last executing test programs: 1m11.450367546s ago: executing program 2 (id=4088): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_emit_ethernet(0x12, &(0x7f0000000000)=ANY=[@ANYBLOB="910418166421b54fa0aaaa050004424203"], 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x4001, 0x8000000, 0x238, 0xf8, 0x720d, 0x148, 0xf8, 0x148, 0x1c8, 0x240, 0x240, 0x1c8, 0x240, 0x7fffffe, 0x0, {[{{@ip={@remote, @empty, 0x0, 0x0, 'wlan1\x00', 'ip6erspan0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) sendto$inet(r3, 0x0, 0x0, 0x24000080, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x64, &(0x7f00000002c0)=0x4220, 0x4) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@can_newroute={0x2c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_XOR={0x15, 0x3, {{{0x1, 0x0, 0x1}, 0x4, 0x2, 0x0, 0x0, "e61ddab91404e1c0"}, 0x3}}]}, 0x2c}}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = syz_open_dev$sg(&(0x7f0000000140), 0x14000000000, 0x8000) sendmsg$RDMA_NLDEV_CMD_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000400)={&(0x7f00000005c0)=ANY=[@ANYBLOB="50000000011400012cbd7000fddbdf25080001000100000008000100020000000800010001000000080001000200000008000100ffffffff015cde5ac0e00f98f3700d080001000000000008000100020000000800010002000000"], 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r8, 0x5380) sendmsg$nl_route(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="5c00000010000104000000000000000000002000", @ANYRES32=0x0, @ANYBLOB="03000000000000002c0012800c0001006d6163766c616e001c000280080001000800000006ef0200010000001ffe02000000000008000500", @ANYRES32=r7, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc010) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000003b810100850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x1a, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5a0}, [@printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8001}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0xae}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}]}, &(0x7f0000000740)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41000, 0x30, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000007c0)={0x4, 0xd, 0x3, 0x7}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000800)=[{0x3, 0x4, 0xe, 0x6}], 0x10, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000340)='kfree\x00', r9}, 0x10) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r10, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r11 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r11, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="2c00000036000900feffffff0000000001000000040000000c0001800600200005470000080002"], 0x2c}}, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 1m10.739438114s ago: executing program 2 (id=4098): mlockall(0x1) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_io_uring_setup(0x6440, &(0x7f00000008c0)={0x0, 0xbbb9, 0x100, 0xfffffffc}, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/14, @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x30, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000048000000000000000000850000000e0000008500000005"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000280)={'veth0_to_hsr\x00', &(0x7f0000000100)=@ethtool_dump={0x40}}) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1000014, &(0x7f00000005c0)=ANY=[], 0x0, 0x245, &(0x7f0000000940)="$eJzs3c1qE1EUB/AzSdqmCiYLVyI4oAtXpe0TpEgFsSslC3WhxbYgSSi0EPADY1c+gU/ic7jxDXwAoTtdFEYmSZsWUttiPkr9/Ta9MPc/59zpDVnNzavbrcbG9u7W3ocfUS4nUahFLdmPqEYhcnMBAFw1v7Ms9rOeiyVLhXH1BACM1zm//+cn2BIAMGZPnz1/vLK2tvokTcsRrc/tehK9v73rK1vxJpqxGYtRiYOI7Ehv/PDR2mqU0lw17rU67XqebL381r//ys+Ibn4pKlEdnl9Ke47lO+36TFzr16/l+eWoxM3h+eUh+ajPxv27x/pfiEp8fx3b0YyNyLOD/MelNH2Qffn1/kXecZ5POu36XHfeQFac+D8HAAAAAAAAAAAAAAAAAAAAAIArayFN0zTLvmZZlnVOnL9TPOheX0gPVU+ez9PLn3Y+UOfY+TqLeYmkN3+QL8WtUpSmuXYAAAAAAAAAAAAAAAAAAAC4LHbfvmusN5ubOyMdHL7WP/o7/+sgiv3WmknEJeinO5jP+5lMrTtxwVq15ubOjf4zO2vyp/68xuHuaqwncUaJ8pg2STZk+xVPTc2OqPrs9dGuIomImaOH+bfJhZgZ8ScFAAAAAAAAAAAAAAAAAACYsMFLv0Mu7k2hIQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACYgsHv/19g0OmHz5ma8hIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4D/wJAAD//5d2dbo=") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) syz_mount_image$vfat(&(0x7f0000003880), &(0x7f0000000e80)='./file0\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="757466383d312c756e695f786c6174653d302c756e695f786c6174653d312c72696e6e742c73686f72746e616d653d6d697865642c73686f72746e616d653d77696e39352c696f636861727365743d63703836362c6e6f6e756d7461696c3d302c73686f72746e616d653d6c6f7765722c696f636861727365743d69736f383835392d362c636f6465706167653d3836362c756e695f786c6184653d302c757466383d302c73686f72746e616d653d6c6f7765722c756e695f786c6174653d302c00"], 0x1, 0x2b8, &(0x7f0000001980)="$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") write$binfmt_register(0xffffffffffffffff, &(0x7f0000000040)={0x3a, 'syz3', 0x3a, 'M', 0x3a, 0x8000000000006, 0x3a, 'w\x12\xbe??0\x8e\xca\x11\xd7\xe7\xb7\xa2+XX\x9a!\x11e;]x\xe5\xd6\xbc\xa1\xa6\\2,o\xa4\x90\xc5\x8cp\xe1;\t\xab\xc0d\xf5:z\xdd[1mC\x1e\x8e\xeb\x8f\xa4\xf2\x0f\x13b\xe2\x91\xcd\xd0+\xc7\x8aP\':\x1bB\x99\x85\\\xd9\xd2!\xbc\xa1\x84{\xa5L\xf6\xder\r\x9ai6\x00\x8e\x85\x04\x86.jy\x1c\xee\nJ\x18\xa1\x85=\xb6i|\xb7\x9f\x0e4w\xf2\x8b\xc9\xca\xb4A\x89\xe8\x86\xa5\x05\xc2\x9d\xe6\xbb\x98\x1aB0\xac\x10\xb3\xd4\xbf\xf5;\xc0\x1d\x83\xd3a\xbd\x16', 0x3a, '\x00\x00\x00\x00\x00', 0x3a, './bus/file0'}, 0xc4) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0xa02000000000000, 0x60, &(0x7f0000000000)={'filter\x00', 0xb001, 0x4, 0x3e8, 0x0, 0x0, 0x130, 0x300, 0x300, 0x300, 0x7fffffe, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pimreg\x00', 'veth0_to_bridge\x00'}, 0xc0, 0x130}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f67b23ffdfa27f907a03732da3acbc6518e62a77ca06f258762e88c0d9f9d2f413b94a105f4bdf01425ce81c5d000000000000000500ffffffff00"}}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_team\x00', 'ip6tnl0\x00'}, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) mlock2(&(0x7f0000ff2000/0x4000)=nil, 0x4000, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x240540c7, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 1m8.389972339s ago: executing program 2 (id=4131): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1e00000000000000050000000600000004000000", @ANYRES32=0x1, @ANYBLOB="000000000000001300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x6c, 0x0, 0x1, 0x401, 0x0, 0x1a14, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x2c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1}]}, 0x6c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x38}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x4) 1m8.005415308s ago: executing program 2 (id=4137): openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x0) io_uring_setup(0x677e, 0x0) symlinkat(0x0, 0xffffffffffffff9c, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'netdevsim0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1, 0x3, 0x261, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000000), r0) sendmsg$DEVLINK_CMD_RATE_NEW(r0, &(0x7f00000003c0)={0x0, 0xa1ff, &(0x7f0000000380)={&(0x7f0000000300)={0x34, r2, 0x1, 