', [{0x20, '^($'}, {0x20, '^'}, {0x20, 'syzkaller\x00'}, {0x20, 'dummy0\x00'}, {0x20, 'dummy0\x00'}], 0xa, "9becd54e29e4021ca13aa2258617e42a18dcace8c2fb7fcf24dbafaf742d75b75069c109673e264ad55292a610f217992838167b37f757c7feba923a52738d93"}, 0x6c) sendto$inet6(r8, &(0x7f0000001240)='>', 0x1, 0x0, &(0x7f00000012c0)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) creat(&(0x7f0000000040)='./file0\x00', 0x0) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r11}, 0x10) mount$9p_fd(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000001bc0)=ANY=[@ANYBLOB=',version=9']) shutdown(r8, 0x1) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='virtio_transport_alloc_pkt\x00', r13}, 0x18) socket$vsock_stream(0x28, 0x1, 0x0) 1.123010175s ago: executing program 6 (id=7789): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x1f2f, 0xf, 0x3253, &(0x7f00000007c0)="9f44948721919580684010a40800", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) 1.055105265s ago: executing program 6 (id=7790): socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0xf, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) pipe2(&(0x7f0000000040), 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000000000000600000006"], 0x50) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r1, 0x0, &(0x7f0000001700)=""/53}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='inet_sock_set_state\x00', r2}, 0x10) r3 = io_uring_setup(0x79bf, &(0x7f00000002c0)={0x0, 0x0, 0x40, 0x4, 0x32f}) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x8957) r5 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) close_range(r3, 0xffffffffffffffff, 0x0) 1.054851765s ago: executing program 0 (id=7791): r0 = io_uring_setup(0x79bf, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000300000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000020000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x8957) r4 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 1.036473704s ago: executing program 0 (id=7793): socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, [@printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @call={0x85, 0x0, 0x0, 0x2a}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="780100003c000701fcffffff00000003047c000004003680600101"], 0x178}, 0x1, 0x0, 0x0, 0x4c040}, 0xc000) 971.028084ms ago: executing program 6 (id=7795): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) set_mempolicy(0x4005, &(0x7f0000000080)=0x7, 0x2) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000340), 0x14) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000500)=@gcm_256={{0x303}, "2a4001011f891d5b", "11682d84dd05bb63db142ade2bd907f400", "fd6ed24e", "01000010ffffffff"}, 0x38) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000001c0)={0x2}, 0x8) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000100)='illinois\x00', 0x9) sendto$inet(r3, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x0) recvfrom$inet(r3, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x700, 0x0, 0xfffffffffffffd25) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x45, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) sendmsg$ETHTOOL_MSG_WOL_SET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000140)=ANY=[@ANYBLOB='\f\x00', @ANYRES16=r2, @ANYBLOB="010027bd700001dcdf250a00000018000180140002007663616e3000"/38], 0x2c}, 0x1, 0x0, 0x0, 0x4044010}, 0x4884) socket$xdp(0x2c, 0x3, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r5, @ANYRES64=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) 817.183914ms ago: executing program 0 (id=7796): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) io_uring_setup(0x5de6, &(0x7f0000000180)={0x0, 0x3660, 0x2, 0x0, 0x34b}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file2\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x35d, &(0x7f0000000f00)="$eJzs3c1rO0UYwPEnaZImKW1yEEVBOtiLXpY2ehaDtCAELG0jtoKwbTcasiYlG6oRse3Jq3j3JHgovVnwUND+A71404sI3noRPNiDurJvyeatLzFpfr/2+4GSycw8u7OZSXk27WYv3/3yo0rJ0kp6Q6JJJRERkSuRrEQlEPEfo245IWGH8srMnz+/uL5ZTHoVaiW/8WpOKTU3/8PHn6X8bmfTcpF9//KP3O8Xz148f/nvxodlS5UtVa01lK62a7829G3TULtlq6IptWoaumWoctUy6l77d/52zNreXlPp1d3Z9F7dsCylV5uqYjRVo6Ya9abSP9DLVaVpmppNC25SPF5b0/NDBu+MeDAYk3o9r0+JSKqnpXg8kQEBAICJ6s7/o05KP0z+vyVzhcLymnI6t/P/k5fOGzPvnM75+f9Zol/+/9ov3rY68n/ndKKd/9e884PSzfn/13KH/L83I3pchs7/s2MYDIYzn+ipinQ8c/L/tP/+dR29d7LoFsj/AQAAAAAAAAAAAAAAAAAAAAB4GlzZdsa27UzwGPy0LyHwn+NBGjT/0yKSdGbfZv4fsvXNLUm6F+45c2x+sV/cL3qPfodzETHF+Mfu5qyN4Moj5cjKj+aBH3+wX5xyW/IlKTvxsiQZybrrKRRv2ytvFZaXlMePb12mlA7H5yQjz4Tjv3dXpxOf64z395+QlxdC8Zpk5KcdqYkpu25ke/+fLyn15tuFrviU209Efrv3SQEAAAAAYMQ01dL3/F3TBrV73zKSL7kfExmyKBn5u//5/WLf8/NY5oXYpI8eAAAAAIDHwWp+WtElatTdgmn2K6RkYNMICrGOmriI9O2c6KqJX7flqdAR3nY8CfHuYPJ/j+ub4FW9S1TwjxTOwFtN/h1VZLjxBMfv1kRiw09T5FDcBXAYborKLcJj3YOfdypU384LA7dz5B9Iqyb42Cgx4HWW1d7tRK9ZCfGeGjsy3AJ47qtv/xrdG+T1U38FfHJz5yPTsA/kNpPSVXB20dsUH/svHgAAAAD3rp30BzVvhJvDNxIJ3yyHv9wDAAAAAAAAAAAAAAAAAAAAAAAAAAAAADBCY/lKv67CpI8RAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeFL8FwAA//8GuPOT") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000004b40)='kmem_cache_free\x00'}, 0x18) open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='mm_page_free\x00', r4}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000010000000850000000f00000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='signal_generate\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000100)) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB="640000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="e5fda988000000002800128009000100766c616e00000000180002800c0002001c0000001f000000060001000000000008000500", @ANYRES32=r8, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="0a000100000070"], 0x64}}, 0x0) 722.769753ms ago: executing program 3 (id=7798): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1000, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=f']) 633.694883ms ago: executing program 0 (id=7799): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="5c00000010000104000000000000000000002000", @ANYRES32=0x0, @ANYBLOB="03000000000000002c0012800c0001006d6163766c616e001c000280080001000800000006ef0200010000001ffe02000000000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x100000, 0x5dd8, 0x3, 0x0, 0x0, 0x8, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r2}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r4, 0x0, 0x80000000000}, 0x18) r5 = socket$inet(0x2, 0x2, 0x1) sendmsg$inet(r5, &(0x7f0000000600)={&(0x7f0000000000)={0x2, 0xffff, @multicast2}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000400)='\b\x00', 0x2}, {&(0x7f0000000180)="2d0000008058", 0x6}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000890b040a0101027f00000100000000001c000000000000000000000008"], 0x40}, 0x20000000) 603.582223ms ago: executing program 3 (id=7800): socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0xf, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000000000000600000006"], 0x50) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r2, 0x0, &(0x7f0000001700)=""/53}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='inet_sock_set_state\x00', r3}, 0x10) r4 = socket$inet(0xa, 0x801, 0x84) listen(r4, 0x8000) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) openat$cgroup_devices(r5, &(0x7f0000000240)='devices.allow\x00', 0x2, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) r6 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r6, &(0x7f0000000180)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e20, 0x5, @ipv4={'\x00', '\xff\xff', @local}, 0x80}}, 0x24) io_uring_setup(0x79bf, &(0x7f00000002c0)={0x0, 0x0, 0x40, 0x4, 0x32f}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000300000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000000020000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r8, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r8, 0x8957) r9 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r9, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) 583.168473ms ago: executing program 2 (id=7801): r0 = syz_io_uring_setup(0xd3f, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x220}, &(0x7f0000000700)=0x0, &(0x7f00000002c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0x4, 0x0, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT2={0x1c, 0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0}) io_uring_enter(r0, 0xce3, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x4ac9, 0x0, 0x0, 0x0, 0x0) 522.102332ms ago: executing program 0 (id=7802): mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000000, 0x40010, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000004c0)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030003000000000000000000000000850000008200000095000000000000005d34867951ea13f85375daba9c73b3512783fdf70a708eafb0a1a17e0d6e4eed0ed55ce4a503b314969f4c2fedd86448de6a9e77cc511aa8e723866776ea19be4ed80ac12fd700423055f23b3ea94afaf4e4c63586b7e5040b6ab3952dc1d9b96ccc5cc9ebc3bcc9a53d1be1ef2685f1a91bb8ba18d4795abb693d5f0d2c064c6dcc3fc20fe72cf1d0ece888ba09fe680eb303a9fe60d75b88c4d91a9f4589138a48bea2e9"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r1}, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001700)={0x24, 0x33, 0x107, 0x0, 0x0, {0x2, 0x7c}, [@nested={0x10, 0x7, 0x0, 0x1, [@nested={0xc, 0xec, 0x0, 0x1, [@typed={0x4, 0x2}, @typed={0x4, 0xab}]}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x28000}, 0x20008000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.controllers\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f00000016c0), 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000004c0)='kmem_cache_free\x00', r5, 0x0, 0x6}, 0x18) r6 = socket(0x200000100000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000380)={'gre0\x00', 0x0}) bind$packet(r6, &(0x7f0000000180)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt$packet_int(r6, 0x107, 0xf, &(0x7f0000000100)=0x3c0, 0x43) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="0201130010061e00cb2f4359b648d5ed0000388dcf66ac141415ef06e63a808a5e5cbd43af9111aa0c520f06"], 0x3000}], 0x1, 0x0, 0x0, 0x40}, 0x0) sendfile(r6, r4, 0x0, 0x80004700) 421.081542ms ago: executing program 3 (id=7803): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) io_uring_setup(0x5de6, &(0x7f0000000180)={0x0, 0x3660, 0x2, 0x0, 0x34b}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='mm_page_free\x00', r2}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000100)) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB="640000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="e5fda988000000002800128009000100766c616e00000000180002800c0002001c0000001f000000060001000000000008000500", @ANYRES32=r5, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="0a000100000070"], 0x64}}, 0x0) 335.113372ms ago: executing program 2 (id=7804): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x18) pipe(&(0x7f00000002c0)) 230.979452ms ago: executing program 2 (id=7805): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r0 = socket$packet(0x11, 0x3, 0x300) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmmsg(r0, &(0x7f0000000840)=[{{&(0x7f0000000700)=@xdp={0x2c, 0x0, r2}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000500)="06", 0x1}], 0x1}}, {{&(0x7f00000002c0)=@xdp={0x2c, 0x0, r2}, 0x80, 0x0, 0x0, 0x0, 0x1450}}], 0x2, 0x0) 204.288001ms ago: executing program 2 (id=7806): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='kfree\x00'}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4000000000000000, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000140), r2}}, 0x18) 185.494211ms ago: executing program 3 (id=7807): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x1f2f, 0xf, 0x3253, &(0x7f00000007c0)="9f44948721919580684010a40800", 0x0, 0x241, 0x0, 0xb1, 0x0, &(0x7f0000000700)="389ceff69d08b0af1cc71b6262d50660bbaf31a7f8cd6a6f911beb65d5fe6b54bf21a66489121f24fefd198059288c9b735e1898e77a7469489a249292c02a72bc193a3008ebdbf4e9dd4ee8fcceef55402c913c8dd0ebece1330aaa93ece835c5044a246a5967e3acd7c950b3b19f351830e545eb9bc3a9c6dd22ce97f1f857cfe8b68a2370b69ea336006b589368f92deb68f3dfc6f2bfee09f8342da437fce5dcdf658e453e3132bb42067575318c39"}, 0x23) 126.900201ms ago: executing program 2 (id=7808): r0 = socket$kcm(0x10, 0x2, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) mq_notify(0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x60) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r1}, 0x10) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) close(r3) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/net\x00') r4 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="85000000080000004e00000000000000850000007d00000095000000000000007ab9e683b171b4b09980af6c1ebeda4ac0d3e3aa71a9ab17e14e1b0be949499ca6a5b2c467b6d3d1c0ae1e9820331afd90cc832c761aa3adf9be48c401c7f893694bf8cd19b7173cd4688904f7310af046fd490d3f2cf49b5f68aecf0bc659dc3d53c2"], &(0x7f0000000140)='GPL\x00', 0x0, 0xbd, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x15) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000440)={r4, 0x0, 0x11, 0x0, &(0x7f0000000600)="61df712bc884fef053a7a9a26e9b722780", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x3c, 0x1, 0x0, 0x0, 0x0, 0x4, 0x80000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x3}, 0x13008, 0x3, 0xfffffffe, 0x5, 0x2, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000005c0)={@ifindex, 0x11, 0x0, 0x4, &(0x7f0000000240), 0x2f, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095", @ANYRES32=r0, @ANYRESDEC, @ANYRESHEX], 0x0, 0xfff, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, @void, @value}, 0x94) 126.428911ms ago: executing program 4 (id=7809): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) io_uring_setup(0x5de6, &(0x7f0000000180)={0x0, 0x3660, 0x2, 0x0, 0x34b}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='mm_page_free\x00', r2}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000085000000"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='signal_generate\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) pipe(&(0x7f0000000100)) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=ANY=[@ANYBLOB="640000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="e5fda988000000002800128009000100766c616e00000000180002800c0002001c0000001f000000060001000000000008000500", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="0a000100000070"], 0x64}}, 0x0) 117.071381ms ago: executing program 3 (id=7810): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendmmsg$inet(r0, &(0x7f0000002100)=[{{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000300)="b5d3838236773268a73daecfa0fdc5beb5a7ac332a11523627b41db31da6be0055bf716aa2b23b97d43cc40c632f6b9850f364ba0831ed0d6f7157f204275aa850d992d81ba6ab984bd809f8887c651523875c9a8139c3ebba62168141343c853896523ffb04131b2786acc44a57f5b1d733cdaef8dd3c0526b7454eefe5153c5778ce05c77e962fd6bf3a4b9eb05654a64f1867398e202b4920e9ebc08f6e6dc652a12e45445030e069", 0xaa}, {&(0x7f0000000500)="e47ecfc6ce6d4d9cc5a0fbf98f301803da3adfbec8a1d5324076b744b24bc7cf83120d4819726e827d90219c7100dc54801b32c3a9a69a238db1f4d16464062d87", 0x41}, {&(0x7f0000000840)="fbdd17a812c727337dc6c74dcb077562b57a440dbf7711ba245a62b76d46b0f19e6ff608ef9e5fbb4a8cfb02e28403582ceb8031acc767f766772a93a2f00ddde52ce6f7a84db1c66feecdc4a028e7b9e5e27a0057957743cbf196c517bf3a", 0x5f}, {&(0x7f0000001300)="9f289544783daada5fedb202b944a5d336217d3a5e4d71506342f371603141b37a9764", 0x23}], 0x4}}, {{0x0, 0x0, &(0x7f0000002200)=[{&(0x7f0000000e00)="ec75d081fcb7e79634ec1a1abfdebb6a38b0c57cc77b83d2eea81aad8f73b36abc2019cb08fcaaec9647a07d0a0965f0f1e39afd84e7e2523aaded5e09aa1e36fcc90c269ad6d38d57619127cee4253655c33b71054226c3b00b9ee6ae29f0b07bc6fe7981126ca804c1f64e6c19ba36b2778c5f4a1c58625fe19516af43c9870c5b8191e23778abe7df2280d459b1651686a53ca52dce9570444c153f9c2903ae4c868074e89477bf6ed2ab648b0498ac8c0f90844ed9a26675199d5ff9b391c1dec077b5099cf9aecd1a9d94e2", 0xce}, {&(0x7f0000000f00)="397d5f2edc82d0337ae5ab9ee47dc3e798cf69cfebf169e77257f308227094d569a4326954e50ea185bc6fff0507c5dfd26676de9ddac4fe6db927cd4d03965f42d9c7513eff1631baa83e3daf514c600450374f6d76b8fcf2bc3eca29ce7538f85aa34b2bdcc17ecd080f0850377f771a", 0x71}, {&(0x7f0000000580)="4068745fc2", 0x5}], 0x3}}, {{0x0, 0x0, &(0x7f0000002040)=[{&(0x7f0000001dc0)="6fbb6bb3084d6b1314481d729e59d552", 0x10}, {&(0x7f0000001e00)="26f08bb1ab3b401fe528f3162de875db349b37f9b5135db5562fe166fcf4a2ed8d735b5ecc7228290aecc10226d1f3e55b658fcb7b87107b992ffdc11eb4b0f284cbd3e074ae91da8adc472d45cbdbbe89094f061095a1ca09bd856f596e4dd1e5e5fb4b99dc2f785568d4bb0c42aa09e8c3de6b2608c862cf46227ff72ee1d53cb485681f29f011c5d5829ce1af", 0x8e}, {&(0x7f0000001ec0)="397fb947b47374c8ba5710543d842be2c34d0bdb4fad", 0x16}], 0x3}}], 0x3, 0xc0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) sendto$inet(r0, &(0x7f0000001480)="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", 0x168, 0x98076b246f72a741, 0x0, 0x0) 96.033801ms ago: executing program 0 (id=7811): r0 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100000100000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x18) r2 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f0000000140)='./file0\x00') openat(r2, &(0x7f0000000700)='./file0/../file0\x00', 0x515a02, 0x52abe154ad664f64) (fail_nth: 5) 67.549551ms ago: executing program 2 (id=7812): open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, 0x0, 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 58.499081ms ago: executing program 6 (id=7813): r0 = io_uring_setup(0x79bf, &(0x7f00000002c0)={0x0, 0x0, 0x40, 0x4, 0x32f}) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000300000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000020000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x8957) r4 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 57.78424ms ago: executing program 3 (id=7814): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000fb"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc4042, 0x1ff) sendfile(r1, r1, 0x0, 0xfffe80) 17.14968ms ago: executing program 4 (id=7815): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = syz_io_uring_setup(0xe42, &(0x7f0000000140)={0x0, 0x2119, 0x400}, &(0x7f0000000240)=0x0, &(0x7f00000001c0)=0x0) open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r5 = dup(r4) write$P9_RLERRORu(r5, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r5, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000040)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000004c0)={0x0, 0x0, 0x32}, &(0x7f0000000500)='./file0\x00', 0x18}) io_uring_enter(r1, 0x47f6, 0x2000000, 0x0, 0x0, 0x0) 0s ago: executing program 6 (id=7816): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x18) pipe(&(0x7f00000002c0)) kernel console output (not intermixed with test programs): e854a1030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 449.312312][T19953] RAX: ffffffffffffffda RBX: 00007fbe87025fa0 RCX: 00007fbe86e3473c [ 449.320271][T19953] RDX: 000000000000000f RSI: 00007fbe854a10a0 RDI: 0000000000000006 [ 449.328278][T19953] RBP: 00007fbe854a1090 R08: 0000000000000000 R09: 0000000000000000 [ 449.336241][T19953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 449.344258][T19953] R13: 0000000000000000 R14: 00007fbe87025fa0 R15: 00007ffd275a52a8 [ 449.352232][T19953] [ 449.356967][T19956] netlink: 132 bytes leftover after parsing attributes in process `syz.4.6696'. [ 449.366829][T17664] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 449.444923][T19967] bridge0: entered promiscuous mode [ 449.457984][T19967] vlan0: entered promiscuous mode [ 449.467824][T19973] 9pnet_fd: Insufficient options for proto=fd [ 449.479074][T19967] bridge0: left promiscuous mode [ 449.506887][T19978] loop5: detected capacity change from 0 to 512 [ 449.508407][T19962] vcan0: entered promiscuous mode [ 449.521050][T19962] vlan0: entered promiscuous mode [ 449.527375][T19962] vcan0: left promiscuous mode [ 449.532497][T19978] loop5: detected capacity change from 0 to 2048 [ 449.637976][T19991] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19991 comm=syz.0.6713 [ 449.679415][T19998] syz_tun: entered promiscuous mode [ 449.697310][T19998] vlan0: entered promiscuous mode [ 449.710417][T19998] syz_tun: left promiscuous mode [ 449.733540][T20006] sit0: entered promiscuous mode [ 449.738518][T20006] vlan0: entered promiscuous mode [ 449.767672][T20006] sit0: left promiscuous mode [ 449.832212][T19991] vhci_hcd: default hub control req: a100 v0000 i0000 l0 [ 449.885430][T20019] Unknown options in mask 5 [ 449.916272][T20023] vcan0: entered promiscuous mode [ 449.921375][T20023] vlan0: entered promiscuous mode [ 449.928446][T20023] vcan0: left promiscuous mode [ 449.961848][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 450.039848][T20038] loop5: detected capacity change from 0 to 512 [ 450.083497][T20038] loop5: detected capacity change from 0 to 2048 [ 450.131529][T20052] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 450.140246][T20052] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 450.219593][T20059] sg_write: data in/out 14238/8 bytes for SCSI command 0xd0-- guessing data in; [ 450.219593][T20059] program syz.4.6732 not setting count and/or reply_len properly [ 450.576043][T20074] ip6_vti0: entered promiscuous mode [ 450.598836][T20074] vlan0: entered promiscuous mode [ 450.620776][T20074] ip6_vti0: left promiscuous mode [ 450.665346][T20077] gretap0: entered promiscuous mode [ 450.676581][T20077] gretap0: left promiscuous mode [ 450.992230][T20091] loop5: detected capacity change from 0 to 512 [ 451.011928][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 451.029541][ T29] kauditd_printk_skb: 995 callbacks suppressed [ 451.029555][ T29] audit: type=1326 audit(1736428870.448:24107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20088 comm="syz.5.6746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fb6c81a498a code=0x7ffc0000 [ 451.059751][T20091] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended [ 451.063260][ T29] audit: type=1326 audit(1736428870.478:24108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20088 comm="syz.5.6746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=258 compat=0 ip=0x7fb6c81a4597 code=0x7ffc0000 [ 451.068900][T20091] EXT4-fs (loop5): ea_inode feature is not supported for Hurd [ 451.092522][ T29] audit: type=1326 audit(1736428870.478:24109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20088 comm="syz.5.6746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7fb6c81a74ca code=0x7ffc0000 [ 451.127495][ T29] audit: type=1326 audit(1736428870.568:24110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20088 comm="syz.5.6746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fb6c81a4690 code=0x7ffc0000 [ 451.157770][ T29] audit: type=1326 audit(1736428870.598:24111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20088 comm="syz.5.6746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fb6c81a592b code=0x7ffc0000 [ 451.181425][ T29] audit: type=1326 audit(1736428870.598:24112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20088 comm="syz.5.6746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fb6c81a498a code=0x7ffc0000 [ 451.204860][ T29] audit: type=1326 audit(1736428870.598:24113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20088 comm="syz.5.6746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6c81a5d29 code=0x7ffc0000 [ 451.213333][T20094] dummy0: entered promiscuous mode [ 451.228606][ T29] audit: type=1326 audit(1736428870.598:24114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20088 comm="syz.5.6746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6c81a5d29 code=0x7ffc0000 [ 451.278430][T20105] random: crng reseeded on system resumption [ 451.281883][T20094] vlan0: entered promiscuous mode [ 451.301997][T20094] dummy0: left promiscuous mode [ 451.318948][T20101] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20101 comm=syz.4.6750 [ 451.339128][T20101] netlink: 'syz.4.6750': attribute type 1 has an invalid length. [ 451.342458][ T29] audit: type=1326 audit(1736428870.788:24115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20104 comm="syz.5.6751" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fb6c81a5d29 code=0x0 [ 451.396791][T20101] 8021q: adding VLAN 0 to HW filter on device bond2 [ 451.409848][T20112] 8021q: adding VLAN 0 to HW filter on device batadv2 [ 451.427487][T20112] bond2: (slave batadv2): making interface the new active one [ 451.436291][T20112] bond2: (slave batadv2): Enslaving as an active interface with an up link [ 451.506466][T20123] SELinux: Context Ü is not valid (left unmapped). [ 451.613644][ T29] audit: type=1326 audit(1736428871.048:24116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20131 comm="syz.2.6760" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd2ef655d29 code=0x7ffc0000 [ 451.720491][T20128] __nla_validate_parse: 3 callbacks suppressed [ 451.720505][T20128] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6758'. [ 451.858350][T20154] ip6tnl1: entered promiscuous mode [ 451.862030][T20155] sg_write: data in/out 14238/8 bytes for SCSI command 0xd0-- guessing data in; [ 451.862030][T20155] program syz.4.6763 not setting count and/or reply_len properly [ 451.863607][T20154] ip6tnl1: entered allmulticast mode [ 452.041837][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 452.138425][T20177] netlink: 16 bytes leftover after parsing attributes in process `syz.5.6776'. [ 452.150651][T20177] gretap0: entered promiscuous mode [ 452.165540][T20177] gretap0: left promiscuous mode [ 452.180458][T20180] sg_write: data in/out 14238/8 bytes for SCSI command 0xd0-- guessing data in; [ 452.180458][T20180] program syz.0.6779 not setting count and/or reply_len properly [ 452.227872][T20185] ip6tnl1: entered promiscuous mode [ 452.233239][T20185] ip6tnl1: entered allmulticast mode [ 452.244636][T20190] lo speed is unknown, defaulting to 1000 [ 452.250439][T20190] lo speed is unknown, defaulting to 1000 [ 452.257357][T20190] lo speed is unknown, defaulting to 1000 [ 452.265556][T20190] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 452.278922][T20190] lo speed is unknown, defaulting to 1000 [ 452.285123][T20190] lo speed is unknown, defaulting to 1000 [ 452.292406][T20190] lo speed is unknown, defaulting to 1000 [ 452.299077][T20190] lo speed is unknown, defaulting to 1000 [ 452.306121][T20190] lo speed is unknown, defaulting to 1000 [ 452.325938][T20193] serio: Serial port ptm0 [ 452.330767][T20190] lo speed is unknown, defaulting to 1000 [ 452.336818][T20190] lo speed is unknown, defaulting to 1000 [ 452.345152][T20190] lo speed is unknown, defaulting to 1000 [ 452.351393][T20190] lo speed is unknown, defaulting to 1000 [ 452.357419][T20190] lo speed is unknown, defaulting to 1000 [ 452.371111][T20197] sit0: entered promiscuous mode [ 452.378668][T20197] vlan0: entered promiscuous mode [ 452.385398][T20197] sit0: left promiscuous mode [ 452.401044][T20190] lo speed is unknown, defaulting to 1000 [ 452.407500][T20200] netlink: 'syz.2.6784': attribute type 3 has an invalid length. [ 452.416956][T20190] lo speed is unknown, defaulting to 1000 [ 452.432006][T20202] random: crng reseeded on system resumption [ 452.471225][T20190] lo speed is unknown, defaulting to 1000 [ 452.489087][T20190] lo speed is unknown, defaulting to 1000 [ 452.619695][T20218] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6786'. [ 452.817003][T20232] tipc: Enabling of bearer rejected, already enabled [ 453.091769][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 453.449833][T20239] lo speed is unknown, defaulting to 1000 [ 453.481416][T20239] lo speed is unknown, defaulting to 1000 [ 453.613393][T20243] loop5: detected capacity change from 0 to 512 [ 453.629557][T20243] /dev/loop5: Can't open blockdev [ 453.695209][T20249] loop5: detected capacity change from 0 to 512 [ 453.724128][T20249] loop5: detected capacity change from 0 to 2048 [ 453.736482][T20255] ip6_vti0: entered promiscuous mode [ 453.743554][T20255] vlan0: entered promiscuous mode [ 453.781040][T20255] ip6_vti0: left promiscuous mode [ 453.815481][T20264] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6808'. [ 453.862483][T20272] netlink: 16 bytes leftover after parsing attributes in process `syz.0.6813'. [ 453.863789][T20270] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6812'. [ 453.876626][T20268] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20268 comm=syz.4.6811 [ 453.894885][T20266] tipc: Enabling of bearer rejected, already enabled [ 453.905401][T20272] gretap0: entered promiscuous mode [ 453.913285][T20272] gretap0: left promiscuous mode [ 453.916468][T20268] netlink: 'syz.4.6811': attribute type 1 has an invalid length. [ 453.939395][T20274] loop5: detected capacity change from 0 to 512 [ 453.956026][T20274] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended [ 453.965209][T20274] EXT4-fs (loop5): ea_inode feature is not supported for Hurd [ 453.985825][T20268] 8021q: adding VLAN 0 to HW filter on device bond3 [ 454.007559][T20280] 8021q: adding VLAN 0 to HW filter on device batadv3 [ 454.044830][T20280] bond3: (slave batadv3): making interface the new active one [ 454.076188][T20280] bond3: (slave batadv3): Enslaving as an active interface with an up link [ 454.131819][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 454.138604][T20287] sit0: entered promiscuous mode [ 454.159572][T20287] vlan0: entered promiscuous mode [ 454.176198][T20287] sit0: left promiscuous mode [ 454.199278][T20299] ip6gre0: entered promiscuous mode [ 454.211841][T20299] vlan0: entered promiscuous mode [ 454.227976][T20299] ip6gre0: left promiscuous mode [ 454.320745][T20319] ip6tnl1: entered promiscuous mode [ 454.326142][T20319] ip6tnl1: entered allmulticast mode [ 454.467086][T20329] netlink: 8 bytes leftover after parsing attributes in process `syz.5.6836'. [ 454.914540][T20345] loop5: detected capacity change from 0 to 512 [ 454.940478][T20347] ip6gre0: entered promiscuous mode [ 454.972407][T20347] vlan0: entered promiscuous mode [ 455.040808][T20347] ip6gre0: left promiscuous mode [ 455.106992][T20345] loop5: detected capacity change from 0 to 2048 [ 455.161799][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 455.451221][T20366] vcan0: entered promiscuous mode [ 455.461235][T20366] vlan0: entered promiscuous mode [ 455.470578][T20366] vcan0: left promiscuous mode [ 455.561380][T20370] syz_tun: entered promiscuous mode [ 455.572082][T20370] vlan0: entered promiscuous mode [ 455.632854][T20370] syz_tun: left promiscuous mode [ 455.663054][T20343] Set syz1 is full, maxelem 65536 reached [ 455.722466][T20386] bridge0: entered promiscuous mode [ 455.727784][T20386] vlan0: entered promiscuous mode [ 455.753799][T20386] bridge0: left promiscuous mode [ 455.765600][T20384] ip6tnl1: entered promiscuous mode [ 455.770882][T20384] ip6tnl1: entered allmulticast mode [ 455.851272][T20398] 9pnet_fd: Insufficient options for proto=fd [ 456.067358][T20405] vcan0: entered promiscuous mode [ 456.072882][ T29] kauditd_printk_skb: 831 callbacks suppressed [ 456.072893][ T29] audit: type=1326 audit(1736428875.518:24948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20411 comm="syz.5.6869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6c81a5d29 code=0x7ffc0000 [ 456.114670][T20405] vlan0: entered promiscuous mode [ 456.121235][ T29] audit: type=1326 audit(1736428875.548:24949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20411 comm="syz.5.6869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6c81a5d29 code=0x7ffc0000 [ 456.145092][ T29] audit: type=1326 audit(1736428875.548:24950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20411 comm="syz.5.6869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb6c81a5d29 code=0x7ffc0000 [ 456.168876][ T29] audit: type=1326 audit(1736428875.548:24951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20411 comm="syz.5.6869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6c81a5d29 code=0x7ffc0000 [ 456.192529][ T29] audit: type=1326 audit(1736428875.548:24952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20411 comm="syz.5.6869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6c81a5d29 code=0x7ffc0000 [ 456.216136][ T29] audit: type=1326 audit(1736428875.548:24953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20411 comm="syz.5.6869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fb6c81a5d29 code=0x7ffc0000 [ 456.221865][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 456.239515][ T29] audit: type=1326 audit(1736428875.548:24954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20411 comm="syz.5.6869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6c81a5d29 code=0x7ffc0000 [ 456.270140][ T29] audit: type=1326 audit(1736428875.548:24955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20411 comm="syz.5.6869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6c81a5d29 code=0x7ffc0000 [ 456.274600][T20405] vcan0: left promiscuous mode [ 456.294032][ T29] audit: type=1326 audit(1736428875.548:24956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20411 comm="syz.5.6869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fb6c81a4690 code=0x7ffc0000 [ 456.322152][ T29] audit: type=1326 audit(1736428875.548:24957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20411 comm="syz.5.6869" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fb6c81a4690 code=0x7ffc0000 [ 456.458507][T20431] dummy0: entered promiscuous mode [ 456.463793][T20431] vlan0: entered promiscuous mode [ 456.473210][T20431] dummy0: left promiscuous mode [ 456.485926][T20436] random: crng reseeded on system resumption [ 456.497281][T20434] ip6tnl1: entered promiscuous mode [ 456.502528][T20434] ip6tnl1: entered allmulticast mode [ 456.607856][T20442] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20442 comm=syz.3.6881 [ 456.621662][T20442] netlink: 'syz.3.6881': attribute type 1 has an invalid length. [ 456.638588][T20442] 8021q: adding VLAN 0 to HW filter on device bond1 [ 456.704047][T20454] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6879'. [ 456.706069][T20442] 8021q: adding VLAN 0 to HW filter on device batadv2 [ 456.721375][T20442] bond1: (slave batadv2): making interface the new active one [ 456.729272][T20453] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6885'. [ 456.735716][T20442] bond1: (slave batadv2): Enslaving as an active interface with an up link [ 456.961678][T20476] ip6tnl0: entered promiscuous mode [ 456.967055][T20476] vlan0: entered promiscuous mode [ 456.976955][T20476] ip6tnl0: left promiscuous mode [ 457.019126][T20481] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6896'. [ 457.027120][T20461] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6888'. [ 457.052696][T20484] siw: device registration error -23 [ 457.058124][T20485] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6892'. [ 457.079259][T20487] loop5: detected capacity change from 0 to 512 [ 457.100856][T20487] loop5: detected capacity change from 0 to 2048 [ 457.251803][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 457.268422][T20497] loop5: detected capacity change from 0 to 512 [ 457.310000][T20497] loop5: detected capacity change from 0 to 2048 [ 457.357916][T20510] ip6tnl0: entered promiscuous mode [ 457.366374][T20510] vlan0: entered promiscuous mode [ 457.372867][T20510] ip6tnl0: left promiscuous mode [ 457.375759][T20513] 9pnet: p9_errstr2errno: server reported unknown error @í΂Í(ááí«QNd [ 457.487306][T20523] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6914'. [ 457.497478][T20523] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 457.501275][T20529] random: crng reseeded on system resumption [ 457.510859][T20523] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 457.539149][T20531] syz_tun: entered promiscuous mode [ 457.545884][T20531] vlan0: entered promiscuous mode [ 457.554419][T20531] syz_tun: left promiscuous mode [ 457.590553][T20535] loop5: detected capacity change from 0 to 512 [ 457.598861][T20535] EXT4-fs: inline encryption not supported [ 457.625554][T20535] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 457.628956][T20529] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6916'. [ 457.647070][T20535] ext4 filesystem being mounted at /210/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 457.676988][T20535] EXT4-fs error (device loop5): ext4_do_update_inode:5153: inode #2: comm syz.5.6918: corrupted inode contents [ 457.699536][T20535] EXT4-fs error (device loop5): ext4_dirty_inode:6041: inode #2: comm syz.5.6918: mark_inode_dirty error [ 457.715236][T20546] FAULT_INJECTION: forcing a failure. [ 457.715236][T20546] name failslab, interval 1, probability 0, space 0, times 0 [ 457.727929][T20546] CPU: 1 UID: 0 PID: 20546 Comm: syz.3.6921 Not tainted 6.13.0-rc6-syzkaller-00051-geea6e4b4dfb8 #0 [ 457.738766][T20546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 457.748816][T20546] Call Trace: [ 457.752086][T20546] [ 457.755005][T20546] dump_stack_lvl+0xf2/0x150 [ 457.759600][T20546] dump_stack+0x15/0x1a [ 457.763816][T20546] should_fail_ex+0x223/0x230 [ 457.768488][T20546] should_failslab+0x8f/0xb0 [ 457.773230][T20546] kmem_cache_alloc_noprof+0x52/0x320 [ 457.778594][T20546] ? vm_area_alloc+0x2c/0x130 [ 457.783305][T20546] vm_area_alloc+0x2c/0x130 [ 457.787825][T20546] __mmap_region+0x6b5/0x1400 [ 457.792544][T20546] mmap_region+0x18c/0x1e0 [ 457.796989][T20546] do_mmap+0x732/0xbb0 [ 457.801054][T20546] __se_sys_remap_file_pages+0x617/0x770 [ 457.806676][T20546] ? fput+0x1c4/0x200 [ 457.810661][T20546] ? ksys_write+0x176/0x1b0 [ 457.815158][T20546] __x64_sys_remap_file_pages+0x67/0x80 [ 457.820695][T20546] x64_sys_call+0x10b2/0x2dc0 [ 457.825363][T20546] do_syscall_64+0xc9/0x1c0 [ 457.829883][T20546] ? clear_bhb_loop+0x55/0xb0 [ 457.834550][T20546] ? clear_bhb_loop+0x55/0xb0 [ 457.839216][T20546] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 457.845216][T20546] RIP: 0033:0x7fbe86e35d29 [ 457.849616][T20546] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 457.869301][T20546] RSP: 002b:00007fbe854a1038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d8 [ 457.877754][T20546] RAX: ffffffffffffffda RBX: 00007fbe87025fa0 RCX: 00007fbe86e35d29 [ 457.885722][T20546] RDX: 0000000000000000 RSI: 0000000000001000 RDI: 000000002057a000 [ 457.893685][T20546] RBP: 00007fbe854a1090 R08: 00000000001c0000 R09: 0000000000000000 [ 457.901646][T20546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 457.909684][T20546] R13: 0000000000000000 R14: 00007fbe87025fa0 R15: 00007ffd275a52a8 [ 457.917651][T20546] [ 457.934995][T20535] EXT4-fs error (device loop5): ext4_do_update_inode:5153: inode #2: comm syz.5.6918: corrupted inode contents [ 457.948820][T20548] vcan0: entered promiscuous mode [ 457.976179][T17664] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 457.986081][T20548] vlan0: entered promiscuous mode [ 457.992709][T20548] vcan0: left promiscuous mode [ 458.012285][T20556] netlink: 'syz.4.6926': attribute type 1 has an invalid length. [ 458.050979][T20564] random: crng reseeded on system resumption [ 458.227869][T20579] FAULT_INJECTION: forcing a failure. [ 458.227869][T20579] name failslab, interval 1, probability 0, space 0, times 0 [ 458.240726][T20579] CPU: 1 UID: 0 PID: 20579 Comm: syz.2.6934 Not tainted 6.13.0-rc6-syzkaller-00051-geea6e4b4dfb8 #0 [ 458.251589][T20579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 458.261826][T20579] Call Trace: [ 458.265096][T20579] [ 458.268042][T20579] dump_stack_lvl+0xf2/0x150 [ 458.272650][T20579] dump_stack+0x15/0x1a [ 458.276854][T20579] should_fail_ex+0x223/0x230 [ 458.281547][T20579] should_failslab+0x8f/0xb0 [ 458.286158][T20579] kmem_cache_alloc_noprof+0x52/0x320 [ 458.291543][T20579] ? dst_alloc+0xc0/0x100 [ 458.291953][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 458.295917][T20579] dst_alloc+0xc0/0x100 [ 458.307084][T20579] ip_route_output_key_hash_rcu+0xb90/0x12d0 [ 458.313185][T20579] ip_route_output_flow+0x76/0x120 [ 458.318298][T20579] udp_sendmsg+0xe5d/0x12f0 [ 458.322802][T20579] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 458.328420][T20579] ? __rcu_read_unlock+0x4e/0x70 [ 458.333370][T20579] ? ip4_datagram_release_cb+0x3f9/0x430 [ 458.339008][T20579] ? __pfx_udp_sendmsg+0x10/0x10 [ 458.343945][T20579] inet_sendmsg+0xaf/0xd0 [ 458.348276][T20579] __sock_sendmsg+0x102/0x180 [ 458.353027][T20579] ____sys_sendmsg+0x312/0x410 [ 458.357786][T20579] __sys_sendmmsg+0x227/0x4b0 [ 458.362586][T20579] __x64_sys_sendmmsg+0x57/0x70 [ 458.367443][T20579] x64_sys_call+0x29aa/0x2dc0 [ 458.372152][T20579] do_syscall_64+0xc9/0x1c0 [ 458.376651][T20579] ? clear_bhb_loop+0x55/0xb0 [ 458.381381][T20579] ? clear_bhb_loop+0x55/0xb0 [ 458.386085][T20579] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 458.392024][T20579] RIP: 0033:0x7fd2ef655d29 [ 458.396428][T20579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 458.416229][T20579] RSP: 002b:00007fd2edcc7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 458.424752][T20579] RAX: ffffffffffffffda RBX: 00007fd2ef845fa0 RCX: 00007fd2ef655d29 [ 458.432720][T20579] RDX: 0000000000000001 RSI: 0000000020000780 RDI: 0000000000000004 [ 458.440716][T20579] RBP: 00007fd2edcc7090 R08: 0000000000000000 R09: 0000000000000000 [ 458.448678][T20579] R10: 0000000004008804 R11: 0000000000000246 R12: 0000000000000001 [ 458.456656][T20579] R13: 0000000000000000 R14: 00007fd2ef845fa0 R15: 00007fff1ce211b8 [ 458.461467][T20581] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6929'. [ 458.464631][T20579] [ 458.522824][T20589] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20589 comm=syz.0.6938 [ 458.535756][T20589] netlink: 'syz.0.6938': attribute type 1 has an invalid length. [ 458.553483][T20589] 8021q: adding VLAN 0 to HW filter on device bond1 [ 458.566270][T20589] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 458.574835][T20589] bond1: (slave batadv1): making interface the new active one [ 458.583511][T20589] bond1: (slave batadv1): Enslaving as an active interface with an up link [ 458.631128][T20598] vcan0: entered promiscuous mode [ 458.636385][T20598] vlan0: entered promiscuous mode [ 458.642247][T20598] vcan0: left promiscuous mode [ 458.650741][T20601] ip6tnl1: entered promiscuous mode [ 458.656067][T20601] ip6tnl1: entered allmulticast mode [ 458.777180][T20611] lo speed is unknown, defaulting to 1000 [ 458.804580][T20611] lo speed is unknown, defaulting to 1000 [ 458.934531][T20619] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20619 comm=syz.4.6951 [ 458.985029][T20620] netlink: 'syz.4.6951': attribute type 1 has an invalid length. [ 459.008965][T20623] siw: device registration error -23 [ 459.020032][T20620] 8021q: adding VLAN 0 to HW filter on device bond4 [ 459.039396][T20623] serio: Serial port ptm0 [ 459.047861][T20627] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=20627 comm=syz.0.6953 [ 459.062221][T20627] netlink: 3 bytes leftover after parsing attributes in process `syz.0.6953'. [ 459.064802][T20619] 8021q: adding VLAN 0 to HW filter on device batadv4 [ 459.079785][T20619] bond4: (slave batadv4): making interface the new active one [ 459.088398][T20619] bond4: (slave batadv4): Enslaving as an active interface with an up link [ 459.101384][T20627] batadv2: entered promiscuous mode [ 459.106650][T20627] batadv2: entered allmulticast mode [ 459.261422][T20647] random: crng reseeded on system resumption [ 459.331802][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 459.377427][T20654] netlink: 16 bytes leftover after parsing attributes in process `syz.3.6965'. [ 459.390837][T20654] gretap0: entered promiscuous mode [ 459.398128][T20654] gretap0: left promiscuous mode [ 459.454547][T20656] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6962'. [ 459.602815][T20672] bridge0: entered promiscuous mode [ 459.612272][T20672] vlan0: entered promiscuous mode [ 459.619780][T20672] bridge0: left promiscuous mode [ 459.780603][T20691] FAULT_INJECTION: forcing a failure. [ 459.780603][T20691] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 459.793845][T20691] CPU: 1 UID: 0 PID: 20691 Comm: syz.0.6978 Not tainted 6.13.0-rc6-syzkaller-00051-geea6e4b4dfb8 #0 [ 459.804644][T20691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 459.808895][T20686] bridge0: entered promiscuous mode [ 459.814689][T20691] Call Trace: [ 459.814698][T20691] [ 459.814705][T20691] dump_stack_lvl+0xf2/0x150 [ 459.819943][T20686] vlan0: entered promiscuous mode [ 459.823183][T20691] dump_stack+0x15/0x1a [ 459.839992][T20691] should_fail_ex+0x223/0x230 [ 459.844783][T20691] should_fail+0xb/0x10 [ 459.848935][T20691] should_fail_usercopy+0x1a/0x20 [ 459.853953][T20691] _copy_to_iter+0xd5/0xd00 [ 459.858526][T20691] ? mod_objcg_state+0x2ea/0x4f0 [ 459.863487][T20691] ? mod_objcg_state+0x2ea/0x4f0 [ 459.868415][T20691] ? should_fail_ex+0x31/0x230 [ 459.873172][T20691] copy_page_to_iter+0x171/0x2b0 [ 459.878180][T20691] sk_msg_recvmsg+0x1e4/0x840 [ 459.882859][T20691] unix_bpf_recvmsg+0x2a1/0x770 [ 459.887796][T20691] ? selinux_socket_recvmsg+0x185/0x1c0 [ 459.893368][T20691] unix_stream_recvmsg+0xae/0xf0 [ 459.898303][T20691] ? __pfx_unix_stream_read_actor+0x10/0x10 [ 459.904198][T20691] ? __pfx_unix_stream_recvmsg+0x10/0x10 [ 459.909894][T20691] sock_recvmsg+0x13f/0x170 [ 459.914459][T20691] ____sys_recvmsg+0xf9/0x280 [ 459.919148][T20691] __sys_recvmsg+0x1c0/0x260 [ 459.923768][T20691] __x64_sys_recvmsg+0x46/0x50 [ 459.928666][T20691] x64_sys_call+0xc64/0x2dc0 [ 459.933294][T20691] do_syscall_64+0xc9/0x1c0 [ 459.937838][T20691] ? clear_bhb_loop+0x55/0xb0 [ 459.942508][T20691] ? clear_bhb_loop+0x55/0xb0 [ 459.947251][T20691] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 459.953145][T20691] RIP: 0033:0x7f6e54545d29 [ 459.957622][T20691] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 459.977219][T20691] RSP: 002b:00007f6e52bb7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 459.985712][T20691] RAX: ffffffffffffffda RBX: 00007f6e54735fa0 RCX: 00007f6e54545d29 [ 459.993669][T20691] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000005 [ 460.001699][T20691] RBP: 00007f6e52bb7090 R08: 0000000000000000 R09: 0000000000000000 [ 460.009777][T20691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 460.017826][T20691] R13: 0000000000000000 R14: 00007f6e54735fa0 R15: 00007fffa0830948 [ 460.025803][T20691] [ 460.030166][T20686] bridge0: left promiscuous mode [ 460.170074][T20711] $Hÿ: renamed from bond0 (while UP) [ 460.190806][T20711] $Hÿ: entered promiscuous mode [ 460.195972][T20711] bond_slave_0: entered promiscuous mode [ 460.201774][T20711] bond_slave_1: entered promiscuous mode [ 460.297845][T20711] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=12 sclass=netlink_audit_socket pid=20711 comm=syz.3.6987 [ 460.361850][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 460.450641][T20747] syz.0.7002[20747] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 460.450741][T20747] syz.0.7002[20747] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 460.462517][T20747] syz.0.7002[20747] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 460.476449][T20747] FAULT_INJECTION: forcing a failure. [ 460.476449][T20747] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 460.500969][T20747] CPU: 0 UID: 0 PID: 20747 Comm: syz.0.7002 Not tainted 6.13.0-rc6-syzkaller-00051-geea6e4b4dfb8 #0 [ 460.511789][T20747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 460.521921][T20747] Call Trace: [ 460.525197][T20747] [ 460.528108][T20747] dump_stack_lvl+0xf2/0x150 [ 460.532695][T20747] dump_stack+0x15/0x1a [ 460.536939][T20747] should_fail_ex+0x223/0x230 [ 460.541609][T20747] should_fail+0xb/0x10 [ 460.545771][T20747] should_fail_usercopy+0x1a/0x20 [ 460.550921][T20747] copy_to_user_nofault+0x7d/0x110 [ 460.556017][T20747] bpf_probe_write_user+0x80/0xc0 [ 460.561169][T20747] bpf_prog_47333e4d9aed2554+0x5c/0x64 [ 460.566715][T20747] bpf_trace_run2+0x104/0x1d0 [ 460.571401][T20747] ? ida_alloc_range+0x673/0x6f0 [ 460.576332][T20747] ? ida_alloc_range+0x673/0x6f0 [ 460.581248][T20747] __traceiter_kfree+0x2b/0x50 [ 460.586032][T20747] ? ida_alloc_range+0x673/0x6f0 [ 460.590951][T20747] kfree+0x247/0x2f0 [ 460.594898][T20747] ida_alloc_range+0x673/0x6f0 [ 460.599644][T20747] ? __pfx_set_anon_super_fc+0x10/0x10 [ 460.605126][T20747] set_anon_super_fc+0x2b/0x80 [ 460.609874][T20747] sget_fc+0x2b8/0x670 [ 460.613993][T20747] ? __pfx_set_anon_super_fc+0x10/0x10 [ 460.619438][T20747] ? __pfx_ramfs_fill_super+0x10/0x10 [ 460.624850][T20747] get_tree_nodev+0x28/0xf0 [ 460.629405][T20747] ramfs_get_tree+0x1c/0x30 [ 460.633959][T20747] vfs_get_tree+0x56/0x1e0 [ 460.638385][T20747] vfs_cmd_create+0x83/0x130 [ 460.642962][T20747] __se_sys_fsconfig+0x6a3/0x980 [ 460.647886][T20747] __x64_sys_fsconfig+0x67/0x80 [ 460.652771][T20747] x64_sys_call+0x2b58/0x2dc0 [ 460.657436][T20747] do_syscall_64+0xc9/0x1c0 [ 460.662014][T20747] ? clear_bhb_loop+0x55/0xb0 [ 460.666797][T20747] ? clear_bhb_loop+0x55/0xb0 [ 460.671458][T20747] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 460.677349][T20747] RIP: 0033:0x7f6e54545d29 [ 460.681785][T20747] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 460.701389][T20747] RSP: 002b:00007f6e52bb7038 EFLAGS: 00000246 ORIG_RAX: 00000000000001af [ 460.709815][T20747] RAX: ffffffffffffffda RBX: 00007f6e54735fa0 RCX: 00007f6e54545d29 [ 460.717770][T20747] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000006 [ 460.725720][T20747] RBP: 00007f6e52bb7090 R08: 0000000000000000 R09: 0000000000000000 [ 460.733672][T20747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 460.741651][T20747] R13: 0000000000000000 R14: 00007f6e54735fa0 R15: 00007fffa0830948 [ 460.749663][T20747] [ 460.774777][T20751] tun0: tun_chr_ioctl cmd 1074025692 [ 460.784824][T20751] netlink: 'syz.5.7006': attribute type 1 has an invalid length. [ 460.800602][T20751] netlink: 'syz.5.7006': attribute type 1 has an invalid length. [ 460.813863][T20755] ip6tnl1: entered promiscuous mode [ 460.819086][T20755] ip6tnl1: entered allmulticast mode [ 460.875520][T20761] ip6tnl1: entered promiscuous mode [ 460.880780][T20761] ip6tnl1: entered allmulticast mode [ 460.909472][T20767] vcan0: entered promiscuous mode [ 460.915132][T20767] vlan0: entered promiscuous mode [ 460.922509][T20767] vcan0: left promiscuous mode [ 461.162080][ T29] kauditd_printk_skb: 908 callbacks suppressed [ 461.162096][ T29] audit: type=1326 audit(1736428880.518:25866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20785 comm="syz.3.7021" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 461.192316][ T29] audit: type=1326 audit(1736428880.518:25867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20785 comm="syz.3.7021" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 461.215980][ T29] audit: type=1326 audit(1736428880.518:25868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20785 comm="syz.3.7021" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 461.240161][ T29] audit: type=1326 audit(1736428880.518:25869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20785 comm="syz.3.7021" exe="/root/syz-executor" sig=0 arch=c000003e syscall=136 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 461.263954][ T29] audit: type=1326 audit(1736428880.518:25870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20785 comm="syz.3.7021" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 461.287807][ T29] audit: type=1326 audit(1736428880.518:25871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20785 comm="syz.3.7021" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 461.311522][ T29] audit: type=1326 audit(1736428880.518:25872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20785 comm="syz.3.7021" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 461.335174][ T29] audit: type=1326 audit(1736428880.518:25873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20785 comm="syz.3.7021" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 461.358800][ T29] audit: type=1326 audit(1736428880.518:25874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20785 comm="syz.3.7021" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 461.382435][ T29] audit: type=1326 audit(1736428880.518:25875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20785 comm="syz.3.7021" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 461.406065][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 461.667014][T20801] bridge0: entered promiscuous mode [ 461.699724][T20801] vlan0: entered promiscuous mode [ 461.708817][T20801] bridge0: left promiscuous mode [ 461.725990][T20806] gretap0: entered promiscuous mode [ 462.000958][T20806] gretap0: left promiscuous mode [ 462.043089][T20811] __nla_validate_parse: 5 callbacks suppressed [ 462.043103][T20811] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7029'. [ 462.114135][T20813] vcan0: entered promiscuous mode [ 462.119225][T20813] vlan0: entered promiscuous mode [ 462.135960][T20813] vcan0: left promiscuous mode [ 462.154597][T20822] ip6tnl1: entered promiscuous mode [ 462.159827][T20822] ip6tnl1: entered allmulticast mode [ 462.191256][T20825] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7033'. [ 462.277187][T20835] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20835 comm=syz.4.7039 [ 462.300301][T20835] netlink: 'syz.4.7039': attribute type 1 has an invalid length. [ 462.330020][T20842] loop5: detected capacity change from 0 to 512 [ 462.335903][T20835] 8021q: adding VLAN 0 to HW filter on device bond5 [ 462.367944][T20835] 8021q: adding VLAN 0 to HW filter on device batadv5 [ 462.376886][T20835] bond5: (slave batadv5): making interface the new active one [ 462.385644][T20835] bond5: (slave batadv5): Enslaving as an active interface with an up link [ 462.441854][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 462.563892][T20842] loop5: detected capacity change from 0 to 2048 [ 462.851690][T20854] netlink: 16 bytes leftover after parsing attributes in process `syz.4.7046'. [ 462.900751][T20854] gretap0: entered promiscuous mode [ 463.024039][T20847] netlink: 8 bytes leftover after parsing attributes in process `syz.3.7042'. [ 463.056360][T20854] gretap0: left promiscuous mode [ 463.108960][T20864] vcan0: entered promiscuous mode [ 463.114168][T20864] vlan0: entered promiscuous mode [ 463.123608][T20867] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20867 comm=syz.0.7051 [ 463.141842][T20864] vcan0: left promiscuous mode [ 463.142928][T20867] netlink: 'syz.0.7051': attribute type 1 has an invalid length. [ 463.188018][T20867] 8021q: adding VLAN 0 to HW filter on device bond2 [ 463.222896][T20867] 8021q: adding VLAN 0 to HW filter on device batadv2 [ 463.231857][T20867] bond2: (slave batadv2): making