last executing test programs: 5m38.319359453s ago: executing program 2 (id=3): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000180)='./file2\x00', 0xa00010, &(0x7f00000001c0), 0x21, 0x4bf, &(0x7f00000009c0)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.numa_stat\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0x4, 0x12) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a01080000000000000000020000000900020073797a2a0000000008000440000000000900010073797a3000000000080003"], 0x64}, 0x1, 0x0, 0x0, 0x810}, 0x40404) sendmsg$NFT_BATCH(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[], 0x74}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000380), 0x101bf) creat(&(0x7f0000000140)='./bus\x00', 0xa6) mount(&(0x7f0000000440)=@loop={'/dev/loop', 0x0}, &(0x7f0000000480)='./bus\x00', 0x0, 0x1000, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000040)={'erspan0\x00', {0x2, 0x0, @rand_addr=0x64010102}}) ioctl$LOOP_SET_STATUS64(r5, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x400, 0x0, 0x0, 0x1, 0xc, "ef35af413bb901527fe4d0ce5d29c3ee5e5c3676345a41499db7aac63a01000000000000004faa2ae2c084a0ea0000000000000000000c00002000", "036c47c67808200400000000000000335263bdbcef549ba197fce47ddfdd753abd950100002a00ffffffffffffffff00000000e8f20000000200", "b7326736181c208220000000b9000000000000000000f0fffffffff2ff00", [0x4]}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000300)={0x0, r4, 0x0, 0x2, 0x0, 0x9}) 5m37.760626514s ago: executing program 2 (id=6): inotify_add_watch(0xffffffffffffffff, 0x0, 0x400017e) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000001a00)=0x72b, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0xfffffffffffffffd, &(0x7f00000000c0)=0xa4) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000730000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[], 0x20) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x802, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1700000000009138150500ffffa5329521000000000000000000", @ANYBLOB="2b1227bf7eb7b63e5793b7df9794c0a85c30a3b74580c0a807b1f023fb2263327b6010925cd719873eef95a2dd40f018a6f0c9ce42f221ee7431d2033f1c9fc6ed479cfe8deb35273e6f4c1ef3d9fbad4467faf00c318af1d560a42f82be20476908283f2814f84ac87e6c024e3a6c"], 0x48) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x10) setsockopt$inet6_buf(r4, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r3, 0x0) r8 = syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x8, 0x80, 0x0, 0x4, 0x0, 0x7, 0x2, 0x0, 0x400e0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x3, 0x0, 0x8, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_FREEZE(r6, 0x400c620e, &(0x7f0000000000)={r8, 0x0, 0x6}) 5m35.041097216s ago: executing program 2 (id=40): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000f00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000280)={'gre0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2810, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x7, 0x2f, 0x0, @empty, @multicast1}}}}) (fail_nth: 11) 5m35.030771377s ago: executing program 32 (id=40): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000f00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000280)={'gre0\x00', &(0x7f0000000100)={'syztnl2\x00', 0x0, 0x2810, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x7, 0x2f, 0x0, @empty, @multicast1}}}}) (fail_nth: 11) 4m11.061951061s ago: executing program 1 (id=1481): bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRES64, @ANYRES64], 0x50) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='fsi_master_gpio_out\x00', r0, 0x0, 0x4}, 0x18) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='mmap_lock_acquire_returned\x00', r6, 0x0, 0x2}, 0x18) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000880)=[{&(0x7f0000000440)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000280)="0342", 0x2}], 0x1}], 0x1, 0x0) r7 = socket$inet6_mptcp(0xa, 0x1, 0x106) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYRES8=r1, @ANYRES32, @ANYRESOCT=r5, @ANYRESDEC=r2, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r9}, 0x10) getsockopt$SO_TIMESTAMP(r7, 0x1, 0x1d, 0x0, 0x0) semtimedop(0x0, 0x0, 0x0, 0x0) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000032c0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000240)=[{0x0}, {&(0x7f0000000300)="359c", 0x2}], 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="30000000000000008400000001000000000000000c", @ANYRES32=0x0], 0x30}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') syz_io_uring_setup(0x8d2, &(0x7f00000000c0)={0x0, 0xfffffffd, 0x3010}, &(0x7f0000000040), &(0x7f0000000140)) 4m10.175611989s ago: executing program 1 (id=1492): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0x7fffffff}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002a20702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)='kfree\x00', r1}, 0x18) r2 = socket(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r6 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000000180)={0x80000020}, 0x10) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001a00010000000000000000001c", @ANYRES32=r6], 0x30}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r5, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{}, 0x3548, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)=@newtfilter={0x44, 0x2c, 0xd27, 0x70bd29, 0x25dfdaff, {0x0, 0x0, 0x0, r5, {0x0, 0x6}, {}, {0xd}}, [@filter_kind_options=@f_bpf={{0x8}, {0x18, 0x2, [@TCA_BPF_OPS={{0x6, 0x4, 0x1}, {0xc, 0x5, [{0x27, 0xe, 0xf, 0x4}]}}]}}]}, 0x44}}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@base={0x1, 0x4, 0x2, 0xc}, 0x50) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000200)={r8, r7}, 0xc) 4m10.055903451s ago: executing program 1 (id=1495): perf_event_open(&(0x7f0000000fc0)={0x2, 0x80, 0x82, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0xc484, 0x0, 0x3, 0x4, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xc, &(0x7f0000000400)="001ca73e", 0x4) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000000)='S', 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, 0x0, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$netlink(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r4, 0x1, 0x200000, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x40840d4}, 0x0) dup(0xffffffffffffffff) r5 = socket$inet(0x2, 0x5, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x81, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$inet_opts(r5, 0x0, 0x4, &(0x7f0000000000)="89", 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001800)={0x6, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000c9500000000"], &(0x7f0000000300)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='kfree\x00', r2}, 0x18) 4m9.469566033s ago: executing program 1 (id=1505): creat(&(0x7f00000000c0)='./file0\x00', 0xce) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x26, 0x1, 0x1c, 0x4, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x8, 0x6}, 0x723, 0x76d, 0x0, 0x1, 0xa, 0x20005, 0x80b, 0x0, 0x7, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newqdisc={0x2c, 0x24, 0xf0b, 0x70bd29, 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7}]}, 0x2c}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@msize={'msize', 0x3d, 0x1000}}], [], 0x6b}}) 4m9.199654368s ago: executing program 1 (id=1510): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x7, [@fwd={0xf}, @enum={0x9, 0x7, 0x0, 0x6, 0x4, [{0x5, 0x4}, {0xd, 0xbb94}, {0xe, 0x6}, {0x1, 0x5}, {0xa, 0x7}, {0x3, 0xe}, {0xc, 0x8}]}, @float={0xa, 0x0, 0x0, 0x10, 0x10}, @volatile={0x10, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x5f, 0x0, 0x61, 0x30, 0x5f]}}, &(0x7f0000000380)=""/198, 0x87, 0xc6, 0x1, 0x3669e8cb}, 0x28) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) get_robust_list(0x0, &(0x7f0000000400)=0x0, &(0x7f00000004c0)) r2 = dup2(r1, 0xffffffffffffffff) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r2}, 0x10) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)=0x10) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYRES64=r3], &(0x7f00000000c0)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x35, '\x00', 0x0, 0x2, r0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000340)='io_uring_register\x00', r5}, 0x10) r6 = syz_io_uring_setup(0x223d, &(0x7f0000000100)={0x0, 0x57d9, 0x100, 0x0, 0x1cd}, &(0x7f0000000040), &(0x7f00000001c0)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000002c0)=0x0) get_robust_list(r7, &(0x7f0000000640)=&(0x7f0000000600)={&(0x7f0000000540)={&(0x7f0000000300)}, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)}}, &(0x7f0000000680)=0x18) io_uring_register$IORING_REGISTER_NAPI(r6, 0x1b, &(0x7f0000000000)={0xffff, 0x6}, 0x1) 4m9.154908129s ago: executing program 1 (id=1511): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r3 = io_uring_setup(0x31fa, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000140)=ANY=[@ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000840)=ANY=[@ANYBLOB="24010000", @ANYRES16=r6, @ANYBLOB="a183000000000000000005"], 0x124}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r8, @ANYRESHEX=r8], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="44000000090601060000000000000000000000000900020073797a310000000005000100070000001c0007800c00018008000140ffffffff0c000280080001407f00"], 0x44}, 0x1, 0x0, 0x0, 0x10040047}, 0x240008c4) sendmsg$IPSET_CMD_DESTROY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYRES32=r4], 0x74}, 0x1, 0x0, 0x0, 0x80c1}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES16=r9, @ANYRESHEX=r8, @ANYRESOCT=r7, @ANYRESHEX=r7, @ANYRES8, @ANYRESOCT=r7, @ANYRESOCT=r4, @ANYRES16=r3, @ANYRESDEC=r6], 0x48) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0xec, r2, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x5}, @NL80211_ATTR_MESH_ID={0xa}, @mon_options=[@NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "b520b1901c400c8b821769f382c6e2001f68933e4680b44a"}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "c4426757bb1c49f03927d86d41d91413a1032bc2922c5743"}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "d0cf38d62c2ce56fea46c8404b538fa924dbb83ab5944461"}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "239a53d79d6d387eda433bce81a0b9caaa0b47c1258f6dfc"}, @NL80211_ATTR_MNTR_FLAGS={0x8, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_ACTIVE={0x4}]}, @NL80211_ATTR_MNTR_FLAGS={0x14, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}]}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @device_b}], @NL80211_ATTR_IFTYPE={0x8}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x6}]}, 0xec}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004040) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000140), &(0x7f0000000040)='%pI4 \x00'}, 0x2a) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000540)='mm_vmscan_lru_isolate\x00', r10}, 0x18) r11 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r11, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r11, 0x1, 0x21, &(0x7f0000000000)=0xfffffffe, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), r11) ioctl$sock_SIOCETHTOOL(r11, 0x8946, &(0x7f00000000c0)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_link_settings={0x2, 0x0, 0x0, 0x40, 0x7, 0x0, 0x0, 0x0, 0x20, 0x8, [0x0, 0x0, 0x0, 0xc, 0x5, 0x0, 0x0, 0x2]}}) 3m54.096921712s ago: executing program 33 (id=1511): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r3 = io_uring_setup(0x31fa, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000140)=ANY=[@ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000840)=ANY=[@ANYBLOB="24010000", @ANYRES16=r6, @ANYBLOB="a183000000000000000005"], 0x124}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r8, @ANYRESHEX=r8], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="44000000090601060000000000000000000000000900020073797a310000000005000100070000001c0007800c00018008000140ffffffff0c000280080001407f00"], 0x44}, 0x1, 0x0, 0x0, 0x10040047}, 0x240008c4) sendmsg$IPSET_CMD_DESTROY(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYRES32=r4], 0x74}, 0x1, 0x0, 0x0, 0x80c1}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES16=r9, @ANYRESHEX=r8, @ANYRESOCT=r7, @ANYRESHEX=r7, @ANYRES8, @ANYRESOCT=r7, @ANYRESOCT=r4, @ANYRES16=r3, @ANYRESDEC=r6], 0x48) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0xec, r2, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x5}, @NL80211_ATTR_MESH_ID={0xa}, @mon_options=[@NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "b520b1901c400c8b821769f382c6e2001f68933e4680b44a"}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "c4426757bb1c49f03927d86d41d91413a1032bc2922c5743"}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "d0cf38d62c2ce56fea46c8404b538fa924dbb83ab5944461"}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "239a53d79d6d387eda433bce81a0b9caaa0b47c1258f6dfc"}, @NL80211_ATTR_MNTR_FLAGS={0x8, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_ACTIVE={0x4}]}, @NL80211_ATTR_MNTR_FLAGS={0x14, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}]}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @device_b}], @NL80211_ATTR_IFTYPE={0x8}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x6}]}, 0xec}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004040) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000140), &(0x7f0000000040)='%pI4 \x00'}, 0x2a) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000540)='mm_vmscan_lru_isolate\x00', r10}, 0x18) r11 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r11, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r11, 0x1, 0x21, &(0x7f0000000000)=0xfffffffe, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), r11) ioctl$sock_SIOCETHTOOL(r11, 0x8946, &(0x7f00000000c0)={'syz_tun\x00', &(0x7f0000000040)=@ethtool_link_settings={0x2, 0x0, 0x0, 0x40, 0x7, 0x0, 0x0, 0x0, 0x20, 0x8, [0x0, 0x0, 0x0, 0xc, 0x5, 0x0, 0x0, 0x2]}}) 3.023828541s ago: executing program 0 (id=5681): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d80)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0x13}]}}, 0x0, 0x26}, 0x20) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)={0x9, 0x4, 0x4, 0x2, 0x80, 0x1, 0x0, '\x00', 0x0, r0, 0x1, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0d0000000400000004000000a800000000000000", @ANYRES32=r1], 0x48) 3.023675441s ago: executing program 0 (id=5682): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='kfree\x00', r2, 0x0, 0xfffffffffffffffd}, 0x18) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x3c, 0x12, 0xa, 0x9, 0x0, 0x0, {0x2}, [@NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELOBJ={0x14, 0x14, 0xa, 0x3, 0x0, 0x0, {0x2}}], {0x14}}, 0x78}}, 0x0) 3.015600081s ago: executing program 0 (id=5683): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f0000000140), 0x1, 0x4fa, &(0x7f0000000ac0)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) quotactl$Q_QUOTAON(0xffffffff80000200, &(0x7f0000000000)=@sr0, 0xffffffffffffffff, 0x0) quotactl$Q_SETQUOTA(0xffffffff80000800, &(0x7f00000001c0)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000100)={0x7, 0x6, 0x7267, 0xb, 0x6, 0x1ffffffffff, 0x6, 0x9, 0x35}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000240), 0x208e24b) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000000, 0x100010, r3, 0x100000000) 2.759465006s ago: executing program 0 (id=5690): openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) (fail_nth: 11) 2.411998253s ago: executing program 0 (id=5692): syz_emit_ethernet(0x56, &(0x7f0000000000)={@local, @random="bb39c7444e53", @void, {@canfd={0xd, {{0x1, 0x0, 0x0, 0x1}, 0x2d, 0x1, 0x0, 0x0, "7f7c9513548495ededa29d59633d151c2141d54a54d9823ddaa09ccbdbf826682cd25cf7dd9c60e991252d64af19074a0522bbff76dd68f67f3caf09fe086781"}}}}, &(0x7f0000000080)={0x0, 0x3, [0x93e, 0xed, 0x55e, 0xc41]}) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xa4, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x48, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xa6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1ff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x49}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xe4b}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7c4b}]}]}, @TIPC_NLA_SOCK={0x40, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000001}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x45}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc176}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY_MASTER={0x4}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x20008800}, 0xc000) sendmsg$NL80211_CMD_GET_SURVEY(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1a0094407e4a41e3}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x8, 0x70bd27, 0x25dfdbfe, {{}, {@void, @void}}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20040050}, 0x4044002) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$USBDEVFS_SUBMITURB(r2, 0x8038550a, &(0x7f0000000400)=@urb_type_control={0x2, {0x1}, 0x9, 0x4, &(0x7f0000000380)={0x87, 0x62, 0x3, 0x5, 0x5}, 0x8, 0x6, 0xfffffff8, 0x0, 0x4, 0x7fff, &(0x7f00000003c0)="c74bc0095331a1d41e1d408aeddf72d81090af302774368f9a0752ba"}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000480)=@deltaction={0x27c, 0x31, 0x800, 0x70bd2b, 0x25dfdbff, {}, [@TCA_ACT_TAB={0x6c, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}, {0xc, 0x13, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x30000000}}, {0x10, 0x3, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0xc, 0x19, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0xc, 0x15, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x53817795}}, {0xc, 0x4, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0x13, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}]}, @TCA_ACT_TAB={0x40, 0x1, [{0xc, 0x10, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x95}}, {0xc, 0xa, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffb}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0xc, 0x8, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xaad}}, {0xc, 0x5, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}]}, @TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x7, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}, {0xc, 0xc, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}]}, @TCA_ACT_TAB={0x90, 0x1, [{0x10, 0x1b, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0xc, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x5, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0xc, 0xf, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0xd, 0x0, 0x0, @TCA_ACT_KIND={0xa, 0x1, 'pedit\x00'}}, {0xc, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0xb, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'police\x00'}}, {0x10, 0x1e, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}]}, @TCA_ACT_TAB={0x30, 0x1, [{0xc, 0x17, 0x0, 0x0, @TCA_ACT_KIND={0x7, 0x1, 'xt\x00'}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x14, 0x10, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}]}, @TCA_ACT_TAB={0x38, 0x1, [{0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x1a, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}, {0x10, 0x10, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0xc, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}]}, @TCA_ACT_TAB={0x6c, 0x1, [{0xc, 0x1f, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfb2}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x4, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x3, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0xc, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x175}}, {0xc, 0x8, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x9cb}}]}, @TCA_ACT_TAB={0x3c, 0x1, [{0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'csum\x00'}}, {0x10, 0x1f, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0xc, 0x1e, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}]}]}, 0x27c}, 0x1, 0x0, 0x0, 0x4040801}, 0x8) r3 = shmget$private(0x0, 0x4000, 0x40, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_RMID(r3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f00000008c0)={'batadv_slave_0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0x20, &(0x7f0000000a40)={&(0x7f0000000940)=""/77, 0x4d, 0x0, &(0x7f00000009c0)=""/127, 0x7f}}, 0x10) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000ac0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xffffb2db, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x2}, 0x50) pipe2$watch_queue(&(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{0x1, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000c40)={0xffffffffffffffff, 0xe, 0x8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x7, 0x4, &(0x7f0000000780)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0xb}, @ldst={0x1, 0x2, 0x0, 0x0, 0x9, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f00000007c0)='syzkaller\x00', 0x61, 0x81, &(0x7f0000000800)=""/129, 0x41000, 0x0, '\x00', r4, @fallback=0x2c, 0xffffffffffffffff, 0x8, &(0x7f0000000900)={0xa, 0x3}, 0x8, 0x10, 0x0, 0x0, r5, 0xffffffffffffffff, 0x1, &(0x7f0000000c80)=[0xffffffffffffffff, r2, r6, r8, 0xffffffffffffffff, 0xffffffffffffffff, r9, r10], &(0x7f0000000cc0)=[{0x5, 0x1, 0xf, 0x8}], 0x10, 0xffffffff}, 0x94) getsockopt$IP_SET_OP_GET_FNAME(r0, 0x1, 0x53, &(0x7f0000000dc0)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f0000000e00)=0x2c) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r8, 0xc0189373, &(0x7f0000000e40)={{0x1, 0x1, 0x18, r10, {0x5dc8}}, './file0\x00'}) ioctl$TUNGETIFF(r11, 0x800454d2, &(0x7f0000000e80)={'bond0\x00'}) r12 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_PRI(r11, &(0x7f0000000fc0)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000f80)={&(0x7f0000000f00)={0x68, 0x0, 0x200, 