0x0, 0x0, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, 0x0, 0x0, 0x4) 1m7.452101877s ago: executing program 2 (id=4144): r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYRES16=r2, @ANYRES32=r2, @ANYRESOCT=r0, @ANYRESDEC=r1, @ANYRES64=r1, @ANYRESOCT=r2], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x46, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) syz_emit_ethernet(0x86, &(0x7f0000000500)={@local, @multicast, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x2, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x0, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "8442a08597d3b2f44ac89b1b52cc6728d6697d4cebc8f2f062c6f91f224aaacc", "99bd3410936eefeb3ea898dafab974aa", {"96deb200000000000000000000ac1d00", "f838a300b01b0e19ecdf00b20600"}}}}}}}, 0x0) syz_emit_ethernet(0x30, &(0x7f0000000340)={@random="e90c630faca2", @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x22, 0x0, 0xe000, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x0, 0xe, 0x0, @opaque='\x00\x00\x00\x00\x00\x00'}}}}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) r6 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r6, 0x0, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x13, 0x0, 0x0) connect$inet6(r7, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r7, 0x11a, 0x2, 0x0, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x370, 0x180, 0xffffff80, 0x178, 0x0, 0x178, 0x2a0, 0x230, 0x258, 0x2a0, 0x258, 0x2034, 0x0, {[{{@uncond, 0x1d, 0x138, 0x180, 0x12, {0x959f1400}, [@common=@unspec=@ipvs={{0x48}, {@ipv4=@multicast1}}, @common=@unspec=@limit={{0x48}, {0x0, 0x412}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@mcast1, 'geneve1\x00'}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@ipv6header={{0x28}}]}, @common=@inet=@SYNPROXY={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="d8000000180081054e81f782db4cb904021d0800fe00fe05e8fe55a10a0015000600142603600e1208000f007f370301a8001600a40002400f000100035c0461c1d67f6f94007134cf6edb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090014d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00350db798262f3d40fad95667e006dcdf63951f215c3f8b6ad2cba0e2375ee535e3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1}, 0x0) 1m7.337888467s ago: executing program 2 (id=4147): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000400)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) socket$packet(0x11, 0x3, 0x300) (async) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000800)={'geneve0\x00', 0x0}) sendto$packet(r2, &(0x7f00000002c0)="14419e5465f0006fc8afa8e40800", 0xe, 0x0, &(0x7f00000000c0)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @multicast}, 0x14) mknodat$null(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x103) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) pipe2$9p(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = dup(r7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000002240)='9p_client_req\x00', r8}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000002240)='9p_client_req\x00', r8}, 0x10) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r9]) (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r9]) 52.289711164s ago: executing program 32 (id=4147): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000400)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) socket$packet(0x11, 0x3, 0x300) (async) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000800)={'geneve0\x00', 0x0}) sendto$packet(r2, &(0x7f00000002c0)="14419e5465f0006fc8afa8e40800", 0xe, 0x0, &(0x7f00000000c0)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @multicast}, 0x14) mknodat$null(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x103) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) pipe2$9p(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = dup(r7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000002240)='9p_client_req\x00', r8}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000002240)='9p_client_req\x00', r8}, 0x10) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r9]) (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r9]) 2.356827235s ago: executing program 3 (id=5075): r0 = gettid() pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) splice(r2, 0x0, r1, 0x0, 0x1, 0x0) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) ioctl$sock_SIOCINQ(r1, 0x5452, &(0x7f0000000000)) r7 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r8 = socket$nl_rdma(0x10, 0x3, 0x14) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r11 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r9, 0x0, 0x8000000000000000}, 0x18) r12 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000200), 0x800) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r12, 0x4058534c, &(0x7f0000000180)={0x80, 0x2a, 0x3}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r12, 0x4058534c, &(0x7f0000000040)={0x80, 0x8, 0x2, 0xfffffffc}) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000009c0)=ANY=[@ANYBLOB="38000000031401002cbd7000fcdbdf250900020073797a32000000000800410073697700140033006c6f000000", @ANYRES64=r7, @ANYRESHEX, @ANYRES32=r10], 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x810) r14 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x48) preadv(r11, &(0x7f00000005c0)=[{&(0x7f00000004c0)=""/117, 0x75}], 0x1, 0x6, 0x5) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r14, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095", @ANYRES8=r13, @ANYRES16=r3, @ANYRES32=0x0, @ANYRESDEC, @ANYRES32=r6, @ANYRES16=r0, @ANYRES8=0x0], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x36, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r15 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r15}, 0x18) syz_io_uring_setup(0x66e, &(0x7f0000000240)={0x0, 0x0, 0x10100, 0x2, 0xffffffff}, &(0x7f0000000380), &(0x7f0000000700)) r16 = socket$nl_generic(0x10, 0x3, 0x10) r17 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r16, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)={0x1c, r17, 0x1}, 0x1c}}, 0x0) 1.657213654s ago: executing program 1 (id=5090): mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x10, &(0x7f0000000180)={0x0, 0x3660, 0x2, 0x1, 0x34b}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000080)=""/28, 0x1c}], 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r2}, 0x10) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) 1.570322263s ago: executing program 1 (id=5091): ioprio_set$pid(0x1, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r0, 0x0, 0x2}, 0x18) r1 = socket(0xa, 0x2400000001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000780)={0x1, {{0xa, 0x0, 0x9, @mcast2, 0xfffffffd}}}, 0x88) r2 = syz_clone(0x40000000, 0x0, 0x51, 0x0, 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x10000000000030, &(0x7f0000000580)=""/154, &(0x7f0000002280)=0x9a) symlinkat(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') lsetxattr$trusted_overlay_upper(&(0x7f0000000a40)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', &(0x7f0000000040), &(0x7f0000000380)=ANY=[], 0xc7, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000001240)='./file0\x00', 