interface the new active one [ 463.241090][T20867] bond2: (slave batadv2): Enslaving as an active interface with an up link [ 463.257534][T20872] syz_tun: entered promiscuous mode [ 463.263160][T20872] vlan0: entered promiscuous mode [ 463.277463][T20872] syz_tun: left promiscuous mode [ 463.481798][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 463.898958][T20911] ip6tnl0: entered promiscuous mode [ 463.911906][T20911] vlan0: entered promiscuous mode [ 463.918219][T20911] ip6tnl0: left promiscuous mode [ 463.930004][T20900] loop5: detected capacity change from 0 to 1024 [ 463.937451][T20900] EXT4-fs: Ignoring removed nobh option [ 463.943052][T20900] EXT4-fs: Ignoring removed bh option [ 463.979258][T20900] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 464.001944][T20900] netlink: 8 bytes leftover after parsing attributes in process `syz.5.7064'. [ 464.029464][T20922] siw: device registration error -23 [ 464.048322][T20922] serio: Serial port ptm0 [ 464.144555][T17664] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 464.199037][T20937] dummy0: entered promiscuous mode [ 464.204894][T20937] vlan0: entered promiscuous mode [ 464.224369][T20937] dummy0: left promiscuous mode [ 464.306513][T20948] ip6tnl1: entered promiscuous mode [ 464.311797][T20948] ip6tnl1: entered allmulticast mode [ 464.521923][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 464.784256][T20966] loop5: detected capacity change from 0 to 512 [ 464.791491][T20966] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended [ 464.800599][T20966] EXT4-fs (loop5): ea_inode feature is not supported for Hurd [ 464.820008][T20960] netlink: 8 bytes leftover after parsing attributes in process `syz.4.7087'. [ 464.944158][T20982] siw: device registration error -23 [ 465.006672][T20987] FAULT_INJECTION: forcing a failure. [ 465.006672][T20987] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 465.019840][T20987] CPU: 1 UID: 0 PID: 20987 Comm: syz.4.7097 Not tainted 6.13.0-rc6-syzkaller-00051-geea6e4b4dfb8 #0 [ 465.030596][T20987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 465.040649][T20987] Call Trace: [ 465.043926][T20987] [ 465.046849][T20987] dump_stack_lvl+0xf2/0x150 [ 465.051434][T20987] dump_stack+0x15/0x1a [ 465.055595][T20987] should_fail_ex+0x223/0x230 [ 465.060262][T20987] should_fail+0xb/0x10 [ 465.064400][T20987] should_fail_usercopy+0x1a/0x20 [ 465.069413][T20987] strncpy_from_user+0x25/0x210 [ 465.074272][T20987] ? kmem_cache_alloc_noprof+0x18e/0x320 [ 465.079904][T20987] ? getname_flags+0x81/0x3b0 [ 465.084584][T20987] getname_flags+0xb0/0x3b0 [ 465.089086][T20987] getname+0x17/0x20 [ 465.093010][T20987] __se_sys_quotactl+0x15b/0x660 [ 465.098032][T20987] __x64_sys_quotactl+0x55/0x70 [ 465.102941][T20987] x64_sys_call+0x826/0x2dc0 [ 465.107513][T20987] do_syscall_64+0xc9/0x1c0 [ 465.112031][T20987] ? clear_bhb_loop+0x55/0xb0 [ 465.116772][T20987] ? clear_bhb_loop+0x55/0xb0 [ 465.121463][T20987] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 465.127375][T20987] RIP: 0033:0x7f9cc94f5d29 [ 465.131770][T20987] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 465.151505][T20987] RSP: 002b:00007f9cc7b61038 EFLAGS: 00000246 ORIG_RAX: 00000000000000b3 [ 465.159900][T20987] RAX: ffffffffffffffda RBX: 00007f9cc96e5fa0 RCX: 00007f9cc94f5d29 [ 465.167859][T20987] RDX: 0000000000000000 RSI: 00000000200006c0 RDI: ffffffff80000200 [ 465.175846][T20987] RBP: 00007f9cc7b61090 R08: 0000000000000000 R09: 0000000000000000 [ 465.183813][T20987] R10: 00000000200008c0 R11: 0000000000000246 R12: 0000000000000001 [ 465.191776][T20987] R13: 0000000000000000 R14: 00007f9cc96e5fa0 R15: 00007fffff527648 [ 465.199797][T20987] [ 465.351018][T21003] syz_tun: entered promiscuous mode [ 465.356317][T21003] vlan0: entered promiscuous mode [ 465.362301][T21003] syz_tun: left promiscuous mode [ 465.559350][T21022] FAULT_INJECTION: forcing a failure. [ 465.559350][T21022] name failslab, interval 1, probability 0, space 0, times 0 [ 465.572049][T21022] CPU: 1 UID: 0 PID: 21022 Comm: syz.4.7112 Not tainted 6.13.0-rc6-syzkaller-00051-geea6e4b4dfb8 #0 [ 465.581787][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 465.582983][T21022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 465.582997][T21022] Call Trace: [ 465.583004][T21022] [ 465.583012][T21022] dump_stack_lvl+0xf2/0x150 [ 465.610829][T21022] dump_stack+0x15/0x1a [ 465.615066][T21022] should_fail_ex+0x223/0x230 [ 465.619729][T21022] ? resv_map_alloc+0x57/0x190 [ 465.624484][T21022] should_failslab+0x8f/0xb0 [ 465.629139][T21022] __kmalloc_cache_noprof+0x4e/0x320 [ 465.634415][T21022] resv_map_alloc+0x57/0x190 [ 465.639138][T21022] hugetlbfs_get_inode+0x64/0x380 [ 465.644151][T21022] hugetlb_file_setup+0x188/0x3c0 [ 465.649158][T21022] ksys_mmap_pgoff+0x172/0x330 [ 465.653910][T21022] x64_sys_call+0x1940/0x2dc0 [ 465.658567][T21022] do_syscall_64+0xc9/0x1c0 [ 465.663054][T21022] ? clear_bhb_loop+0x55/0xb0 [ 465.667714][T21022] ? clear_bhb_loop+0x55/0xb0 [ 465.672510][T21022] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 465.678395][T21022] RIP: 0033:0x7f9cc94f5d29 [ 465.682804][T21022] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 465.702409][T21022] RSP: 002b:00007f9cc7b61038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 465.710810][T21022] RAX: ffffffffffffffda RBX: 00007f9cc96e5fa0 RCX: 00007f9cc94f5d29 [ 465.718764][T21022] RDX: 0000000000000000 RSI: 0000000000c00008 RDI: 0000000020400000 [ 465.726788][T21022] RBP: 00007f9cc7b61090 R08: ffffffffffffffff R09: 0000000000000000 [ 465.734784][T21022] R10: 0000000000050032 R11: 0000000000000246 R12: 0000000000000001 [ 465.742755][T21022] R13: 0000000000000000 R14: 00007f9cc96e5fa0 R15: 00007fffff527648 [ 465.750741][T21022] [ 465.893971][T21035] vcan0: entered promiscuous mode [ 465.899153][T21035] vlan0: entered promiscuous mode [ 465.905493][T21035] vcan0: left promiscuous mode [ 466.009771][T21047] syz_tun: entered promiscuous mode [ 466.019703][T21047] vlan0: entered promiscuous mode [ 466.025854][T21047] syz_tun: left promiscuous mode [ 466.039008][T21048] syz_tun: entered promiscuous mode [ 466.044279][T21048] vlan0: entered promiscuous mode [ 466.050065][T21048] syz_tun: left promiscuous mode [ 466.097782][T21055] siw: device registration error -23 [ 466.100854][T21056] loop5: detected capacity change from 0 to 512 [ 466.136735][T21056] loop5: detected capacity change from 0 to 2048 [ 466.182877][ T29] kauditd_printk_skb: 708 callbacks suppressed [ 466.182890][ T29] audit: type=1326 audit(1736428885.628:26584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21053 comm="syz.5.7126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=262 compat=0 ip=0x7fb6c81a453a code=0x7ffc0000 [ 466.212748][ T29] audit: type=1326 audit(1736428885.628:26585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21053 comm="syz.5.7126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=262 compat=0 ip=0x7fb6c81a453a code=0x7ffc0000 [ 466.236462][ T29] audit: type=1326 audit(1736428885.628:26586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21053 comm="syz.5.7126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=262 compat=0 ip=0x7fb6c81a453a code=0x7ffc0000 [ 466.260089][ T29] audit: type=1326 audit(1736428885.628:26587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21053 comm="syz.5.7126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=262 compat=0 ip=0x7fb6c81a453a code=0x7ffc0000 [ 466.283716][ T29] audit: type=1326 audit(1736428885.628:26588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21053 comm="syz.5.7126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=262 compat=0 ip=0x7fb6c81a453a code=0x7ffc0000 [ 466.288523][T21064] netlink: 'syz.3.7128': attribute type 3 has an invalid length. [ 466.307400][ T29] audit: type=1326 audit(1736428885.628:26589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21053 comm="syz.5.7126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=262 compat=0 ip=0x7fb6c81a453a code=0x7ffc0000 [ 466.338776][ T29] audit: type=1326 audit(1736428885.628:26590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21053 comm="syz.5.7126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=262 compat=0 ip=0x7fb6c81a453a code=0x7ffc0000 [ 466.362661][ T29] audit: type=1326 audit(1736428885.628:26591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21053 comm="syz.5.7126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fb6c81a498a code=0x7ffc0000 [ 466.386537][ T29] audit: type=1326 audit(1736428885.628:26592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21053 comm="syz.5.7126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb6c81a5d29 code=0x7ffc0000 [ 466.410238][ T29] audit: type=1326 audit(1736428885.628:26593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21053 comm="syz.5.7126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=64 compat=0 ip=0x7fb6c81a5d29 code=0x7ffc0000 [ 466.483400][T21075] FAULT_INJECTION: forcing a failure. [ 466.483400][T21075] name failslab, interval 1, probability 0, space 0, times 0 [ 466.496977][T21075] CPU: 0 UID: 0 PID: 21075 Comm: syz.4.7135 Not tainted 6.13.0-rc6-syzkaller-00051-geea6e4b4dfb8 #0 [ 466.507747][T21075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 466.517805][T21075] Call Trace: [ 466.521084][T21075] [ 466.524010][T21075] dump_stack_lvl+0xf2/0x150 [ 466.528675][T21075] dump_stack+0x15/0x1a [ 466.532843][T21075] should_fail_ex+0x223/0x230 [ 466.537520][T21075] should_failslab+0x8f/0xb0 [ 466.542112][T21075] kmem_cache_alloc_noprof+0x52/0x320 [ 466.547474][T21075] ? proc_net_ns_init+0x2f/0x1f0 [ 466.552437][T21075] proc_net_ns_init+0x2f/0x1f0 [ 466.557246][T21075] ops_init+0x1c9/0x260 [ 466.561397][T21075] setup_net+0x14d/0x600 [ 466.565645][T21075] copy_net_ns+0x290/0x430 [ 466.570056][T21075] create_new_namespaces+0x228/0x430 [ 466.575395][T21075] unshare_nsproxy_namespaces+0xe6/0x120 [ 466.581025][T21075] ksys_unshare+0x3c9/0x6e0 [ 466.585520][T21075] __x64_sys_unshare+0x1f/0x30 [ 466.590326][T21075] x64_sys_call+0x1a3e/0x2dc0 [ 466.595046][T21075] do_syscall_64+0xc9/0x1c0 [ 466.599552][T21075] ? clear_bhb_loop+0x55/0xb0 [ 466.604220][T21075] ? clear_bhb_loop+0x55/0xb0 [ 466.608898][T21075] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 466.614846][T21075] RIP: 0033:0x7f9cc94f5d29 [ 466.619319][T21075] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 466.638984][T21075] RSP: 002b:00007f9cc7b61038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 466.647386][T21075] RAX: ffffffffffffffda RBX: 00007f9cc96e5fa0 RCX: 00007f9cc94f5d29 [ 466.655347][T21075] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 466.663305][T21075] RBP: 00007f9cc7b61090 R08: 0000000000000000 R09: 0000000000000000 [ 466.671268][T21075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 466.679289][T21075] R13: 0000000000000000 R14: 00007f9cc96e5fa0 R15: 00007fffff527648 [ 466.687254][T21075] [ 466.690501][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 466.757739][T21086] bridge0: entered promiscuous mode [ 466.767043][T21086] vlan0: entered promiscuous mode [ 466.774140][T21086] bridge0: left promiscuous mode [ 466.777395][T21089] serio: Serial port ptm0 [ 466.857932][T21097] syz.4.7143[21097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.858036][T21097] syz.4.7143[21097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.896105][T21097] syz.4.7143[21097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.910463][T21097] syz.4.7143[21097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.927679][T21097] syz.4.7143[21097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 466.939535][T21097] syz.4.7143[21097] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 467.137588][T21120] FAULT_INJECTION: forcing a failure. [ 467.137588][T21120] name failslab, interval 1, probability 0, space 0, times 0 [ 467.161836][T21120] CPU: 1 UID: 0 PID: 21120 Comm: syz.4.7152 Not tainted 6.13.0-rc6-syzkaller-00051-geea6e4b4dfb8 #0 [ 467.172605][T21120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 467.182663][T21120] Call Trace: [ 467.186006][T21120] [ 467.188980][T21120] dump_stack_lvl+0xf2/0x150 [ 467.193587][T21120] dump_stack+0x15/0x1a [ 467.197885][T21120] should_fail_ex+0x223/0x230 [ 467.202560][T21120] should_failslab+0x8f/0xb0 [ 467.207197][T21120] kmem_cache_alloc_noprof+0x52/0x320 [ 467.212637][T21120] ? sk_prot_alloc+0x41/0x190 [ 467.217369][T21120] sk_prot_alloc+0x41/0x190 [ 467.222034][T21120] sk_alloc+0x33/0x360 [ 467.226106][T21120] ? inet6_create+0x397/0x840 [ 467.230853][T21120] inet6_create+0x3b6/0x840 [ 467.235390][T21120] __sock_create+0x2e9/0x5a0 [ 467.240036][T21120] sock_create_kern+0x38/0x50 [ 467.244900][T21120] mptcp_subflow_create_socket+0x84/0x710 [ 467.250700][T21120] ? avc_has_perm_noaudit+0x1cc/0x210 [ 467.256092][T21120] __mptcp_nmpc_sk+0xb4/0x3c0 [ 467.260792][T21120] mptcp_connect+0x59/0x760 [ 467.265386][T21120] __inet_stream_connect+0x162/0x790 [ 467.270676][T21120] ? _raw_spin_unlock_bh+0x36/0x40 [ 467.275833][T21120] ? release_sock+0x117/0x150 [ 467.280533][T21120] ? _raw_spin_unlock_bh+0x36/0x40 [ 467.285637][T21120] ? lock_sock_nested+0x10f/0x140 [ 467.290655][T21120] ? selinux_netlbl_socket_connect+0x113/0x130 [ 467.296803][T21120] inet_stream_connect+0x48/0x70 [ 467.301738][T21120] ? __pfx_inet_stream_connect+0x10/0x10 [ 467.307388][T21120] __sys_connect+0x18f/0x1b0 [ 467.311976][T21120] __x64_sys_connect+0x41/0x50 [ 467.316731][T21120] x64_sys_call+0x22a7/0x2dc0 [ 467.321407][T21120] do_syscall_64+0xc9/0x1c0 [ 467.325940][T21120] ? clear_bhb_loop+0x55/0xb0 [ 467.330668][T21120] ? clear_bhb_loop+0x55/0xb0 [ 467.335419][T21120] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 467.341316][T21120] RIP: 0033:0x7f9cc94f5d29 [ 467.345761][T21120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 467.365482][T21120] RSP: 002b:00007f9cc7b61038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 467.373884][T21120] RAX: ffffffffffffffda RBX: 00007f9cc96e5fa0 RCX: 00007f9cc94f5d29 [ 467.381847][T21120] RDX: 000000000000001c RSI: 0000000020000180 RDI: 0000000000000004 [ 467.389868][T21120] RBP: 00007f9cc7b61090 R08: 0000000000000000 R09: 0000000000000000 [ 467.397829][T21120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 467.406180][T21120] R13: 0000000000000000 R14: 00007f9cc96e5fa0 R15: 00007fffff527648 [ 467.414150][T21120] [ 467.421012][T21118] netlink: 252 bytes leftover after parsing attributes in process `syz.3.7151'. [ 467.602379][T21127] bridge0: entered promiscuous mode [ 467.607717][T21127] vlan0: entered promiscuous mode [ 467.615010][T21127] bridge0: left promiscuous mode [ 467.721823][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 468.030762][T21115] syz.3.7151 (21115) used greatest stack depth: 6232 bytes left [ 468.378851][T21168] 9pnet: Could not find request transport: f [ 468.538746][T21173] netlink: 16 bytes leftover after parsing attributes in process `syz.0.7173'. [ 468.550338][T21173] gretap0: entered promiscuous mode [ 468.558160][T21173] gretap0: left promiscuous mode [ 468.596649][T21175] bridge0: entered promiscuous mode [ 468.601973][T21175] vlan0: entered promiscuous mode [ 468.608189][T21175] bridge0: left promiscuous mode [ 468.678119][T21182] 9pnet: Could not find request transport: f [ 468.761858][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 468.853046][T21202] 9pnet: Could not find request transport: f [ 468.872022][T21205] netlink: 16 bytes leftover after parsing attributes in process `syz.2.7185'. [ 468.883879][T21205] gretap0: entered promiscuous mode [ 468.895865][T21205] gretap0: left promiscuous mode [ 469.019128][T21221] netlink: 4 bytes leftover after parsing attributes in process `syz.3.7190'. [ 469.058116][T21225] ip6tnl0: entered promiscuous mode [ 469.068986][T21225] vlan0: entered promiscuous mode [ 469.076326][T21225] ip6tnl0: left promiscuous mode [ 469.128407][T21235] netlink: 16 bytes leftover after parsing attributes in process `syz.5.7195'. [ 469.156973][T21235] gretap0: entered promiscuous mode [ 469.185096][T21235] gretap0: left promiscuous mode [ 469.269363][T21247] ip6tnl0: entered promiscuous mode [ 469.276202][T21247] vlan0: entered promiscuous mode [ 469.285547][T21247] ip6tnl0: left promiscuous mode [ 469.333328][T21255] netlink: 4 bytes leftover after parsing attributes in process `syz.0.7204'. [ 469.495381][T21280] syz_tun: entered promiscuous mode [ 469.500805][T21280] vlan0: entered promiscuous mode [ 469.508018][T21280] syz_tun: left promiscuous mode [ 469.597376][T21291] ip6tnl0: entered promiscuous mode [ 469.602866][T21291] vlan0: entered promiscuous mode [ 469.609032][T21291] ip6tnl0: left promiscuous mode [ 469.797904][T21297] loop5: detected capacity change from 0 to 1024 [ 469.804324][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 469.814117][T21297] EXT4-fs: Ignoring removed nobh option [ 469.819743][T21297] EXT4-fs: Ignoring removed bh option [ 469.835364][T21297] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 469.849120][T21297] netlink: 8 bytes leftover after parsing attributes in process `syz.5.7221'. [ 469.954827][T17664] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 470.586329][T21348] dummy0: entered promiscuous mode [ 470.591674][T21348] vlan0: entered promiscuous mode [ 470.604328][T21348] dummy0: left promiscuous mode [ 470.632723][T21342] loop5: detected capacity change from 0 to 1024 [ 470.639385][T21342] EXT4-fs: Ignoring removed nobh option [ 470.645119][T21342] EXT4-fs: Ignoring removed bh option [ 470.663292][T21342] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 470.676801][T21342] netlink: 8 bytes leftover after parsing attributes in process `syz.5.7237'. [ 470.739312][T21361] 9pnet: Could not find request transport: f [ 470.810009][T17664] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 470.851912][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 470.934835][T21382] ip6tnl0: entered promiscuous mode [ 470.940183][T21382] vlan0: entered promiscuous mode [ 470.948464][T21382] ip6tnl0: left promiscuous mode [ 471.177495][T21413] random: crng reseeded on system resumption [ 471.246714][ T29] kauditd_printk_skb: 600 callbacks suppressed [ 471.246726][ T29] audit: type=1326 