0x70bd2d, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x5, @link='syz1\x00'}}}, ["", "", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000001000)=@base={0x14, 0xc, 0x9, 0x8, 0x10, 0x1, 0x5a, '\x00', r4, 0xffffffffffffffff, 0x1, 0x5, 0x2}, 0x50) r14 = socket$inet_sctp(0x2, 0x1, 0x84) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x4000010, r14, 0xa3027000) lsetxattr$trusted_overlay_opaque(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0), &(0x7f0000001100), 0x2, 0x2) socket(0x2c, 0x8, 0x3) fchdir(r7) ioctl$INOTIFY_IOC_SETNEXTWD(r13, 0x40044900, 0x4) sendmsg$DEVLINK_CMD_RATE_DEL(r12, &(0x7f0000001240)={&(0x7f0000001140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001200)={&(0x7f00000011c0)={0x40, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}, @handle=@pci={{0x8}, {0x11}}]}, 0x40}, 0x1, 0x0, 0x0, 0x880}, 0x40008d0) 1.929694952s ago: executing program 0 (id=5700): socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) signalfd4(0xffffffffffffffff, &(0x7f0000000500), 0x8, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0500000004000000ff0f0000070000000000000005869284be2706223fa77f36531d9a56e8905ae220a4be397f98a447840707b12abb6957e2da607a2306efbe89789a239d2d564b12fe7c23f2e4e68d7db41acdd726fae1b3de04005ba799cbcaed3ed6f6ab4a2d2f4795561d2da07f37", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001400)={0x1a, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000013c0)='mm_page_pcpu_drain\x00', r1}, 0x18) creat(&(0x7f00000000c0)='./file0\x00', 0x3) syz_io_uring_setup(0xe4d, &(0x7f0000000380)={0x0, 0x5f3b, 0x2, 0x1, 0x40402bc}, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000180)=ANY=[], 0x5000) bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) r2 = msgget$private(0x0, 0x3fc) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) unshare(0x24040000) prctl$PR_SET_NAME(0xf, &(0x7f00000001c0)='w\xde\xa3\x05\xff\a\x00\x00\x00\x00\x00\x00\x8f\xc0\x9b\x86\xef\\\xc0\x89\av\x9f\xd6\xd1\x98<\xc8\x18E/\x8c\x1a\xe3\xbd') r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='kmem_cache_free\x00', r5}, 0x10) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) poll(0x0, 0x0, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x18) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5c01000010001307fefffffffcdbdf252001000000000000000000000000000120010000000000000000000000000001000000004e210002020000206c000000", @ANYRES32=0x0, @ANYRES8=r2, @ANYBLOB="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", @ANYRES32, @ANYBLOB="7195"], 0x15c}, 0x1, 0x0, 0x0, 0x880}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f000000fa80), r7) sendmsg$TIPC_CMD_SET_LINK_TOL(r7, &(0x7f000000fb80)={0x0, 0x0, &(0x7f000000fb40)={&(0x7f0000001280)=ANY=[@ANYBLOB="6800000090bc5e10ff1a06fb4c20ba4c8f0560d610cb0c396937b6f6ac65a5159b330df3729ec934a497cdc6edfaad019b808a97bf282e132ac6ea96cf1ef6ff7e229ec0dac68488bc28b578cdabb15e23f80e4db24faf2374f89ee718b6cb8da39a59297c827e9787afc65f347743568d3d876a1ee2f3a6bf0a773c39f3e13dadf83b41d3086d8021ef3385bde01b7f5b2bfd17a31282fe513fc6ffd97df3", @ANYRES16=r8, @ANYBLOB="01002cbd7000ffdbdf25010000000000000007410000004c0018fffffffb75647000"/98], 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x40010) socket$kcm(0x10, 0x400000002, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 1.614191178s ago: executing program 4 (id=5703): r0 = socket$netlink(0x10, 0x3, 0xa) socket$netlink(0x10, 0x3, 0x10) r1 = getpid() r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0xfffc}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}]}], {0x14}}, 0x7c}}, 0x44) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000240)=0xa9a, 0x4) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, 0xffffffffffffffff, 0x0) sched_getparam(r1, &(0x7f0000000000)) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r0) sendmsg$NL80211_CMD_NEW_MPATH(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x58, r3, 0x20, 0x70bd27, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0xa}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x58}, 0x1, 0x0, 0x0, 0x4004804}, 0x2) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="ac0000000001010400000000000000000a0000003c0001802c00018014000300fe8000000000000000000000000000aa14000400ff0100000000000000000000000000010c00028005000100000000003c0002802c00018014000300fe8000000000000000000000000000aa14000400fe8800000000000000000000000000010c00028005000100000000000800074000000000180006801400040020010000000000000000000000000001"], 0xac}, 0x1, 0x0, 0x0, 0xc001}, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='kfree\x00', r7, 0x0, 0xfffffffffffffffd}, 0x18) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000005c00)={&(0x7f0000000000)=@newtaction={0xa0, 0x30, 0x9, 0xfffffffc, 0x0, {}, [{0x8c, 0x1, [@m_bpf={0x88, 0x1, 0x0, 0x0, {{0x8}, {0x60, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x7}, @TCA_ACT_BPF_OPS={0x3c, 0x4, [{}, {}, {0x6}, {}, {0x0, 0x0, 0xfe}, {0xf792}, {0x3}]}, @TCA_ACT_BPF_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa0}}, 0x0) r9 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r0, &(0x7f0000000600)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000640)={0x20, 0x1406, 0x300, 0x70bd27, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$EVIOCGREP(r9, 0x80084503, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r4, &(0x7f0000000300)={0x0, 0x3a00, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="ac0000000001010400000000000000000a0000003c0001802c000180140003000000000000000000000000000000000014000400ff0100000000000000000000000000010c00028005000100000000003c0002802c00018014000300fe8000000000000000000000000000aa14000400fe8000000000000000000000000000aa0c00028005000100000000000800074000000000180006801400040020010000000000000000000000000001"], 0xac}, 0x1, 0x0, 0x0, 0x4000}, 0x4000894) 1.494907221s ago: executing program 4 (id=5711): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x65, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000001680)=ANY=[@ANYBLOB="1800000000030000000000000000000095"], &(0x7f0000001700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2000000}, 0x94) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)=@generic={0x0, r1}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'geneve1\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000004640)={&(0x7f0000000540)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x0) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1802000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc0004}]}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x20000000000002b8, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x8000, 0x0, 0x0, 0x41000}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) lsetxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000000)={r5, @broadcast, @broadcast}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000003380)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000006cfa000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x100, 0x7d, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x96) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r11, 0xffffffffffffffff}, 0x4) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000020000007b8a00fe0000000087080000000000007b8af0ff00000000bda100000000000027000000f8ffffffbfa400000000000007040000f0ffffffb70200000200000018230000", @ANYRES32=r12, @ANYBLOB="0000000000000000b704000008000000850000004900000095"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r13, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="7638300c000000000000e9000000", 0x0, 0x2f000000, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r10, 0x0, 0xfffffffffffffffe}, 0x18) 1.411483592s ago: executing program 4 (id=5715): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, &(0x7f0000000240)}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000040000000400"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, &(0x7f00000004c0), &(0x7f0000001c40)=r1}, 0x20) r2 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0xfffffd2b}, {0x0}], 0x2, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x0) (fail_nth: 12) 1.378547423s ago: executing program 3 (id=5717): r0 = getpid() r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$setownex(r1, 0xf, &(0x7f0000000000)={0x1, r0}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x200000000006, 0xc0, 0x0, 0x7ffc0001}]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r2}, 0x10) kexec_load(0x3e00, 0x0, 0x0, 0x0) r3 = syz_pidfd_open(r0, 0x0) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0), 0x1) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x2}}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, @NFT_MSG_NEWRULE={0x44, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x1c, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @cmp={{0x8}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CMP_SREG={0x8, 0x1, 0x1, 0x0, 0x9}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xb8}, 0x1, 0x0, 0x0, 0x4}, 0x40050) prctl$PR_SET_NAME(0xf, &(0x7f0000000340)='data_err=ignore') sched_getattr(r0, &(0x7f0000000100)={0x38}, 0x38, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000040)={0x0, 0x140000, 0x0, 'queue0\x00'}) r6 = syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1018e58, &(0x7f00000005c0)={[{@noblock_validity}, {@min_batch_time={'min_batch_time', 0x3d, 0x8}}, {@data_err_ignore}, {@max_batch_time={'max_batch_time', 0x3d, 0x8c9}}, {@nodiscard}, {@inlinecrypt}, {@i_version}]}, 0x6, 0x5fc, &(0x7f0000001000)="$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") close_range(r3, r6, 0x2) sched_setscheduler(r0, 0x0, &(0x7f0000000300)=0xfffffff7) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r7, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x48, 0x0, 0x1, 0x707, 0x0, 0x0, {0x1, 0x0, 0x4}, [@CTA_STATUS_MASK={0x8, 0x1a, 0x1, 0x0, 0x6}, @CTA_TUPLE_ORIG={0x14, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_STATUS_MASK={0x8, 0x1a, 0x1, 0x0, 0xfffffff8}, @CTA_TUPLE_ORIG={0x10, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x8c}}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x20008005}, 0x40) 1.373851233s ago: executing program 5 (id=5718): prlimit64(0x0, 0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) ioprio_set$uid(0x3, 0x0, 0x0) r0 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000040)='./bus\x00', 0x143142, 0x80) ftruncate(r2, 0x2007ffb) sendfile(r2, r2, 0x0, 0x1000000201005) (fail_nth: 5) 811.382134ms ago: executing program 6 (id=5719): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b000000000000000000040015960000000015bc", @ANYRES32, @ANYBLOB="ff0f00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000000050000000500"/28], 0x50) r2 = open(&(0x7f0000000280)='.\x00', 0x80, 0x122) getpeername$tipc(r2, &(0x7f00000006c0)=@id, &(0x7f0000000700)=0x10) fcntl$notify(r2, 0x402, 0x8000003d) fcntl$setown(r2, 0x8, 0xffffffffffffffff) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000a00)={{r2, 0xffffffffffffffff}, &(0x7f0000000980), &(0x7f00000009c0)='%pS \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xb, 0x13, &(0x7f00000007c0)=@raw=[@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @generic={0x81, 0x2, 0x3, 0x2, 0x6}, @map_val={0x18, 0x2, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x5}, @alu={0x7, 0x0, 0x0, 0x1, 0x0, 0x100, 0x8}], &(0x7f0000000880)='GPL\x00', 0xa9ae, 0x16, &(0x7f00000008c0)=""/22, 0x41100, 0x7a, '\x00', 0x0, @fallback=0x2a, r2, 0x8, &(0x7f0000000900)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000940)={0x0, 0x8, 0x14, 0xffff8001}, 0x10, 0xffffffffffffffff, r2, 0x3, &(0x7f0000000a40)=[r2, r2, r2, r3, r1, r1, r2], &(0x7f0000000a80)=[{0x1, 0x3, 0x9, 0x9}, {0x2, 0x4, 0xb, 0xb}, {0x1, 0x3, 0xd, 0xb}], 0x10, 0xffff346c}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0x20, &(0x7f0000000500)={&(0x7f0000001bc0)=""/4096, 0x1000, 0x0, &(0x7f0000000740)=""/46, 0x2e}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000005c0)=@bpf_lsm={0x1d, 0x16, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000e20000000000000001f8ffff18110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b70300000000850000000c000000b7000000000000008510000000000000a569010010000000bf91000000000000b7020000010000008500000084000000b700000000a450fea2b6478a070000009500"], &(0x7f0000000200)='GPL\x00', 0x1000, 0x64, &(0x7f0000000400)=""/100, 0x1f00, 0x22, '\x00', 0x0, 0x1b, r2, 0x8, &(0x7f0000000240)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000480)={0x2, 0xc, 0x6, 0x3}, 0x10, r4, 0x0, 0x2, 0x0, &(0x7f0000000580)=[{0x5, 0x5, 0x9, 0xc}, {0x0, 0x3, 0xc, 0x1}], 0x10, 0x200}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'team_slave_0\x00', 0x0}) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'ipvlan0\x00', 0x0}) r9 = add_key$keyring(&(0x7f00000004c0), &(0x7f0000000780)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_MOVE(0x1e, 0x0, r9, 0xffffffffffffffff, 0x1) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000680), 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="400000001000030500000000fddbdf0000000000", @ANYRES32=0x0, @ANYBLOB="02880100373004002000128008000100687372001400028008000100", @ANYRES32=r6, @ANYBLOB="08000200", @ANYRES32=r8], 0x40}}, 0x4008054) 811.151044ms ago: executing program 4 (id=5720): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='kfree\x00', r2, 0x0, 0xfffffffffffffffd}, 0x18) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x3c, 0x12, 0xa, 0x9, 0x0, 0x0, {0x2}, [@NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELOBJ={0x14, 0x14, 0xa, 0x3, 0x0, 0x0, {0x2}}], {0x14}}, 0x78}}, 0x0) 772.936895ms ago: executing program 3 (id=5721): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="440000000301030000000000000000000a0000470a0000802c000180140003", @ANYRESHEX=0x0, @ANYRES64=r0], 0x44}, 0x1, 0x0, 0x0, 0x20004000}, 0x604c050) 757.982865ms ago: executing program 4 (id=5722): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000002c0)='kfree\x00', r1, 0x0, 0x2}, 0x18) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) close(r2) 732.099265ms ago: executing program 3 (id=5723): r0 = socket(0x2, 0x80805, 0x0) getsockopt$bt_hci(r0, 0x84, 0x1, 0x0, &(0x7f0000000000)=0x54) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x6, [@union={0x5, 0x6, 0x0, 0x5, 0x1, 0x5, [{0xc, 0x5, 0x1}, {0x10, 0x1, 0xffffffff}, {0x10, 0x5, 0x8}, {0x8, 0x800003, 0xf}, {0x7, 0x4, 0x401}, {0x4, 0x3, 0xb}]}, @ptr={0x10}, @float={0x6, 0x0, 0x0, 0x10, 0x4}, @volatile={0x4, 0x0, 0x0, 0x9, 0x1}, @struct={0x4, 0x4, 0x0, 0x4, 0x0, 0x1, [{0xe, 0x5, 0xa239eee}, {0xe, 0x4}, {0x9, 0x4, 0x3}, {0xe, 0x4, 0x10}]}]}, {0x0, [0x0, 0x6f, 0x2e, 0x61]}}, &(0x7f0000000040)=""/41, 0xd2, 0x29, 0x1, 0xfffffff8}, 0x28) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000680)={'syztnl2\x00', &(0x7f0000000600)={'gretap0\x00', 0x0, 0x10, 0x8, 0xd, 0x3, {{0x15, 0x4, 0x1, 0x5, 0x54, 0x64, 0x0, 0xa6, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, {[@timestamp_addr={0x44, 0x2c, 0xdf, 0x1, 0x6, [{@rand_addr=0x64010100}, {@loopback, 0x1}, {@loopback}, {@multicast2, 0x100}, {@remote, 0x83}]}, @end, @cipso={0x86, 0x10, 0x3, [{0x1, 0xa, "5b09fbc87fb9072a"}]}]}}}}}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000740)={0x2, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x2, 0x4, &(0x7f0000000900)=ANY=[@ANYBLOB="0800000000000000300800f0ffffff950000000000000000000000000000000082f652a55fb3709e0b0afcfe408cf0795783382047946f8d253a7e0a7e7ed8bee7c370b9822dffd401174ad93831892d4adeb23c63003eec774b8313d43f1ee29b522d5171e2ffd962260b3d9d32e511f67d1dcdd8e22f6c6282dd898250f2dab052bb303135ea03691a966273d925"], &(0x7f0000000300)='syzkaller\x00', 0x101, 0xd, &(0x7f00000003c0)=""/13, 0x41100, 0x44, '\x00', r7, @fallback=0x22, r3, 0x8, &(0x7f00000006c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000700)={0x0, 0x9, 0xcf, 0x2}, 0x10, r8, r6, 0x0, &(0x7f0000000780)=[r4, r4, r4], 0x0, 0x10, 0x3}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x18) sendmsg$key(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="020900000700000000000000000000000500", @ANYRES32], 0x38}}, 0x0) 730.760875ms ago: executing program 4 (id=5724): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) syz_open_procfs(0x0, &(0x7f0000000840)='map_files\x00') r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x3, &(0x7f0000000440)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) timerfd_create(0x0, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x2, 0x0, 0x1fb4216c, 0xfffffffffffffffd, 0x3, 0x0, 0x0, 0xe}, 0x0, &(0x7f0000000300)={0x3ff, 0x7e7, 0x0, 0x9, 0x3, 0x0, 0x7fffffff}, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000380)=0x1c) socket$packet(0x11, 0x2, 0x300) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r6 = openat$selinux_policy(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000b, 0x12, r6, 0x0) write$selinux_load(r5, &(0x7f0000000000)=ANY=[], 0x2000) socket$inet6_sctp(0xa, 0x801, 0x84) 671.841276ms ago: executing program 3 (id=5725): shmget$private(0x0, 0x13000, 0x1, &(0x7f0000feb000/0x13000)=nil) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() close(0xffffffffffffffff) timer_create(0x1, &(0x7f0000000000)={0x0, 0x4, 0x4, @thr={&(0x7f0000000380)="b599cdfe2d05240c102eb6037a7eb3df02e77e9e150c9e4c3b244534aca29590cb4f087b9f799a077f5e707362c90d10c2ea8c11f60b8ce1a1a29d50d482eda0fc3258d6896615982a6f7233a444f980c6e5ee", &(0x7f0000000880)="210aa34de058b6bcd983bd970c133d731c9d41f540a96c1f665e4f954b6679130617ac9734bf72fecd2ceb9894057ba38a1087282bf3901c16ba8e485d79e229b7baf69bd4fe32d4d1163ddcf1b2e1ab3b594d1fa7a66f9ce54cbdb5ed5f021355dd7279cdd2af54954b2d8bf236880fd079859539f1b6a8c1e7ed2599977bcd27785281d7a7a454b831e8a675a8e7fe9dff"}}, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000480)=""/196, 0xc4}], 0x1, &(0x7f0000000580)=""/223, 0xdf}, 0x99}], 0x1, 0x10003, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x5, &(0x7f0000000c40)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000022850000000500000095", @ANYBLOB="1695ee7c793a69fca976208de2c6ed01bc8649fcdeaaa2ebcb03bcaf97bd507fbe68e57a8fb50bdf9d1a78", @ANYRESHEX=r0, @ANYRESHEX=r1, @ANYRES8=r3, @ANYBLOB="66fbdb9dbf14fd9b7baec902ab22a5b8951e44c21de881556a8a4aec37dcef71899b3c245496a6e26de530b30271ae1ccf841ca876b33bdd573a2993433ce2af62ab0d5fa48708dd173dba4286f16704c2de5f42d50b036761240b9dcb6df65e01829f76cca4b2b20fa8aed79e7b3fec934fbafb7fc0f8bcbe5104a6959df0e7eb93b03e5c089929ac1e9065315dc98a176c9f9b869a0ce8df18d44c26c14d5a60659be9969dca61a8"], &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) add_key(&(0x7f0000000040)='.request_key_auth\x00', 0x0, &(0x7f0000000840)='\x00\x00\x00\x00\x00\x00\x00\x00\x00*\x00\x00', 0xc, 0xffffffffffffffff) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_usb_connect$hid(0x4, 0x36, &(0x7f0000000280)=ANY=[], 0x0) close_range(r6, 0xffffffffffffffff, 0x0) writev(r3, 0x0, 0x19) syz_socket_connect_nvme_tcp() bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BTRFS_IOC_GET_FEATURES(r2, 0x80189439, &(0x7f00000000c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r7, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r7, 0x0, 0x29, &(0x7f0000000000)=ANY=[], 0x57) 671.636007ms ago: executing program 6 (id=5726): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000001640)={&(0x7f0000001700)=ANY=[@ANYBLOB="540200001600050000000000fedbdf25ff0100000000000000000000000000010a0101010000000000000000000000004e2200004e2300000a00200021000000", @ANYRES32=r0, @ANYRES32, @ANYBLOB="fc0000000000000000000000000000000000000033000000e0000002000000000000000000000000060000000000000019d000000000000009000000000000000000000000000000000000000000000008000000000000000000000000000000ff030000100000000300000000000000ffffffff00000000ffffff7f000000000900000000000000000000007f000000070000002bbd7000000000000200013f000000000000000001000000060000002c001300200100000000000000000000000000010000000000000000000000020000001c00040003004e204e210000fe"], 0x254}}, 0x40808) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00'}) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/168, 0xa8}], 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800001965ba917c62e1e690e400210061010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x2000000, 0xe, 0x0, &(0x7f00000004c0)="630b008646dc3f0adf33c9f7b986", 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x1) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) write$binfmt_format(r3, &(0x7f0000000100)='0\x00', 0x2) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$qrtrtun(r3, &(0x7f0000000300)="ca0e808bb35b", 0x6) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r4, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=[0x7, 0x5], 0x0, 0x0, 0x2}}, 0x40) creat(&(0x7f00000000c0)='./file0\x00', 0x80) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000a80)={0x14, 0x55, 0x1, 0x0, 0x0, {0x7}}, 0x14}, 0x1, 0x0, 0x0, 0x4c504}, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r6, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0xfffffcf4}, {0x0}], 0x2, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x0) 654.436897ms ago: executing program 5 (id=5727): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x7fff}, 0x18) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f00000000c0)="010001000000000000001000015b097ead85847817353d2dbad05dd5", 0x1c, 0xffffffffffffffff) 640.627487ms ago: executing program 5 (id=5728): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) openat$binfmt(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x8, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x4}, 0x100, 0x10000, 0x7, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "8a37f2", 0x8, 0x2c, 0x0, @remote, @local, {[], {{0x1100, 0x5, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000140)={0x100000001, {{0xa, 0x0, 0xfffffffd, @mcast2, 0x5}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000580)={0x1, {{0xa, 