0x10, &(0x7f0000000a80)=ANY=[@ANYBLOB="00e789da34e04a1ffbc2f05cefeb4ee6d5ae1071124b2c2fb684f5c7ac05000000c7880f67e775c748f6381a3e01e7f93330b30b90bbb4d2b697899a16f2df4fa2a8f06ac2c5352ddcae2b83672ef3d9f532e55f4e798924ac6332751e737383f6890d2dcfcbdbd41940a64c7b4374674e7bb6dd0d1b8d3d62f6d77b0282e166e2ce4c353d2d4d315a81146bf46a1508ef0d2ddc7d0b447fe17b85b292d13cea2256a16cab12d75a852bc680da7ea837480feb2e0500001e0000000000003bc18c52d0351cd285197b0641569048b5b416ba1c570000000000100083794afff0a9eed63b1226b18c4b455ab222d7ae1be52a22e8ec8bf2c0c7d99770415863f50aa18bcb66061a29bc55105f3482ed752f882d224a386b51836c1b437036b677156e22e174ff516dbab0b2cdf52bee43c4ffffffffffffffffd9487b8663a339b98df63b4bf3e97f02d6f1e7e65f968dd90841506355d9ac40f1b434c8a9b5bd91a70c53a5aadbebd9ed9d0a55bd47a967163e0c02753f8895bfbf1b41b5490667c241068d59983ae1d0f03e650f5357425284b76d793e25a2558fa437e38b8200000000630000000000000000000000000000000000000000000000e911000000000066e073c14bb74617079e0b6ecfc830db14244567fd8f4e4e5903eaf983786e28295783f130b95dc37f59a658000e88047db7783ce8a9cba6c255902cfb83946ea3f5f7a8cee911b2b37ae4b01e65ea86d5ea7ae17b2a9bc250c9b8fc9fbc04617939bdd13457954172d18701768f8a461bee740f2d82ae566d2e30a93ad2b201a6d16a93c75a950cc437e7f25d3aadddb8edd028d84490b6bafd636aa4fb482a8a4b3987dafe58e742448c4b36b03790090198145dee533257bb9050554f8cace210a5bc5c768f83e99019f7c00ff9ca679768dbba3f7d21c545c99c2f7688f7030fe37121d625d1f81018feb74c9d48eebdf1702550b097271ab9bd38c62f4b31fd9482c05ba0", @ANYRES16], 0x1, 0x11dc, &(0x7f0000001280)="$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") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x24, 0x0, 0x800, 0x70bd2a, 0x25dfdbfe, {{}, {}, {0x8, 0x2, 0xd3}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x40090}, 0x4800) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x20000295, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000740)=ANY=[@ANYRESHEX=r3, @ANYRESHEX, @ANYRES32=r2], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) epoll_pwait2(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r5, 0x560a, &(0x7f0000000280)={0x6, 0x0, 0x1, 0x0, 0x83, 0x7}) syz_read_part_table(0x60d, &(0x7f0000002240)="$eJzs3D9olHcYB/DvJbmcUTAdnFxqHDoJRXE0Q5XkqlgIp1IIDvYfIs0UIXDSw5Q4tBkUM0jHLlK4DhonYwYnRaFzEQeLkMGlYBepHXLl7l6SOyjF0oRS/HyGe353PDzf94F3/V34XxtIuTi1Kp3y/qd/298a3TzP50xzYvJ4q9VqnU5KOZtyxsq7l5MMpX9q9icZ7plz8/udq9/+9mG5+fTUq/fOPVgc2JhZyTtJdvU2Z+SvHqXyzzZlO9wafzi6cGW2erX9pdpYW/84uf1yorZycnFp+UT52Oft3y8nj4r+7osxkoup51K+zCdDbxz19eax1Jc/386vj194Um2sfdd8fnB9b3Xw7vkjr/etXrt/KJlrR0yl87JvGv6Xi/fkL/Tkz41dn15qHD1wZ8+Nw/V7j2svBn9vdRWR5a3JBQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABge9xqf1yZrV6tj194Um2sffPzTx/dfjlRWzm5uLR8YvjYs6LvUVGHinox9VxKOclMZvJFZt88crrUmz/+cHRhI/+Pncnzg+t7q82754+8nly9dv9Qp6uUqXYZ2IqN+/XnN9bmxq5PLzWOHriz58bh+r3HtReD3b6ZSj7rrJuksvWPAQAAAAAAAAAAAAAAAAAAwFtuYvL4vqkPaqeTUs7uSPLrV51b9q3KyI/p3Lzv2l/UZ5Vkd5KbO7r/BdB8eurV8LkHi78Ul+LnU8l8kl0/rJxJ3t3IudwfW96czH/pzwAAAP//gTiR5w==") creat(&(0x7f0000000040)='./bus\x00', 0x0) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f00000002c0)='./bus\x00', 0x0, 0x1000, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x208400, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x5, 0xb, &(0x7f0000000680)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xb, @void, @value}, 0x94) 1.457452583s ago: executing program 3 (id=5092): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f00000001c0), 0x4) 1.456887413s ago: executing program 3 (id=5093): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1e00000000000000050000000600000004000000", @ANYRES32=0x1, @ANYBLOB="000000000000001300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x6c, 0x0, 0x1, 0x401, 0x0, 0x1a14, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x2c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1}]}, 0x6c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x38, 0x3, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x38}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000140)='cgroup.clone_children\x00', 0x2, 0x0) r6 = openat$cgroup_procs(r4, 0x0, 0x2, 0x0) sendfile(r6, r5, 0x0, 0x4) 1.357993623s ago: executing program 5 (id=5096): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2074, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = io_uring_setup(0x689, &(0x7f0000000500)={0x0, 0xe48d, 0x8, 0x1, 0x1cd}) r4 = syz_io_uring_setup(0x1114, &(0x7f0000000200)={0x0, 0x1, 0x0, 0x0, 0x21e, 0x0, r3}, &(0x7f0000000600)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/cgroups\x00', 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000380)=@IORING_OP_RENAMEAT={0x23, 0x10, 0x0, 0xffffffffffffffff, &(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file1\x00'}) r7 = syz_io_uring_setup(0xcfb, &(0x7f0000000300)={0x0, 0x51a8, 0x800, 0x0, 0x13e, 0x0, r4}, &(0x7f00000003c0), &(0x7f00000004c0)) io_uring_enter(r7, 0x47fa, 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$cgroup_int(r9, &(0x7f0000000040)=0x4000006, 0x12) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') getdents64(r10, &(0x7f0000002f40)=""/4098, 0x1002) r11 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$UHID_CREATE2(r11, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b00000073797a31000000dfff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000037b35f0a00000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001"], 0x119) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x1008002, &(0x7f0000000340)={[{@grpquota}, {@sysvgroups}, {@abort}, {@errors_continue}, {@dioread_nolock}, {@jqfmt_vfsv0}, {@nomblk_io_submit}, {@noauto_da_alloc}]}, 0x0, 0x5e0, &(0x7f0000000bc0)="$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") r12 = syz_open_dev$hidraw(&(0x7f00000004c0), 0x0, 0x14a042) mount$9p_fd(0x0, &(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000240), 0xc, &(0x7f00000011c0)=ANY=[]) ioctl$HIDIOCGRDESC(r12, 0x90044802, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r8}, 0x10) r13 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x141b82, 0x0) write$cgroup_int(r13, &(0x7f0000000000)=0x700, 0x12) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c0000002000010400000000000000000a0000000000000000000000080017004e224e"], 0x2c}}, 0x84) 986.274412ms ago: executing program 3 (id=5100): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000d00)='sched_switch\x00', r0}, 0x10) socket$kcm(0xa, 0x1, 0x106) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000003c0)={0x1c, 0x13, 0xa, 0x201, 0x70bd2b, 0x25dfdbfb, {0x7, 0x0, 0x8}, [@generic="4a287ce4b1"]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000080}, 0x20000000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x121301, 0x0) write$binfmt_aout(r2, &(0x7f0000000000)=ANY=[], 0xff2e) ioctl$TCSETS(r2, 0x40045431, 0x0) r3 = syz_open_pts(r2, 0x0) r4 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x8080) ioctl$EVIOCGRAB(r4, 0x40044590, 0x0) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) r6 = socket(0x10, 0x80003, 0x0) write(r6, &(0x7f0000000000)="240000001a005f0214f9f407000904000a000000fe0000000000000008000f00fd000000", 0x85) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000080)={'sit0\x00'}) r7 = dup3(r3, r4, 0x0) ioctl$TIOCSTI(r7, 0x5412, &(0x7f00000001c0)=0x11) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x9, 