audit(1736428890.638:27194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21409 comm="syz.4.7265" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9cc94f5d29 code=0x7ffc0000 [ 471.276823][ T29] audit: type=1326 audit(1736428890.638:27195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21409 comm="syz.4.7265" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9cc94f5d29 code=0x7ffc0000 [ 471.300451][ T29] audit: type=1326 audit(1736428890.638:27196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21409 comm="syz.4.7265" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9cc94f5d29 code=0x7ffc0000 [ 471.324071][ T29] audit: type=1326 audit(1736428890.638:27197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21409 comm="syz.4.7265" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9cc94f5d29 code=0x7ffc0000 [ 471.347704][ T29] audit: type=1326 audit(1736428890.638:27198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21409 comm="syz.4.7265" exe="/root/syz-executor" sig=0 arch=c000003e syscall=261 compat=0 ip=0x7f9cc94f5d29 code=0x7ffc0000 [ 471.371431][ T29] audit: type=1326 audit(1736428890.638:27199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21409 comm="syz.4.7265" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9cc94f5d29 code=0x7ffc0000 [ 471.395414][ T29] audit: type=1326 audit(1736428890.638:27200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21409 comm="syz.4.7265" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f9cc94f5d29 code=0x7ffc0000 [ 471.418815][ T29] audit: type=1326 audit(1736428890.638:27201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21409 comm="syz.4.7265" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9cc94f5d29 code=0x7ffc0000 [ 471.442941][ T29] audit: type=1326 audit(1736428890.638:27202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21409 comm="syz.4.7265" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f9cc94f5d29 code=0x7ffc0000 [ 471.466493][ T29] audit: type=1326 audit(1736428890.638:27203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21409 comm="syz.4.7265" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9cc94f5d29 code=0x7ffc0000 [ 471.497170][T21403] loop5: detected capacity change from 0 to 1024 [ 471.506859][T21403] EXT4-fs: Ignoring removed nobh option [ 471.512482][T21403] EXT4-fs: Ignoring removed bh option [ 471.525607][T21403] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 471.540644][T21403] netlink: 8 bytes leftover after parsing attributes in process `syz.5.7262'. [ 471.729998][T17664] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 471.891751][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 471.925556][T21442] ip6tnl0: entered promiscuous mode [ 471.930975][T21442] vlan0: entered promiscuous mode [ 471.937223][T21442] ip6tnl0: left promiscuous mode [ 472.026361][T21450] loop5: detected capacity change from 0 to 512 [ 472.047233][T21450] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended [ 472.056353][T21450] EXT4-fs (loop5): ea_inode feature is not supported for Hurd [ 472.081271][T21452] vcan0: entered promiscuous mode [ 472.086841][T21452] vlan0: entered promiscuous mode [ 472.093645][T21452] vcan0: left promiscuous mode [ 472.136095][T21462] FAULT_INJECTION: forcing a failure. [ 472.136095][T21462] name failslab, interval 1, probability 0, space 0, times 0 [ 472.149143][T21462] CPU: 1 UID: 0 PID: 21462 Comm: syz.5.7285 Not tainted 6.13.0-rc6-syzkaller-00051-geea6e4b4dfb8 #0 [ 472.159915][T21462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 472.170017][T21462] Call Trace: [ 472.173364][T21462] [ 472.176297][T21462] dump_stack_lvl+0xf2/0x150 [ 472.180964][T21462] dump_stack+0x15/0x1a [ 472.185199][T21462] should_fail_ex+0x223/0x230 [ 472.189880][T21462] should_failslab+0x8f/0xb0 [ 472.194481][T21462] kmem_cache_alloc_node_noprof+0x59/0x320 [ 472.200323][T21462] ? __alloc_skb+0x10b/0x310 [ 472.204980][T21462] __alloc_skb+0x10b/0x310 [ 472.209452][T21462] netlink_alloc_large_skb+0xad/0xe0 [ 472.214744][T21462] netlink_sendmsg+0x3b4/0x6e0 [ 472.219524][T21462] ? __pfx_netlink_sendmsg+0x10/0x10 [ 472.224882][T21462] __sock_sendmsg+0x140/0x180 [ 472.229690][T21462] ____sys_sendmsg+0x312/0x410 [ 472.234477][T21462] __sys_sendmsg+0x19d/0x230 [ 472.239127][T21462] __x64_sys_sendmsg+0x46/0x50 [ 472.243946][T21462] x64_sys_call+0x2734/0x2dc0 [ 472.248619][T21462] do_syscall_64+0xc9/0x1c0 [ 472.253115][T21462] ? clear_bhb_loop+0x55/0xb0 [ 472.257788][T21462] ? clear_bhb_loop+0x55/0xb0 [ 472.262457][T21462] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 472.268422][T21462] RIP: 0033:0x7fb6c81a5d29 [ 472.272895][T21462] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 472.292690][T21462] RSP: 002b:00007fb6c6811038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 472.301097][T21462] RAX: ffffffffffffffda RBX: 00007fb6c8395fa0 RCX: 00007fb6c81a5d29 [ 472.309055][T21462] RDX: 0000000020000010 RSI: 0000000020001000 RDI: 000000000000000b [ 472.317093][T21462] RBP: 00007fb6c6811090 R08: 0000000000000000 R09: 0000000000000000 [ 472.325092][T21462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 472.333053][T21462] R13: 0000000000000000 R14: 00007fb6c8395fa0 R15: 00007ffdbf210e78 [ 472.341020][T21462] [ 472.362488][T21462] netlink: 24 bytes leftover after parsing attributes in process `syz.5.7285'. [ 472.389835][T21469] FAULT_INJECTION: forcing a failure. [ 472.389835][T21469] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 472.403041][T21469] CPU: 0 UID: 0 PID: 21469 Comm: syz.2.7287 Not tainted 6.13.0-rc6-syzkaller-00051-geea6e4b4dfb8 #0 [ 472.413806][T21469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 472.423859][T21469] Call Trace: [ 472.427183][T21469] [ 472.430151][T21469] dump_stack_lvl+0xf2/0x150 [ 472.434814][T21469] dump_stack+0x15/0x1a [ 472.438970][T21469] should_fail_ex+0x223/0x230 [ 472.443645][T21469] should_fail+0xb/0x10 [ 472.447814][T21469] should_fail_usercopy+0x1a/0x20 [ 472.452961][T21469] _copy_from_user+0x1e/0xb0 [ 472.457547][T21469] ip6_tnl_siocdevprivate+0x131/0x770 [ 472.462939][T21469] ? __pfx_ip6_tnl_siocdevprivate+0x10/0x10 [ 472.468907][T21469] dev_ifsioc+0x84e/0xa10 [ 472.473228][T21469] dev_ioctl+0x8e9/0xab0 [ 472.477462][T21469] sock_ioctl+0x57d/0x600 [ 472.481829][T21469] ? __pfx_sock_ioctl+0x10/0x10 [ 472.486746][T21469] __se_sys_ioctl+0xc9/0x140 [ 472.491394][T21469] __x64_sys_ioctl+0x43/0x50 [ 472.495976][T21469] x64_sys_call+0x1690/0x2dc0 [ 472.500645][T21469] do_syscall_64+0xc9/0x1c0 [ 472.505200][T21469] ? clear_bhb_loop+0x55/0xb0 [ 472.509948][T21469] ? clear_bhb_loop+0x55/0xb0 [ 472.514613][T21469] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 472.520532][T21469] RIP: 0033:0x7fd2ef655d29 [ 472.524984][T21469] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 472.544581][T21469] RSP: 002b:00007fd2edcc7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 472.552982][T21469] RAX: ffffffffffffffda RBX: 00007fd2ef845fa0 RCX: 00007fd2ef655d29 [ 472.561001][T21469] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000007 [ 472.568959][T21469] RBP: 00007fd2edcc7090 R08: 0000000000000000 R09: 0000000000000000 [ 472.576919][T21469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 472.585015][T21469] R13: 0000000000000000 R14: 00007fd2ef845fa0 R15: 00007fff1ce211b8 [ 472.592980][T21469] [ 472.600233][T21462] netlink: 4 bytes leftover after parsing attributes in process `syz.5.7285'. [ 472.609154][T21462] netlink: 4 bytes leftover after parsing attributes in process `syz.5.7285'. [ 472.618313][T21462] netlink: 4 bytes leftover after parsing attributes in process `syz.5.7285'. [ 472.776091][T21482] netlink: 133492 bytes leftover after parsing attributes in process `syz.3.7293'. [ 472.797775][T21484] netlink: 40 bytes leftover after parsing attributes in process `syz.2.7294'. [ 472.810623][T21490] loop5: detected capacity change from 0 to 128 [ 472.826112][T21494] vcan0: entered promiscuous mode [ 472.831682][T21494] vlan0: entered promiscuous mode [ 472.838629][T21494] vcan0: left promiscuous mode [ 472.854175][T21490] nlmon0: entered promiscuous mode [ 472.859573][T21490] vlan0: entered promiscuous mode [ 472.868114][T21490] nlmon0: left promiscuous mode [ 472.921843][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 472.980901][T21513] loop5: detected capacity change from 0 to 512 [ 473.046218][T21513] loop5: detected capacity change from 0 to 2048 [ 473.047474][T21521] syz_tun: entered promiscuous mode [ 473.074663][T21521] vlan0: entered promiscuous mode [ 473.091750][T21521] syz_tun: left promiscuous mode [ 473.159405][T21537] loop5: detected capacity change from 0 to 512 [ 473.185734][T21537] loop5: detected capacity change from 0 to 2048 [ 473.213102][T21541] dummy0: entered promiscuous mode [ 473.219814][T21541] vlan0: entered promiscuous mode [ 473.240549][T21541] dummy0: left promiscuous mode [ 473.308578][T21551] 9pnet: Could not find request transport: f [ 473.317209][T21554] FAULT_INJECTION: forcing a failure. [ 473.317209][T21554] name failslab, interval 1, probability 0, space 0, times 0 [ 473.329878][T21554] CPU: 1 UID: 0 PID: 21554 Comm: syz.5.7325 Not tainted 6.13.0-rc6-syzkaller-00051-geea6e4b4dfb8 #0 [ 473.340675][T21554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 473.350730][T21554] Call Trace: [ 473.354006][T21554] [ 473.356987][T21554] dump_stack_lvl+0xf2/0x150 [ 473.361696][T21554] dump_stack+0x15/0x1a [ 473.365856][T21554] should_fail_ex+0x223/0x230 [ 473.370560][T21554] should_failslab+0x8f/0xb0 [ 473.375149][T21554] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 473.381468][T21554] ? sidtab_sid2str_get+0xb8/0x140 [ 473.386628][T21554] kmemdup_noprof+0x2a/0x60 [ 473.391182][T21554] sidtab_sid2str_get+0xb8/0x140 [ 473.396115][T21554] security_sid_to_context_core+0x1eb/0x2f0 [ 473.402083][T21554] security_sid_to_context+0x27/0x30 [ 473.407359][T21554] selinux_lsmprop_to_secctx+0x2c/0x40 [ 473.412819][T21554] security_lsmprop_to_secctx+0x4a/0x90 [ 473.418378][T21554] audit_log_task_context+0x93/0x1c0 [ 473.423661][T21554] audit_log_task+0xf9/0x1c0 [ 473.428311][T21554] audit_seccomp+0x68/0x130 [ 473.432922][T21554] __seccomp_filter+0x6fa/0x1180 [ 473.438014][T21554] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 473.443710][T21554] ? vfs_write+0x596/0x920 [ 473.448198][T21554] ? putname+0xcf/0xf0 [ 473.452263][T21554] __secure_computing+0x9f/0x1c0 [ 473.457196][T21554] syscall_trace_enter+0xd1/0x1f0 [ 473.462220][T21554] ? fpregs_assert_state_consistent+0x83/0xa0 [ 473.468314][T21554] do_syscall_64+0xaa/0x1c0 [ 473.472881][T21554] ? clear_bhb_loop+0x55/0xb0 [ 473.477579][T21554] ? clear_bhb_loop+0x55/0xb0 [ 473.482278][T21554] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 473.488183][T21554] RIP: 0033:0x7fb6c81a5d29 [ 473.492589][T21554] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 473.512224][T21554] RSP: 002b:00007fb6c6811038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 473.520630][T21554] RAX: ffffffffffffffda RBX: 00007fb6c8395fa0 RCX: 00007fb6c81a5d29 [ 473.528645][T21554] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffffff [ 473.536737][T21554] RBP: 00007fb6c6811090 R08: 0000000000000000 R09: 0000000000000000 [ 473.544699][T21554] R10: 0000000000000042 R11: 0000000000000246 R12: 0000000000000001 [ 473.552658][T21554] R13: 0000000000000000 R14: 00007fb6c8395fa0 R15: 00007ffdbf210e78 [ 473.560624][T21554] [ 473.689719][T21571] 9pnet: Could not find request transport: f [ 473.747722][T21580] 9pnet: Could not find request transport: f [ 473.971764][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 474.009542][T21611] ip6tnl0: entered promiscuous mode [ 474.042424][T21611] vlan0: entered promiscuous mode [ 474.057353][T21611] ip6tnl0: left promiscuous mode [ 474.094686][T21618] 9pnet: Could not find request transport: f [ 474.176159][T21625] ip6tnl1: entered promiscuous mode [ 474.181456][T21625] ip6tnl1: entered allmulticast mode [ 474.245785][T21627] dummy0: entered promiscuous mode [ 474.251037][T21627] vlan0: entered promiscuous mode [ 474.259147][T21627] dummy0: left promiscuous mode [ 474.351137][T21642] 9pnet: Could not find request transport: f [ 474.358277][T21647] FAULT_INJECTION: forcing a failure. [ 474.358277][T21647] name failslab, interval 1, probability 0, space 0, times 0 [ 474.371076][T21647] CPU: 0 UID: 0 PID: 21647 Comm: syz.4.7364 Not tainted 6.13.0-rc6-syzkaller-00051-geea6e4b4dfb8 #0 [ 474.378993][T21649] netlink: 133536 bytes leftover after parsing attributes in process `syz.3.7365'. [ 474.381834][T21647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 474.381848][T21647] Call Trace: [ 474.381854][T21647] [ 474.381861][T21647] dump_stack_lvl+0xf2/0x150 [ 474.381906][T21647] dump_stack+0x15/0x1a [ 474.381933][T21647] should_fail_ex+0x223/0x230 [ 474.381958][T21647] should_failslab+0x8f/0xb0 [ 474.425377][T21647] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 474.431846][T21647] ? sidtab_sid2str_get+0xb8/0x140 [ 474.436997][T21647] kmemdup_noprof+0x2a/0x60 [ 474.441499][T21647] sidtab_sid2str_get+0xb8/0x140 [ 474.446446][T21647] security_sid_to_context_core+0x1eb/0x2f0 [ 474.452333][T21647] security_sid_to_context+0x27/0x30 [ 474.457627][T21647] selinux_lsmprop_to_secctx+0x2c/0x40 [ 474.463121][T21647] security_lsmprop_to_secctx+0x4a/0x90 [ 474.468861][T21647] audit_log_task_context+0x93/0x1c0 [ 474.474183][T21647] audit_log_task+0xf9/0x1c0 [ 474.478764][T21647] audit_seccomp+0x68/0x130 [ 474.483341][T21647] __seccomp_filter+0x6fa/0x1180 [ 474.488275][T21647] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 474.493977][T21647] ? vfs_write+0x596/0x920 [ 474.498387][T21647] ? putname+0xcf/0xf0 [ 474.502447][T21647] __secure_computing+0x9f/0x1c0 [ 474.507382][T21647] syscall_trace_enter+0xd1/0x1f0 [ 474.512452][T21647] ? fpregs_assert_state_consistent+0x83/0xa0 [ 474.518545][T21647] do_syscall_64+0xaa/0x1c0 [ 474.523128][T21647] ? clear_bhb_loop+0x55/0xb0 [ 474.527801][T21647] ? clear_bhb_loop+0x55/0xb0 [ 474.532545][T21647] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 474.538481][T21647] RIP: 0033:0x7f9cc94f5d29 [ 474.542960][T21647] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 474.562682][T21647] RSP: 002b:00007f9cc7b61038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c4 [ 474.571088][T21647] RAX: ffffffffffffffda RBX: 00007f9cc96e5fa0 RCX: 00007f9cc94f5d29 [ 474.579105][T21647] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 474.587065][T21647] RBP: 00007f9cc7b61090 R08: 0000000000000000 R09: 0000000000000000 [ 474.595029][T21647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 474.603037][T21647] R13: 0000000000000000 R14: 00007f9cc96e5fa0 R15: 00007fffff527648 [ 474.611018][T21647] [ 474.663253][T21653] ip6tnl1: entered promiscuous mode [ 474.668480][T21653] ip6tnl1: entered allmulticast mode [ 474.684204][T21655] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 474.763149][T21664] loop5: detected capacity change from 0 to 128 [ 474.788471][T21664] nlmon0: entered promiscuous mode [ 474.799288][T21664] vlan0: entered promiscuous mode [ 474.806826][T21664] nlmon0: left promiscuous mode [ 474.828363][T21655] netlink: 133492 bytes leftover after parsing attributes in process `syz.4.7367'. [ 474.996269][T21688] bridge0: entered promiscuous mode [ 475.001622][T21688] vlan0: entered promiscuous mode [ 475.006777][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 475.020696][T21688] bridge0: left promiscuous mode [ 475.108501][T21698] ip6tnl0: entered promiscuous mode [ 475.114006][T21698] vlan0: entered promiscuous mode [ 475.120440][T21698] ip6tnl0: left promiscuous mode [ 475.230194][T21718] bridge0: entered promiscuous mode [ 475.235692][T21718] vlan0: entered promiscuous mode [ 475.242086][T21718] bridge0: left promiscuous mode [ 475.367756][T21735] ip6tnl0: entered promiscuous mode [ 475.373356][T21735] vlan0: entered promiscuous mode [ 475.379572][T21735] ip6tnl0: left promiscuous mode [ 475.551938][T21746] bond_slave_0: entered promiscuous mode [ 475.557654][T21746] bond_slave_1: entered promiscuous mode [ 475.563529][T21746] vlan0: entered promiscuous mode [ 475.568677][T21746] bond0: entered promiscuous mode [ 475.575548][T21746] bond0: left promiscuous mode [ 475.580446][T21746] bond_slave_0: left promiscuous mode [ 475.585850][T21746] bond_slave_1: left promiscuous mode [ 475.618270][T21751] syz_tun: entered promiscuous mode [ 475.623738][T21751] vlan0: entered promiscuous mode [ 475.629701][T21751] syz_tun: left promiscuous mode [ 475.827399][T21774] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 475.915979][T21784] syz_tun: entered promiscuous mode [ 475.921337][T21784] vlan0: entered promiscuous mode [ 475.927850][T21784] syz_tun: left promiscuous mode [ 475.984780][T21778] netlink: 8 bytes leftover after parsing attributes in process `syz.4.7423'. [ 476.033664][T21794] netlink: 16 bytes leftover after parsing attributes in process `syz.5.7430'. [ 476.042725][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 476.063383][T21792] dummy0: entered promiscuous mode [ 476.068607][T21792] vlan0: entered promiscuous mode [ 476.074975][T21792] dummy0: left promiscuous mode [ 476.117676][T21798] ip6tnl0: entered promiscuous mode [ 476.123489][T21798] vlan0: entered promiscuous mode [ 476.130203][T21798] ip6tnl0: left promiscuous mode [ 476.207747][T21812] syz_tun: entered promiscuous mode [ 476.213630][T21812] vlan0: entered promiscuous mode [ 476.220280][T21812] syz_tun: left promiscuous mode [ 476.245945][T21816] netlink: 4 bytes leftover after parsing attributes in process `syz.3.7437'. [ 476.401649][ T29] kauditd_printk_skb: 1152 callbacks suppressed [ 476.401661][ T29] audit: type=1326 audit(1736428895.838:28354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21823 comm="syz.3.7443" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 476.450864][ T29] audit: type=1326 audit(1736428895.878:28355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21823 comm="syz.3.7443" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 476.451204][T21826] ip6tnl1: entered promiscuous mode [ 476.474492][ T29] audit: type=1326 audit(1736428895.878:28356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21823 comm="syz.3.7443" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 