0x0, 0x4, @mcast2}}}, 0x90) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) memfd_secret(0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000001200)={[{@nodiscard}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@dioread_lock}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0xeb}}, {@abort}, {@user_xattr}, {@bh}, {@errors_remount}]}, 0x1, 0x55f, &(0x7f0000000580)="$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") 466.120601ms ago: executing program 5 (id=5729): socket$nl_route(0x10, 0x3, 0x0) (async) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'lo\x00'}) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000800)={&(0x7f0000000180)='mm_vmscan_write_folio\x00', r2}, 0x18) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000"], 0x50) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000fe000000004b64ffec850000007d00000004000000070000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x2000410, &(0x7f0000000000)={[{@bsdgroups}, {@jqfmt_vfsv1}]}, 0xc1, 0x7da, &(0x7f0000000fc0)="$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") (async) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)=0x0) timer_settime(r5, 0x1, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x86, 0x2, 0x0, 0x0, 0xfffffffc) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) (async) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000900)=[@in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x0, 0x0, @loopback, 0x7ff}], 0x2c) sendto$inet6(r6, &(0x7f0000000240)='\x00', 0x1, 0x0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback, 0x5}, 0x1c) socket$nl_route(0x10, 0x3, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000003c0)=@ax25={{0x3, @netrom}, [@rose, @remote, @rose, @default, @netrom, @null, @default, @rose]}, 0x80, &(0x7f0000000680)=[{&(0x7f00000004c0)=""/96, 0x60}, {&(0x7f0000000340)=""/21, 0x15}, {&(0x7f0000000540)=""/215, 0xd7}, {&(0x7f0000000640)=""/40, 0x28}], 0x4, &(0x7f00000006c0)=""/244, 0xf4}, 0x20) r7 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r7, 0x6, 0x0, 0x0, 0x0) r8 = fsmount(r7, 0x0, 0x9) fchdir(r8) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x0, 0x0) 441.199481ms ago: executing program 6 (id=5730): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x21081e, &(0x7f00000005c0)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4}}, {@grpid}]}, 0x1, 0x4f2, &(0x7f0000000600)="$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") (fail_nth: 22) 441.024671ms ago: executing program 5 (id=5731): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='kfree\x00', r2, 0x0, 0xfffffffffffffffd}, 0x18) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWSET={0x3c, 0x12, 0xa, 0x9, 0x0, 0x0, {0x2}, [@NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELOBJ={0x14, 0x14, 0xa, 0x3, 0x0, 0x0, {0x2}}], {0x14}}, 0x78}}, 0x0) 357.515793ms ago: executing program 6 (id=5732): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xfffffffd, {0x0, 0x0, 0x0, r3, {0x0, 0x1}, {0xffff, 0xffff}, {0xffe0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x84ff, &(0x7f0000000300)={&(0x7f0000000340)=@newtfilter={0x3c, 0x2c, 0xf3f, 0x30bd29, 0x25dfdbfc, {0x0, 0x0, 0x0, r3, {0x2, 0x9}, {}, {0x7, 0x300}}, [@filter_kind_options=@f_flower={{0xb}, {0xc, 0x2, [@TCA_FLOWER_KEY_ETH_TYPE={0x6, 0x8, 0x86dd}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20041090}, 0x0) 116.888457ms ago: executing program 5 (id=5733): r0 = socket(0xa, 0x5, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x100b28, 0x6, 0x0, 0x7, 0x9, 0x20005, 0x80, 0x0, 0x0, 0x0, 0x20000009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r2, &(0x7f00000002c0)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000009, 0x12, r2, 0x0) sendto$inet6(r0, &(0x7f0000000740)="d248f569276267c819276697fa4ba991cc9060c26c01b9e3f6c10ac7b179c965e49ff8ebad9adbe85b4a25fa240293031c93bdce618591750ad500e2d2cec7157a2b7f712263ea178a53907cc4c59062cc24", 0x52, 0x4004005, &(0x7f0000000100)={0xa, 0x4e24, 0xb, @loopback, 0xc5f}, 0x1c) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'gre0\x00', 0x0}) bind$packet(r3, &(0x7f0000000300)={0x11, 0x1b, r4, 0x1, 0xfc, 0x6, @local}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x4, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={r2, 0xffffffffffffffff}, 0x4) dup(r1) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r7, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r8}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000540)={'ip6tnl0\x00', 0x0, 0x2f, 0x7, 0x6, 0x461a, 0x20, @empty, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7, 0x1, 0xf9, 0x2}}) r10 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x19, &(0x7f0000000240)=ANY=[@ANYBLOB="000900000000040004040000006500000010000014b51fd7e28a652e", @ANYRES32=r2, @ANYBLOB="000000000000000018220000", @ANYRES32=r0, @ANYBLOB="000000000800000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180000000000000000000000010000801867000009000000000000000000000018140000", @ANYRES32=r6, @ANYBLOB="000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095a81800040000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x200, 0xd2, &(0x7f0000000440)=""/210, 0x41000, 0x30, '\x00', r9, 0x19, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000005c0)={0x1, 0x0, 0x7f, 0x1800}, 0x10, 0x282dd, r2, 0x0, &(0x7f0000000640)=[r10, r2, r2], 0x0, 0x10, 0x80}, 0x94) 46.710079ms ago: executing program 3 (id=5734): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) creat(0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, 0x0, 0x0) 46.533319ms ago: executing program 6 (id=5735): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0x8}, 0x18) fsopen(&(0x7f00000003c0)='bpf\x00', 0x0) 45.844339ms ago: executing program 6 (id=5736): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x20, 0xcf, 0x0, 0xfffff010}, {0x6, 0x0, 0x0, 0x4}]}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x2e, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x330b9072}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='kvm_dirty_ring_push\x00', r1, 0x0, 0x4}, 0x18) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000060000000000000000008500000007000000850000000e00000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000012c0)={&(0x7f0000000040)='kfree\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) io_setup(0x6, &(0x7f0000000680)=0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) io_submit(r4, 0x2, &(0x7f00000001c0)=[&(0x7f0000000000)={0x180a, 0x0, 0x3, 0x1, 0x80, r3, 0x0}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x3, r3, &(0x7f00000006c0)="5810235a8c132d765b", 0x9, 0x1}]) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r6 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r5, &(0x7f00000005c0)=ANY=[], 0xfdef) 0s ago: executing program 3 (id=5737): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4e, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000140)="5500000018007f5f00fe01b2a4a2809302060000ff41fd01020400000a00120002002800000019002d007fffffff0022de1330d54400009b84136ef75afb83de066a5900e1baac968300000000f2ff000001000000", 0x55}], 0x1, 0x0, 0x0, 0x7a000000}, 0x4000884) kernel console output (not intermixed with test programs): 60 [ 334.360518][T27251] alloc_pages_mpol+0xb3/0x250 [ 334.360543][T27251] vma_alloc_folio_noprof+0x1aa/0x300 [ 334.360580][T27251] do_wp_page+0x5db/0x24e0 [ 334.360645][T27251] ? css_rstat_updated+0xb7/0x240 [ 334.360676][T27251] ? __rcu_read_lock+0x37/0x50 [ 334.360701][T27251] handle_mm_fault+0x77d/0x2c20 [ 334.360729][T27251] do_user_addr_fault+0x636/0x1090 [ 334.360788][T27251] ? fpregs_assert_state_consistent+0xb4/0xe0 [ 334.360853][T27251] exc_page_fault+0x62/0xa0 [ 334.360877][T27251] asm_exc_page_fault+0x26/0x30 [ 334.360894][T27251] RIP: 0033:0x7fa5feb80c50 [ 334.360907][T27251] Code: 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 47 0f b6 0c 08 45 84 c9 74 08 <45> 88 0c 00 49 8b 47 10 48 83 c0 01 49 89 47 10 83 e9 01 73 d3 41 [ 334.360921][T27251] RSP: 002b:00007fa5fd7264a0 EFLAGS: 00010202 [ 334.360954][T27251] RAX: 0000000000006005 RBX: 00007fa5fd726540 RCX: 0000000000000101 [ 334.360969][T27251] RDX: 000000000000a1ff RSI: 0000000000000800 RDI: 00007fa5fd7265e0 [ 334.360982][T27251] RBP: 0000000000000102 R08: 00007fa5f5307000 R09: 0000000000000004 [ 334.361049][T27251] R10: 0000200000000bc2 R11: 0000000000000471 R12: 0000000000000601 [ 334.361060][T27251] R13: 00007fa5fed5da20 R14: 0000000000000015 R15: 00007fa5fd7265e0 [ 334.361076][T27251] [ 334.361144][T27251] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 334.636343][T27258] netlink: 'syz.4.5048': attribute type 21 has an invalid length. [ 334.644243][T27258] netlink: 128 bytes leftover after parsing attributes in process `syz.4.5048'. [ 334.657488][T27258] netlink: 'syz.4.5048': attribute type 5 has an invalid length. [ 334.665287][T27258] netlink: 'syz.4.5048': attribute type 6 has an invalid length. [ 334.673067][T27258] netlink: 3 bytes leftover after parsing attributes in process `syz.4.5048'. [ 334.724722][T27261] netlink: 268 bytes leftover after parsing attributes in process `syz.3.5049'. [ 334.810829][T27270] netlink: 28 bytes leftover after parsing attributes in process `syz.4.5053'. [ 334.830987][T27266] program syz.0.5052 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 334.864297][T27273] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5054'. [ 335.529655][T27297] FAULT_INJECTION: forcing a failure. [ 335.529655][T27297] name failslab, interval 1, probability 0, space 0, times 0 [ 335.543041][T27297] CPU: 0 UID: 0 PID: 27297 Comm: syz.5.5063 Not tainted syzkaller #0 PREEMPT(voluntary) [ 335.543068][T27297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 335.543081][T27297] Call Trace: [ 335.543088][T27297] [ 335.543150][T27297] __dump_stack+0x1d/0x30 [ 335.543295][T27297] dump_stack_lvl+0xe8/0x140 [ 335.543316][T27297] dump_stack+0x15/0x1b [ 335.543334][T27297] should_fail_ex+0x265/0x280 [ 335.543430][T27297] should_failslab+0x8c/0xb0 [ 335.543456][T27297] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 335.543492][T27297] ? alloc_inode+0x9a/0x170 [ 335.543594][T27297] alloc_inode+0x9a/0x170 [ 335.543616][T27297] path_from_stashed+0xec/0x330 [ 335.543640][T27297] ? __ptrace_may_access+0x1c7/0x340 [ 335.543730][T27297] ? __pfx_proc_ns_get_link+0x10/0x10 [ 335.543752][T27297] ns_get_path+0x5b/0x80 [ 335.543779][T27297] proc_ns_get_link+0x80/0x160 [ 335.543844][T27297] pick_link+0x41a/0x830 [ 335.543871][T27297] step_into+0x7b6/0x820 [ 335.543891][T27297] ? d_splice_alias_ops+0xdc/0x280 [ 335.543909][T27297] path_openat+0x13e8/0x2170 [ 335.543940][T27297] do_filp_open+0x109/0x230 [ 335.543985][T27297] do_sys_openat2+0xa6/0x110 [ 335.544013][T27297] __x64_sys_openat+0xf2/0x120 [ 335.544063][T27297] x64_sys_call+0x2e9c/0x2ff0 [ 335.544081][T27297] do_syscall_64+0xd2/0x200 [ 335.544187][T27297] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 335.544211][T27297] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 335.544268][T27297] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 335.544289][T27297] RIP: 0033:0x7f56d70fd510 [ 335.544305][T27297] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 335.544330][T27297] RSP: 002b:00007f56d5b5ef60 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 335.544351][T27297] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f56d70fd510 [ 335.544364][T27297] RDX: 0000000000000000 RSI: 00007f56d7181f06 RDI: 00000000ffffff9c [ 335.544375][T27297] RBP: 00007f56d7181f06 R08: 0000000000000000 R09: 0000000000000000 [ 335.544386][T27297] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 335.544475][T27297] R13: 00007f56d7346038 R14: 00007f56d7345fa0 R15: 00007ffc13b5c3d8 [ 335.544495][T27297] [ 335.825162][T27299] netlink: 268 bytes leftover after parsing attributes in process `syz.0.5064'. [ 335.886208][ T818] hid-generic 0000:3000000:0000.0011: unknown main item tag 0x4 [ 335.893957][ T818] hid-generic 0000:3000000:0000.0011: unknown main item tag 0x2 [ 335.902896][ T818] hid-generic 0000:3000000:0000.0011: unknown main item tag 0x3 [ 335.916006][ T818] hid-generic 0000:3000000:0000.0011: hidraw0: HID v0.00 Device [sy] on syz0 [ 336.052218][T27320] FAULT_INJECTION: forcing a failure. [ 336.052218][T27320] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 336.066121][T27320] CPU: 0 UID: 0 PID: 27320 Comm: syz.0.5071 Not tainted syzkaller #0 PREEMPT(voluntary) [ 336.066151][T27320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 336.066169][T27320] Call Trace: [ 336.066231][T27320] [ 336.066238][T27320] __dump_stack+0x1d/0x30 [ 336.066323][T27320] dump_stack_lvl+0xe8/0x140 [ 336.066397][T27320] dump_stack+0x15/0x1b [ 336.066418][T27320] should_fail_ex+0x265/0x280 [ 336.066482][T27320] should_fail+0xb/0x20 [ 336.066503][T27320] should_fail_usercopy+0x1a/0x20 [ 336.066526][T27320] _copy_from_iter+0xd2/0xe80 [ 336.066551][T27320] ? __build_skb_around+0x1a0/0x200 [ 336.066593][T27320] ? __alloc_skb+0x223/0x320 [ 336.066613][T27320] netlink_sendmsg+0x471/0x6b0 [ 336.066636][T27320] ? __pfx_netlink_sendmsg+0x10/0x10 [ 336.066668][T27320] __sock_sendmsg+0x142/0x180 [ 336.066695][T27320] ____sys_sendmsg+0x31e/0x4e0 [ 336.066784][T27320] ___sys_sendmsg+0x17b/0x1d0 [ 336.066871][T27320] __x64_sys_sendmsg+0xd4/0x160 [ 336.066922][T27320] x64_sys_call+0x191e/0x2ff0 [ 336.066979][T27320] do_syscall_64+0xd2/0x200 [ 336.067006][T27320] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 336.067042][T27320] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 336.067065][T27320] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 336.067134][T27320] RIP: 0033:0x7f606468eba9 [ 336.067147][T27320] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 336.067165][T27320] RSP: 002b:00007f60630ef038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 336.067224][T27320] RAX: ffffffffffffffda RBX: 00007f60648d5fa0 RCX: 00007f606468eba9 [ 336.067251][T27320] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000006 [ 336.067264][T27320] RBP: 00007f60630ef090 R08: 0000000000000000 R09: 0000000000000000 [ 336.067278][T27320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 336.067288][T27320] R13: 00007f60648d6038 R14: 00007f60648d5fa0 R15: 00007ffe0229eca8 [ 336.067306][T27320] [ 336.337301][T27331] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 336.385586][T27341] random: crng reseeded on system resumption [ 336.453102][T27331] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 336.466284][T27348] netlink: 'syz.6.5073': attribute type 2 has an invalid length. [ 336.474192][T27348] netlink: 'syz.6.5073': attribute type 1 has an invalid length. [ 336.503456][T27351] SELinux: ebitmap: truncated map [ 336.513003][T27351] SELinux: failed to load policy [ 336.534259][T27331] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 336.629804][T27331] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 336.656237][T27334] 9pnet: Could not find request transport: tcp [ 336.711681][T11938] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 336.719932][T11938] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 336.745003][T27334] hub 2-0:1.0: USB hub found [ 336.773681][T27334] hub 2-0:1.0: 8 ports detected [ 336.777004][T11938] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 336.786704][T11938] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 336.912956][ T3409] hid-generic 0000:3000000:0000.0012: unknown main item tag 0x4 [ 336.920666][ T3409] hid-generic 0000:3000000:0000.0012: unknown main item tag 0x2 [ 336.930157][ T3409] hid-generic 0000:3000000:0000.0012: unknown main item tag 0x3 [ 337.283598][ T3409] hid-generic 0000:3000000:0000.0012: hidraw0: HID v0.00 Device [sy] on syz0 [ 337.308928][ T29] kauditd_printk_skb: 242 callbacks suppressed [ 337.308941][ T29] audit: type=1400 audit(1757586880.757:28128): avc: denied { relabelto } for pid=27401 comm="+}[@" name="file0" dev="tmpfs" ino=2382 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 337.341973][ T29] audit: type=1400 audit(1757586880.757:28129): avc: denied { associate } for pid=27401 comm="+}[@" name="file0" dev="tmpfs" ino=2382 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:fsadm_exec_t:s0" [ 337.526349][ T29] audit: type=1326 audit(1757586880.967:28130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27426 comm="syz.0.5095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 337.563182][ T29] audit: type=1326 audit(1757586880.967:28131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27426 comm="syz.0.5095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 337.588186][ T29] audit: type=1326 audit(1757586881.007:28132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27426 comm="syz.0.5095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 337.612248][ T29] audit: type=1326 audit(1757586881.007:28133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27426 comm="syz.0.5095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 337.637445][ T29] audit: type=1326 audit(1757586881.007:28134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27426 comm="syz.0.5095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 337.661188][ T29] audit: type=1326 audit(1757586881.007:28135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27426 comm="syz.0.5095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 337.686102][ T29] audit: type=1326 audit(1757586881.007:28136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27426 comm="syz.0.5095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 337.709863][ T29] audit: type=1326 audit(1757586881.007:28137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27426 comm="syz.0.5095" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 337.790026][ T7077] hid-generic 0000:3000000:0000.0013: unknown main item tag 0x4 [ 337.797797][ T7077] hid-generic 0000:3000000:0000.0013: unknown main item tag 0x2 [ 337.805567][ T7077] hid-generic 0000:3000000:0000.0013: unknown main item tag 0x3 [ 337.813711][ T7077] hid-generic 0000:3000000:0000.0013: hidraw0: HID v0.00 Device [sy] on syz0 [ 337.881666][T27451] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 649 [ 337.922815][T27457] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 338.360540][ T818] hid-generic 0000:3000000:0000.0014: unknown main item tag 0x4 [ 338.392300][ T818] hid-generic 0000:3000000:0000.0014: hidraw0: HID v0.00 Device [sy] on syz0 [ 338.409182][T27488] __nla_validate_parse: 13 callbacks suppressed [ 338.409197][T27488] netlink: 20 bytes leftover after parsing attributes in process `syz.3.5118'. [ 338.511442][T27488] vxcan1: entered allmulticast mode [ 338.568483][T27498] netlink: 268 bytes leftover after parsing attributes in process `syz.0.5120'. [ 338.847480][T27539] lo speed is unknown, defaulting to 1000 [ 338.900120][T27539] lo speed is unknown, defaulting to 1000 [ 339.078655][T27563] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5124'. [ 339.739425][T27574] ipip0: entered promiscuous mode [ 339.871571][T27591] netlink: 96 bytes leftover after parsing attributes in process `syz.4.5131'. [ 339.880672][T27591] netlink: 96 bytes leftover after parsing attributes in process `syz.4.5131'. [ 339.891148][T27591] netlink: 96 bytes leftover after parsing attributes in process `syz.4.5131'. [ 339.905066][T27595] program syz.0.5132 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 340.108887][T27600] netlink: 'syz.0.5134': attribute type 11 has an invalid length. [ 340.187714][T27600] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5134'. [ 340.416880][T27612] netlink: 16 bytes leftover after parsing attributes in process `syz.0.5139'. [ 340.430638][T27611] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5138'. [ 340.509252][T27617] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5142'. [ 340.645384][T27628] block device autoloading is deprecated and will be removed. [ 340.803886][T27624] FAULT_INJECTION: forcing a failure. [ 340.803886][T27624] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 340.818438][T27624] CPU: 1 UID: 0 PID: 27624 Comm: syz.4.5144 Not tainted syzkaller #0 PREEMPT(voluntary) [ 340.818463][T27624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 340.818544][T27624] Call Trace: [ 340.818551][T27624] [ 340.818559][T27624] __dump_stack+0x1d/0x30 [ 340.818580][T27624] dump_stack_lvl+0xe8/0x140 [ 340.818600][T27624] dump_stack+0x15/0x1b [ 340.818615][T27624] should_fail_ex+0x265/0x280 [ 340.818635][T27624] should_fail_alloc_page+0xf2/0x100 [ 340.818716][T27624] __alloc_frozen_pages_noprof+0xff/0x360 [ 340.818784][T27624] alloc_pages_mpol+0xb3/0x250 [ 340.818817][T27624] alloc_migration_target_by_mpol+0x11b/0x280 [ 340.818873][T27624] migrate_pages_batch+0x309/0x1ae0 [ 340.818904][T27624] ? __pfx_alloc_migration_target_by_mpol+0x10/0x10 [ 340.818928][T27624] ? bpf_trace_run3+0x12c/0x1d0 [ 340.818976][T27624] ? mpol_set_shared_policy+0x361/0x860 [ 340.818996][T27624] migrate_pages+0xf5f/0x1770 [ 340.819020][T27624] ? __pfx_alloc_migration_target_by_mpol+0x10/0x10 [ 340.819064][T27624] ? shmem_get_policy+0x7c/0x90 [ 340.819095][T27624] __se_sys_mbind+0x975/0xac0 [ 340.819132][T27624] __x64_sys_mbind+0x78/0x90 [ 340.819183][T27624] x64_sys_call+0x2932/0x2ff0 [ 340.819204][T27624] do_syscall_64+0xd2/0x200 [ 340.819271][T27624] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 340.819314][T27624] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 340.819341][T27624] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 340.819362][T27624] RIP: 0033:0x7ff829daeba9 [ 340.819442][T27624] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 340.819459][T27624] RSP: 002b:00007ff828817038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 340.819557][T27624] RAX: ffffffffffffffda RBX: 00007ff829ff5fa0 RCX: 00007ff829daeba9 [ 340.819568][T27624] RDX: 0000000000004003 RSI: 0000000000004000 RDI: 0000200000000000 [ 340.819579][T27624] RBP: 00007ff828817090 R08: 0000000000000006 R09: 0000000000000002 [ 340.819590][T27624] R10: 0000200000000c00 R11: 0000000000000246 R12: 0000000000000002 [ 340.819603][T27624] R13: 00007ff829ff6038 R14: 00007ff829ff5fa0 R15: 00007ffd3dfcccc8 [ 340.819621][T27624] [ 341.023762][T27654] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27654 comm=syz.3.5153 [ 341.063732][T27647] hub 2-0:1.0: USB hub found [ 341.071793][T27647] hub 2-0:1.0: 8 ports detected [ 341.230782][T27666] FAULT_INJECTION: forcing a failure. [ 341.230782][T27666] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 341.245321][T27666] CPU: 1 UID: 0 PID: 27666 Comm: syz.0.5156 Not tainted syzkaller #0 PREEMPT(voluntary) [ 341.245394][T27666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 341.245457][T27666] Call Trace: [ 341.245464][T27666] [ 341.245471][T27666] __dump_stack+0x1d/0x30 [ 341.245500][T27666] dump_stack_lvl+0xe8/0x140 [ 341.245521][T27666] dump_stack+0x15/0x1b [ 341.245538][T27666] should_fail_ex+0x265/0x280 [ 341.245560][T27666] should_fail+0xb/0x20 [ 341.245576][T27666] should_fail_usercopy+0x1a/0x20 [ 341.245699][T27666] _copy_to_user+0x20/0xa0 [ 341.245725][T27666] copy_siginfo_to_user+0x22/0xb0 [ 341.245747][T27666] x64_setup_rt_frame+0x2b5/0x580 [ 341.245771][T27666] arch_do_signal_or_restart+0x27c/0x480 [ 341.245856][T27666] exit_to_user_mode_loop+0x7a/0x100 [ 341.245880][T27666] do_syscall_64+0x1d6/0x200 [ 341.245958][T27666] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 341.245982][T27666] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 341.246082][T27666] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 341.246150][T27666] RIP: 0033:0x7f606468eba7 [ 341.246163][T27666] Code: ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 <0f> 05 48 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 [ 341.246179][T27666] RSP: 002b:00007f60630ef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 341.246196][T27666] RAX: 0000000000000001 RBX: 00007f60648d5fa0 RCX: 00007f606468eba9 [ 341.246267][T27666] RDX: 0000000000000008 RSI: 0000200000000040 RDI: 0000000000000006 [ 341.246280][T27666] RBP: 00007f60630ef090 R08: 0000000000000000 R09: 0000000000000000 [ 341.246293][T27666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 341.246306][T27666] R13: 00007f60648d6038 R14: 00007f60648d5fa0 R15: 00007ffe0229eca8 [ 341.246324][T27666] [ 341.467698][T27674] SELinux: ebitmap: truncated map [ 341.565256][T27674] SELinux: failed to load policy [ 341.596500][T27628] Set syz1 is full, maxelem 65536 reached [ 341.806028][T27695] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 341.853560][T27701] random: crng reseeded on system resumption [ 341.862648][T27695] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 341.886748][ T3381] IPVS: starting estimator thread 0... [ 341.976484][T27695] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 342.024994][T27704] IPVS: using max 2448 ests per chain, 122400 per kthread [ 342.040592][T27695] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 342.069168][T27714] hub 2-0:1.0: USB hub found [ 342.074431][T27714] hub 2-0:1.0: 8 ports detected [ 342.226088][T27729] tipc: New replicast peer: 10.1.1.2 [ 342.231463][T27729] tipc: Enabled bearer , priority 10 [ 342.247753][ T318] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 342.258903][ T318] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 342.330173][ T29] kauditd_printk_skb: 404 callbacks suppressed [ 342.330189][ T29] audit: type=1400 audit(1757586885.769:28542): avc: denied { write } for pid=27722 comm="syz.5.5171" name="usbmon0" dev="devtmpfs" ino=141 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 342.360675][ T29] audit: type=1400 audit(1757586885.779:28543): avc: denied { allowed } for pid=27722 comm="syz.5.5171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 342.380861][ T29] audit: type=1400 audit(1757586885.779:28544): avc: denied { create } for pid=27722 comm="syz.5.5171" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 342.402307][ T29] audit: type=1400 audit(1757586885.779:28545): avc: denied { map } for pid=27722 comm="syz.5.5171" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=69656 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 342.427318][ T29] audit: type=1400 audit(1757586885.779:28546): avc: denied { read write } for pid=27722 comm="syz.5.5171" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=69656 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 342.501088][ T2449] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 342.552868][ T2449] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 342.851363][T27744] random: crng reseeded on system resumption [ 342.858345][ T29] audit: type=1400 audit(1757586886.299:28547): avc: denied { create } for pid=27753 comm="syz.6.5179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 342.863436][T27755] netlink: 'syz.6.5179': attribute type 83 has an invalid length. [ 342.879511][ T29] audit: type=1400 audit(1757586886.299:28548): avc: denied { read } for pid=27743 comm="syz.3.5175" name="snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 342.911444][ T29] audit: type=1400 audit(1757586886.299:28549): avc: denied { ioctl } for pid=27743 comm="syz.3.5175" path="/dev/snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 343.009633][T27759] siw: device registration error -23 [ 343.019066][ T29] audit: type=1400 audit(1757586886.339:28550): avc: denied { setopt } for pid=27753 comm="syz.6.5179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 343.039619][ T29] audit: type=1400 audit(1757586886.339:28551): avc: denied { bind } for pid=27753 comm="syz.6.5179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 343.514390][T27779] __nla_validate_parse: 10 callbacks suppressed [ 343.514434][T27779] netlink: 32 bytes leftover after parsing attributes in process `syz.6.5186'. [ 343.672337][T27785] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5188'. [ 343.691536][T27783] netlink: 28 bytes leftover after parsing attributes in process `syz.4.5187'. [ 343.744712][T27787] netlink: 'syz.0.5189': attribute type 5 has an invalid length. [ 343.998992][T27809] SELinux: ebitmap: truncated map [ 344.005678][T27809] SELinux: failed to load policy [ 344.049172][T27820] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 344.059112][T27820] SELinux: failed to load policy [ 344.153556][T27827] netlink: 'syz.3.5207': attribute type 13 has an invalid length. [ 344.165453][T27829] netlink: 'syz.6.5208': attribute type 1 has an invalid length. [ 344.173244][T27829] netlink: 161700 bytes leftover after parsing attributes in process `syz.6.5208'. [ 344.815070][T27841] netlink: 20 bytes leftover after parsing attributes in process `syz.0.5213'. [ 344.833864][T27841] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 649 [ 344.931991][T27849] lo speed is unknown, defaulting to 1000 [ 344.939609][T27849] lo speed is unknown, defaulting to 1000 [ 344.958426][T27849] lo speed is unknown, defaulting to 1000 [ 344.968814][T27851] netlink: 96 bytes leftover after parsing attributes in process `syz.5.5218'. [ 344.977885][T27851] netlink: 96 bytes leftover after parsing attributes in process `syz.5.5218'. [ 344.987589][T27851] netlink: 96 bytes leftover after parsing attributes in process `syz.5.5218'. [ 344.998698][T27853] netlink: 16 bytes leftover after parsing attributes in process `syz.4.5219'. [ 345.004735][T27849] infiniband sz1: set active [ 345.012345][T27849] infiniband sz1: added lo [ 345.023607][T27853] hub 2-0:1.0: USB hub found [ 345.028297][T27853] hub 2-0:1.0: 8 ports detected [ 345.034511][ T818] lo speed is unknown, defaulting to 1000 [ 345.043266][T27862] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5220'. [ 345.058218][T27849] RDS/IB: sz1: added [ 345.062481][T27849] smc: adding ib device sz1 with port count 1 [ 345.070787][T27849] smc: ib device sz1 port 1 has pnetid [ 345.076731][ T818] lo speed is unknown, defaulting to 1000 [ 345.083226][T27849] lo speed is unknown, defaulting to 1000 [ 345.106840][T27877] veth0_macvtap: left promiscuous mode [ 345.173803][T27849] lo speed is unknown, defaulting to 1000 [ 345.207687][T27849] lo speed is unknown, defaulting to 1000 [ 345.220590][T27884] hub 2-0:1.0: USB hub found [ 345.237005][T27884] hub 2-0:1.0: 8 ports detected [ 345.245785][T27887] FAULT_INJECTION: forcing a failure. [ 345.245785][T27887] name failslab, interval 1, probability 0, space 0, times 0 [ 345.248431][T27849] lo speed is unknown, defaulting to 1000 [ 345.258498][T27887] CPU: 1 UID: 0 PID: 27887 Comm: syz.5.5224 Not tainted syzkaller #0 PREEMPT(voluntary) [ 345.258525][T27887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 345.258537][T27887] Call Trace: [ 345.258542][T27887] [ 345.258550][T27887] __dump_stack+0x1d/0x30 [ 345.258634][T27887] dump_stack_lvl+0xe8/0x140 [ 345.258700][T27887] dump_stack+0x15/0x1b [ 345.258717][T27887] should_fail_ex+0x265/0x280 [ 345.258740][T27887] ? allocate_file_region_entries+0xd2/0x310 [ 345.258767][T27887] should_failslab+0x8c/0xb0 [ 345.258833][T27887] __kmalloc_cache_noprof+0x4c/0x320 [ 345.258861][T27887] ? __pfx_workingset_update_node+0x10/0x10 [ 345.258886][T27887] allocate_file_region_entries+0xd2/0x310 [ 345.258914][T27887] region_chg+0x232/0x2d0 [ 345.258992][T27887] alloc_hugetlb_folio+0x312/0x1070 [ 345.259028][T27887] hugetlb_fault+0xd71/0x1b50 [ 345.259134][T27887] handle_mm_fault+0x1861/0x2c20 [ 345.259159][T27887] ? mt_find+0x200/0x320 [ 345.259229][T27887] ? try_grab_folio+0x75/0x170 [ 345.259370][T27887] ? down_read+0x77/0xe0 [ 345.259420][T27887] __get_user_pages+0x102e/0x1fa0 [ 345.259526][T27887] __mm_populate+0x243/0x3a0 [ 345.259551][T27887] vm_mmap_pgoff+0x232/0x2e0 [ 345.259581][T27887] ksys_mmap_pgoff+0x2d0/0x310 [ 345.259601][T27887] x64_sys_call+0x14a3/0x2ff0 [ 345.259679][T27887] do_syscall_64+0xd2/0x200 [ 345.259714][T27887] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 345.259737][T27887] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 345.259765][T27887] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 345.259847][T27887] RIP: 0033:0x7f56d70feba9 [ 345.259866][T27887] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 345.259884][T27887] RSP: 002b:00007f56d5b5f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 345.259903][T27887] RAX: ffffffffffffffda RBX: 00007f56d7345fa0 RCX: 00007f56d70feba9 [ 345.259983][T27887] RDX: 0000000000000002 RSI: 0000000000ff5000 RDI: 0000200000000000 [ 345.260052][T27887] RBP: 00007f56d5b5f090 R08: ffffffffffffffff R09: 0000000000000000 [ 345.260065][T27887] R10: 000000000004c831 R11: 0000000000000246 R12: 0000000000000002 [ 345.260078][T27887] R13: 00007f56d7346038 R14: 00007f56d7345fa0 R15: 00007ffc13b5c3d8 [ 345.260097][T27887] [ 345.540657][T27849] lo speed is unknown, defaulting to 1000 [ 345.619337][T27849] lo speed is unknown, defaulting to 1000 [ 345.774637][T27918] hub 2-0:1.0: USB hub found [ 345.779423][T27918] hub 2-0:1.0: 8 ports detected [ 345.937501][T27946] FAULT_INJECTION: forcing a failure. [ 345.937501][T27946] name failslab, interval 1, probability 0, space 0, times 0 [ 345.950856][T27946] CPU: 0 UID: 0 PID: 27946 Comm: wÞ£ÿ Not tainted syzkaller #0 PREEMPT(voluntary) [ 345.950879][T27946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 345.950969][T27946] Call Trace: [ 345.950976][T27946] [ 345.950983][T27946] __dump_stack+0x1d/0x30 [ 345.951005][T27946] dump_stack_lvl+0xe8/0x140 [ 345.951025][T27946] dump_stack+0x15/0x1b [ 345.951040][T27946] should_fail_ex+0x265/0x280 [ 345.951063][T27946] ? audit_log_d_path+0x8d/0x150 [ 345.951092][T27946] should_failslab+0x8c/0xb0 [ 345.951114][T27946] __kmalloc_cache_noprof+0x4c/0x320 [ 345.951141][T27946] audit_log_d_path+0x8d/0x150 [ 345.951322][T27946] audit_log_d_path_exe+0x42/0x70 [ 345.951353][T27946] audit_log_task+0x1e9/0x250 [ 345.951384][T27946] audit_seccomp+0x61/0x100 [ 345.951461][T27946] ? __seccomp_filter+0x68c/0x10d0 [ 345.951492][T27946] __seccomp_filter+0x69d/0x10d0 [ 345.951516][T27946] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 345.951545][T27946] ? vfs_write+0x7e8/0x960 [ 345.951585][T27946] ? __rcu_read_unlock+0x4f/0x70 [ 345.951606][T27946] ? __fget_files+0x184/0x1c0 [ 345.951635][T27946] __secure_computing+0x82/0x150 [ 345.951712][T27946] syscall_trace_enter+0xcf/0x1e0 [ 345.951733][T27946] do_syscall_64+0xac/0x200 [ 345.951826][T27946] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 345.951851][T27946] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 345.951903][T27946] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 345.951921][T27946] RIP: 0033:0x7f606468eba9 [ 345.951934][T27946] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 345.951950][T27946] RSP: 002b:00007f60630ef038 EFLAGS: 00000246 ORIG_RAX: 000000000000009e [ 345.951967][T27946] RAX: ffffffffffffffda RBX: 00007f60648d5fa0 RCX: 00007f606468eba9 [ 345.951981][T27946] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000005005 [ 345.952009][T27946] RBP: 00007f60630ef090 R08: 0000000000000000 R09: 0000000000000000 [ 345.952023][T27946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 345.952034][T27946] R13: 00007f60648d6038 R14: 00007f60648d5fa0 R15: 00007ffe0229eca8 [ 345.952051][T27946] [ 346.202569][T27948] usb usb8: usbfs: process 27948 (syz.0.5247) did not claim interface 0 before use [ 346.259800][T27954] vxcan1: entered allmulticast mode [ 346.281638][T27954] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 649 [ 346.326634][T27959] hub 2-0:1.0: USB hub found [ 346.331299][T27959] hub 2-0:1.0: 8 ports detected [ 346.424785][T27974] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 649 [ 346.549408][ T818] hid_parser_main: 2 callbacks suppressed [ 346.549428][ T818] hid-generic 0000:3000000:0000.0015: unknown main item tag 0x4 [ 346.564257][ T818] hid-generic 0000:3000000:0000.0015: unknown main item tag 0x2 [ 346.573471][ T818] hid-generic 0000:3000000:0000.0015: unknown main item tag 0x3 [ 346.581779][ T818] hid-generic 0000:3000000:0000.0015: hidraw0: HID v0.00 Device [sy] on syz0 [ 346.619502][T27995] FAULT_INJECTION: forcing a failure. [ 346.619502][T27995] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 346.633504][T27995] CPU: 0 UID: 0 PID: 27995 Comm: syz.4.5264 Not tainted syzkaller #0 PREEMPT(voluntary) [ 346.633529][T27995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 346.633539][T27995] Call Trace: [ 346.633544][T27995] [ 346.633551][T27995] __dump_stack+0x1d/0x30 [ 346.633569][T27995] dump_stack_lvl+0xe8/0x140 [ 346.633588][T27995] dump_stack+0x15/0x1b [ 346.633676][T27995] should_fail_ex+0x265/0x280 [ 346.633700][T27995] should_fail_alloc_page+0xf2/0x100 [ 346.633795][T27995] __alloc_frozen_pages_noprof+0xff/0x360 [ 346.633826][T27995] alloc_pages_mpol+0xb3/0x250 [ 346.633853][T27995] vma_alloc_folio_noprof+0x1aa/0x300 [ 346.633937][T27995] handle_mm_fault+0xec2/0x2c20 [ 346.634039][T27995] do_user_addr_fault+0x636/0x1090 [ 346.634069][T27995] ? fpregs_assert_state_consistent+0xb4/0xe0 [ 346.634134][T27995] exc_page_fault+0x62/0xa0 [ 346.634158][T27995] asm_exc_page_fault+0x26/0x30 [ 346.634179][T27995] RIP: 0033:0x7ff829c70ba3 [ 346.634196][T27995] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 346.634213][T27995] RSP: 002b:00007ff8288164a0 EFLAGS: 00010206 [ 346.634227][T27995] RAX: 0000000000002000 RBX: 00007ff828816540 RCX: 00007ff8203f7000 [ 346.634252][T27995] RDX: 00007ff8288166e0 RSI: 0000000000000007 RDI: 00007ff8288165e0 [ 346.634263][T27995] RBP: 0000000000000043 R08: 0000000000000009 R09: 00000000000001a9 [ 346.634274][T27995] R10: 00000000000001b2 R11: 00007ff828816540 R12: 0000000000000001 [ 346.634288][T27995] R13: 00007ff829e4da20 R14: 00000000000000ed R15: 00007ff8288165e0 [ 346.634308][T27995] [ 346.634316][T27995] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 346.888918][T28018] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=28018 comm=syz.6.5273 [ 346.985731][T28029] proc: Unknown parameter 'ZïþÆ¢Â1’èÓ@ÝŒáþ9½"ó';^÷»' [ 347.246608][ T818] hid-generic 0000:3000000:0000.0016: unknown main item tag 0x4 [ 347.255207][ T818] hid-generic 0000:3000000:0000.0016: unknown main item tag 0x2 [ 347.263150][ T818] hid-generic 0000:3000000:0000.0016: unknown main item tag 0x3 [ 347.271030][ T818] hid-generic 0000:3000000:0000.0016: hidraw0: HID v0.00 Device [sy] on syz0 [ 347.348772][ T29] kauditd_printk_skb: 593 callbacks suppressed [ 347.348786][ T29] audit: type=1400 audit(1757586890.802:29145): avc: denied { read } for pid=28056 comm="syz.6.5286" lport=57842 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 347.421146][ T29] audit: type=1400 audit(1757586890.872:29146): avc: denied { create } for pid=28088 comm="syz.0.5290" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 347.448953][T28089] pim6reg1: entered promiscuous mode [ 347.454357][T28089] pim6reg1: entered allmulticast mode [ 347.462574][ T29] audit: type=1400 audit(1757586890.902:29147): avc: denied { mounton } for pid=28088 comm="syz.0.5290" path="/507/file0" dev="tmpfs" ino=2696 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 347.487229][ T29] audit: type=1400 audit(1757586890.902:29148): avc: denied { mount } for pid=28088 comm="syz.0.5290" name="/" dev="9p" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 347.533671][T28091] ip6gre1: entered allmulticast mode [ 347.564033][ T29] audit: type=1400 audit(1757586891.022:29149): avc: denied { unmount } for pid=16022 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 347.608404][T28109] lo speed is unknown, defaulting to 1000 [ 347.729150][ T29] audit: type=1400 audit(1757586891.182:29150): avc: denied { unlink } for pid=16022 comm="syz-executor" name="file0" dev="tmpfs" ino=2696 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 347.764184][T28120] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(9) [ 347.770784][T28120] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 347.778981][T28120] vhci_hcd vhci_hcd.0: Device attached [ 347.795371][ T29] audit: type=1400 audit(1757586891.252:29151): avc: denied { ioctl } for pid=28125 comm="syz.0.5295" path="socket:[70859]" dev="sockfs" ino=70859 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 347.802285][T28120] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 347.918680][ T29] audit: type=1400 audit(1757586891.372:29152): avc: denied { read } for pid=28128 comm="syz.4.5298" path="socket:[70864]" dev="sockfs" ino=70864 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 347.954295][T28122] vhci_hcd: connection closed [ 347.954456][ T318] vhci_hcd: stop threads [ 347.963456][ T318] vhci_hcd: release socket [ 347.967931][ T318] vhci_hcd: disconnect device [ 347.974814][T28131] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 347.984055][T28131] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 347.996256][T28109] lo speed is unknown, defaulting to 1000 [ 348.020760][T28109] lo speed is unknown, defaulting to 1000 [ 348.192135][ T29] audit: type=1400 audit(1757586891.632:29153): avc: denied { connect } for pid=28166 comm="syz.0.5301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 348.299794][ T29] audit: type=1326 audit(1757586891.752:29154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28169 comm="syz.0.5303" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 348.333375][T28173] bridge0: entered promiscuous mode [ 348.343729][T28173] bridge0: port 4(macsec1) entered blocking state [ 348.350175][T28173] bridge0: port 4(macsec1) entered disabled state [ 348.361531][T28173] macsec1: entered allmulticast mode [ 348.366903][T28173] bridge0: entered allmulticast mode [ 348.375881][T28173] macsec1: left allmulticast mode [ 348.380923][T28173] bridge0: left allmulticast mode [ 348.390803][T28173] bridge0: left promiscuous mode [ 348.457123][T28173] bridge0: entered promiscuous mode [ 348.469999][T28173] bridge0: port 4(macsec1) entered blocking state [ 348.477236][T28173] bridge0: port 4(macsec1) entered disabled state [ 348.491052][T28173] macsec1: entered allmulticast mode [ 348.496366][T28173] bridge0: entered allmulticast mode [ 348.521489][T28173] macsec1: left allmulticast mode [ 348.526542][T28173] bridge0: left allmulticast mode [ 348.534468][T28173] bridge0: left promiscuous mode [ 348.594161][T28173] bridge0: entered promiscuous mode [ 348.600724][T28173] bridge0: port 4(macsec1) entered blocking state [ 348.607332][T28173] bridge0: port 4(macsec1) entered disabled state [ 348.631763][T28173] macsec1: entered allmulticast mode [ 348.637067][T28173] bridge0: entered allmulticast mode [ 348.646599][T28173] macsec1: left allmulticast mode [ 348.651717][T28173] bridge0: left allmulticast mode [ 348.657512][T28173] bridge0: left promiscuous mode [ 348.675934][T28205] __nla_validate_parse: 28 callbacks suppressed [ 348.675947][T28205] netlink: 28 bytes leftover after parsing attributes in process `syz.3.5310'. [ 348.704585][T28173] bridge0: entered promiscuous mode [ 348.714990][T28173] bridge0: port 4(macsec1) entered blocking state [ 348.722778][T28173] bridge0: port 4(macsec1) entered disabled state [ 348.729493][T28173] macsec1: entered allmulticast mode [ 348.734814][T28173] bridge0: entered allmulticast mode [ 348.740705][T28173] macsec1: left allmulticast mode [ 348.745803][T28173] bridge0: left allmulticast mode [ 348.752808][T28173] bridge0: left promiscuous mode [ 348.803837][T28173] bridge0: entered promiscuous mode [ 348.810343][T28173] bridge0: port 4(macsec1) entered blocking state [ 348.816855][T28173] bridge0: port 