0x4, 0x3, 0xffffffff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PIO_UNIMAP(r3, 0x4b67, &(0x7f0000000300)={0x6, &(0x7f00000002c0)=[{0x681a, 0x1}, {0x0, 0x100}, {0x9, 0xa}, {0x8, 0xfff8}, {0x6, 0xdb}, {0x4, 0xe47}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000200)={'geneve0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}, 0x1, 0x2}, 0x0) 957.465502ms ago: executing program 5 (id=5101): mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x10, &(0x7f0000000180)={0x0, 0x3660, 0x2, 0x1, 0x34b}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000080)=""/28, 0x1c}], 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r2}, 0x10) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) 933.406552ms ago: executing program 5 (id=5102): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) syz_emit_ethernet(0x12, &(0x7f0000000000)=ANY=[@ANYBLOB="910418166421b54fa0aaaa050004424203"], 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00'}, 0x10) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x4001, 0x8000000, 0x238, 0xf8, 0x720d, 0x148, 0xf8, 0x148, 0x1c8, 0x240, 0x240, 0x1c8, 0x240, 0x7fffffe, 0x0, {[{{@ip={@remote, @empty, 0x0, 0x0, 'wlan1\x00', 'ip6erspan0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x64, &(0x7f00000002c0)=0x4220, 0x4) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) listen(0xffffffffffffffff, 0x80) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="2c00000036000900feffffff0000000001000000040000000c0001800600200005470000080002"], 0x2c}}, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 892.183852ms ago: executing program 5 (id=5103): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8}, 0x2000) 891.550182ms ago: executing program 5 (id=5104): r0 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffc}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) getpgrp(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/udplite6\x00') socket$nl_route(0x10, 0x3, 0x0) socket$igmp(0x2, 0x3, 0x2) eventfd2(0x0, 0x80001) io_setup(0x81, &(0x7f0000000400)=0x0) io_submit(r2, 0x0, &(0x7f0000000a00)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x401) ioctl$BLKTRACESETUP(r3, 0xc0481273, 0x0) ioctl$SG_BLKTRACETEARDOWN(r3, 0x1276, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x3, 0xc, &(0x7f0000000340)=ANY=[], 0x0, 0xfffffffc, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xfe27, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x200000, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='kfree\x00', r4, 0x0, 0x6}, 0x18) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x20010800) syz_genetlink_get_family_id$nfc(&(0x7f0000000000), 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) r6 = accept4$x25(r1, &(0x7f00000001c0)={0x9, @remote}, &(0x7f0000000200)=0x12, 0x0) setsockopt$X25_QBITINCL(r6, 0x106, 0x1, &(0x7f0000000340)=0x1, 0x4) syz_usb_connect$hid(0x3, 0x36, &(0x7f0000000040)=ANY=[], 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 849.239682ms ago: executing program 1 (id=5105): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000440)=ANY=[], 0x48) socket$igmp(0x2, 0x3, 0x2) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x3b, 0x1, 0x0, 0x0, 0x0, 0x89, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x2, @perf_config_ext={0x94, 0x1}, 0x1000, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="980000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000700012800b0001006272696467650000600002800600270004"], 0x98}}, 0x0) 733.676612ms ago: executing program 1 (id=5107): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x6, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = openat$misdntimer(0xffffffffffffff9c, 0x0, 0x22402, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0x14) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f00000000c0)=0x32) close(r0) 671.302781ms ago: executing program 1 (id=5108): r0 = syz_clone(0x0, 0x0, 0x3f, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffc}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) getpgrp(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/udplite6\x00') r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = socket$igmp(0x2, 0x3, 0x2) r4 = eventfd2(0x0, 0x80001) io_setup(0x81, &(0x7f0000000400)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x1, r3, 0x0, 0x0, 0x81, 0x0, 0x1, r4}]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x401) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000006c0)={'\x00', 0x6e3, 0x200006, 0xc, 0xb, 0x6, 0xffffffffffffffff}) ioctl$SG_BLKTRACETEARDOWN(r6, 0x1276, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x3, 0xc, &(0x7f0000000340)=ANY=[], 0x0, 0xfffffffc, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xfe27, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x200000, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='kfree\x00', r7, 0x0, 0x6}, 0x18) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000001400000200000a20000000000a03000000000000000000070000000900010073797a300000000078000000090a010400000000000000000700000708000a40000000000900020073797a30000000000900010073797a3000000000080005400000000e3400128010000180090001006c6173740000000010000180090001006c61737400000000100001800c000100636f756e7465720008000340000001"], 0xc0}}, 0x20010800) syz_genetlink_get_family_id$nfc(&(0x7f0000000000), 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) r8 = accept4$x25(r1, &(0x7f00000001c0)={0x9, @remote}, &(0x7f0000000200)=0x12, 0x0) setsockopt$X25_QBITINCL(r8, 0x106, 0x1, &(0x7f0000000340)=0x1, 0x4) syz_usb_connect$hid(0x3, 0x36, &(0x7f0000000040)=ANY=[], 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 645.330721ms ago: executing program 0 (id=5109): r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000a50000002a00000095"], &(0x7f0000000b40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWRULE={0x54, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x28, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @match={{0xa}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_MATCH_NAME={0x8, 0x1, 'bpf\x00'}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x7c}}, 0x4048010) sendto$inet6(r0, &(0x7f0000000040)="aa", 0x1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x3}, 0x3}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r4, &(0x7f00000002c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000000)={'nicvf0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x43}}}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000027b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$sock_ifreq(r4, 0x8917, &(0x7f0000000480)={'wlan0\x00', @ifru_data=&(0x7f0000000440)="ac21d31d8804aaa885ad7db75b639fe094996c82a8c6f113b419b4af3d2223ce"}) write$P9_RSYMLINK(r8, &(0x7f00000003c0)={0x14, 0x11, 0x1, {0x1, 0x3, 0x3}}, 0x14) setsockopt$sock_int(r7, 0x1, 0x3c, &(0x7f00000006c0)=0x7fffffff, 0x4) socket$inet6(0xa, 0x4, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000180)='kmem_cache_free\x00', r6, 0x0, 0x1}, 0x18) dup2(0xffffffffffffffff, 0xffffffffffffffff) listen(r4, 0x4) sendmmsg$inet6(r3, &(0x7f0000003c40)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000300)='j', 0x1}], 0x1}}], 0x1, 0x0) 541.390591ms ago: executing