476.479692][T21826] ip6tnl1: entered allmulticast mode [ 476.503246][ T29] audit: type=1326 audit(1736428895.878:28357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21823 comm="syz.3.7443" exe="/root/syz-executor" sig=0 arch=c000003e syscall=136 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 476.532177][ T29] audit: type=1326 audit(1736428895.878:28358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21823 comm="syz.3.7443" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 476.555899][ T29] audit: type=1326 audit(1736428895.878:28359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21823 comm="syz.3.7443" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 476.579527][ T29] audit: type=1326 audit(1736428895.878:28360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21823 comm="syz.3.7443" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 476.603282][ T29] audit: type=1326 audit(1736428895.878:28361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21823 comm="syz.3.7443" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 476.626945][ T29] audit: type=1326 audit(1736428895.878:28362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21823 comm="syz.3.7443" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 476.650513][ T29] audit: type=1326 audit(1736428895.878:28363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21823 comm="syz.3.7443" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 476.845643][T21842] loop5: detected capacity change from 0 to 512 [ 476.871488][T21842] loop5: detected capacity change from 0 to 2048 [ 477.081845][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 477.393499][T21869] 9pnet: Could not find request transport: f [ 477.540236][T21887] ip6tnl1: entered promiscuous mode [ 477.545640][T21887] ip6tnl1: entered allmulticast mode [ 478.026070][T21923] ip6tnl2: entered promiscuous mode [ 478.031368][T21923] ip6tnl2: entered allmulticast mode [ 478.121811][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 478.170118][T21938] 9pnet: Could not find request transport: f [ 478.226084][T21946] loop5: detected capacity change from 0 to 512 [ 478.232657][T21946] ext3: Unknown parameter 'fsmagic' [ 478.242469][T21946] loop5: detected capacity change from 0 to 512 [ 478.257758][T21946] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended [ 478.266894][T21946] EXT4-fs (loop5): couldn't mount as ext2 due to feature incompatibilities [ 478.318411][T21958] ip6tnl1: entered promiscuous mode [ 478.323846][T21958] ip6tnl1: entered allmulticast mode [ 478.479521][T21968] dummy0: entered promiscuous mode [ 478.484733][T21968] vlan0: entered promiscuous mode [ 478.491414][T21968] dummy0: left promiscuous mode [ 478.516691][T21964] FAULT_INJECTION: forcing a failure. [ 478.516691][T21964] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 478.532978][T21964] CPU: 1 UID: 0 PID: 21964 Comm: syz.5.7496 Not tainted 6.13.0-rc6-syzkaller-00051-geea6e4b4dfb8 #0 [ 478.543821][T21964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 478.553858][T21964] Call Trace: [ 478.557185][T21964] [ 478.560100][T21964] dump_stack_lvl+0xf2/0x150 [ 478.564720][T21964] dump_stack+0x15/0x1a [ 478.568859][T21964] should_fail_ex+0x223/0x230 [ 478.573522][T21964] should_fail+0xb/0x10 [ 478.577715][T21964] should_fail_usercopy+0x1a/0x20 [ 478.582722][T21964] _copy_to_user+0x20/0xa0 [ 478.587124][T21964] simple_read_from_buffer+0xa0/0x110 [ 478.592514][T21964] proc_fail_nth_read+0xf9/0x140 [ 478.597466][T21964] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 478.603023][T21964] vfs_read+0x1a2/0x700 [ 478.607218][T21964] ? __rcu_read_unlock+0x4e/0x70 [ 478.612144][T21964] ? __fget_files+0x17c/0x1c0 [ 478.616812][T21964] ksys_read+0xe8/0x1b0 [ 478.620991][T21964] __x64_sys_read+0x42/0x50 [ 478.625598][T21964] x64_sys_call+0x2874/0x2dc0 [ 478.630344][T21964] do_syscall_64+0xc9/0x1c0 [ 478.634922][T21964] ? clear_bhb_loop+0x55/0xb0 [ 478.639590][T21964] ? clear_bhb_loop+0x55/0xb0 [ 478.644309][T21964] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 478.650208][T21964] RIP: 0033:0x7fb6c81a473c [ 478.654653][T21964] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 478.674528][T21964] RSP: 002b:00007fb6c6811030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 478.682962][T21964] RAX: ffffffffffffffda RBX: 00007fb6c8395fa0 RCX: 00007fb6c81a473c [ 478.690920][T21964] RDX: 000000000000000f RSI: 00007fb6c68110a0 RDI: 0000000000000009 [ 478.698882][T21964] RBP: 00007fb6c6811090 R08: 0000000000000000 R09: 0000000000000000 [ 478.706835][T21964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 478.714787][T21964] R13: 0000000000000000 R14: 00007fb6c8395fa0 R15: 00007ffdbf210e78 [ 478.722744][T21964] [ 478.743780][T21975] 9pnet: Could not find request transport: f [ 478.860937][T21992] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 478.907011][T21998] bridge0: entered promiscuous mode [ 478.907044][T21998] vlan0: entered promiscuous mode [ 478.918554][T21998] bridge0: left promiscuous mode [ 478.937818][T22001] __nla_validate_parse: 5 callbacks suppressed [ 478.937831][T22001] netlink: 4 bytes leftover after parsing attributes in process `syz.3.7511'. [ 478.986768][T22009] 9pnet: Could not find request transport: f [ 479.162621][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 479.336244][T22043] FAULT_INJECTION: forcing a failure. [ 479.336244][T22043] name failslab, interval 1, probability 0, space 0, times 0 [ 479.348954][T22043] CPU: 0 UID: 0 PID: 22043 Comm: syz.4.7531 Not tainted 6.13.0-rc6-syzkaller-00051-geea6e4b4dfb8 #0 [ 479.359713][T22043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 479.369801][T22043] Call Trace: [ 479.373064][T22043] [ 479.375979][T22043] dump_stack_lvl+0xf2/0x150 [ 479.380599][T22043] dump_stack+0x15/0x1a [ 479.384843][T22043] should_fail_ex+0x223/0x230 [ 479.389513][T22043] should_failslab+0x8f/0xb0 [ 479.394153][T22043] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 479.400477][T22043] ? sidtab_sid2str_get+0xb8/0x140 [ 479.405590][T22043] kmemdup_noprof+0x2a/0x60 [ 479.410081][T22043] sidtab_sid2str_get+0xb8/0x140 [ 479.415006][T22043] security_sid_to_context_core+0x1eb/0x2f0 [ 479.420922][T22043] security_sid_to_context+0x27/0x30 [ 479.426211][T22043] selinux_lsmprop_to_secctx+0x2c/0x40 [ 479.431889][T22043] security_lsmprop_to_secctx+0x4a/0x90 [ 479.437436][T22043] audit_log_task_context+0x93/0x1c0 [ 479.442796][T22043] audit_log_task+0xf9/0x1c0 [ 479.447438][T22043] audit_seccomp+0x68/0x130 [ 479.451982][T22043] __seccomp_filter+0x6fa/0x1180 [ 479.456920][T22043] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 479.462620][T22043] ? vfs_write+0x596/0x920 [ 479.467042][T22043] __secure_computing+0x9f/0x1c0 [ 479.472048][T22043] syscall_trace_enter+0xd1/0x1f0 [ 479.477092][T22043] ? fpregs_assert_state_consistent+0x83/0xa0 [ 479.483301][T22043] do_syscall_64+0xaa/0x1c0 [ 479.487847][T22043] ? clear_bhb_loop+0x55/0xb0 [ 479.492517][T22043] ? clear_bhb_loop+0x55/0xb0 [ 479.497215][T22043] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 479.503134][T22043] RIP: 0033:0x7f9cc94f5d29 [ 479.507546][T22043] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 479.527220][T22043] RSP: 002b:00007f9cc7b61038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 479.535617][T22043] RAX: ffffffffffffffda RBX: 00007f9cc96e5fa0 RCX: 00007f9cc94f5d29 [ 479.543597][T22043] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffffff [ 479.551567][T22043] RBP: 00007f9cc7b61090 R08: 0000000000000000 R09: 0000000000000000 [ 479.559529][T22043] R10: 0000000000000042 R11: 0000000000000246 R12: 0000000000000001 [ 479.567559][T22043] R13: 0000000000000000 R14: 00007f9cc96e5fa0 R15: 00007fffff527648 [ 479.575549][T22043] [ 479.667239][T22059] siw: device registration error -23 [ 479.680302][T22059] serio: Serial port ptm0 [ 479.730107][T22061] netlink: 132840 bytes leftover after parsing attributes in process `syz.3.7540'. [ 479.756695][T22057] netlink: 80 bytes leftover after parsing attributes in process `syz.0.7537'. [ 479.770234][T22057] netlink: 8 bytes leftover after parsing attributes in process `syz.0.7537'. [ 479.836197][T22072] netlink: 'syz.5.7544': attribute type 1 has an invalid length. [ 479.844123][T22072] netlink: 224 bytes leftover after parsing attributes in process `syz.5.7544'. [ 480.056633][T22089] ebtables: ebtables: counters copy to user failed while replacing table [ 480.145824][T22099] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 480.183185][T22099] netlink: 132840 bytes leftover after parsing attributes in process `syz.5.7554'. [ 480.211786][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 480.252862][T22110] netlink: 8 bytes leftover after parsing attributes in process `syz.4.7558'. [ 480.261876][T22110] netlink: 8 bytes leftover after parsing attributes in process `syz.4.7558'. [ 480.331650][T22120] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 480.426382][T22129] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 480.488066][T22129] netlink: 133492 bytes leftover after parsing attributes in process `syz.5.7567'. [ 480.549322][T22134] loop5: detected capacity change from 0 to 512 [ 480.572487][T22134] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 480.600425][T22134] ext4 filesystem being mounted at /345/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 480.689194][T17664] EXT4-fs error (device loop5): ext4_ext_check_inode:524: inode #11: comm syz-executor: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 480.757752][T17664] EXT4-fs error (device loop5): ext4_ext_check_inode:524: inode #11: comm syz-executor: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 480.948144][T22151] dummy0: entered promiscuous mode [ 480.953561][T22151] vlan0: entered promiscuous mode [ 480.959655][T22151] dummy0: left promiscuous mode [ 481.063909][T22139] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 481.076515][ T40] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 481.251915][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 481.268566][ T40] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 481.497795][ T40] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 481.542763][ T29] kauditd_printk_skb: 919 callbacks suppressed [ 481.542779][ T29] audit: type=1326 audit(1736428900.988:29282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22165 comm="syz.4.7583" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f9cc94f47df code=0x7ffc0000 [ 481.626568][ T40] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 481.679232][ T29] audit: type=1326 audit(1736428901.028:29283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22165 comm="syz.4.7583" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f9cc94f5db7 code=0x7ffc0000 [ 481.702857][ T29] audit: type=1326 audit(1736428901.038:29284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22165 comm="syz.4.7583" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f9cc94f4690 code=0x7ffc0000 [ 481.726633][ T29] audit: type=1326 audit(1736428901.038:29285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22165 comm="syz.4.7583" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f9cc94f498a code=0x7ffc0000 [ 481.750187][ T29] audit: type=1326 audit(1736428901.038:29286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22165 comm="syz.4.7583" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9cc94f5d29 code=0x7ffc0000 [ 481.773840][ T29] audit: type=1326 audit(1736428901.038:29287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22165 comm="syz.4.7583" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9cc94f5d29 code=0x7ffc0000 [ 481.797386][ T29] audit: type=1326 audit(1736428901.038:29288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22165 comm="syz.4.7583" exe="/root/syz-executor" sig=0 arch=c000003e syscall=64 compat=0 ip=0x7f9cc94f5d29 code=0x7ffc0000 [ 481.820877][ T29] audit: type=1326 audit(1736428901.038:29289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22165 comm="syz.4.7583" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9cc94f5d29 code=0x7ffc0000 [ 481.844461][ T29] audit: type=1326 audit(1736428901.038:29290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22165 comm="syz.4.7583" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9cc94f5d29 code=0x7ffc0000 [ 481.868057][ T29] audit: type=1326 audit(1736428901.038:29291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22165 comm="syz.4.7583" exe="/root/syz-executor" sig=0 arch=c000003e syscall=65 compat=0 ip=0x7f9cc94f5d29 code=0x7ffc0000 [ 481.983763][T22174] bridge0: entered promiscuous mode [ 481.991625][T22174] vlan0: entered promiscuous mode [ 481.998186][T22174] bridge0: left promiscuous mode [ 482.067423][ T40] bridge_slave_1: left allmulticast mode [ 482.073154][ T40] bridge_slave_1: left promiscuous mode [ 482.078853][ T40] bridge0: port 2(bridge_slave_1) entered disabled state [ 482.125532][ T40] bridge_slave_0: left allmulticast mode [ 482.131222][ T40] bridge_slave_0: left promiscuous mode [ 482.137001][ T40] bridge0: port 1(bridge_slave_0) entered disabled state [ 482.281816][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 482.447516][ T40] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 482.475015][ T40] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 482.493720][ T40] bond0 (unregistering): Released all slaves [ 482.512279][ T40] bond1 (unregistering): Released all slaves [ 482.544089][T22185] vcan0: entered promiscuous mode [ 482.556893][T22185] vlan0: entered promiscuous mode [ 482.565702][T22185] vcan0: left promiscuous mode [ 482.607833][T22188] dummy0: entered promiscuous mode [ 482.620154][T22188] vlan0: entered promiscuous mode [ 482.629438][T22188] dummy0: left promiscuous mode [ 482.665572][ T40] tipc: Disabling bearer [ 482.670828][ T40] tipc: Left network mode [ 482.711882][T22168] lo speed is unknown, defaulting to 1000 [ 482.742216][ T40] hsr_slave_0: left promiscuous mode [ 482.757094][ T40] hsr_slave_1: left promiscuous mode [ 482.774567][ T40] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 482.782137][ T40] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 482.794988][ T40] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 482.802562][ T40] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 482.815808][ T40] veth0_macvtap: left promiscuous mode [ 482.867578][ T40] team0 (unregistering): Port device team_slave_1 removed [ 482.880427][ T40] team0 (unregistering): Port device team_slave_0 removed [ 482.934543][T22168] lo speed is unknown, defaulting to 1000 [ 483.016056][T22168] chnl_net:caif_netlink_parms(): no params data found [ 483.060544][T22168] bridge0: port 1(bridge_slave_0) entered blocking state [ 483.067662][T22168] bridge0: port 1(bridge_slave_0) entered disabled state [ 483.075031][T22168] bridge_slave_0: entered allmulticast mode [ 483.082069][T22168] bridge_slave_0: entered promiscuous mode [ 483.089107][T22168] bridge0: port 2(bridge_slave_1) entered blocking state [ 483.096245][T22168] bridge0: port 2(bridge_slave_1) entered disabled state [ 483.103640][T22168] bridge_slave_1: entered allmulticast mode [ 483.110597][T22168] bridge_slave_1: entered promiscuous mode [ 483.119630][T22230] syz_tun: entered promiscuous mode [ 483.125091][T22230] vlan0: entered promiscuous mode [ 483.131249][T22230] syz_tun: left promiscuous mode [ 483.156279][T22168] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 483.167223][T22168] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 483.189955][T22168] team0: Port device team_slave_0 added [ 483.200592][T22168] team0: Port device team_slave_1 added [ 483.227869][T22168] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 483.235028][T22168] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 483.261023][T22168] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 483.278109][T22168] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 483.285257][T22168] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 483.311320][T22168] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 483.321970][ C0] net_ratelimit: 1 callbacks suppressed [ 483.321988][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 483.419270][T22239] vcan0: entered promiscuous mode [ 483.426463][T22239] vlan0: entered promiscuous mode [ 483.539437][T22239] vcan0: left promiscuous mode [ 483.556942][T22168] hsr_slave_0: entered promiscuous mode [ 483.564631][T22168] hsr_slave_1: entered promiscuous mode [ 483.570988][T22168] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 483.578962][T22168] Cannot create hsr debugfs directory [ 483.658681][T22246] dummy0: entered promiscuous mode [ 483.671758][T22246] vlan0: entered promiscuous mode [ 483.690410][T22246] dummy0: left promiscuous mode [ 483.717691][T22251] ip6tnl1: entered promiscuous mode [ 483.722950][T22251] ip6tnl1: entered allmulticast mode [ 483.749093][T22168] bridge0: port 2(bridge_slave_1) entered blocking state [ 483.756253][T22168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 483.763564][T22168] bridge0: port 1(bridge_slave_0) entered blocking state [ 483.770684][T22168] bridge0: port 1(bridge_slave_0) entered forwarding state [ 483.837814][T22255] serio: Serial port ptm0 [ 483.856707][T22168] 8021q: adding VLAN 0 to HW filter on device bond0 [ 483.872997][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 483.885993][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 483.907363][T22168] 8021q: adding VLAN 0 to HW filter on device team0 [ 483.923245][ T3862] bridge0: port 1(bridge_slave_0) entered blocking state [ 483.930336][ T3862] bridge0: port 1(bridge_slave_0) entered forwarding state [ 483.944870][ T40] bridge0: port 2(bridge_slave_1) entered blocking state [ 483.951936][ T40] bridge0: port 2(bridge_slave_1) entered forwarding state [ 483.977200][T22261] netlink: 'syz.3.7613': attribute type 1 has an invalid length. [ 483.985110][T22261] netlink: 224 bytes leftover after parsing attributes in process `syz.3.7613'. [ 484.045278][T22267] ip6tnl0: entered promiscuous mode [ 484.052591][T22267] vlan0: entered promiscuous mode [ 484.058552][T22267] ip6tnl0: left promiscuous mode [ 484.157743][T22168] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 