4(macsec1) entered disabled state [ 348.824491][T28173] macsec1: entered allmulticast mode [ 348.829831][T28173] bridge0: entered allmulticast mode [ 348.835487][T28173] macsec1: left allmulticast mode [ 348.840495][T28173] bridge0: left allmulticast mode [ 348.845988][T28173] bridge0: left promiscuous mode [ 348.893368][T28173] bridge0: entered promiscuous mode [ 348.899762][T28173] bridge0: port 4(macsec1) entered blocking state [ 348.905003][ T7077] hid-generic 0000:3000000:0000.0017: unknown main item tag 0x4 [ 348.906292][T28173] bridge0: port 4(macsec1) entered disabled state [ 348.913881][ T7077] hid-generic 0000:3000000:0000.0017: unknown main item tag 0x2 [ 348.914958][ T7077] hid-generic 0000:3000000:0000.0017: unknown main item tag 0x3 [ 348.921495][T28173] macsec1: entered allmulticast mode [ 348.932227][ T7077] hid-generic 0000:3000000:0000.0017: hidraw0: HID v0.00 Device [sy] on syz0 [ 348.936234][T28173] bridge0: entered allmulticast mode [ 348.958321][T28173] macsec1: left allmulticast mode [ 348.963495][T28173] bridge0: left allmulticast mode [ 348.969230][T28173] bridge0: left promiscuous mode [ 349.035861][T28173] bridge0: entered promiscuous mode [ 349.042508][T28173] bridge0: port 4(macsec1) entered blocking state [ 349.049055][T28173] bridge0: port 4(macsec1) entered disabled state [ 349.056633][T28173] macsec1: entered allmulticast mode [ 349.062549][T28173] bridge0: entered allmulticast mode [ 349.068261][T28173] macsec1: left allmulticast mode [ 349.073351][T28173] bridge0: left allmulticast mode [ 349.081622][T28173] bridge0: left promiscuous mode [ 349.178067][T28255] netlink: 28 bytes leftover after parsing attributes in process `syz.5.5321'. [ 349.349132][T28265] netlink: 20 bytes leftover after parsing attributes in process `syz.0.5325'. [ 349.363012][T28265] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 649 [ 349.857429][T28275] syzkaller0: mtu greater than device maximum [ 349.961396][T28283] netlink: 12 bytes leftover after parsing attributes in process `syz.6.5331'. [ 349.983818][T28286] FAULT_INJECTION: forcing a failure. [ 349.983818][T28286] name failslab, interval 1, probability 0, space 0, times 0 [ 349.996469][T28286] CPU: 0 UID: 0 PID: 28286 Comm: syz.6.5332 Not tainted syzkaller #0 PREEMPT(voluntary) [ 349.996493][T28286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 349.996504][T28286] Call Trace: [ 349.996509][T28286] [ 349.996515][T28286] __dump_stack+0x1d/0x30 [ 349.996553][T28286] dump_stack_lvl+0xe8/0x140 [ 349.996621][T28286] dump_stack+0x15/0x1b [ 349.996637][T28286] should_fail_ex+0x265/0x280 [ 349.996657][T28286] should_failslab+0x8c/0xb0 [ 349.996680][T28286] kmem_cache_alloc_node_noprof+0x57/0x320 [ 349.996787][T28286] ? __alloc_skb+0x101/0x320 [ 349.996929][T28286] __alloc_skb+0x101/0x320 [ 349.996951][T28286] _sctp_make_chunk+0x59/0x210 [ 349.997058][T28286] sctp_make_datafrag_empty+0x96/0x110 [ 349.997088][T28286] sctp_datamsg_from_user+0x572/0x950 [ 349.997118][T28286] ? sctp_primitive_ASSOCIATE+0x71/0x90 [ 349.997138][T28286] sctp_sendmsg_to_asoc+0xa56/0xf20 [ 349.997222][T28286] ? sctp_connect_new_asoc+0x29c/0x3a0 [ 349.997247][T28286] sctp_sendmsg+0x1263/0x18d0 [ 349.997347][T28286] ? selinux_socket_sendmsg+0x81/0x1b0 [ 349.997374][T28286] ? __pfx_sctp_sendmsg+0x10/0x10 [ 349.997391][T28286] inet_sendmsg+0xc5/0xd0 [ 349.997492][T28286] __sock_sendmsg+0x102/0x180 [ 349.997533][T28286] __sys_sendto+0x268/0x330 [ 349.997558][T28286] __x64_sys_sendto+0x76/0x90 [ 349.997641][T28286] x64_sys_call+0x2d05/0x2ff0 [ 349.997667][T28286] do_syscall_64+0xd2/0x200 [ 349.997744][T28286] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 349.997896][T28286] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 349.998000][T28286] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 349.998022][T28286] RIP: 0033:0x7f79fe9feba9 [ 349.998037][T28286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 349.998128][T28286] RSP: 002b:00007f79fd467038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 349.998148][T28286] RAX: ffffffffffffffda RBX: 00007f79fec45fa0 RCX: 00007f79fe9feba9 [ 349.998162][T28286] RDX: 0000000000000002 RSI: 00002000000002c0 RDI: 0000000000000003 [ 349.998194][T28286] RBP: 00007f79fd467090 R08: 0000200000000140 R09: 000000000000001c [ 349.998204][T28286] R10: 000000002000c851 R11: 0000000000000246 R12: 0000000000000002 [ 349.998215][T28286] R13: 00007f79fec46038 R14: 00007f79fec45fa0 R15: 00007ffc087e9c58 [ 349.998231][T28286] [ 350.304858][T28294] netlink: 20 bytes leftover after parsing attributes in process `syz.3.5336'. [ 350.383327][T28305] netlink: 268 bytes leftover after parsing attributes in process `syz.3.5340'. [ 350.391324][T28302] lo speed is unknown, defaulting to 1000 [ 350.426978][T28312] netlink: 8 bytes leftover after parsing attributes in process `syz.6.5339'. [ 350.434630][T28302] lo speed is unknown, defaulting to 1000 [ 350.442023][T28302] lo speed is unknown, defaulting to 1000 [ 350.543897][T28334] lo speed is unknown, defaulting to 1000 [ 350.586610][T28334] lo speed is unknown, defaulting to 1000 [ 350.602041][T28334] lo speed is unknown, defaulting to 1000 [ 350.919400][T28371] netlink: 20 bytes leftover after parsing attributes in process `syz.4.5348'. [ 351.239484][T28381] netlink: 96 bytes leftover after parsing attributes in process `syz.4.5350'. [ 351.250049][T28381] netlink: 32 bytes leftover after parsing attributes in process `syz.4.5350'. [ 351.881969][T28432] SELinux: ebitmap: truncated map [ 351.890336][T28432] SELinux: failed to load policy [ 351.913154][T28431] vhci_hcd: invalid port number 96 [ 351.918289][T28431] vhci_hcd: default hub control req: 0300 vfffa i0060 l0 [ 351.927826][T28431] FAULT_INJECTION: forcing a failure. [ 351.927826][T28431] name failslab, interval 1, probability 0, space 0, times 0 [ 351.941964][T28431] CPU: 1 UID: 0 PID: 28431 Comm: syz.6.5363 Not tainted syzkaller #0 PREEMPT(voluntary) [ 351.941991][T28431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 351.942003][T28431] Call Trace: [ 351.942008][T28431] [ 351.942016][T28431] __dump_stack+0x1d/0x30 [ 351.942038][T28431] dump_stack_lvl+0xe8/0x140 [ 351.942059][T28431] dump_stack+0x15/0x1b [ 351.942162][T28431] should_fail_ex+0x265/0x280 [ 351.942235][T28431] ? allocate_file_region_entries+0xd2/0x310 [ 351.942288][T28431] should_failslab+0x8c/0xb0 [ 351.942313][T28431] __kmalloc_cache_noprof+0x4c/0x320 [ 351.942336][T28431] ? __pfx_workingset_update_node+0x10/0x10 [ 351.942358][T28431] allocate_file_region_entries+0xd2/0x310 [ 351.942389][T28431] region_chg+0x232/0x2d0 [ 351.942413][T28431] alloc_hugetlb_folio+0x312/0x1070 [ 351.942444][T28431] hugetlb_fault+0xd71/0x1b50 [ 351.942492][T28431] handle_mm_fault+0x1861/0x2c20 [ 351.942515][T28431] ? mt_find+0x200/0x320 [ 351.942534][T28431] ? try_grab_folio+0x75/0x170 [ 351.942551][T28431] ? down_read+0x77/0xe0 [ 351.942579][T28431] __get_user_pages+0x102e/0x1fa0 [ 351.942690][T28431] __mm_populate+0x243/0x3a0 [ 351.942715][T28431] vm_mmap_pgoff+0x232/0x2e0 [ 351.942779][T28431] ksys_mmap_pgoff+0x2d0/0x310 [ 351.942796][T28431] x64_sys_call+0x14a3/0x2ff0 [ 351.942814][T28431] do_syscall_64+0xd2/0x200 [ 351.942915][T28431] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 351.942955][T28431] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 351.943060][T28431] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 351.943079][T28431] RIP: 0033:0x7f79fe9feba9 [ 351.943094][T28431] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 351.943113][T28431] RSP: 002b:00007f79fd467038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 351.943129][T28431] RAX: ffffffffffffffda RBX: 00007f79fec45fa0 RCX: 00007f79fe9feba9 [ 351.943140][T28431] RDX: 0000000000000002 RSI: 0000000000ff5000 RDI: 0000200000000000 [ 351.943219][T28431] RBP: 00007f79fd467090 R08: ffffffffffffffff R09: 0000000000000000 [ 351.943232][T28431] R10: 000000000004c831 R11: 0000000000000246 R12: 0000000000000002 [ 351.943245][T28431] R13: 00007f79fec46038 R14: 00007f79fec45fa0 R15: 00007ffc087e9c58 [ 351.943262][T28431] [ 352.397414][T28458] SELinux: Context ›Y7 is not valid (left unmapped). [ 352.449039][T28460] netlink: '+}[@': attribute type 13 has an invalid length. [ 352.986011][ T818] lo speed is unknown, defaulting to 1000 [ 352.991832][ T818] sz1: Port: 1 Link DOWN [ 352.997067][ T318] netdevsim netdevsim0 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 353.005622][ T818] lo speed is unknown, defaulting to 1000 [ 353.010425][ T318] netdevsim netdevsim0 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 353.029369][ T318] netdevsim netdevsim0 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 353.046189][ T318] netdevsim netdevsim0 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 353.083300][ T29] kauditd_printk_skb: 242 callbacks suppressed [ 353.083312][ T29] audit: type=1400 audit(1757586896.545:29397): avc: denied { ioctl } for pid=28468 comm="syz.5.5375" path="socket:[71349]" dev="sockfs" ino=71349 ioctlcmd=0x541c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 353.138500][ T29] audit: type=1400 audit(1757586896.575:29398): avc: denied { wake_alarm } for pid=28468 comm="syz.5.5375" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 353.224431][T28472] FAULT_INJECTION: forcing a failure. [ 353.224431][T28472] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 353.238196][T28472] CPU: 0 UID: 0 PID: 28472 Comm: syz.4.5378 Not tainted syzkaller #0 PREEMPT(voluntary) [ 353.238242][T28472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 353.238255][T28472] Call Trace: [ 353.238277][T28472] [ 353.238284][T28472] __dump_stack+0x1d/0x30 [ 353.238303][T28472] dump_stack_lvl+0xe8/0x140 [ 353.238321][T28472] dump_stack+0x15/0x1b [ 353.238338][T28472] should_fail_ex+0x265/0x280 [ 353.238364][T28472] should_fail+0xb/0x20 [ 353.238382][T28472] should_fail_usercopy+0x1a/0x20 [ 353.238437][T28472] _copy_from_iter+0xd2/0xe80 [ 353.238460][T28472] ? __build_skb_around+0x1a0/0x200 [ 353.238479][T28472] ? __alloc_skb+0x223/0x320 [ 353.238578][T28472] netlink_sendmsg+0x471/0x6b0 [ 353.238605][T28472] ? __pfx_netlink_sendmsg+0x10/0x10 [ 353.238628][T28472] __sock_sendmsg+0x142/0x180 [ 353.238656][T28472] ____sys_sendmsg+0x31e/0x4e0 [ 353.238758][T28472] ___sys_sendmsg+0x17b/0x1d0 [ 353.238837][T28472] __x64_sys_sendmsg+0xd4/0x160 [ 353.238865][T28472] x64_sys_call+0x191e/0x2ff0 [ 353.238883][T28472] do_syscall_64+0xd2/0x200 [ 353.238910][T28472] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 353.238971][T28472] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 353.238995][T28472] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 353.239012][T28472] RIP: 0033:0x7ff829daeba9 [ 353.239025][T28472] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 353.239047][T28472] RSP: 002b:00007ff828817038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 353.239065][T28472] RAX: ffffffffffffffda RBX: 00007ff829ff5fa0 RCX: 00007ff829daeba9 [ 353.239077][T28472] RDX: 0000000004040804 RSI: 00002000000003c0 RDI: 0000000000000003 [ 353.239091][T28472] RBP: 00007ff828817090 R08: 0000000000000000 R09: 0000000000000000 [ 353.239104][T28472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 353.239117][T28472] R13: 00007ff829ff6038 R14: 00007ff829ff5fa0 R15: 00007ffd3dfcccc8 [ 353.239184][T28472] [ 353.537145][ T29] audit: type=1326 audit(1757586896.995:29399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28491 comm="syz.0.5386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 353.595043][ T29] audit: type=1326 audit(1757586897.025:29400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28491 comm="syz.0.5386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=151 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 353.621224][ T29] audit: type=1326 audit(1757586897.065:29401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28491 comm="syz.0.5386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 353.645088][ T29] audit: type=1326 audit(1757586897.075:29402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28491 comm="syz.0.5386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 353.668652][ T29] audit: type=1326 audit(1757586897.075:29403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28491 comm="syz.0.5386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 353.674925][T28503] vxcan1: entered allmulticast mode [ 353.693025][ T29] audit: type=1326 audit(1757586897.075:29404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28491 comm="syz.0.5386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 353.721052][ T29] audit: type=1326 audit(1757586897.085:29405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28491 comm="syz.0.5386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 353.732278][T28503] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 649 [ 353.745446][ T29] audit: type=1326 audit(1757586897.085:29406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28491 comm="syz.0.5386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=425 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 353.887707][T28515] __nla_validate_parse: 15 callbacks suppressed [ 353.887720][T28515] netlink: 796 bytes leftover after parsing attributes in process `syz.5.5390'. [ 353.936468][T28522] netlink: 268 bytes leftover after parsing attributes in process `syz.6.5395'. [ 354.009786][T28534] netlink: 44 bytes leftover after parsing attributes in process `syz.3.5399'. [ 354.019528][T28534] netlink: 43 bytes leftover after parsing attributes in process `syz.3.5399'. [ 354.028504][T28534] netlink: 'syz.3.5399': attribute type 6 has an invalid length. [ 354.036209][T28534] netlink: 'syz.3.5399': attribute type 5 has an invalid length. [ 354.044006][T28534] netlink: 43 bytes leftover after parsing attributes in process `syz.3.5399'. [ 354.054059][T28534] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5399'. [ 354.102936][T28544] netlink: 20 bytes leftover after parsing attributes in process `syz.3.5402'. [ 354.301244][T28567] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 354.347543][T28572] FAULT_INJECTION: forcing a failure. [ 354.347543][T28572] name failslab, interval 1, probability 0, space 0, times 0 [ 354.360196][T28572] CPU: 0 UID: 0 PID: 28572 Comm: syz.6.5412 Not tainted syzkaller #0 PREEMPT(voluntary) [ 354.360220][T28572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 354.360230][T28572] Call Trace: [ 354.360236][T28572] [ 354.360243][T28572] __dump_stack+0x1d/0x30 [ 354.360273][T28572] dump_stack_lvl+0xe8/0x140 [ 354.360290][T28572] dump_stack+0x15/0x1b [ 354.360304][T28572] should_fail_ex+0x265/0x280 [ 354.360329][T28572] should_failslab+0x8c/0xb0 [ 354.360353][T28572] __kmalloc_noprof+0xa5/0x3e0 [ 354.360439][T28572] ? em_canid_change+0x7b/0x3f0 [ 354.360469][T28572] em_canid_change+0x7b/0x3f0 [ 354.360496][T28572] ? __kmalloc_noprof+0x2e4/0x3e0 [ 354.360522][T28572] ? tcf_em_tree_validate+0x13f/0x890 [ 354.360541][T28572] ? __pfx_em_canid_change+0x10/0x10 [ 354.360572][T28572] tcf_em_tree_validate+0x47e/0x890 [ 354.360601][T28572] ? __kmalloc_cache_noprof+0x189/0x320 [ 354.360664][T28572] flow_change+0x1e8/0xc80 [ 354.360705][T28572] ? flow_init+0x31/0x80 [ 354.360738][T28572] ? __pfx_flow_change+0x10/0x10 [ 354.360841][T28572] tc_new_tfilter+0xde1/0x10a0 [ 354.360868][T28572] ? __rcu_read_unlock+0x4f/0x70 [ 354.360902][T28572] ? ns_capable+0x7d/0xb0 [ 354.360984][T28572] ? __pfx_tc_new_tfilter+0x10/0x10 [ 354.361005][T28572] rtnetlink_rcv_msg+0x5fb/0x6d0 [ 354.361041][T28572] netlink_rcv_skb+0x123/0x220 [ 354.361064][T28572] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 354.361126][T28572] rtnetlink_rcv+0x1c/0x30 [ 354.361148][T28572] netlink_unicast+0x5bd/0x690 [ 354.361171][T28572] netlink_sendmsg+0x58b/0x6b0 [ 354.361223][T28572] ? __pfx_netlink_sendmsg+0x10/0x10 [ 354.361246][T28572] __sock_sendmsg+0x142/0x180 [ 354.361272][T28572] ____sys_sendmsg+0x31e/0x4e0 [ 354.361354][T28572] ___sys_sendmsg+0x17b/0x1d0 [ 354.361387][T28572] __x64_sys_sendmsg+0xd4/0x160 [ 354.361412][T28572] x64_sys_call+0x191e/0x2ff0 [ 354.361452][T28572] do_syscall_64+0xd2/0x200 [ 354.361478][T28572] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 354.361500][T28572] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 354.361596][T28572] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 354.361617][T28572] RIP: 0033:0x7f79fe9feba9 [ 354.361700][T28572] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 354.361726][T28572] RSP: 002b:00007f79fd467038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 354.361746][T28572] RAX: ffffffffffffffda RBX: 00007f79fec45fa0 RCX: 00007f79fe9feba9 [ 354.361759][T28572] RDX: 0000000020040054 RSI: 0000200000006040 RDI: 0000000000000005 [ 354.361772][T28572] RBP: 00007f79fd467090 R08: 0000000000000000 R09: 0000000000000000 [ 354.361817][T28572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 354.361829][T28572] R13: 00007f79fec46038 R14: 00007f79fec45fa0 R15: 00007ffc087e9c58 [ 354.361846][T28572] [ 354.363929][T28576] netlink: 20 bytes leftover after parsing attributes in process `syz.4.5413'. [ 354.461765][T28585] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5416'. [ 354.483548][T28586] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 649 [ 354.679554][T28579] vxcan1: entered allmulticast mode [ 354.689672][T28590] SELinux: Context @ is not valid (left unmapped). [ 354.702604][T28590] syzkaller0: entered allmulticast mode [ 354.713433][T28590] syzkaller0 (unregistering): left allmulticast mode [ 354.815110][T28618] FAULT_INJECTION: forcing a failure. [ 354.815110][T28618] name failslab, interval 1, probability 0, space 0, times 0 [ 354.828395][T28618] CPU: 0 UID: 0 PID: 28618 Comm: syz.5.5423 Not tainted syzkaller #0 PREEMPT(voluntary) [ 354.828421][T28618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 354.828509][T28618] Call Trace: [ 354.828515][T28618] [ 354.828522][T28618] __dump_stack+0x1d/0x30 [ 354.828540][T28618] dump_stack_lvl+0xe8/0x140 [ 354.828609][T28618] dump_stack+0x15/0x1b [ 354.828622][T28618] should_fail_ex+0x265/0x280 [ 354.828649][T28618] should_failslab+0x8c/0xb0 [ 354.828669][T28618] kmem_cache_alloc_node_noprof+0x57/0x320 [ 354.828698][T28618] ? __alloc_skb+0x101/0x320 [ 354.828732][T28618] __alloc_skb+0x101/0x320 [ 354.828751][T28618] tcp_stream_alloc_skb+0x2d/0x1d0 [ 354.828826][T28618] tcp_sendmsg_locked+0xcbf/0x2c00 [ 354.828857][T28618] ? __account_obj_stock+0x211/0x350 [ 354.828882][T28618] ? __rcu_read_unlock+0x4f/0x70 [ 354.828915][T28618] ? __pfx_tcp_sendmsg+0x10/0x10 [ 354.828931][T28618] tcp_sendmsg+0x2f/0x50 [ 354.829005][T28618] inet_sendmsg+0x76/0xd0 [ 354.829020][T28618] __sock_sendmsg+0x102/0x180 [ 354.829087][T28618] ____sys_sendmsg+0x345/0x4e0 [ 354.829103][T28618] ___sys_sendmsg+0x17b/0x1d0 [ 354.829125][T28618] __sys_sendmmsg+0x178/0x300 [ 354.829184][T28618] __x64_sys_sendmmsg+0x57/0x70 [ 354.829243][T28618] x64_sys_call+0x1c4a/0x2ff0 [ 354.829255][T28618] do_syscall_64+0xd2/0x200 [ 354.829333][T28618] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 354.829346][T28618] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 354.829362][T28618] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 354.829374][T28618] RIP: 0033:0x7f56d70feba9 [ 354.829383][T28618] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 354.829445][T28618] RSP: 002b:00007f56d5b5f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 354.829457][T28618] RAX: ffffffffffffffda RBX: 00007f56d7345fa0 RCX: 00007f56d70feba9 [ 354.829464][T28618] RDX: 0000000000000004 RSI: 0000200000000d00 RDI: 0000000000000003 [ 354.829471][T28618] RBP: 00007f56d5b5f090 R08: 0000000000000000 R09: 0000000000000000 [ 354.829478][T28618] R10: 0000000004000000 R11: 0000000000000246 R12: 0000000000000001 [ 354.829485][T28618] R13: 00007f56d7346038 R14: 00007f56d7345fa0 R15: 00007ffc13b5c3d8 [ 354.829555][T28618] [ 355.084201][T28612] tipc: Enabled bearer , priority 0 [ 355.103046][T28612] tipc: Resetting bearer [ 355.117441][T28612] tipc: Disabling bearer [ 355.210389][T28647] SELinux: ebitmap: truncated map [ 355.216309][T28650] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 649 [ 355.225493][T28647] SELinux: failed to load policy [ 355.407053][T28682] lo speed is unknown, defaulting to 1000 [ 355.444357][T28682] lo speed is unknown, defaulting to 1000 [ 355.452433][T28682] lo speed is unknown, defaulting to 1000 [ 355.566523][T28720] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 649 [ 355.741630][T28742] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 649 [ 355.792020][T28744] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 355.806016][T28744] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 355.823884][T28744] netlink: 'syz.5.5459': attribute type 13 has an invalid length. [ 355.948236][T28744] bridge0: port 3(vlan0) entered disabled state [ 355.954602][T28744] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.961811][T28744] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.079122][T28744] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 356.109521][T28744] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 356.197986][T11935] netdevsim netdevsim5 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 356.215189][T11935] netdevsim netdevsim5 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 356.234385][T11935] netdevsim netdevsim5 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 356.257212][T11935] netdevsim netdevsim5 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 356.271428][T28760] infiniband syz1: set down [ 356.276040][T28760] infiniband syz1: added veth1_macvtap [ 356.320448][T28760] RDS/IB: syz1: added [ 356.329118][T28760] smc: adding ib device syz1 with port count 1 [ 356.336723][T28760] smc: ib device syz1 port 1 has pnetid [ 356.341606][T28782] FAULT_INJECTION: forcing a failure. [ 356.341606][T28782] name failslab, interval 1, probability 0, space 0, times 0 [ 356.355989][T28782] CPU: 0 UID: 0 PID: 28782 Comm: syz.4.5468 Not tainted syzkaller #0 PREEMPT(voluntary) [ 356.356014][T28782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 356.356025][T28782] Call Trace: [ 356.356031][T28782] [ 356.356038][T28782] __dump_stack+0x1d/0x30 [ 356.356056][T28782] dump_stack_lvl+0xe8/0x140 [ 356.356182][T28782] dump_stack+0x15/0x1b [ 356.356199][T28782] should_fail_ex+0x265/0x280 [ 356.356248][T28782] ? rtnl_newlink+0x5c/0x12d0 [ 356.356273][T28782] should_failslab+0x8c/0xb0 [ 356.356339][T28782] __kmalloc_cache_noprof+0x4c/0x320 [ 356.356371][T28782] rtnl_newlink+0x5c/0x12d0 [ 356.356397][T28782] ? x2apic_send_IPI_self+0x10/0x20 [ 356.356421][T28782] ? arch_irq_work_raise+0x46/0x50 [ 356.356529][T28782] ? __irq_work_queue_local+0x10f/0x2c0 [ 356.356553][T28782] ? irq_work_queue+0x93/0x100 [ 356.356646][T28782] ? bpf_ringbuf_discard+0xd3/0xf0 [ 356.356679][T28782] ? __rcu_read_unlock+0x34/0x70 [ 356.356702][T28782] ? bpf_trace_run3+0x12c/0x1d0 [ 356.356724][T28782] ? __memcg_slab_free_hook+0x135/0x230 [ 356.356831][T28782] ? __rcu_read_unlock+0x4f/0x70 [ 356.356913][T28782] ? avc_has_perm_noaudit+0x1b1/0x200 [ 356.356944][T28782] ? cred_has_capability+0x210/0x280 [ 356.356980][T28782] ? selinux_capable+0x31/0x40 [ 356.357005][T28782] ? security_capable+0x83/0x90 [ 356.357030][T28782] ? ns_capable+0x7d/0xb0 [ 356.357048][T28782] ? __pfx_rtnl_newlink+0x10/0x10 [ 356.357146][T28782] rtnetlink_rcv_msg+0x5fb/0x6d0 [ 356.357180][T28782] netlink_rcv_skb+0x123/0x220 [ 356.357202][T28782] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 356.357292][T28782] rtnetlink_rcv+0x1c/0x30 [ 356.357316][T28782] netlink_unicast+0x5bd/0x690 [ 356.357337][T28782] netlink_sendmsg+0x58b/0x6b0 [ 356.357363][T28782] ? __pfx_netlink_sendmsg+0x10/0x10 [ 356.357425][T28782] __sock_sendmsg+0x142/0x180 [ 356.357474][T28782] ____sys_sendmsg+0x31e/0x4e0 [ 356.357550][T28782] ___sys_sendmsg+0x17b/0x1d0 [ 356.357589][T28782] __x64_sys_sendmsg+0xd4/0x160 [ 356.357620][T28782] x64_sys_call+0x191e/0x2ff0 [ 356.357669][T28782] do_syscall_64+0xd2/0x200 [ 356.357742][T28782] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 356.357790][T28782] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 356.357818][T28782] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 356.357839][T28782] RIP: 0033:0x7ff829daeba9 [ 356.357908][T28782] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 356.358043][T28782] RSP: 002b:00007ff828817038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 356.358111][T28782] RAX: ffffffffffffffda RBX: 00007ff829ff5fa0 RCX: 00007ff829daeba9 [ 356.358125][T28782] RDX: 0000000020008800 RSI: 0000200000000080 RDI: 0000000000000003 [ 356.358137][T28782] RBP: 00007ff828817090 R08: 0000000000000000 R09: 0000000000000000 [ 356.358226][T28782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 356.358237][T28782] R13: 00007ff829ff6038 R14: 00007ff829ff5fa0 R15: 00007ffd3dfcccc8 [ 356.358256][T28782] [ 356.664391][ T318] batadv1: left allmulticast mode [ 356.669639][ T318] batadv1: left promiscuous mode [ 356.674739][ T318] bridge0: port 3(batadv1) entered disabled state [ 356.692946][ T318] bridge_slave_1: left allmulticast mode [ 356.698622][ T318] bridge_slave_1: left promiscuous mode [ 356.704370][ T318] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.704568][T28785] ucma_write: process 1061 (syz.4.5469) changed security contexts after opening file descriptor, this is not allowed. [ 356.725056][ T318] bridge_slave_0: left promiscuous mode [ 356.730913][ T318] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.795479][ T318] team0: Port device geneve1 removed [ 356.939467][ T318] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 356.949733][ T318] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 356.959765][ T318] bond0 (unregistering): Released all slaves [ 356.971357][T28785] A link change request failed with some changes committed already. Interface ip6_vti0 may have been left with an inconsistent configuration, please check. [ 357.011091][ T318] tipc: Left network mode [ 357.073469][T28808] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 357.079998][T28808] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 357.088221][T28808] vhci_hcd vhci_hcd.0: Device attached [ 357.146115][ T318] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 357.147845][T28816] netlink: 'syz.5.5479': attribute type 10 has an invalid length. [ 357.153612][ T318] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 357.176894][T28814] SELinux: ebitmap: truncated map [ 357.183211][T28814] SELinux: failed to load policy [ 357.198294][ T318] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 357.205658][ T318] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 357.219251][ T318] veth1_macvtap: left promiscuous mode [ 357.229522][ T318] veth0_macvtap: left promiscuous mode [ 357.283855][ T318] team0 (unregistering): Port device team_slave_1 removed [ 357.293570][T28821] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=28821 comm=syz.3.5480 [ 357.312459][ T318] team0 (unregistering): Port device team_slave_0 removed [ 357.336553][ T2960] usb 1-1: new low-speed USB device number 2 using vhci_hcd [ 357.360003][T28816] ipvlan0: entered allmulticast mode [ 357.366138][T28816] team0: Device ipvlan0 failed to register rx_handler [ 357.382360][T28812] vhci_hcd: connection reset by peer [ 357.390640][ T3409] lo speed is unknown, defaulting to 1000 [ 357.396363][ T3409] infiniband syz2: ib_query_port failed (-19) [ 357.403668][T28813] vhci_hcd: sendmsg failed!, ret=-32 for 48 [ 357.419117][T27536] vhci_hcd: stop threads [ 357.423360][T27536] vhci_hcd: release socket [ 357.427905][T27536] vhci_hcd: disconnect device [ 357.553308][T28856] lo speed is unknown, defaulting to 1000 [ 357.560213][T28856] lo speed is unknown, defaulting to 1000 [ 357.936519][T28893] block device autoloading is deprecated and will be removed. [ 358.089718][ T29] kauditd_printk_skb: 458 callbacks suppressed [ 358.089787][ T29] audit: type=1400 audit(1757586901.547:29865): avc: denied { create } for pid=28904 comm="syz.0.5495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 358.117548][ T29] audit: type=1326 audit(1757586901.547:29866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28904 comm="syz.0.5495" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 358.141140][ T29] audit: type=1326 audit(1757586901.547:29867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28904 comm="syz.0.5495" exe="/root/syz-executor" sig=0 arch=c000003e syscall=154 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 358.165555][ T29] audit: type=1326 audit(1757586901.547:29868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28904 comm="syz.0.5495" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 358.190426][ T29] audit: type=1326 audit(1757586901.547:29869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28904 comm="syz.0.5495" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 358.214071][ T29] audit: type=1326 audit(1757586901.547:29870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28904 comm="syz.0.5495" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 358.238726][ T29] audit: type=1326 audit(1757586901.547:29871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28904 comm="syz.0.5495" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 358.262348][ T29] audit: type=1326 audit(1757586901.547:29872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28904 comm="syz.0.5495" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 358.287294][ T29] audit: type=1326 audit(1757586901.547:29873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28904 comm="syz.0.5495" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 358.310908][ T29] audit: type=1326 audit(1757586901.547:29874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28904 comm="syz.0.5495" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f606468eba9 code=0x7ffc0000 [ 358.427919][T28919] syzkaller0: entered allmulticast mode [ 358.433594][T28919] syzkaller0: entered promiscuous mode [ 358.440826][T28919] syzkaller0 (unregistering): left allmulticast mode [ 358.447632][T28919] syzkaller0 (unregistering): left promiscuous mode [ 358.487781][T28924] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=65280 sclass=netlink_xfrm_socket pid=28924 comm=syz.3.5498 [ 358.552151][T28940] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 649 [ 358.625556][T28951] block device autoloading is deprecated and will be removed. [ 358.782853][T28963] loop0: detected capacity change from 0 to 8192 [ 358.793036][T28970] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 649 [ 358.816148][T28963] loop0: p1 p2 < > p3 p4 < p5 > [ 358.821111][T28963] loop0: partition table partially beyond EOD, truncated [ 358.828388][T28963] loop0: p1 size 100663296 extends beyond EOD, truncated [ 358.835427][T28972] syzkaller0: entered promiscuous mode [ 358.838720][T28963] loop0: p2 start 591104 is beyond EOD, truncated [ 358.847721][T28963] loop0: p3 start 33572980 is beyond EOD, truncated [ 358.854921][T28963] loop0: p5 size 100663296 extends beyond EOD, truncated [ 358.855378][T28972] syzkaller0 (unregistering): left promiscuous mode [ 358.925543][T28985] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 358.935763][T28985] FAT-fs (loop1): unable to read boot sector [ 359.022583][T29001] __nla_validate_parse: 24 callbacks suppressed [ 359.022592][T29001] netlink: 96 bytes leftover after parsing attributes in process `syz.0.5521'. [ 359.038421][T29001] netlink: 32 bytes leftover after parsing attributes in process `syz.0.5521'. [ 359.073574][T29009] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5522'. [ 359.120521][T29018] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 649 [ 359.171633][T29020] loop0: detected capacity change from 0 to 8192 [ 359.227264][T29020] loop0: p1 p2 < > p3 p4 < p5 > [ 359.232206][T29020] loop0: partition table partially beyond EOD, truncated [ 359.255676][T29020] loop0: p1 size 100663296 extends beyond EOD, truncated [ 359.263386][T29020] loop0: p2 start 591104 is beyond EOD, truncated [ 359.269980][T29020] loop0: p3 start 33572980 is beyond EOD, truncated [ 359.296062][T29020] loop0: p5 size 100663296 extends beyond EOD, truncated [ 359.339121][T29042] FAULT_INJECTION: forcing a failure. [ 359.339121][T29042] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 359.352237][T29042] CPU: 0 UID: 0 PID: 29042 Comm: syz.5.5531 Not tainted syzkaller #0 PREEMPT(voluntary) [ 359.352260][T29042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 359.352277][T29042] Call Trace: [ 359.352283][T29042] [ 359.352291][T29042] __dump_stack+0x1d/0x30 [ 359.352305][T29042] dump_stack_lvl+0xe8/0x140 [ 359.352323][T29042] dump_stack+0x15/0x1b [ 359.352340][T29042] should_fail_ex+0x265/0x280 [ 359.352443][T29042] should_fail+0xb/0x20 [ 359.352454][T29042] should_fail_usercopy+0x1a/0x20 [ 359.352468][T29042] _copy_to_user+0x20/0xa0 [ 359.352486][T29042] simple_read_from_buffer+0xb5/0x130 [ 359.352570][T29042] proc_fail_nth_read+0x10e/0x150 [ 359.352587][T29042] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 359.352601][T29042] vfs_read+0x1a8/0x770 [ 359.352613][T29042] ? __rcu_read_unlock+0x4f/0x70 [ 359.352669][T29042] ? __fget_files+0x184/0x1c0 [ 359.352684][T29042] ksys_read+0xda/0x1a0 [ 359.352755][T29042] __x64_sys_read+0x40/0x50 [ 359.352767][T29042] x64_sys_call+0x27bc/0x2ff0 [ 359.352779][T29042] do_syscall_64+0xd2/0x200 [ 359.352974][T29042] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 359.353036][T29042] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 359.353068][T29042] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 359.353172][T29042] RIP: 0033:0x7f56d70fd5bc [ 359.353182][T29042] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 359.353192][T29042] RSP: 002b:00007f56d5b5f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 359.353203][T29042] RAX: ffffffffffffffda RBX: 00007f56d7345fa0 RCX: 00007f56d70fd5bc [ 359.353211][T29042] RDX: 000000000000000f RSI: 00007f56d5b5f0a0 RDI: 0000000000000006 [ 359.353277][T29042] RBP: 00007f56d5b5f090 R08: 0000000000000000 R09: 0000000000000014 [ 359.353286][T29042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 359.353317][T29042] R13: 00007f56d7346038 R14: 00007f56d7345fa0 R15: 00007ffc13b5c3d8 [ 359.353328][T29042] [ 359.609808][T29046] netlink: 'syz.0.5530': attribute type 4 has an invalid length. [ 359.637743][T29051] netlink: 96 bytes leftover after parsing attributes in process `syz.6.5533'. [ 359.648141][T29051] netlink: 32 bytes leftover after parsing attributes in process `syz.6.5533'. [ 359.684849][T29061] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5537'. [ 359.703199][T29056] SELinux: ebitmap: truncated map [ 359.714192][T29056] SELinux: failed to load policy [ 359.852491][T29071] loop0: detected capacity change from 0 to 8192 [ 359.936227][T29071] loop0: p1 p2 < > p3 p4 < p5 > [ 359.941288][T29071] loop0: partition table partially beyond EOD, truncated [ 359.949295][T29071] loop0: p1 size 100663296 extends beyond EOD, truncated [ 359.957946][T29071] loop0: p2 start 591104 is beyond EOD, truncated [ 359.964410][T29071] loop0: p3 start 33572980 is beyond EOD, truncated [ 359.972103][T29071] loop0: p5 size 100663296 extends beyond EOD, truncated [ 360.016676][T29088] netlink: 20 bytes leftover after parsing attributes in process `syz.4.5545'. [ 360.032467][T29093] bridge0: Device is already in use. [ 360.044068][T29093] loop0: detected capacity change from 0 to 1024 [ 360.051326][T29093] EXT4-fs: Ignoring removed orlov option [ 360.059932][T29098] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=29098 comm=syz.4.5547 [ 360.067977][T29093] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 360.114576][T29105] netlink: 28 bytes leftover after parsing attributes in process `syz.4.5548'. [ 360.124158][T29105] netem: change failed [ 360.196493][T16022] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 360.228748][T29111] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5549'. [ 360.688688][T29130] FAULT_INJECTION: forcing a failure. [ 360.688688][T29130] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 360.701768][T29130] CPU: 0 UID: 0 PID: 29130 Comm: syz.6.5555 Not tainted syzkaller #0 PREEMPT(voluntary) [ 360.701791][T29130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 360.701847][T29130] Call Trace: [ 360.701853][T29130] [ 360.701860][T29130] __dump_stack+0x1d/0x30 [ 360.701879][T29130] dump_stack_lvl+0xe8/0x140 [ 360.701965][T29130] dump_stack+0x15/0x1b [ 360.701979][T29130] should_fail_ex+0x265/0x280 [ 360.701999][T29130] should_fail+0xb/0x20 [ 360.702020][T29130] should_fail_usercopy+0x1a/0x20 [ 360.702046][T29130] _copy_to_user+0x20/0xa0 [ 360.702097][T29130] simple_read_from_buffer+0xb5/0x130 [ 360.702118][T29130] proc_fail_nth_read+0x10e/0x150 [ 360.702156][T29130] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 360.702183][T29130] vfs_read+0x1a8/0x770 [ 360.702227][T29130] ? __rcu_read_unlock+0x4f/0x70 [ 360.702256][T29130] ? __fget_files+0x184/0x1c0 [ 360.702279][T29130] ksys_read+0xda/0x1a0 [ 360.702331][T29130] __x64_sys_read+0x40/0x50 [ 360.702349][T29130] x64_sys_call+0x27bc/0x2ff0 [ 360.702370][T29130] do_syscall_64+0xd2/0x200 [ 360.702401][T29130] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 360.702447][T29130] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 360.702472][T29130] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 360.702491][T29130] RIP: 0033:0x7f79fe9fd5bc [ 360.702504][T29130] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 360.702580][T29130] RSP: 002b:00007f79fd467030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 360.702597][T29130] RAX: ffffffffffffffda RBX: 00007f79fec45fa0 RCX: 00007f79fe9fd5bc [ 360.702611][T29130] RDX: 000000000000000f RSI: 00007f79fd4670a0 RDI: 0000000000000003 [ 360.702691][T29130] RBP: 00007f79fd467090 R08: 0000000000000000 R09: 0000000000000000 [ 360.702775][T29130] R10: 00002000000002c0 R11: 0000000000000246 R12: 0000000000000001 [ 360.702786][T29130] R13: 00007f79fec46038 R14: 00007f79fec45fa0 R15: 00007ffc087e9c58 [ 360.702802][T29130] [ 360.970042][T29137] netlink: 28 bytes leftover after parsing attributes in process `syz.6.5558'. [ 361.114308][T29146] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29146 comm=syz.6.5562 [ 361.166457][T29150] C: renamed from team_slave_0 [ 361.174690][T29150] can0: slcan on ttyS3. [ 361.205281][T29149] can0 (unregistered): slcan off ttyS3. [ 361.578660][T29198] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 649 [ 361.859580][T29211] 9pnet_fd: Insufficient options for proto=fd [ 362.056179][T29215] loop0: detected capacity change from 0 to 8192 [ 362.104718][T29215] loop0: p1 p2 < > p3 p4 < p5 > [ 362.109697][T29215] loop0: partition table partially beyond EOD, truncated [ 362.118918][T29215] loop0: p1 size 100663296 extends beyond EOD, truncated [ 362.128600][T29215] loop0: p2 start 591104 is beyond EOD, truncated [ 362.135090][T29215] loop0: p3 start 33572980 is beyond EOD, truncated [ 362.143196][T29215] loop0: p5 size 100663296 extends beyond EOD, truncated [ 362.393004][ T36] IPVS: starting estimator thread 0... [ 362.425199][ T2960] usb 1-1: enqueue for inactive port 0 [ 362.434343][T29279] FAULT_INJECTION: forcing a failure. [ 362.434343][T29279] name failslab, interval 1, probability 0, space 0, times 0 [ 362.448343][T29279] CPU: 1 UID: 0 PID: 29279 Comm: syz.6.5606 Not tainted syzkaller #0 PREEMPT(voluntary) [ 362.448384][T29279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 362.448396][T29279] Call Trace: [ 362.448403][T29279] [ 362.448411][T29279] __dump_stack+0x1d/0x30 [ 362.448429][T29279] dump_stack_lvl+0xe8/0x140 [ 362.448446][T29279] dump_stack+0x15/0x1b [ 362.448516][T29279] should_fail_ex+0x265/0x280 [ 362.448539][T29279] should_failslab+0x8c/0xb0 [ 362.448560][T29279] __kvmalloc_node_noprof+0x123/0x4e0 [ 362.448585][T29279] ? rhashtable_init_noprof+0x316/0x4f0 [ 362.448674][T29279] rhashtable_init_noprof+0x316/0x4f0 [ 362.448699][T29279] br_fdb_hash_init+0x20/0x30 [ 362.448717][T29279] br_dev_init+0x21/0xf0 [ 362.448812][T29279] register_netdevice+0x284/0xf00 [ 362.448836][T29279] ? validate_linkmsg+0x4f2/0x570 [ 362.448919][T29279] br_dev_newlink+0x42/0x100 [ 362.449013][T29279] ? __pfx_br_dev_newlink+0x10/0x10 [ 362.449037][T29279] rtnl_newlink_create+0x1bc/0x620 [ 362.449054][T29279] ? security_capable+0x83/0x90 [ 362.449074][T29279] ? netlink_ns_capable+0x86/0xa0 [ 362.449162][T29279] rtnl_newlink+0xf29/0x12d0 [ 362.449212][T29279] ? bpf_trace_run3+0x12c/0x1d0 [ 362.449236][T29279] ? __memcg_slab_free_hook+0x135/0x230 [ 362.449280][T29279] ? __rcu_read_unlock+0x4f/0x70 [ 362.449299][T29279] ? avc_has_perm_noaudit+0x1b1/0x200 [ 362.449326][T29279] ? cred_has_capability+0x210/0x280 [ 362.449353][T29279] ? selinux_capable+0x31/0x40 [ 362.449431][T29279] ? security_capable+0x83/0x90 [ 362.449454][T29279] ? ns_capable+0x7d/0xb0 [ 362.449597][T29279] ? __pfx_rtnl_newlink+0x10/0x10 [ 362.449626][T29279] rtnetlink_rcv_msg+0x5fb/0x6d0 [ 362.449653][T29279] netlink_rcv_skb+0x123/0x220 [ 362.449672][T29279] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 362.449737][T29279] rtnetlink_rcv+0x1c/0x30 [ 362.449843][T29279] netlink_unicast+0x5bd/0x690 [ 362.449863][T29279] netlink_sendmsg+0x58b/0x6b0 [ 362.449974][T29279] ? __pfx_netlink_sendmsg+0x10/0x10 [ 362.449996][T29279] __sock_sendmsg+0x142/0x180 [ 362.450137][T29279] ____sys_sendmsg+0x31e/0x4e0 [ 362.450234][T29279] ___sys_sendmsg+0x17b/0x1d0 [ 362.450313][T29279] __x64_sys_sendmsg+0xd4/0x160 [ 362.450360][T29279] x64_sys_call+0x191e/0x2ff0 [ 362.450378][T29279] do_syscall_64+0xd2/0x200 [ 362.450408][T29279] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 362.450492][T29279] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 362.450522][T29279] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 362.450591][T29279] RIP: 0033:0x7f79fe9feba9 [ 362.450607][T29279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 362.450724][T29279] RSP: 002b:00007f79fd467038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 362.450741][T29279] RAX: ffffffffffffffda RBX: 00007f79fec45fa0 RCX: 00007f79fe9feba9 [ 362.450752][T29279] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 362.450763][T29279] RBP: 00007f79fd467090 R08: 0000000000000000 R09: 0000000000000000 [ 362.450776][T29279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 362.450790][T29279] R13: 00007f79fec46038 R14: 00007f79fec45fa0 R15: 00007ffc087e9c58 [ 362.450810][T29279] [ 362.493267][ T3409] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 362.534847][T29276] IPVS: using max 2592 ests per chain, 129600 per kthread [ 362.538851][ T3409] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 362.794512][ T3409] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 362.844386][ T2960] vhci_hcd: vhci_device speed not set [ 362.850216][ T3409] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 362.857755][ T3409] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 362.865195][ T3409] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 362.873195][ T3409] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 362.880612][ T3409] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 362.880635][ T3409] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 362.880657][ T3409] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 362.883800][ T3409] hid-generic 0000:0000:0000.0018: hidraw0: HID v8.00 Device [syz0] on syz1 [ 362.902247][T29295] dummy0: entered allmulticast mode [ 362.995875][T29306] dummy0: left allmulticast mode [ 363.085384][T29317] can0: slcan on ptm0. [ 363.135837][ T29] kauditd_printk_skb: 371 callbacks suppressed [ 363.135852][ T29] audit: type=1400 audit(1757586906.600:30246): avc: denied { sqpoll } for pid=29329 comm="syz.6.5617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 363.165618][T29330] 9pnet_fd: Insufficient options for proto=fd [ 363.173251][ T29] audit: type=1400 audit(1757586906.630:30247): avc: denied { ioctl } for pid=29329 comm="syz.6.5617" path="socket:[73668]" dev="sockfs" ino=73668 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 363.225349][T29336] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 649 [ 363.254826][T29316] can0 (unregistered): slcan off ptm0. [ 363.292352][ T29] audit: type=1326 audit(1757586906.750:30248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29343 comm="syz.4.5622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff829daeba9 code=0x7ffc0000 [ 363.317169][ T29] audit: type=1326 audit(1757586906.750:30249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29343 comm="syz.4.5622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff829daeba9 code=0x7ffc0000 [ 363.341419][ T29] audit: type=1326 audit(1757586906.810:30250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29343 comm="syz.4.5622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff829daeba9 code=0x7ffc0000 [ 363.366228][ T29] audit: type=1326 audit(1757586906.810:30251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29343 comm="syz.4.5622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff829daeba9 code=0x7ffc0000 [ 363.389823][ T29] audit: type=1326 audit(1757586906.810:30252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29343 comm="syz.4.5622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff829daeba9 code=0x7ffc0000 [ 363.415300][ T29] audit: type=1326 audit(1757586906.880:30253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29343 comm="syz.4.5622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff829daeba9 code=0x7ffc0000 [ 363.438931][ T29] audit: type=1326 audit(1757586906.880:30254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29343 comm="syz.4.5622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff829daeba9 code=0x7ffc0000 [ 363.462571][ T29] audit: type=1326 audit(1757586906.880:30255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29343 comm="syz.4.5622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff829daeba9 code=0x7ffc0000 [ 363.513941][T29352] netlink: 'syz.4.5625': attribute type 21 has an invalid length. [ 363.527760][T29352] netlink: 'syz.4.5625': attribute type 1 has an invalid length. [ 363.593222][T29366] FAULT_INJECTION: forcing a failure. [ 363.593222][T29366] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 363.607071][T29366] CPU: 0 UID: 0 PID: 29366 Comm: syz.4.5628 Not tainted syzkaller #0 PREEMPT(voluntary) [ 363.607099][T29366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 363.607110][T29366] Call Trace: [ 363.607116][T29366] [ 363.607122][T29366] __dump_stack+0x1d/0x30 [ 363.607141][T29366] dump_stack_lvl+0xe8/0x140 [ 363.607174][T29366] dump_stack+0x15/0x1b [ 363.607253][T29366] should_fail_ex+0x265/0x280 [ 363.607352][T29366] should_fail+0xb/0x20 [ 363.607372][T29366] should_fail_usercopy+0x1a/0x20 [ 363.607440][T29366] _copy_to_user+0x20/0xa0 [ 363.607471][T29366] usbdev_read+0x143/0x4c0 [ 363.607501][T29366] ? css_rstat_updated+0xb7/0x240 [ 363.607583][T29366] ? __account_obj_stock+0x211/0x350 [ 363.607663][T29366] loop_rw_iter+0x2c3/0x3f0 [ 363.607692][T29366] __io_read+0xbcb/0xc20 [ 363.607716][T29366] ? __fget_files+0x184/0x1c0 [ 363.607745][T29366] io_read+0x1c/0x60 [ 363.607763][T29366] __io_issue_sqe+0xfe/0x2e0 [ 363.607785][T29366] ? io_assign_file+0x1b6/0x200 [ 363.607804][T29366] io_issue_sqe+0x53/0x970 [ 363.607829][T29366] io_submit_sqes+0x675/0x1060 [ 363.607926][T29366] __se_sys_io_uring_enter+0x1c1/0x1b70 [ 363.607952][T29366] ? 0xffffffff81000000 [ 363.607965][T29366] ? __rcu_read_unlock+0x4f/0x70 [ 363.608018][T29366] ? get_pid_task+0x96/0xd0 [ 363.608038][T29366] ? proc_fail_nth_write+0x13b/0x160 [ 363.608065][T29366] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 363.608167][T29366] ? vfs_write+0x7e8/0x960 [ 363.608190][T29366] ? __rcu_read_unlock+0x4f/0x70 [ 363.608213][T29366] ? __fget_files+0x184/0x1c0 [ 363.608234][T29366] ? fput+0x8f/0xc0 [ 363.608307][T29366] __x64_sys_io_uring_enter+0x78/0x90 [ 363.608331][T29366] x64_sys_call+0x2de1/0x2ff0 [ 363.608349][T29366] do_syscall_64+0xd2/0x200 [ 363.608435][T29366] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 363.608461][T29366] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 363.608490][T29366] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 363.608511][T29366] RIP: 0033:0x7ff829daeba9 [ 363.608524][T29366] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 363.608596][T29366] RSP: 002b:00007ff828817038 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 363.608613][T29366] RAX: ffffffffffffffda RBX: 00007ff829ff5fa0 RCX: 00007ff829daeba9 [ 363.608627][T29366] RDX: 0000000000000000 RSI: 00000000000847ba RDI: 0000000000000005 [ 363.608662][T29366] RBP: 00007ff828817090 R08: 0000000000000000 R09: 0000000000000000 [ 363.608676][T29366] R10: 000000000000000e R11: 0000000000000246 R12: 0000000000000001 [ 363.608725][T29366] R13: 00007ff829ff6038 R14: 00007ff829ff5fa0 R15: 00007ffd3dfcccc8 [ 363.608743][T29366] [ 363.934911][T29367] lo speed is unknown, defaulting to 1000 [ 363.940884][T29367] lo speed is unknown, defaulting to 1000 [ 363.946954][T29367] lo speed is unknown, defaulting to 1000 [ 363.953409][T29367] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 363.965027][T29367] lo speed is unknown, defaulting to 1000 [ 363.971029][T29367] lo speed is unknown, defaulting to 1000 [ 363.977129][T29367] lo speed is unknown, defaulting to 1000 [ 363.983280][T29367] lo speed is unknown, defaulting to 1000 [ 363.989275][T29367] lo speed is unknown, defaulting to 1000 [ 364.044820][T29373] __nla_validate_parse: 9 callbacks suppressed [ 364.044834][T29373] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5631'. [ 364.069867][T29373] netlink: 32 bytes leftover after parsing attributes in process `syz.3.5631'. [ 364.094367][T29392] tipc: Started in network mode [ 364.099276][T29392] tipc: Node identity ac14140f, cluster identity 4711 [ 364.106263][T29392] tipc: New replicast peer: 255.255.255.83 [ 364.106430][T29395] FAULT_INJECTION: forcing a failure. [ 364.106430][T29395] name failslab, interval 1, probability 0, space 0, times 0 [ 364.112076][T29392] tipc: Enabled bearer , priority 10 [ 364.125538][T29395] CPU: 0 UID: 0 PID: 29395 Comm: syz.4.5638 Not tainted syzkaller #0 PREEMPT(voluntary) [ 364.125567][T29395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 364.125580][T29395] Call Trace: [ 364.125587][T29395] [ 364.125595][T29395] __dump_stack+0x1d/0x30 [ 364.125651][T29395] dump_stack_lvl+0xe8/0x140 [ 364.125670][T29395] dump_stack+0x15/0x1b [ 364.125687][T29395] should_fail_ex+0x265/0x280 [ 364.125713][T29395] should_failslab+0x8c/0xb0 [ 364.125769][T29395] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 364.125826][T29395] ? make_vfsuid+0x49/0xa0 [ 364.125849][T29395] ? v9fs_session_init+0x4b/0xde0 [ 364.125940][T29395] kstrdup+0x3e/0xd0 [ 364.125987][T29395] v9fs_session_init+0x4b/0xde0 [ 364.126008][T29395] ? __rcu_read_unlock+0x4f/0x70 [ 364.126098][T29395] ? avc_has_perm_noaudit+0x1b1/0x200 [ 364.126156][T29395] ? should_fail_ex+0xdb/0x280 [ 364.126178][T29395] ? v9fs_mount+0x51/0x5c0 [ 364.126204][T29395] ? should_failslab+0x8c/0xb0 [ 364.126291][T29395] ? __kmalloc_cache_noprof+0x189/0x320 [ 364.126399][T29395] v9fs_mount+0x67/0x5c0 [ 364.126483][T29395] ? selinux_capable+0x31/0x40 [ 364.126534][T29395] ? __pfx_v9fs_mount+0x10/0x10 [ 364.126561][T29395] legacy_get_tree+0x75/0xd0 [ 364.126582][T29395] vfs_get_tree+0x54/0x1d0 [ 364.126667][T29395] do_new_mount+0x207/0x5e0 [ 364.126689][T29395] ? security_capable+0x83/0x90 [ 364.126784][T29395] path_mount+0x4a4/0xb20 [ 364.126805][T29395] ? user_path_at+0x109/0x130 [ 364.126834][T29395] __se_sys_mount+0x28f/0x2e0 [ 364.126856][T29395] ? fput+0x8f/0xc0 [ 364.126979][T29395] __x64_sys_mount+0x67/0x80 [ 364.127002][T29395] x64_sys_call+0x2b4d/0x2ff0 [ 364.127035][T29395] do_syscall_64+0xd2/0x200 [ 364.127063][T29395] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 364.127086][T29395] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 364.127114][T29395] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 364.127209][T29395] RIP: 0033:0x7ff829daeba9 [ 364.127223][T29395] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 364.127263][T29395] RSP: 002b:00007ff828817038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 364.127281][T29395] RAX: ffffffffffffffda RBX: 00007ff829ff5fa0 RCX: 00007ff829daeba9 [ 364.127316][T29395] RDX: 0000200000000040 RSI: 0000200000000000 RDI: 0000000000000000 [ 364.127329][T29395] RBP: 00007ff828817090 R08: 0000200000000140 R09: 0000000000000000 [ 364.127342][T29395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 364.127354][T29395] R13: 00007ff829ff6038 R14: 00007ff829ff5fa0 R15: 00007ffd3dfcccc8 [ 364.127373][T29395] [ 364.474280][T29409] netlink: 16 bytes leftover after parsing attributes in process `syz.6.5643'. [ 364.646348][T29431] netlink: 36 bytes leftover after parsing attributes in process `syz.0.5650'. [ 364.839696][T29449] FAULT_INJECTION: forcing a failure. [ 364.839696][T29449] name failslab, interval 1, probability 0, space 0, times 0 [ 364.853171][T29449] CPU: 0 UID: 0 PID: 29449 Comm: syz.3.5655 Not tainted syzkaller #0 PREEMPT(voluntary) [ 364.853243][T29449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 364.853255][T29449] Call Trace: [ 364.853262][T29449] [ 364.853271][T29449] __dump_stack+0x1d/0x30 [ 364.853292][T29449] dump_stack_lvl+0xe8/0x140 [ 364.853313][T29449] dump_stack+0x15/0x1b [ 364.853330][T29449] should_fail_ex+0x265/0x280 [ 364.853351][T29449] should_failslab+0x8c/0xb0 [ 364.853377][T29449] kmem_cache_alloc_node_noprof+0x57/0x320 [ 364.853402][T29449] ? __alloc_skb+0x101/0x320 [ 364.853426][T29449] __alloc_skb+0x101/0x320 [ 364.853447][T29449] ? audit_log_start+0x365/0x6c0 [ 364.853527][T29449] audit_log_start+0x380/0x6c0 [ 364.853555][T29449] ? __rcu_read_unlock+0x4f/0x70 [ 364.853579][T29449] audit_log_common_recv_msg+0xbe/0x190 [ 364.853633][T29449] audit_receive+0x149d/0x2180 [ 364.853668][T29449] ? __netlink_lookup+0x266/0x2a0 [ 364.853775][T29449] netlink_unicast+0x5bd/0x690 [ 364.853798][T29449] netlink_sendmsg+0x58b/0x6b0 [ 364.853826][T29449] ? __pfx_netlink_sendmsg+0x10/0x10 [ 364.853856][T29449] __sock_sendmsg+0x142/0x180 [ 364.854020][T29449] ____sys_sendmsg+0x31e/0x4e0 [ 364.854048][T29449] ___sys_sendmsg+0x17b/0x1d0 [ 364.854079][T29449] __x64_sys_sendmsg+0xd4/0x160 [ 364.854146][T29449] x64_sys_call+0x191e/0x2ff0 [ 364.854169][T29449] do_syscall_64+0xd2/0x200 [ 364.854219][T29449] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 364.854306][T29449] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 364.854332][T29449] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 364.854354][T29449] RIP: 0033:0x7fa5fecbeba9 [ 364.854369][T29449] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 364.854434][T29449] RSP: 002b:00007fa5fd727038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 364.854500][T29449] RAX: ffffffffffffffda RBX: 00007fa5fef05fa0 RCX: 00007fa5fecbeba9 [ 364.854513][T29449] RDX: 0000000004000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 364.854526][T29449] RBP: 00007fa5fd727090 R08: 0000000000000000 R09: 0000000000000000 [ 364.854540][T29449] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 364.854553][T29449] R13: 00007fa5fef06038 R14: 00007fa5fef05fa0 R15: 00007ffd1deb9d58 [ 364.854573][T29449] [ 365.124330][T29456] netlink: 16 bytes leftover after parsing attributes in process `syz.5.5658'. [ 365.172416][T29462] netlink: 268 bytes leftover after parsing attributes in process `syz.5.5661'. [ 365.222540][ T36] tipc: Node number set to 2886997007 [ 365.285107][T29467] netlink: 96 bytes leftover after parsing attributes in process `syz.5.5663'. [ 365.294801][T29467] netlink: 96 bytes leftover after parsing attributes in process `syz.5.5663'. [ 365.303822][T29467] netlink: 96 bytes leftover after parsing attributes in process `syz.5.5663'. [ 365.339060][T29470] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5664'. [ 365.347897][T29472] FAULT_INJECTION: forcing a failure. [ 365.347897][T29472] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 365.347961][T29472] CPU: 0 UID: 0 PID: 29472 Comm: syz.5.5665 Not tainted syzkaller #0 PREEMPT(voluntary) [ 365.347986][T29472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 365.347998][T29472] Call Trace: [ 365.348005][T29472] [ 365.348012][T29472] __dump_stack+0x1d/0x30 [ 365.348187][T29472] dump_stack_lvl+0xe8/0x140 [ 365.348276][T29472] dump_stack+0x15/0x1b [ 365.348293][T29472] should_fail_ex+0x265/0x280 [ 365.348317][T29472] should_fail+0xb/0x20 [ 365.348412][T29472] should_fail_usercopy+0x1a/0x20 [ 365.348436][T29472] _copy_from_iter+0xd2/0xe80 [ 365.348464][T29472] ? __build_skb_around+0x1a0/0x200 [ 365.348487][T29472] ? __alloc_skb+0x223/0x320 [ 365.348510][T29472] netlink_sendmsg+0x471/0x6b0 [ 365.348587][T29472] ? __pfx_netlink_sendmsg+0x10/0x10 [ 365.348611][T29472] __sock_sendmsg+0x142/0x180 [ 365.348697][T29472] ____sys_sendmsg+0x31e/0x4e0 [ 365.348725][T29472] ___sys_sendmsg+0x17b/0x1d0 [ 365.348762][T29472] __x64_sys_sendmsg+0xd4/0x160 [ 365.348823][T29472] x64_sys_call+0x191e/0x2ff0 [ 365.348918][T29472] do_syscall_64+0xd2/0x200 [ 365.349048][T29472] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 365.349083][T29472] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 365.349118][T29472] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 365.349189][T29472] RIP: 0033:0x7f56d70feba9 [ 365.349204][T29472] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 365.349277][T29472] RSP: 002b:00007f56d5b5f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 365.349295][T29472] RAX: ffffffffffffffda RBX: 00007f56d7345fa0 RCX: 00007f56d70feba9 [ 365.349308][T29472] RDX: 00000000240000c0 RSI: 0000200000000140 RDI: 0000000000000003 [ 365.349320][T29472] RBP: 00007f56d5b5f090 R08: 0000000000000000 R09: 0000000000000000 [ 365.349394][T29472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 365.349406][T29472] R13: 00007f56d7346038 R14: 00007f56d7345fa0 R15: 00007ffc13b5c3d8 [ 365.349425][T29472] [ 365.596141][T29483] loop0: detected capacity change from 0 to 512 [ 365.616405][T29483] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 365.629256][T29483] ext4 filesystem being mounted at /592/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 365.641663][T29483] FAULT_INJECTION: forcing a failure. [ 365.641663][T29483] name failslab, interval 1, probability 0, space 0, times 0 [ 365.654316][T29483] CPU: 1 UID: 0 PID: 29483 Comm: syz.0.5670 Not tainted syzkaller #0 PREEMPT(voluntary) [ 365.654418][T29483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 365.654429][T29483] Call Trace: [ 365.654434][T29483] [ 365.654506][T29483] __dump_stack+0x1d/0x30 [ 365.654526][T29483] dump_stack_lvl+0xe8/0x140 [ 365.654543][T29483] dump_stack+0x15/0x1b [ 365.654561][T29483] should_fail_ex+0x265/0x280 [ 365.654584][T29483] should_failslab+0x8c/0xb0 [ 365.654628][T29483] __kmalloc_noprof+0xa5/0x3e0 [ 365.654799][T29483] ? posix_acl_from_xattr+0xf0/0x360 [ 365.654818][T29483] posix_acl_from_xattr+0xf0/0x360 [ 365.654835][T29483] do_set_acl+0x6b/0x130 [ 365.654853][T29483] filename_setxattr+0x1ff/0x400 [ 365.654881][T29483] path_setxattrat+0x2c9/0x310 [ 365.654994][T29483] __x64_sys_setxattr+0x6e/0x90 [ 365.655014][T29483] x64_sys_call+0xad2/0x2ff0 [ 365.655039][T29483] do_syscall_64+0xd2/0x200 [ 365.655069][T29483] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 365.655178][T29483] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 365.655202][T29483] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 365.655299][T29483] RIP: 0033:0x7f606468eba9 [ 365.655316][T29483] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 365.655333][T29483] RSP: 002b:00007f60630ef038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 365.655349][T29483] RAX: ffffffffffffffda RBX: 00007f60648d5fa0 RCX: 00007f606468eba9 [ 365.655368][T29483] RDX: 0000200000000040 RSI: 0000200000002a40 RDI: 0000200000002a00 [ 365.655379][T29483] RBP: 00007f60630ef090 R08: 0000000000000000 R09: 0000000000000000 [ 365.655392][T29483] R10: 0000000000000024 R11: 0000000000000246 R12: 0000000000000001 [ 365.655406][T29483] R13: 00007f60648d6038 R14: 00007f60648d5fa0 R15: 00007ffe0229eca8 [ 365.655426][T29483] [ 365.849913][T16022] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 365.906784][T29520] loop0: detected capacity change from 0 to 512 [ 365.947581][T29520] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 365.961554][T29520] ext4 filesystem being mounted at /596/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 366.145196][T16022] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 366.163309][T29553] FAULT_INJECTION: forcing a failure. [ 366.163309][T29553] name failslab, interval 1, probability 0, space 0, times 0 [ 366.176649][T29553] CPU: 0 UID: 0 PID: 29553 Comm: syz.6.5691 Not tainted syzkaller #0 PREEMPT(voluntary) [ 366.176678][T29553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 366.176691][T29553] Call Trace: [ 366.176723][T29553] [ 366.176729][T29553] __dump_stack+0x1d/0x30 [ 366.176748][T29553] dump_stack_lvl+0xe8/0x140 [ 366.176767][T29553] dump_stack+0x15/0x1b [ 366.176814][T29553] should_fail_ex+0x265/0x280 [ 366.176836][T29553] should_failslab+0x8c/0xb0 [ 366.176862][T29553] kmem_cache_alloc_noprof+0x50/0x310 [ 366.177028][T29553] ? skb_clone+0x151/0x1f0 [ 366.177131][T29553] skb_clone+0x151/0x1f0 [ 366.177154][T29553] __netlink_deliver_tap+0x2c9/0x500 [ 366.177183][T29553] netlink_unicast+0x66b/0x690 [ 366.177206][T29553] netlink_sendmsg+0x58b/0x6b0 [ 366.177236][T29553] ? __pfx_netlink_sendmsg+0x10/0x10 [ 366.177261][T29553] __sock_sendmsg+0x142/0x180 [ 366.177292][T29553] sock_write_iter+0x165/0x1b0 [ 366.177336][T29553] do_iter_readv_writev+0x499/0x540 [ 366.177365][T29553] vfs_writev+0x2df/0x8b0 [ 366.177433][T29553] do_writev+0xe7/0x210 [ 366.177495][T29553] __x64_sys_writev+0x45/0x50 [ 366.177542][T29553] x64_sys_call+0x1e9a/0x2ff0 [ 366.177562][T29553] do_syscall_64+0xd2/0x200 [ 366.177591][T29553] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 366.177678][T29553] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 366.177701][T29553] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 366.177723][T29553] RIP: 0033:0x7f79fe9feba9 [ 366.177811][T29553] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 366.177831][T29553] RSP: 002b:00007f79fd467038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 366.177850][T29553] RAX: ffffffffffffffda RBX: 00007f79fec45fa0 RCX: 00007f79fe9feba9 [ 366.177863][T29553] RDX: 0000000000000001 RSI: 00002000000003c0 RDI: 000000000000000b [ 366.177936][T29553] RBP: 00007f79fd467090 R08: 0000000000000000 R09: 0000000000000000 [ 366.177947][T29553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 366.177958][T29553] R13: 00007f79fec46038 R14: 00007f79fec45fa0 R15: 00007ffc087e9c58 [ 366.178118][T29553] [ 366.178131][T29553] netlink: 'syz.6.5691': attribute type 4 has an invalid length. [ 366.178804][T29555] random: crng reseeded on system resumption [ 366.411382][T29555] FAULT_INJECTION: forcing a failure. [ 366.411382][T29555] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 366.411701][ T3388] lo speed is unknown, defaulting to 1000 [ 366.425946][T29555] CPU: 1 UID: 0 PID: 29555 Comm: syz.0.5690 Not tainted syzkaller #0 PREEMPT(voluntary) [ 366.426062][T29555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 366.426074][T29555] Call Trace: [ 366.426081][T29555] [ 366.426088][T29555] __dump_stack+0x1d/0x30 [ 366.426109][T29555] dump_stack_lvl+0xe8/0x140 [ 366.426151][T29555] dump_stack+0x15/0x1b [ 366.426167][T29555] should_fail_ex+0x265/0x280 [ 366.426187][T29555] should_fail_alloc_page+0xf2/0x100 [ 366.426281][T29555] __alloc_frozen_pages_noprof+0xff/0x360 [ 366.426316][T29555] alloc_pages_mpol+0xb3/0x250 [ 366.426347][T29555] alloc_pages_noprof+0x90/0x130 [ 366.426443][T29555] get_zeroed_page_noprof+0x1a/0x40 [ 366.426542][T29555] get_image_page+0x2b/0x420 [ 366.426656][T29555] ? alloc_pages_noprof+0xa9/0x130 [ 366.426688][T29555] alloc_rtree_node+0x146/0x1f0 [ 366.426713][T29555] memory_bm_create+0x694/0xd90 [ 366.426784][T29555] create_basic_memory_bitmaps+0xa6/0x450 [ 366.426816][T29555] snapshot_open+0x1b4/0x270 [ 366.426842][T29555] ? __pfx_snapshot_open+0x10/0x10 [ 366.426869][T29555] misc_open+0x1d6/0x200 [ 366.426951][T29555] chrdev_open+0x2eb/0x3a0 [ 366.426977][T29555] do_dentry_open+0x646/0xa20 [ 366.427027][T29555] ? __pfx_chrdev_open+0x10/0x10 [ 366.427054][T29555] vfs_open+0x37/0x1e0 [ 366.427081][T29555] path_openat+0x1c5e/0x2170 [ 366.427115][T29555] do_filp_open+0x109/0x230 [ 366.427144][T29555] do_sys_openat2+0xa6/0x110 [ 366.427174][T29555] __x64_sys_openat+0xf2/0x120 [ 366.427221][T29555] x64_sys_call+0x2e9c/0x2ff0 [ 366.427242][T29555] do_syscall_64+0xd2/0x200 [ 366.427349][T29555] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 366.427372][T29555] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 