program 0 (id=5111): r0 = socket(0xa, 0x5, 0x0) setsockopt$WPAN_SECURITY_LEVEL(r0, 0x29, 0x4c, &(0x7f00000003c0)=0x1ffffff, 0x4) r1 = syz_open_dev$mouse(&(0x7f00000001c0), 0x2c9e, 0x100) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=r0, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200004f30a41b375ce4f1026c64ed260000000007020000f8ffffffb703000008000000a6040000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000d54b3bf57fcae30fa897ead1b80000000010000000000000000000f0afd1fe781b37bec4f0f088b159bf11ab5a49"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000640)='io_uring_create\x00', r3, 0x0, 0x102}, 0x18) io_uring_enter(0xffffffffffffffff, 0x3516, 0x0, 0x0, 0x0, 0x0) r4 = socket$can_raw(0x1d, 0x3, 0x1) r5 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000001100)={'vcan0\x00', 0x0}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="1801000000001f00000000000000ea1f850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xec, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r8, 0x0, 0xfffffffffffffffc}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9, 0x0, 0x9}, 0x18) bind$can_raw(r5, &(0x7f0000000000)={0x1d, r6}, 0x10) dup3(r4, r5, 0x0) io_uring_setup(0x325a, &(0x7f0000002400)={0x0, 0xffffffbc, 0x80, 0x2, 0x17a}) 519.815061ms ago: executing program 4 (id=5112): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kfree\x00', r0}, 0x18) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="e80000006c00010029bd7000fcdbdf2500000000", @ANYRES32, @ANYBLOB="001000008000000008000f002000000014003500726f7365300000000000000000000000a40034801400350070696d367265673000000020000000001400350076657468305f6d614176746170000000140035006d61637674617030020000000000000014003500677265300000000000000000000000001400350076657468305f746f5f626174616476001400350001657468315f6d6163767461700000001400350067726530000000000000000000000000140035006261746164765f736c6176655f31000008000f"], 0xe8}}, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 494.976241ms ago: executing program 0 (id=5113): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) syz_emit_ethernet(0x12, &(0x7f0000000000)=ANY=[@ANYBLOB="910418166421b54fa0aaaa050004424203"], 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00'}, 0x10) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x4001, 0x8000000, 0x238, 0xf8, 0x720d, 0x148, 0xf8, 0x148, 0x1c8, 0x240, 0x240, 0x1c8, 0x240, 0x7fffffe, 0x0, {[{{@ip={@remote, @empty, 0x0, 0x0, 'wlan1\x00', 'ip6erspan0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x298) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x64, &(0x7f00000002c0)=0x4220, 0x4) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) listen(0xffffffffffffffff, 0x80) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="2c00000036000900feffffff0000000001000000040000000c0001800600200005470000080002"], 0x2c}}, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 421.426641ms ago: executing program 0 (id=5114): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44045}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001780)=[{0x10, 0x84}], 0x10}, 0x4004048) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000042000501"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x140, &(0x7f00000002c0)=[{&(0x7f00000004c0)=""/4091, 0x1008}, {&(0x7f0000001580)=""/238, 0xf0}], 0x5, 0x0, 0x353}}], 0x40000000000002e, 0x100000000000000, 0x0) 420.786151ms ago: executing program 0 (id=5115): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffeca50000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000380)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000640)='./file2\x00', 0x0, &(0x7f0000000c00)={[{@grpjquota}, {@noblock_validity}, {@grpjquota}, {@inode_readahead_blks}, {@i_version}]}, 0x3, 0x4c1, &(0x7f0000000680)="$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") mount_setattr(0xffffffffffffff9c, &(0x7f0000000180)='.\x00', 0x8100, &(0x7f0000001dc0)={0xf, 0x84, 0x20000}, 0x20) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000001080), 0x1, 0x4e2, &(0x7f0000000b80)="$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") r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) r2 = signalfd(0xffffffffffffffff, &(0x7f0000000640), 0x8) name_to_handle_at(r2, &(0x7f0000004740)='\x00', 0x0, 0x0, 0x1000) socket$inet6_udp(0xa, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000140)='./file1\x00', 0x120c8ca, &(0x7f0000000080)=ANY=[], 0x1, 0x2cb, &(0x7f0000000400)="$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") r3 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000700)=0xe9, 0x4) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r3, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) dup2(r3, r6) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r7, 0x0) write$binfmt_script(r6, &(0x7f0000000440)={'#! ', '', [], 0xa, "00f64be8ebab"}, 0xa) 419.748391ms ago: executing program 4 (id=5116): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x2, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x18) openat2(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)={0x140c0, 0x119, 0x8}, 0x18) 366.129571ms ago: executing program 0 (id=5117): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, 0x0, &(0x7f0000048000), 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ff"], 0x48) futex(&(0x7f00000000c0)=0x1, 0xd, 0x2, &(0x7f0000000140), 0x0, 0x40000001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000080)='kfree\x00'}, 0x18) r0 = gettid() bpf$PROG_LOAD(0x5, 0x0, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001600), 0x28000, 0x0) ioctl$TIOCMIWAIT(r1, 0x545c, 0x200000000000000) 354.618141ms ago: executing program 4 (id=5118): iopl(0x3) socket$igmp(0x2, 0x3, 0x2) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x3b, 0x1, 0x0, 0x0, 0x0, 0x89, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x2, @perf_config_ext={0x94, 0x1}, 0x1000, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="980000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000700012800b0001006272696467650000600002800600270004"], 0x98}}, 0x0) 325.014491ms ago: executing program 4 (id=5119): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0b000000070000000500000008000000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000027b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x3, 0x3}, 0x10) r3 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) sendmsg$tipc(r3, &(0x7f00000002c0)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 249.438151ms ago: executing program 4 (id=5120): setitimer(0x2, 0x0, &(0x7f0000000080)) r0 = getpid() process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) symlinkat(0x0, 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f00000005c0)='mm_page_free\x00', r1}, 0x10) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x4000002, 0x50032, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) 217.484181ms ago: executing program 5 (id=5121): r0 = perf_event_open(0x0, 0xffffffffffffffff, 0xfffffffffffffe00, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000500)=ANY=[@ANYRES32=r0, @ANYRES64=0x0, @ANYBLOB="020000002c", @ANYRES32=r0, @ANYRESHEX=r0, @ANYRES16=r0], &(0x7f0000000700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xffffffdf, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1c, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r3}, 