484.371767][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 484.388014][T22296] dummy0: entered promiscuous mode [ 484.393627][T22296] vlan0: entered promiscuous mode [ 484.399674][T22296] dummy0: left promiscuous mode [ 484.419635][T22168] veth0_vlan: entered promiscuous mode [ 484.434274][T22168] veth1_vlan: entered promiscuous mode [ 484.460812][T22168] veth0_macvtap: entered promiscuous mode [ 484.470327][T22168] veth1_macvtap: entered promiscuous mode [ 484.481404][T22305] siw: device registration error -23 [ 484.488912][T22168] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 484.494200][T22305] serio: Serial port ptm0 [ 484.499502][T22168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 484.513604][T22168] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 484.524100][T22168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 484.533922][T22168] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 484.544375][T22168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 484.554221][T22168] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 484.564760][T22168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 484.574674][T22168] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 484.585095][T22168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 484.594934][T22168] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 484.605355][T22168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 484.615266][T22168] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 484.625900][T22168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 484.635809][T22168] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 484.646231][T22168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 484.656055][T22168] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 484.666475][T22168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 484.676293][T22168] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 484.686862][T22168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 484.697817][T22168] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 484.707340][T22168] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 484.717854][T22168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 484.727679][T22168] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 484.738178][T22168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 484.748159][T22168] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 484.758635][T22168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 484.768574][T22168] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 484.779140][T22168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 484.789007][T22168] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 484.799514][T22168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 484.809341][T22168] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 484.819761][T22168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 484.829647][T22168] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 484.840073][T22168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 484.849927][T22168] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 484.860346][T22168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 484.870235][T22168] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 484.880653][T22168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 484.890459][T22168] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 484.901012][T22168] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 484.912649][T22168] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 484.974804][T22312] netlink: 'syz.4.7627': attribute type 1 has an invalid length. [ 485.143583][T22329] dummy0: entered promiscuous mode [ 485.148747][T22329] vlan0: entered promiscuous mode [ 485.168836][T22329] dummy0: left promiscuous mode [ 485.215885][T22337] netlink: 4 bytes leftover after parsing attributes in process `syz.6.7636'. [ 485.282013][T22340] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 485.318100][T22340] netlink: 133492 bytes leftover after parsing attributes in process `syz.4.7638'. [ 485.401897][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 485.571190][T22351] netlink: 8 bytes leftover after parsing attributes in process `syz.6.7642'. [ 485.711512][T22370] netlink: 16 bytes leftover after parsing attributes in process `syz.4.7651'. [ 485.727352][T22370] gretap0: entered promiscuous mode [ 485.735216][T22370] gretap0: left promiscuous mode [ 485.737049][T22374] netlink: 16 bytes leftover after parsing attributes in process `syz.3.7653'. [ 485.759109][T22374] gretap0: entered promiscuous mode [ 485.867301][T22380] FAULT_INJECTION: forcing a failure. [ 485.867301][T22380] name failslab, interval 1, probability 0, space 0, times 0 [ 485.880036][T22380] CPU: 1 UID: 0 PID: 22380 Comm: syz.2.7656 Not tainted 6.13.0-rc6-syzkaller-00051-geea6e4b4dfb8 #0 [ 485.890914][T22380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 485.900963][T22380] Call Trace: [ 485.904255][T22380] [ 485.907173][T22380] dump_stack_lvl+0xf2/0x150 [ 485.911780][T22380] dump_stack+0x15/0x1a [ 485.915932][T22380] should_fail_ex+0x223/0x230 [ 485.920629][T22380] should_failslab+0x8f/0xb0 [ 485.925268][T22380] __kmalloc_noprof+0xab/0x3f0 [ 485.930171][T22380] ? iter_file_splice_write+0x102/0x980 [ 485.935745][T22380] iter_file_splice_write+0x102/0x980 [ 485.941110][T22380] ? current_time+0x173/0x220 [ 485.945786][T22380] ? atime_needs_update+0x3cb/0x3e0 [ 485.951031][T22380] ? touch_atime+0x110/0x350 [ 485.955616][T22380] ? shmem_file_splice_read+0x58a/0x5d0 [ 485.961220][T22380] ? __pfx_iter_file_splice_write+0x10/0x10 [ 485.967126][T22380] direct_splice_actor+0x160/0x2c0 [ 485.972242][T22380] splice_direct_to_actor+0x302/0x670 [ 485.977629][T22380] ? __pfx_direct_splice_actor+0x10/0x10 [ 485.983267][T22380] do_splice_direct+0xd7/0x150 [ 485.988024][T22380] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 485.993935][T22380] do_sendfile+0x398/0x660 [ 485.998365][T22380] __x64_sys_sendfile64+0x110/0x150 [ 486.003781][T22380] x64_sys_call+0xfbd/0x2dc0 [ 486.008369][T22380] do_syscall_64+0xc9/0x1c0 [ 486.012869][T22380] ? clear_bhb_loop+0x55/0xb0 [ 486.017610][T22380] ? clear_bhb_loop+0x55/0xb0 [ 486.022334][T22380] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 486.028288][T22380] RIP: 0033:0x7fd2ef655d29 [ 486.032690][T22380] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 486.052369][T22380] RSP: 002b:00007fd2edcc7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 486.060845][T22380] RAX: ffffffffffffffda RBX: 00007fd2ef845fa0 RCX: 00007fd2ef655d29 [ 486.068872][T22380] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000009 [ 486.076835][T22380] RBP: 00007fd2edcc7090 R08: 0000000000000000 R09: 0000000000000000 [ 486.084860][T22380] R10: 000000000003ffff R11: 0000000000000246 R12: 0000000000000001 [ 486.092929][T22380] R13: 0000000000000000 R14: 00007fd2ef845fa0 R15: 00007fff1ce211b8 [ 486.100911][T22380] [ 486.167380][T22390] dummy0: entered promiscuous mode [ 486.176764][T22390] vlan0: entered promiscuous mode [ 486.184394][T22390] dummy0: left promiscuous mode [ 486.234855][T22397] lo speed is unknown, defaulting to 1000 [ 486.267448][T22397] lo speed is unknown, defaulting to 1000 [ 486.282899][T22399] FAULT_INJECTION: forcing a failure. [ 486.282899][T22399] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 486.296034][T22399] CPU: 0 UID: 0 PID: 22399 Comm: syz.0.7665 Not tainted 6.13.0-rc6-syzkaller-00051-geea6e4b4dfb8 #0 [ 486.306868][T22399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 486.316922][T22399] Call Trace: [ 486.320201][T22399] [ 486.323133][T22399] dump_stack_lvl+0xf2/0x150 [ 486.327900][T22399] dump_stack+0x15/0x1a [ 486.332071][T22399] should_fail_ex+0x223/0x230 [ 486.336759][T22399] should_fail+0xb/0x10 [ 486.340957][T22399] should_fail_usercopy+0x1a/0x20 [ 486.346071][T22399] copy_page_from_iter_atomic+0x228/0xf80 [ 486.351805][T22399] ? shmem_write_begin+0xa2/0x180 [ 486.356834][T22399] ? shmem_write_begin+0xda/0x180 [ 486.361937][T22399] generic_perform_write+0x2f1/0x4a0 [ 486.367237][T22399] shmem_file_write_iter+0xc2/0xe0 [ 486.372380][T22399] vfs_write+0x77f/0x920 [ 486.376640][T22399] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 486.382478][T22399] ksys_write+0xe8/0x1b0 [ 486.386743][T22399] __x64_sys_write+0x42/0x50 [ 486.391336][T22399] x64_sys_call+0x287e/0x2dc0 [ 486.396035][T22399] do_syscall_64+0xc9/0x1c0 [ 486.400363][T22415] netlink: 16 bytes leftover after parsing attributes in process `syz.6.7669'. [ 486.400534][T22399] ? clear_bhb_loop+0x55/0xb0 [ 486.414230][T22399] ? clear_bhb_loop+0x55/0xb0 [ 486.417218][T22415] gretap0: entered promiscuous mode [ 486.418901][T22399] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 486.429974][T22399] RIP: 0033:0x7f6e54545d29 [ 486.434396][T22399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 486.454004][T22399] RSP: 002b:00007f6e52bb7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 486.462442][T22399] RAX: ffffffffffffffda RBX: 00007f6e54735fa0 RCX: 00007f6e54545d29 [ 486.470402][T22399] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000009 [ 486.478383][T22399] RBP: 00007f6e52bb7090 R08: 0000000000000000 R09: 0000000000000000 [ 486.486342][T22399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 486.494371][T22399] R13: 0000000000000000 R14: 00007f6e54735fa0 R15: 00007fffa0830948 [ 486.502494][T22399] [ 486.505657][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 486.598711][T22425] netlink: 'syz.6.7673': attribute type 1 has an invalid length. [ 486.611571][T22425] (unnamed net_device) (uninitialized): option miimon: invalid value (18446744073709551615) [ 486.621759][T22425] (unnamed net_device) (uninitialized): option miimon: allowed values 0 - 2147483647 [ 486.731442][T22437] serio: Serial port ptm0 [ 486.803971][ T29] kauditd_printk_skb: 401 callbacks suppressed [ 486.803986][ T29] audit: type=1326 audit(1736428906.248:29691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22439 comm="syz.2.7679" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd2ef655d29 code=0x7ffc0000 [ 486.836738][ T29] audit: type=1326 audit(1736428906.248:29692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22439 comm="syz.2.7679" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd2ef655d29 code=0x7ffc0000 [ 486.860586][ T29] audit: type=1326 audit(1736428906.278:29693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22439 comm="syz.2.7679" exe="/root/syz-executor" sig=0 arch=c000003e syscall=244 compat=0 ip=0x7fd2ef655d29 code=0x7ffc0000 [ 486.884328][ T29] audit: type=1326 audit(1736428906.278:29694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22439 comm="syz.2.7679" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd2ef655d29 code=0x7ffc0000 [ 486.907947][ T29] audit: type=1326 audit(1736428906.278:29695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22439 comm="syz.2.7679" exe="/root/syz-executor" sig=0 arch=c000003e syscall=47 compat=0 ip=0x7fd2ef655d29 code=0x7ffc0000 [ 486.931454][ T29] audit: type=1326 audit(1736428906.278:29696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22439 comm="syz.2.7679" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd2ef655d29 code=0x7ffc0000 [ 486.955034][ T29] audit: type=1326 audit(1736428906.278:29697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22439 comm="syz.2.7679" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd2ef655d29 code=0x7ffc0000 [ 486.978771][ T29] audit: type=1326 audit(1736428906.278:29698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22439 comm="syz.2.7679" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd2ef655d29 code=0x7ffc0000 [ 487.002388][ T29] audit: type=1326 audit(1736428906.278:29699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22439 comm="syz.2.7679" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd2ef655d29 code=0x7ffc0000 [ 487.026014][ T29] audit: type=1326 audit(1736428906.278:29700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22439 comm="syz.2.7679" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd2ef655d29 code=0x7ffc0000 [ 487.095921][T22452] netlink: 8 bytes leftover after parsing attributes in process `syz.0.7683'. [ 487.104888][T22452] netlink: 16 bytes leftover after parsing attributes in process `syz.0.7683'. [ 487.117128][T22452] gretap0: entered promiscuous mode [ 487.384714][T22466] loop0: detected capacity change from 0 to 128 [ 487.408977][T22466] nlmon0: entered promiscuous mode [ 487.422037][T22466] vlan0: entered promiscuous mode [ 487.438302][T22466] nlmon0: left promiscuous mode [ 487.547327][T22479] netlink: 8 bytes leftover after parsing attributes in process `syz.4.7695'. [ 487.561836][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 487.574669][T22479] gretap0: entered promiscuous mode [ 487.759538][T22489] netlink: 'syz.0.7699': attribute type 1 has an invalid length. [ 487.831178][T22494] syz_tun: entered promiscuous mode [ 487.845299][T22494] vlan0: entered promiscuous mode [ 487.851692][T22494] syz_tun: left promiscuous mode [ 487.875399][T22498] 9pnet: Could not find request transport: f [ 487.974611][T22508] ip6tnl0: entered promiscuous mode [ 487.977230][T22512] 9pnet: Could not find request transport: f [ 487.979848][T22508] vlan0: entered promiscuous mode [ 488.011045][T22508] ip6tnl0: left promiscuous mode [ 488.030508][T22518] ip6tnl0: entered promiscuous mode [ 488.035815][T22518] vlan0: entered promiscuous mode [ 488.042319][T22518] ip6tnl0: left promiscuous mode [ 488.340495][T22534] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 488.392938][T22532] 9pnet: Could not find request transport: f [ 488.426545][T22537] loop0: detected capacity change from 0 to 512 [ 488.461182][T22537] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 488.461323][T22537] ext4 filesystem being mounted at /274/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 488.519086][T22537] wireguard0: entered promiscuous mode [ 488.519106][T22537] wireguard0: entered allmulticast mode [ 488.601806][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 488.930478][T18845] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 489.138592][T22569] 9pnet: Could not find request transport: f [ 489.185537][T22575] vcan0: entered promiscuous mode [ 489.191037][T22575] vlan0: entered promiscuous mode [ 489.197704][T22575] vcan0: left promiscuous mode [ 489.380295][T22587] loop0: detected capacity change from 0 to 2048 [ 489.415180][T22587] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 489.479481][T22596] dummy0: entered promiscuous mode [ 489.484916][T22596] vlan0: entered promiscuous mode [ 489.491503][T22596] dummy0: left promiscuous mode [ 489.651859][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 489.665012][T22602] siw: device registration error -23 [ 489.704959][T22602] serio: Serial port ptm0 [ 489.940537][T22612] SELinux: syz.3.7742 (22612) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 490.240405][T22621] syz_tun: entered promiscuous mode [ 490.253101][T22621] vlan0: entered promiscuous mode [ 490.350655][T22621] syz_tun: left promiscuous mode [ 490.368114][T22633] siw: device registration error -23 [ 490.448398][T22631] __nla_validate_parse: 6 callbacks suppressed [ 490.448412][T22631] netlink: 8 bytes leftover after parsing attributes in process `syz.2.7752'. [ 490.474262][T18845] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 490.566725][T22633] serio: Serial port ptm0 [ 490.645890][T22642] loop0: detected capacity change from 0 to 512 [ 490.681897][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 490.727446][T22642] loop0: detected capacity change from 0 to 2048 [ 490.974772][T22651] 9pnet: Could not find request transport: f [ 491.010744][T22658] loop0: detected capacity change from 0 to 512 [ 491.074489][T22664] dummy0: entered promiscuous mode [ 491.079822][T22664] vlan0: entered promiscuous mode [ 491.095367][T22664] dummy0: left promiscuous mode [ 491.129371][T22658] loop0: detected capacity change from 0 to 2048 [ 491.267120][T22680] FAULT_INJECTION: forcing a failure. [ 491.267120][T22680] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 491.280294][T22680] CPU: 1 UID: 0 PID: 22680 Comm: syz.3.7770 Not tainted 6.13.0-rc6-syzkaller-00051-geea6e4b4dfb8 #0 [ 491.291073][T22680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 491.301214][T22680] Call Trace: [ 491.304522][T22680] [ 491.307506][T22680] dump_stack_lvl+0xf2/0x150 [ 491.312209][T22680] dump_stack+0x15/0x1a [ 491.316385][T22680] should_fail_ex+0x223/0x230 [ 491.321078][T22680] should_fail+0xb/0x10 [ 491.325283][T22680] should_fail_usercopy+0x1a/0x20 [ 491.330324][T22680] strncpy_from_user+0x25/0x210 [ 491.335173][T22680] ? kmem_cache_alloc_noprof+0x18e/0x320 [ 491.340798][T22680] ? getname_flags+0x81/0x3b0 [ 491.345526][T22680] getname_flags+0xb0/0x3b0 [ 491.350018][T22680] user_path_at+0x26/0x120 [ 491.354434][T22680] __se_sys_pivot_root+0xca/0x1090 [ 491.359627][T22680] ? vfs_write+0x596/0x920 [ 491.364051][T22680] __x64_sys_pivot_root+0x31/0x40 [ 491.369113][T22680] x64_sys_call+0x1abf/0x2dc0 [ 491.373782][T22680] do_syscall_64+0xc9/0x1c0 [ 491.378390][T22680] ? clear_bhb_loop+0x55/0xb0 [ 491.383076][T22680] ? clear_bhb_loop+0x55/0xb0 [ 491.387816][T22680] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 491.393713][T22680] RIP: 0033:0x7fbe86e35d29 [ 491.398195][T22680] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 491.417847][T22680] RSP: 002b:00007fbe854a1038 EFLAGS: 00000246 ORIG_RAX: 000000000000009b [ 491.426248][T22680] RAX: ffffffffffffffda RBX: 00007fbe87025fa0 RCX: 00007fbe86e35d29 [ 491.434354][T22680] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001f80 [ 491.442431][T22680] RBP: 00007fbe854a1090 R08: 0000000000000000 R09: 0000000000000000 [ 491.450441][T22680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 491.458749][T22680] R13: 0000000000000000 R14: 00007fbe87025fa0 R15: 00007ffd275a52a8 [ 491.466714][T22680] [ 491.495053][T22687] netlink: 16 bytes leftover after parsing attributes in process `syz.0.7773'. [ 491.709047][T22703] netlink: 'syz.0.7780': attribute type 1 has an