366.427476][T29555] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 366.427515][T29555] RIP: 0033:0x7f606468eba9 [ 366.427531][T29555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 366.427618][T29555] RSP: 002b:00007f60630ef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 366.427637][T29555] RAX: ffffffffffffffda RBX: 00007f60648d5fa0 RCX: 00007f606468eba9 [ 366.427650][T29555] RDX: 0000000000000001 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 366.427662][T29555] RBP: 00007f60630ef090 R08: 0000000000000000 R09: 0000000000000000 [ 366.427711][T29555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 366.427723][T29555] R13: 00007f60648d6038 R14: 00007f60648d5fa0 R15: 00007ffe0229eca8 [ 366.427742][T29555] [ 366.683200][ T3388] syz2: Port: 1 Link DOWN [ 366.731621][T29572] FAULT_INJECTION: forcing a failure. [ 366.731621][T29572] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 366.744703][T29572] CPU: 1 UID: 0 PID: 29572 Comm: syz.6.5697 Not tainted syzkaller #0 PREEMPT(voluntary) [ 366.744720][T29572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 366.744728][T29572] Call Trace: [ 366.744733][T29572] [ 366.744737][T29572] __dump_stack+0x1d/0x30 [ 366.744787][T29572] dump_stack_lvl+0xe8/0x140 [ 366.744798][T29572] dump_stack+0x15/0x1b [ 366.744849][T29572] should_fail_ex+0x265/0x280 [ 366.744863][T29572] should_fail+0xb/0x20 [ 366.744889][T29572] should_fail_usercopy+0x1a/0x20 [ 366.744924][T29572] _copy_from_iter+0xd2/0xe80 [ 366.745000][T29572] ? __build_skb_around+0x1a0/0x200 [ 366.745069][T29572] ? __alloc_skb+0x223/0x320 [ 366.745082][T29572] netlink_sendmsg+0x471/0x6b0 [ 366.745147][T29572] ? __pfx_netlink_sendmsg+0x10/0x10 [ 366.745169][T29572] __sock_sendmsg+0x142/0x180 [ 366.745187][T29572] ____sys_sendmsg+0x31e/0x4e0 [ 366.745203][T29572] ___sys_sendmsg+0x17b/0x1d0 [ 366.745270][T29572] __x64_sys_sendmsg+0xd4/0x160 [ 366.745293][T29572] x64_sys_call+0x191e/0x2ff0 [ 366.745379][T29572] do_syscall_64+0xd2/0x200 [ 366.745444][T29572] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 366.745461][T29572] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 366.745473][T29572] RIP: 0033:0x7f79fe9feba9 [ 366.745487][T29572] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 366.745497][T29572] RSP: 002b:00007f79fd467038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 366.745509][T29572] RAX: ffffffffffffffda RBX: 00007f79fec45fa0 RCX: 00007f79fe9feba9 [ 366.745516][T29572] RDX: 0000000004000894 RSI: 0000200000000300 RDI: 0000000000000004 [ 366.745524][T29572] RBP: 00007f79fd467090 R08: 0000000000000000 R09: 0000000000000000 [ 366.745531][T29572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 366.745538][T29572] R13: 00007f79fec46038 R14: 00007f79fec45fa0 R15: 00007ffc087e9c58 [ 366.745592][T29572] [ 366.993879][T29586] FAULT_INJECTION: forcing a failure. [ 366.993879][T29586] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 367.008617][T29586] CPU: 1 UID: 0 PID: 29586 Comm: syz.5.5702 Not tainted syzkaller #0 PREEMPT(voluntary) [ 367.008641][T29586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 367.008651][T29586] Call Trace: [ 367.008657][T29586] [ 367.008663][T29586] __dump_stack+0x1d/0x30 [ 367.008692][T29586] dump_stack_lvl+0xe8/0x140 [ 367.008768][T29586] dump_stack+0x15/0x1b [ 367.008786][T29586] should_fail_ex+0x265/0x280 [ 367.008812][T29586] should_fail_alloc_page+0xf2/0x100 [ 367.008886][T29586] __alloc_frozen_pages_noprof+0xff/0x360 [ 367.008924][T29586] alloc_pages_mpol+0xb3/0x250 [ 367.008956][T29586] alloc_pages_noprof+0x90/0x130 [ 367.009055][T29586] __pmd_alloc+0x47/0x470 [ 367.009080][T29586] handle_mm_fault+0x19d4/0x2c20 [ 367.009103][T29586] ? __rcu_read_unlock+0x4f/0x70 [ 367.009134][T29586] do_user_addr_fault+0x3fe/0x1090 [ 367.009241][T29586] exc_page_fault+0x62/0xa0 [ 367.009267][T29586] asm_exc_page_fault+0x26/0x30 [ 367.009351][T29586] RIP: 0010:rep_movs_alternative+0x4a/0x90 [ 367.009376][T29586] Code: f6 01 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 db 83 f9 08 73 e8 eb c5 a4 c3 cc cc cc cc 48 8b 06 48 89 07 48 8d 47 08 48 83 e0 f8 48 [ 367.009392][T29586] RSP: 0018:ffffc900046ffdf8 EFLAGS: 00050202 [ 367.009462][T29586] RAX: ffff888102481b20 RBX: 00000000000000d8 RCX: 00000000000000d8 [ 367.009474][T29586] RDX: 0000000000000000 RSI: ffff888129b7d300 RDI: 0000200000000040 [ 367.009488][T29586] RBP: 0000000000000000 R08: 000000000000058f R09: 0000000000000000 [ 367.009501][T29586] R10: 0001888129b7d300 R11: 0001888129b7d3d7 R12: 0000200000000118 [ 367.009514][T29586] R13: 00007ffffffff000 R14: 0000200000000040 R15: ffff888129b7d300 [ 367.009534][T29586] _copy_to_user+0x7c/0xa0 [ 367.009701][T29586] copy_regset_to_user+0xe5/0x180 [ 367.009725][T29586] arch_ptrace+0x23f/0x3f0 [ 367.009775][T29586] __se_sys_ptrace+0xf3/0x2c0 [ 367.009804][T29586] __x64_sys_ptrace+0x55/0x70 [ 367.009827][T29586] x64_sys_call+0x286c/0x2ff0 [ 367.009849][T29586] do_syscall_64+0xd2/0x200 [ 367.009888][T29586] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 367.009911][T29586] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 367.009936][T29586] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 367.009958][T29586] RIP: 0033:0x7f56d70feba9 [ 367.009973][T29586] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 367.010071][T29586] RSP: 002b:00007f56d5b5f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000065 [ 367.010090][T29586] RAX: ffffffffffffffda RBX: 00007f56d7345fa0 RCX: 00007f56d70feba9 [ 367.010104][T29586] RDX: ffffffffffffdcaf RSI: 00000000000003e9 RDI: 000000000000000c [ 367.010117][T29586] RBP: 00007f56d5b5f090 R08: 0000000000000000 R09: 0000000000000000 [ 367.010130][T29586] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 367.010143][T29586] R13: 00007f56d7346038 R14: 00007f56d7345fa0 R15: 00007ffc13b5c3d8 [ 367.010163][T29586] [ 367.330838][T29599] nftables ruleset with unbound chain [ 367.333202][T29595] syz_tun: entered allmulticast mode [ 367.355112][T29595] pimreg: entered allmulticast mode [ 367.385181][T29593] syz_tun: left allmulticast mode [ 367.554318][T29640] FAULT_INJECTION: forcing a failure. [ 367.554318][T29640] name failslab, interval 1, probability 0, space 0, times 0 [ 367.567693][T29640] CPU: 0 UID: 0 PID: 29640 Comm: syz.5.5718 Not tainted syzkaller #0 PREEMPT(voluntary) [ 367.567722][T29640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 367.567734][T29640] Call Trace: [ 367.567740][T29640] [ 367.567747][T29640] __dump_stack+0x1d/0x30 [ 367.567819][T29640] dump_stack_lvl+0xe8/0x140 [ 367.567837][T29640] dump_stack+0x15/0x1b [ 367.567851][T29640] should_fail_ex+0x265/0x280 [ 367.567871][T29640] ? audit_log_d_path+0x8d/0x150 [ 367.567896][T29640] should_failslab+0x8c/0xb0 [ 367.567975][T29640] __kmalloc_cache_noprof+0x4c/0x320 [ 367.568001][T29640] audit_log_d_path+0x8d/0x150 [ 367.568026][T29640] audit_log_d_path_exe+0x42/0x70 [ 367.568071][T29640] audit_log_task+0x1e9/0x250 [ 367.568099][T29640] audit_seccomp+0x61/0x100 [ 367.568121][T29640] ? __seccomp_filter+0x68c/0x10d0 [ 367.568139][T29640] __seccomp_filter+0x69d/0x10d0 [ 367.568218][T29640] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 367.568244][T29640] ? vfs_write+0x7e8/0x960 [ 367.568339][T29640] ? __rcu_read_unlock+0x4f/0x70 [ 367.568362][T29640] ? __fget_files+0x184/0x1c0 [ 367.568389][T29640] __secure_computing+0x82/0x150 [ 367.568407][T29640] syscall_trace_enter+0xcf/0x1e0 [ 367.568428][T29640] do_syscall_64+0xac/0x200 [ 367.568454][T29640] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 367.568474][T29640] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 367.568570][T29640] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 367.568608][T29640] RIP: 0033:0x7f56d70feba9 [ 367.568623][T29640] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 367.568646][T29640] RSP: 002b:00007f56d5b5f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 367.568672][T29640] RAX: ffffffffffffffda RBX: 00007f56d7345fa0 RCX: 00007f56d70feba9 [ 367.568684][T29640] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000005 [ 367.568695][T29640] RBP: 00007f56d5b5f090 R08: 0000000000000000 R09: 0000000000000000 [ 367.568707][T29640] R10: 0001000000201005 R11: 0000000000000246 R12: 0000000000000001 [ 367.568782][T29640] R13: 00007f56d7346038 R14: 00007f56d7345fa0 R15: 00007ffc13b5c3d8 [ 367.568801][T29640] [ 367.788217][T29645] FAULT_INJECTION: forcing a failure. [ 367.788217][T29645] name failslab, interval 1, probability 0, space 0, times 0 [ 367.800888][T29645] CPU: 1 UID: 0 PID: 29645 Comm: syz.4.5715 Not tainted syzkaller #0 PREEMPT(voluntary) [ 367.800915][T29645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 367.800981][T29645] Call Trace: [ 367.800988][T29645] [ 367.801048][T29645] __dump_stack+0x1d/0x30 [ 367.801068][T29645] dump_stack_lvl+0xe8/0x140 [ 367.801088][T29645] dump_stack+0x15/0x1b [ 367.801105][T29645] should_fail_ex+0x265/0x280 [ 367.801192][T29645] ? __pfx_rxrpc_io_thread+0x10/0x10 [ 367.801266][T29645] ? __kthread_create_on_node+0x76/0x230 [ 367.801299][T29645] should_failslab+0x8c/0xb0 [ 367.801324][T29645] __kmalloc_cache_noprof+0x4c/0x320 [ 367.801365][T29645] ? __pfx_rxrpc_io_thread+0x10/0x10 [ 367.801384][T29645] __kthread_create_on_node+0x76/0x230 [ 367.801414][T29645] ? __pfx_rxrpc_io_thread+0x10/0x10 [ 367.801552][T29645] kthread_create_on_node+0x89/0xc0 [ 367.801578][T29645] ? _raw_spin_unlock+0x26/0x50 [ 367.801601][T29645] rxrpc_lookup_local+0x963/0xc70 [ 367.801626][T29645] ? __pfx_rxrpc_encap_rcv+0x10/0x10 [ 367.801673][T29645] ? __pfx_rxrpc_encap_err_rcv+0x10/0x10 [ 367.801698][T29645] rxrpc_sendmsg+0x2f3/0x590 [ 367.801718][T29645] ? __pfx_rxrpc_sendmsg+0x10/0x10 [ 367.801737][T29645] __sock_sendmsg+0x142/0x180 [ 367.801838][T29645] ____sys_sendmsg+0x31e/0x4e0 [ 367.801868][T29645] ___sys_sendmsg+0x17b/0x1d0 [ 367.801905][T29645] __x64_sys_sendmsg+0xd4/0x160 [ 367.801934][T29645] x64_sys_call+0x191e/0x2ff0 [ 367.801959][T29645] do_syscall_64+0xd2/0x200 [ 367.801987][T29645] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 367.802058][T29645] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 367.802086][T29645] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 367.802139][T29645] RIP: 0033:0x7ff829daeba9 [ 367.802232][T29645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 367.802248][T29645] RSP: 002b:00007ff828817038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 367.802264][T29645] RAX: ffffffffffffffda RBX: 00007ff829ff5fa0 RCX: 00007ff829daeba9 [ 367.802275][T29645] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000006 [ 367.802345][T29645] RBP: 00007ff828817090 R08: 0000000000000000 R09: 0000000000000000 [ 367.802356][T29645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 367.802368][T29645] R13: 00007ff829ff6038 R14: 00007ff829ff5fa0 R15: 00007ffd3dfcccc8 [ 367.802388][T29645] [ 368.098603][T29620] lo speed is unknown, defaulting to 1000 [ 368.107473][T29620] lo speed is unknown, defaulting to 1000 [ 368.110435][T29659] team_slave_0: entered promiscuous mode [ 368.121038][T29659] team_slave_0: left promiscuous mode [ 368.191749][T29620] lo speed is unknown, defaulting to 1000 [ 368.283241][ T29] kauditd_printk_skb: 754 callbacks suppressed [ 368.283253][ T29] audit: type=1326 audit(1757586911.752:31008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29705 comm="syz.5.5728" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f56d70feba9 code=0x7ffc0000 [ 368.361149][T29707] SELinux: ebitmap: truncated map [ 368.366945][T29707] SELinux: failed to load policy [ 368.367286][ T29] audit: type=1326 audit(1757586911.812:31009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29705 comm="syz.5.5728" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f56d70feba9 code=0x7ffc0000 [ 368.376900][T29620] chnl_net:caif_netlink_parms(): no params data found [ 368.397098][ T29] audit: type=1326 audit(1757586911.812:31010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29705 comm="syz.5.5728" exe="/root/syz-executor" sig=0 arch=c000003e syscall=447 compat=0 ip=0x7f56d70feba9 code=0x7ffc0000 [ 368.426076][ T29] audit: type=1326 audit(1757586911.812:31011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29705 comm="syz.5.5728" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f56d70feba9 code=0x7ffc0000 [ 368.451115][ T29] audit: type=1326 audit(1757586911.812:31012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29705 comm="syz.5.5728" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f56d70feba9 code=0x7ffc0000 [ 368.464094][T29787] FAULT_INJECTION: forcing a failure. [ 368.464094][T29787] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 368.475655][ T29] audit: type=1326 audit(1757586911.812:31013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29705 comm="syz.5.5728" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f56d70febe3 code=0x7ffc0000 [ 368.488687][T29787] CPU: 0 UID: 0 PID: 29787 Comm: syz.6.5730 Not tainted syzkaller #0 PREEMPT(voluntary) [ 368.488751][T29787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 368.488764][T29787] Call Trace: [ 368.488772][T29787] [ 368.488780][T29787] __dump_stack+0x1d/0x30 [ 368.488801][T29787] dump_stack_lvl+0xe8/0x140 [ 368.488820][T29787] dump_stack+0x15/0x1b [ 368.488880][T29787] should_fail_ex+0x265/0x280 [ 368.488903][T29787] should_fail_alloc_page+0xf2/0x100 [ 368.488947][T29787] __alloc_frozen_pages_noprof+0xff/0x360 [ 368.488982][T29787] alloc_pages_mpol+0xb3/0x250 [ 368.489083][T29787] vma_alloc_folio_noprof+0x1aa/0x300 [ 368.489115][T29787] handle_mm_fault+0xec2/0x2c20 [ 368.489147][T29787] do_user_addr_fault+0x636/0x1090 [ 368.489193][T29787] ? fpregs_assert_state_consistent+0xb4/0xe0 [ 368.489225][T29787] exc_page_fault+0x62/0xa0 [ 368.489251][T29787] asm_exc_page_fault+0x26/0x30 [ 368.489321][T29787] RIP: 0033:0x7f79fe8c0ba3 [ 368.489338][T29787] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 368.489355][T29787] RSP: 002b:00007f79fd4664a0 EFLAGS: 00010206 [ 368.489371][T29787] RAX: 0000000000008000 RBX: 00007f79fd466540 RCX: 00007f79f5047000 [ 368.489384][T29787] RDX: 00007f79fd4666e0 RSI: 000000000000001f RDI: 00007f79fd4665e0 [ 368.489397][T29787] RBP: 000000000000005f R08: 0000000000000009 R09: 00000000000001b4 [ 368.489483][T29787] R10: 00000000000001d0 R11: 00007f79fd466540 R12: 0000000000000001 [ 368.489496][T29787] R13: 00007f79fea9da20 R14: 0000000000000027 R15: 00007f79fd4665e0 [ 368.489515][T29787] [ 368.489537][T29787] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 368.513844][ T29] audit: type=1326 audit(1757586911.812:31014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29705 comm="syz.5.5728" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f56d70fd65f code=0x7ffc0000 [ 368.712969][ T29] audit: type=1326 audit(1757586911.812:31015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29705 comm="syz.5.5728" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f56d70fec37 code=0x7ffc0000 [ 368.736446][ T29] audit: type=1326 audit(1757586911.812:31016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29705 comm="syz.5.5728" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f56d70fd510 code=0x7ffc0000 [ 368.760838][ T29] audit: type=1326 audit(1757586911.812:31017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29705 comm="syz.5.5728" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f56d70fe7ab code=0x7ffc0000 [ 368.973029][T11935] bond0 (unregistering): Released all slaves [ 368.990700][ C0] ================================================================== [ 368.998781][ C0] BUG: KCSAN: data-race in wq_worker_tick / wq_worker_tick [ 369.005959][ C0] [ 369.008261][ C0] read-write to 0xffff8881000734b8 of 8 bytes by interrupt on cpu 1: [ 369.016312][ C0] wq_worker_tick+0x60/0x230 [ 369.020884][ C0] sched_tick+0x11a/0x270 [ 369.025200][ C0] update_process_times+0x15f/0x190 [ 369.030395][ C0] tick_nohz_handler+0x249/0x2d0 [ 369.035308][ C0] __hrtimer_run_queues+0x20c/0x5a0 [ 369.040479][ C0] hrtimer_interrupt+0x21a/0x460 [ 369.045390][ C0] __sysvec_apic_timer_interrupt+0x5c/0x1d0 [ 369.051266][ C0] sysvec_apic_timer_interrupt+0x6f/0x80 [ 369.056885][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 369.062837][ C0] __tsan_unaligned_write8+0xec/0x190 [ 369.068190][ C0] cgroup_can_fork+0x1d7/0x980 [ 369.072927][ C0] copy_process+0x114b/0x2000 [ 369.077591][ C0] kernel_clone+0x16c/0x5c0 [ 369.082104][ C0] user_mode_thread+0x7d/0xb0 [ 369.086770][ C0] call_usermodehelper_exec_work+0x41/0x160 [ 369.092650][ C0] process_scheduled_works+0x4cb/0x9d0 [ 369.098098][ C0] worker_thread+0x582/0x770 [ 369.102666][ C0] kthread+0x489/0x510 [ 369.106708][ C0] ret_from_fork+0xda/0x150 [ 369.111186][ C0] ret_from_fork_asm+0x1a/0x30 [ 369.115944][ C0] [ 369.118248][ C0] read-write to 0xffff8881000734b8 of 8 bytes by interrupt on cpu 0: [ 369.126290][ C0] wq_worker_tick+0x60/0x230 [ 369.130862][ C0] sched_tick+0x11a/0x270 [ 369.135179][ C0] update_process_times+0x15f/0x190 [ 369.140358][ C0] tick_nohz_handler+0x249/0x2d0 [ 369.145271][ C0] __hrtimer_run_queues+0x20c/0x5a0 [ 369.150452][ C0] hrtimer_interrupt+0x21a/0x460 [ 369.155364][ C0] __sysvec_apic_timer_interrupt+0x5c/0x1d0 [ 369.161239][ C0] sysvec_apic_timer_interrupt+0x6f/0x80 [ 369.166863][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 369.172817][ C0] __tsan_memcpy+0x143/0x3c0 [ 369.177385][ C0] copy_fd_bitmaps+0xfc/0x170 [ 369.182037][ C0] dup_fd+0x209/0x540 [ 369.186004][ C0] copy_files+0x98/0xf0 [ 369.190136][ C0] copy_process+0xc5b/0x2000 [ 369.194700][ C0] kernel_clone+0x16c/0x5c0 [ 369.199179][ C0] user_mode_thread+0x7d/0xb0 [ 369.203830][ C0] call_usermodehelper_exec_work+0x41/0x160 [ 369.209703][ C0] process_scheduled_works+0x4cb/0x9d0 [ 369.215141][ C0] worker_thread+0x582/0x770 [ 369.219711][ C0] kthread+0x489/0x510 [ 369.223754][ C0] ret_from_fork+0xda/0x150 [ 369.228231][ C0] ret_from_fork_asm+0x1a/0x30 [ 369.232970][ C0] [ 369.235271][ C0] value changed: 0x000000000015f900 -> 0x0000000000162010 [ 369.242349][ C0] [ 369.244652][ C0] Reported by Kernel Concurrency Sanitizer on: [ 369.250777][ C0] CPU: 0 UID: 0 PID: 2449 Comm: kworker/u8:9 Not tainted syzkaller #0 PREEMPT(voluntary) [ 369.260653][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 369.270729][ C0] Workqueue: events_unbound call_usermodehelper_exec_work [ 369.277850][ C0] ================================================================== [ 369.306072][T29620] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.313230][T29620] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.321026][T29620] bridge_slave_0: entered allmulticast mode [ 369.327517][T29620] bridge_slave_0: entered promiscuous mode [ 369.335438][T29620] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.342542][T29620] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.349716][T29620] bridge_slave_1: entered allmulticast mode [ 369.356187][T29620] bridge_slave_1: entered promiscuous mode [ 369.362884][T11935] tipc: Disabling bearer [ 369.367873][T11935] tipc: Left network mode [ 369.394717][T29620] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 369.405403][T29620] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 369.438533][T11935] hsr_slave_0: left promiscuous mode [ 369.445683][T11935] hsr_slave_1: left promiscuous mode [ 369.459328][ T2449] smc: removing ib device syz1 [ 369.500050][ T4910] smc: removing ib device sz1 [ 369.505865][T29620] team0: Port device team_slave_0 added [ 369.514719][T29620] team0: Port device team_slave_1 added [ 369.558799][T29620] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 369.565860][T29620] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 369.592437][T29620] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 369.637995][T29620] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 369.644999][T29620] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 369.671583][T29620] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 369.730199][T29620] hsr_slave_0: entered promiscuous mode [ 369.736417][T29620] hsr_slave_1: entered promiscuous mode [ 369.745217][T29620] debugfs: 'hsr0' already exists in 'hsr' [ 369.750969][T29620] Cannot create hsr debugfs directory [ 369.882910][T11935] IPVS: stop unused estimator thread 0... [ 370.144587][T29620] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 370.153485][T29620] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 370.162327][T29620] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 370.170721][T29620] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 370.202401][T29620] 8021q: adding VLAN 0 to HW filter on device bond0 [ 370.214624][T29620] 8021q: adding VLAN 0 to HW filter on device team0 [ 370.223846][ T2449] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.230963][ T2449] bridge0: port 1(bridge_slave_0) entered forwarding state [ 370.242529][T11935] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.249589][T11935] bridge0: port 2(bridge_slave_1) entered forwarding state [ 370.303640][T29620] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 370.357815][T29620] veth0_vlan: entered promiscuous mode [ 370.365875][T29620] veth1_vlan: entered promiscuous mode [ 370.379392][T29620] veth0_macvtap: entered promiscuous mode [ 370.386407][T29620] veth1_macvtap: entered promiscuous mode [ 370.396624][T29620] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 370.407974][T29620] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 370.418208][T11932] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 370.428231][T11932] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 370.438134][T11932] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 370.449260][T11932] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0