0x10) faccessat(0xffffffffffffff9c, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') unshare(0x68060200) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001780)={&(0x7f0000000500)=ANY=[], 0x2cc}}, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000400)={0x0, 0xe29, 0x30, 0x5, 0xfffffffffffffffc}, &(0x7f0000000440)=0x18) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000480)={r5, 0x7}, 0x8) r6 = socket(0x10, 0x3, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f00000003c0)='kmem_cache_free\x00', r7}, 0x10) umount2(&(0x7f0000000280)='./file1\x00', 0x6) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000f40), r8) sendmsg$IEEE802154_ADD_IFACE(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r9, @ANYBLOB="0000fcff7fbdd123676aad16d6000003000021000000"], 0x14}}, 0x0) r10 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(r8, &(0x7f00000003c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES16=r10, @ANYBLOB="020026bd7000fbdbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x94}, 0x20008080) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', 0xffffffffffffffff, 0x0, 0x80000000000000}, 0x18) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffa, 0x0) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019f00000000000000000a000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x8044}, 0x0) sendmmsg(r6, &(0x7f0000000000), 0x4000000000001f2, 0x0) 196.49463ms ago: executing program 4 (id=5122): r0 = socket$can_j1939(0x1d, 0x2, 0x7) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f0000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000940)={[{@bsdgroups}, {@nodiscard}, {@noblock_validity}, {@grpjquota}, {@grpjquota}, {@noquota}, {@abort}, {@noload}, {@nodiscard}]}, 0x64, 0x50a, &(0x7f0000000200)="$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") syz_read_part_table(0x1064, &(0x7f0000001080)="$eJzsz7FNAzEABdDv48AHFSNQ0zEMPRKDwFU0jMAELILEADdAVkgfR77cDEmK9xrL/l9fcriwx5q31JS8f90kY5LyOST3W9xu0w6ttZZMecqUmh4Oa/Ok3uWvX3f/Scm8vX600o/9PCw/zy/rVPrGmIet8b28/p75swAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwlY4BAAD//6ERFH4=") getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000740)={0x0, 0x73d41bee}, &(0x7f0000000780)=0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bind$can_j1939(r0, &(0x7f0000000080), 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0x1fffffffffffff44, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1050f0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x2904, 0x4, 0x4, 0x0, 0x0, 0xfffffffe, 0xffff, 0x0, 0x3}, 0x0, 0x1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100000100000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x10000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 49.45713ms ago: executing program 3 (id=5123): setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000000)={0x5, {{0x2, 0x4e24, @loopback}}}, 0x88) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000200)=@raw=[@exit, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x51}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}], &(0x7f0000001200)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 527.5µs ago: executing program 1 (id=5124): mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x10, &(0x7f0000000180)={0x0, 0x3660, 0x2, 0x1, 0x34b}) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000080)=""/28, 0x1c}], 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r1}, 0x10) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) 0s ago: executing program 3 (id=5125): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure_enabled\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2, 0x0, 0x2}, 0x18) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x3ff, 0x0) kernel console output (not intermixed with test programs): mm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=587 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 265.235270][T15835] bridge0: entered promiscuous mode [ 265.251884][ T29] audit: type=1400 audit(2000000362.443:13667): avc: denied { ioctl } for pid=12315 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=587 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 265.259254][T15835] macvlan2: entered promiscuous mode [ 265.282004][ T29] audit: type=1400 audit(2000000362.453:13668): avc: denied { write } for pid=15834 comm="syz.0.4428" name="usbmon8" dev="devtmpfs" ino=166 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 265.313894][T15835] bridge0: port 4(macvlan2) entered blocking state [ 265.320564][T15835] bridge0: port 4(macvlan2) entered disabled state [ 265.327893][T15835] macvlan2: entered allmulticast mode [ 265.333425][T15835] bridge0: entered allmulticast mode [ 265.346460][T15835] macvlan2: left allmulticast mode [ 265.351694][T15835] bridge0: left allmulticast mode [ 265.364601][T15835] bridge0: left promiscuous mode [ 265.426849][T15833] netlink: 28 bytes leftover after parsing attributes in process `syz.1.4429'. [ 265.662321][T15845] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 265.667385][T15859] syz.0.4436[15859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.673163][T15859] syz.0.4436[15859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.722076][T15845] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 266.018795][T15860] loop1: detected capacity change from 0 to 2048 [ 266.031809][T15859] syz.0.4436[15859] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 266.035319][T15859] xt_TPROXY: Can be used only with -p tcp or -p udp [ 266.090445][T15860] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 266.142353][T15859] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 266.151171][T15853] EXT4-fs error (device loop1): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 25 vs 281 free clusters [ 266.168647][T15859] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 266.237721][ T29] audit: type=1326 audit(2000000363.483:13669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15869 comm="syz.4.4437" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f791f5f5d29 code=0x7ffc0000 [ 266.264565][ T29] audit: type=1326 audit(2000000363.513:13670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15869 comm="syz.4.4437" exe="/root/syz-executor" sig=0 arch=c000003e syscall=132 compat=0 ip=0x7f791f5f5d29 code=0x7ffc0000 [ 266.288292][ T29] audit: type=1326 audit(2000000363.513:13671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15869 comm="syz.4.4437" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f791f5f5d29 code=0x7ffc0000 [ 266.344014][T15872] lo speed is unknown, defaulting to 1000 [ 266.350266][T15872] lo speed is unknown, defaulting to 1000 [ 266.408434][T12315] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 266.459652][T15875] loop1: detected capacity change from 0 to 2048 [ 266.470411][T15875] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 266.529535][ T29] audit: type=1326 audit(2000000363.783:13672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15879 comm="syz.3.4440" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04755a5d29 