invalid length. [ 491.721881][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 491.794058][T22711] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 491.974832][T22715] netlink: 133492 bytes leftover after parsing attributes in process `syz.0.7783'. [ 492.081949][T22717] netlink: 1068 bytes leftover after parsing attributes in process `syz.4.7784'. [ 492.131410][T22717] 9pnet: Unknown protocol version 9 [ 492.198593][T22725] FAULT_INJECTION: forcing a failure. [ 492.198593][T22725] name failslab, interval 1, probability 0, space 0, times 0 [ 492.211404][T22725] CPU: 1 UID: 0 PID: 22725 Comm: syz.0.7787 Not tainted 6.13.0-rc6-syzkaller-00051-geea6e4b4dfb8 #0 [ 492.222326][T22725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 492.232438][T22725] Call Trace: [ 492.235743][T22725] [ 492.238683][T22725] dump_stack_lvl+0xf2/0x150 [ 492.243340][T22725] dump_stack+0x15/0x1a [ 492.247588][T22725] should_fail_ex+0x223/0x230 [ 492.252319][T22725] should_failslab+0x8f/0xb0 [ 492.256922][T22725] kmem_cache_alloc_node_noprof+0x59/0x320 [ 492.262725][T22725] ? __alloc_skb+0x10b/0x310 [ 492.267363][T22725] ? tcp_chrono_stop+0x194/0x200 [ 492.272758][T22725] __alloc_skb+0x10b/0x310 [ 492.277176][T22725] tcp_stream_alloc_skb+0x2f/0x1e0 [ 492.282290][T22725] tcp_connect+0xcdf/0x2290 [ 492.286790][T22725] tcp_v6_connect+0xb99/0xc60 [ 492.291467][T22725] __inet_stream_connect+0x162/0x790 [ 492.296795][T22725] ? tcp_sendmsg_fastopen+0x163/0x4f0 [ 492.302161][T22725] ? should_failslab+0x8f/0xb0 [ 492.306944][T22725] ? __kmalloc_cache_noprof+0x186/0x320 [ 492.312511][T22725] tcp_sendmsg_fastopen+0x40e/0x4f0 [ 492.317706][T22725] tcp_sendmsg_locked+0x2513/0x2710 [ 492.322936][T22725] ? mntput_no_expire+0x70/0x3c0 [ 492.327923][T22725] ? __rcu_read_unlock+0x4e/0x70 [ 492.332858][T22725] ? avc_has_perm_noaudit+0x1cc/0x210 [ 492.338234][T22725] ? avc_has_perm+0xd4/0x160 [ 492.342865][T22725] ? _raw_spin_unlock_bh+0x36/0x40 [ 492.347981][T22725] ? __pfx_tcp_sendmsg+0x10/0x10 [ 492.352948][T22725] tcp_sendmsg+0x30/0x50 [ 492.357192][T22725] inet6_sendmsg+0x77/0xd0 [ 492.361689][T22725] __sock_sendmsg+0x8b/0x180 [ 492.366323][T22725] __sys_sendto+0x1a8/0x230 [ 492.370822][T22725] __x64_sys_sendto+0x78/0x90 [ 492.375552][T22725] x64_sys_call+0x29fa/0x2dc0 [ 492.380277][T22725] do_syscall_64+0xc9/0x1c0 [ 492.384813][T22725] ? clear_bhb_loop+0x55/0xb0 [ 492.389479][T22725] ? clear_bhb_loop+0x55/0xb0 [ 492.394163][T22725] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 492.400078][T22725] RIP: 0033:0x7f6e54545d29 [ 492.404488][T22725] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 492.424322][T22725] RSP: 002b:00007f6e52bb7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 492.432739][T22725] RAX: ffffffffffffffda RBX: 00007f6e54735fa0 RCX: 00007f6e54545d29 [ 492.440764][T22725] RDX: 0000000000000001 RSI: 00000000200000c0 RDI: 0000000000000007 [ 492.448804][T22725] RBP: 00007f6e52bb7090 R08: 0000000020b63fe4 R09: 000000000000001c [ 492.456763][T22725] R10: 0000000020000845 R11: 0000000000000246 R12: 0000000000000001 [ 492.464724][T22725] R13: 0000000000000000 R14: 00007f6e54735fa0 R15: 00007fffa0830948 [ 492.472690][T22725] [ 492.666925][ T29] kauditd_printk_skb: 618 callbacks suppressed [ 492.666940][ T29] audit: type=1326 audit(1736428912.108:30319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22735 comm="syz.3.7792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 492.739713][ T29] audit: type=1326 audit(1736428912.138:30320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22735 comm="syz.3.7792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 492.744574][T22738] netlink: 'syz.0.7793': attribute type 1 has an invalid length. [ 492.763410][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 492.763521][ T29] audit: type=1326 audit(1736428912.138:30321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22735 comm="syz.3.7792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 492.791363][T22743] 9pnet_fd: Insufficient options for proto=fd [ 492.801910][ T29] audit: type=1326 audit(1736428912.138:30322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22735 comm="syz.3.7792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 492.801948][ T29] audit: type=1326 audit(1736428912.138:30323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22735 comm="syz.3.7792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 492.855325][ T29] audit: type=1326 audit(1736428912.138:30324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22735 comm="syz.3.7792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=22 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 492.878885][ T29] audit: type=1326 audit(1736428912.138:30325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22735 comm="syz.3.7792" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe86e35d29 code=0x7ffc0000 [ 492.928704][T22745] loop0: detected capacity change from 0 to 128 [ 492.950356][T22745] nlmon0: entered promiscuous mode [ 492.969972][T22745] vlan0: entered promiscuous mode [ 492.981111][T22745] nlmon0: left promiscuous mode [ 493.043209][T22751] 9pnet: Could not find request transport: f [ 493.085818][T22755] netlink: 16 bytes leftover after parsing attributes in process `syz.0.7799'. [ 493.306432][T22764] syz_tun: entered promiscuous mode [ 493.333017][T22764] vlan0: entered promiscuous mode [ 493.350691][T22764] syz_tun: left promiscuous mode [ 493.371208][ T29] audit: type=1326 audit(1736428912.808:30326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22766 comm="syz.2.7804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd2ef655d29 code=0x7ffc0000 [ 493.395662][ T29] audit: type=1326 audit(1736428912.808:30327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22766 comm="syz.2.7804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd2ef655d29 code=0x7ffc0000 [ 493.419306][ T29] audit: type=1326 audit(1736428912.808:30328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22766 comm="syz.2.7804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd2ef655d29 code=0x7ffc0000 [ 493.564031][T22778] vcan0: entered promiscuous mode [ 493.569250][T22778] vlan0: entered promiscuous mode [ 493.587489][T22778] vcan0: left promiscuous mode [ 493.656619][ T3431] ================================================================== [ 493.664722][ T3431] BUG: KCSAN: data-race in io_sq_thread / io_uring_try_cancel_requests [ 493.672980][ T3431] [ 493.675302][ T3431] write to 0xffff888116bd30f8 of 8 bytes by task 22779 on cpu 1: [ 493.683018][ T3431] io_sq_thread+0xe68/0x10b0 [ 493.687616][ T3431] ret_from_fork+0x4b/0x60 [ 493.692034][ T3431] ret_from_fork_asm+0x1a/0x30 [ 493.696799][ T3431] [ 493.699122][ T3431] read to 0xffff888116bd30f8 of 8 bytes by task 3431 on cpu 0: [ 493.705828][T22788] FAULT_INJECTION: forcing a failure. [ 493.705828][T22788] name failslab, interval 1, probability 0, space 0, times 0 [ 493.706654][ T3431] io_uring_try_cancel_requests+0x18d/0x340 [ 493.719271][T22788] CPU: 1 UID: 0 PID: 22788 Comm: syz.0.7811 Not tainted 6.13.0-rc6-syzkaller-00051-geea6e4b4dfb8 #0 [ 493.725073][ T3431] io_ring_exit_work+0x148/0x500 [ 493.735796][T22788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 493.740701][ T3431] process_scheduled_works+0x483/0x9a0 [ 493.750732][T22788] Call Trace: [ 493.750740][T22788] [ 493.756159][ T3431] worker_thread+0x51d/0x6f0 [ 493.759458][T22788] dump_stack_lvl+0xf2/0x150 [ 493.762376][ T3431] kthread+0x1d1/0x210 [ 493.766940][T22788] dump_stack+0x15/0x1a [ 493.771501][ T3431] ret_from_fork+0x4b/0x60 [ 493.775552][T22788] should_fail_ex+0x223/0x230 [ 493.779678][ T3431] ret_from_fork_asm+0x1a/0x30 [ 493.784066][T22788] should_failslab+0x8f/0xb0 [ 493.788712][ T3431] [ 493.788717][ T3431] value changed: 0xffff888138eea100 -> 0x0000000000000000 [ 493.793446][T22788] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 493.798006][ T3431] [ 493.798011][ T3431] Reported by Kernel Concurrency Sanitizer on: [ 493.800308][T22788] ? __d_alloc+0x3d/0x340 [ 493.807392][ T3431] CPU: 0 UID: 0 PID: 3431 Comm: kworker/u8:7 Not tainted 6.13.0-rc6-syzkaller-00051-geea6e4b4dfb8 #0 [ 493.807413][ T3431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 493.807424][ T3431] Workqueue: iou_exit io_ring_exit_work SYZFAIL: failed to send rpc fd=3 want=4072 sent=0 n=-1 (errno 32: Broken pipe) [ 493.807443][ T3431] ================================================================== [ 493.851945][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 493.852299][T22788] __d_alloc+0x3d/0x340 [ 493.871865][T22788] ? security_inode_permission+0x4e/0xc0 [ 493.877594][T22788] d_alloc+0x2e/0x100 [ 493.881581][T22788] vfs_tmpfile+0xf1/0x4d0 [ 493.885924][T22788] do_tmpfile+0xa9/0x190 [ 493.890168][T22788] path_openat+0x1c4c/0x1fa0 [ 493.894791][T22788] ? _parse_integer_limit+0x167/0x180 [ 493.900232][T22788] ? _parse_integer+0x27/0x30 [ 493.904910][T22788] ? kstrtoull+0x110/0x140 [ 493.909331][T22788] ? kstrtouint_from_user+0xb0/0xe0 [ 493.914723][T22788] do_filp_open+0x107/0x230 [ 493.919254][T22788] ? __pfx_page_put_link+0x10/0x10 [ 493.924446][T22788] do_sys_openat2+0xab/0x120 [ 493.929113][T22788] __x64_sys_openat+0xf3/0x120 [ 493.934019][T22788] x64_sys_call+0x2b30/0x2dc0 [ 493.938795][T22788] do_syscall_64+0xc9/0x1c0 [ 493.943302][T22788] ? clear_bhb_loop+0x55/0xb0 [ 493.948059][T22788] ? clear_bhb_loop+0x55/0xb0 [ 493.952769][T22788] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 493.958680][T22788] RIP: 0033:0x7f6e54545d29 [ 493.963090][T22788] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 493.982688][T22788] RSP: 002b:00007f6e52bb7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 493.991091][T22788] RAX: ffffffffffffffda RBX: 00007f6e54735fa0 RCX: 00007f6e54545d29 [ 493.999089][T22788] RDX: 0000000000515a02 RSI: 0000000020000700 RDI: 0000000000000006 [ 494.007051][T22788] RBP: 00007f6e52bb7090 R08: 0000000000000000 R09: 0000000000000000 [ 494.015136][T22788] R10: 52abe154ad664f64 R11: 0000000000000246 R12: 0000000000000001 [ 494.023165][T22788] R13: 0000000000000000 R14: 00007f6e54735fa0 R15: 00007fffa0830948 [ 494.031129][T22788] [ 494.217098][ T11] bridge_slave_1: left allmulticast mode [ 494.222835][ T11] bridge_slave_1: left promiscuous mode [ 494.228491][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 494.236287][ T11] bridge_slave_0: left allmulticast mode [ 494.241955][ T11] bridge_slave_0: left promiscuous mode [ 494.247658][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 494.291761][ T11] gretap0 (unregistering): left promiscuous mode [ 494.374487][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 494.385122][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 494.394684][ T11] bond0 (unregistering): Released all slaves [ 494.446610][ T11] hsr_slave_0: left promiscuous mode [ 494.452364][ T11] hsr_slave_1: left promiscuous mode [ 494.458167][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 494.465616][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 494.473436][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 494.480806][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 494.491379][ T11] veth1_macvtap: left promiscuous mode [ 494.496912][ T11] veth0_macvtap: left promiscuous mode [ 494.539750][ T11] team0 (unregistering): Port device team_slave_1 removed [ 494.549549][ T11] team0 (unregistering): Port device team_slave_0 removed [ 494.875968][ T11] netdevsim netdevsim2 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 494.886299][ T11] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 494.924906][ T11] netdevsim netdevsim2 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 494.931778][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 494.935231][ T11] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 495.004322][ T11] netdevsim netdevsim2 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 495.014699][ T11] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 495.073797][ T11] netdevsim netdevsim2 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 495.084259][ T11] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 495.156485][ T11] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 495.203852][ T11] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 495.263965][ T11] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 495.314391][ T11] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 495.363597][ T11] bridge_slave_1: left allmulticast mode [ 495.369310][ T11] bridge_slave_1: left promiscuous mode [ 495.374994][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 495.382882][ T11] bridge_slave_0: left allmulticast mode [ 495.388509][ T11] bridge_slave_0: left promiscuous mode [ 495.394222][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 495.402204][ T11] bridge_slave_1: left allmulticast mode [ 495.407823][ T11] bridge_slave_1: left promiscuous mode [ 495.413702][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 495.421266][ T11] bridge_slave_0: left allmulticast mode [ 495.426929][ T11] bridge_slave_0: left promiscuous mode [ 495.432605][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 495.440662][ T11] bridge_slave_1: left allmulticast mode [ 495.446446][ T11] bridge_slave_1: left promiscuous mode [ 495.452085][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 495.459847][ T11] bridge_slave_0: left allmulticast mode [ 495.465556][ T11] bridge_slave_0: left promiscuous mode [ 495.471161][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 495.568851][ T11] gretap0 (unregistering): left promiscuous mode [ 495.580410][ T11] gretap0 (unregistering): left promiscuous mode [ 495.753735][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 495.763626][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 495.773116][ T11] bond0 (unregistering): Released all slaves [ 495.781095][ T11] bond1 (unregistering): (slave batadv1): Releasing active interface [ 495.790073][ T11] bond1 (unregistering): Released all slaves [ 495.798415][ T11] bond2 (unregistering): (slave batadv2): Releasing active interface [ 495.807893][ T11] bond2 (unregistering): Released all slaves [ 495.816323][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 495.826262][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 495.835989][ T11] bond0 (unregistering): Released all slaves [ 495.844460][ T11] bond1 (unregistering): (slave batadv1): Releasing active interface [ 495.853463][ T11] bond1 (unregistering): Released all slaves [ 495.861156][ T11] bond2 (unregistering): Released all slaves [ 495.869716][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 495.879385][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 495.888914][ T11] bond0 (unregistering): Released all slaves [ 495.897969][ T11] bond1 (unregistering): (slave batadv1): Releasing active interface [ 495.906759][ T11] bond1 (unregistering): Released all slaves [ 495.915067][ T11] bond2 (unregistering): (slave batadv2): Releasing active interface [ 495.924062][ T11] bond2 (unregistering): Released all slaves [ 495.932593][ T11] bond3 (unregistering): (slave batadv3): Releasing active interface [ 495.941350][ T11] bond3 (unregistering): Released all slaves [ 495.949780][ T11] bond4 (unregistering): (slave batadv4): Releasing active interface [ 495.958564][ T11] bond4 (unregistering): Released all slaves [ 495.964651][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 495.974237][ T11] bond5 (unregistering): (slave batadv5): Releasing active interface [ 495.983658][ T11] bond5 (unregistering): Released all slaves [ 496.026432][ T11] tipc: Disabling bearer [ 496.031679][ T11] tipc: Left network mode [ 496.036352][ T11] tipc: Disabling bearer [ 496.041643][ T11] tipc: Left network mode [ 496.087254][ T11] hsr_slave_0: left promiscuous mode [ 496.093049][ T11] hsr_slave_1: left promiscuous mode [ 496.098741][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 496.106259][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 496.113778][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 496.121142][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 496.129429][ T11] hsr_slave_0: left promiscuous mode [ 496.135176][ T11] hsr_slave_1: left promiscuous mode [ 496.140858][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 496.148370][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 496.155863][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 496.163287][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 496.171352][ T11] hsr_slave_0: left promiscuous mode [ 496.177028][ T11] hsr_slave_1: left promiscuous mode [ 496.185476][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 496.192929][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 496.200560][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 496.208027][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 496.220069][ T11] veth1_macvtap: left promiscuous mode [ 496.225613][ T11] veth0_macvtap: left promiscuous mode [ 496.231462][ T11] veth1_macvtap: left promiscuous mode [ 496.236990][ T11] veth0_macvtap: left promiscuous mode [ 496.244063][ T11] veth1_macvtap: left promiscuous mode [ 496.249597][ T11] veth0_macvtap: left promiscuous mode [ 496.338882][ T11] team0 (unregistering): Port device team_slave_1 removed [ 496.348771][ T11] team0 (unregistering): Port device team_slave_0 removed [ 496.394607][ T11] team0 (unregistering): Port device team_slave_1 removed [ 496.406217][ T11] team0 (unregistering): Port device team_slave_0 removed [ 496.449891][ T11] team0 (unregistering): Port device team_slave_1 removed [ 496.458981][ T11] team0 (unregistering): Port device team_slave_0 removed [ 496.487677][ T1036] lo speed is unknown, defaulting to 1000 [ 496.493423][ T1036] infiniband syz0: ib_query_port failed (-19) [ 497.001776][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 498.041835][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 499.081807][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 500.121827][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 501.161822][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 502.201886][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 503.241782][ C0] IPVS: lblc: UDP 224.0.0.2:0 - no destination available