code=0x7ffc0000 [ 266.587975][ T29] audit: type=1326 audit(2000000363.813:13673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15879 comm="syz.3.4440" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04755a5d29 code=0x7ffc0000 [ 266.611724][ T29] audit: type=1326 audit(2000000363.813:13674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15879 comm="syz.3.4440" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f04755a5d29 code=0x7ffc0000 [ 266.694920][T15882] netlink: 296 bytes leftover after parsing attributes in process `syz.3.4441'. [ 266.704369][T15882] unsupported nlmsg_type 40 [ 266.765097][T15888] ref_ctr_offset mismatch. inode: 0x60 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x2000000 [ 267.030786][T15901] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 267.104037][T15901] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 267.229874][T15908] lo speed is unknown, defaulting to 1000 [ 267.235945][T15908] lo speed is unknown, defaulting to 1000 [ 267.341021][T15907] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 267.455132][T15907] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 267.772224][ C1] vxcan1: j1939_tp_rxtimer: 0xffff88811573fc00: rx timeout, send abort [ 267.780616][ C1] vxcan1: j1939_xtp_rx_abort_one: 0xffff88811573fc00: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 267.893027][T12315] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 267.915878][T15914] netlink: 96 bytes leftover after parsing attributes in process `syz.5.4451'. [ 267.980107][T15917] Cannot find add_set index 0 as target [ 268.000264][T15919] syz.5.4452[15919] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.000396][T15919] syz.5.4452[15919] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.017711][T15917] loop1: detected capacity change from 0 to 128 [ 268.052362][T15919] syz.5.4452[15919] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.052769][T15920] xt_TPROXY: Can be used only with -p tcp or -p udp [ 268.093652][T15922] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 268.108594][T15919] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 268.117056][T15919] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 268.149863][T15917] syz.1.4450: attempt to access beyond end of device [ 268.149863][T15917] loop1: rw=2049, sector=145, nr_sectors = 896 limit=128 [ 268.418748][T15941] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 268.500609][T15941] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 268.532527][T15948] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 268.577741][T15948] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 268.619428][T15947] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 269.651288][T15959] SELinux: syz.4.4462 (15959) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 269.867557][T15966] Cannot find add_set index 0 as target [ 269.873163][ C0] vxcan1: j1939_tp_rxtimer: 0xffff888118e96000: rx timeout, send abort [ 269.881519][ C0] vxcan1: j1939_xtp_rx_abort_one: 0xffff888118e96000: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 270.209194][T15962] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 270.217663][T15962] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 270.356819][ T29] kauditd_printk_skb: 161 callbacks suppressed [ 270.356835][ T29] audit: type=1326 audit(2000000367.603:13836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15968 comm="syz.0.4467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0761055d29 code=0x7ffc0000 [ 270.386847][ T29] audit: type=1326 audit(2000000367.603:13837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15968 comm="syz.0.4467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0761055d29 code=0x7ffc0000 [ 270.493661][ T29] audit: type=1326 audit(2000000367.683:13838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15968 comm="syz.0.4467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0761055d29 code=0x7ffc0000 [ 270.517401][ T29] audit: type=1326 audit(2000000367.683:13839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15968 comm="syz.0.4467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0761055d29 code=0x7ffc0000 [ 270.541013][ T29] audit: type=1326 audit(2000000367.683:13840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15968 comm="syz.0.4467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0761055d29 code=0x7ffc0000 [ 270.564762][ T29] audit: type=1326 audit(2000000367.693:13841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15968 comm="syz.0.4467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0761055d29 code=0x7ffc0000 [ 270.588414][ T29] audit: type=1326 audit(2000000367.693:13842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15968 comm="syz.0.4467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0761055d29 code=0x7ffc0000 [ 270.612039][ T29] audit: type=1326 audit(2000000367.693:13843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15968 comm="syz.0.4467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0761055d29 code=0x7ffc0000 [ 270.635660][ T29] audit: type=1326 audit(2000000367.703:13844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15968 comm="syz.0.4467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0761055d29 code=0x7ffc0000 [ 270.659337][ T29] audit: type=1326 audit(2000000367.703:13845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15968 comm="syz.0.4467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0761055d29 code=0x7ffc0000 [ 270.787845][T15984] lo speed is unknown, defaulting to 1000 [ 270.818314][T15984] lo speed is unknown, defaulting to 1000 [ 270.895558][T15987] ref_ctr_offset mismatch. inode: 0x6f5 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x2000000 [ 271.139963][T15995] syz.3.4471[15995] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.140055][T15995] syz.3.4471[15995] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.155872][T15995] syz.3.4471[15995] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.171778][T15995] xt_TPROXY: Can be used only with -p tcp or -p udp [ 271.192561][T15995] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 271.201018][T15995] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 271.237982][T15996] netlink: 96 bytes leftover after parsing attributes in process `syz.5.4474'. [ 271.439761][T16018] Unknown options in mask 5 [ 271.471656][T16018] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4476'. [ 271.486790][T16018] syz_tun: left allmulticast mode [ 271.491934][T16018] syz_tun: left promiscuous mode [ 271.497043][T16018] bridge0: port 3(syz_tun) entered disabled state [ 271.512720][T16018] bridge_slave_1: left allmulticast mode [ 271.518441][T16018] bridge_slave_1: left promiscuous mode [ 271.524111][T16018] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.536156][T16023] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4479'. [ 271.572732][T16018] bridge_slave_0: left allmulticast mode [ 271.578476][T16018] bridge_slave_0: left promiscuous mode [ 271.584188][T16018] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.586743][T16021] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 271.663645][T16021] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 271.832983][T16044] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4481'. [ 272.188270][T16057] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 272.208462][T16060] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4483'. [ 272.272478][T16057] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 272.486599][T16089] SELinux: policydb version 0 does not match my version range 15-33 [ 272.516255][T16090] lo speed is unknown, defaulting to 1000 [ 272.522882][T16090] lo speed is unknown, defaulting to 1000 [ 272.641285][T16089] SELinux: failed to load policy [ 273.101773][T16116] SELinux: policydb version 0 does not match my version range 15-33 [ 273.194920][T16116] SELinux: failed to load policy [ 273.238143][T16124] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:1) [ 273.298613][T16124] netlink: 96 bytes leftover after parsing attributes in process `syz.4.4490'. [ 273.397121][T16141] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 273.564296][T16154] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 273.794490][T16178] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 273.861782][T16178] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 273.863508][T16186] netdevsim netdevsim3 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 273.877789][T16186] netdevsim netdevsim3 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 273.886084][T16186] netdevsim netdevsim3 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 273.894446][T16186] netdevsim netdevsim3 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 273.962556][T16186] vxlan0: entered promiscuous mode [ 273.967762][T16186] vxlan0: entered allmulticast mode [ 274.019793][T16186] netdevsim netdevsim3 eth0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 274.028230][T16186] netdevsim netdevsim3 eth1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 274.036651][T16186] netdevsim netdevsim3 eth2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 274.045055][T16186] netdevsim netdevsim3 eth3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 274.152769][T16204] lo speed is unknown, defaulting to 1000 [ 274.169741][T16204] lo speed is unknown, defaulting to 1000 [ 274.418587][T16219] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 274.528462][T16246] bridge0: entered promiscuous mode [ 274.536194][T16246] macvlan2: entered promiscuous mode [ 274.544457][T16246] bridge0: port 4(macvlan2) entered blocking state [ 274.551038][T16246] bridge0: port 4(macvlan2) entered disabled state [ 274.558319][T16246] macvlan2: entered allmulticast mode [ 274.563719][T16246] bridge0: entered allmulticast mode [ 274.570270][T16246] macvlan2: left allmulticast mode [ 274.575421][T16246] bridge0: left allmulticast mode [ 274.585469][T16246] bridge0: left promiscuous mode [ 274.965146][T16258] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 275.262353][T16264] netlink: 16 bytes leftover after parsing attributes in process `syz.3.4516'. [ 275.365608][T16265] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 275.395694][T16269] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 275.446566][ T29] kauditd_printk_skb: 264 callbacks suppressed [ 275.446580][ T29] audit: type=1326 audit(2000000372.693:14110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16259 comm="syz.1.4515" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc8763e5d29 code=0x7ffc0000 [ 275.453751][T16272] bridge0: entered promiscuous mode [ 275.478729][T16265] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 275.504650][ T29] audit: type=1326 audit(2000000372.753:14111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16259 comm="syz.1.4515" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc8763e5d29 code=0x7ffc0000 [ 275.529718][T16272] macvlan2: entered promiscuous mode [ 275.550084][T16272] bridge0: port 4(macvlan2) entered blocking state [ 275.556675][T16272] bridge0: port 4(macvlan2) entered disabled state [ 275.572490][ T29] audit: type=1326 audit(2000000372.823:14112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16259 comm="syz.1.4515" exe="/root/syz-executor" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7fc8763e5d29 code=0x7ffc0000 [ 275.588398][T16272] macvlan2: entered allmulticast mode [ 275.601597][T16272] bridge0: entered allmulticast mode [ 275.629006][ T29] audit: type=1326 audit(2000000372.863:14113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16259 comm="syz.1.4515" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc8763e5d29 code=0x7ffc0000 [ 275.652688][ T29] audit: type=1326 audit(2000000372.863:14114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16259 comm="syz.1.4515" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc8763e5d29 code=0x7ffc0000 [ 275.676579][T16272] macvlan2: left allmulticast mode [ 275.681937][T16272] bridge0: left allmulticast mode [ 275.688863][T16272] bridge0: left promiscuous mode [ 275.718963][T16269] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 275.779577][T16269] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 275.821761][T16279] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:1) [ 275.849573][T16269] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 275.904638][T16269] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.939135][T16269] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.944961][ T29] audit: type=1326 audit(2000000373.193:14115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16283 comm="syz.5.4522" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4bb49a5d29 code=0x7ffc0000 [ 275.973894][T16269] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.986305][T16287] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4524'. [ 276.011057][T16269] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 276.033305][ T29] audit: type=1326 audit(2000000373.223:14116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16283 comm="syz.5.4522" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4bb49a5d29 code=0x7ffc0000 [ 276.057010][ T29] audit: type=1326 audit(2000000373.223:14117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16283 comm="syz.5.4522" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f4bb49a5d29 code=0x7ffc0000 [ 276.080603][ T29] audit: type=1326 audit(2000000373.223:14118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16283 comm="syz.5.4522" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4bb49a5d29 code=0x7ffc0000 [ 276.104186][ T29] audit: type=1326 audit(2000000373.223:14119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16283 comm="syz.5.4522" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4bb49a5d29 code=0x7ffc0000 [ 276.211037][T16291] lo speed is unknown, defaulting to 1000 [ 276.247483][T16291] lo speed is unknown, defaulting to 1000 [ 276.394423][T16295] bridge0: port 1(syz_tun) entered blocking state [ 276.402385][T16295] bridge0: port 1(syz_tun) entered disabled state [ 276.424300][T16295] syz_tun: entered allmulticast mode [ 276.448428][T16295] syz_tun: entered promiscuous mode [ 276.724070][T16324] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4534'. [ 276.733141][T16324] netlink: 84 bytes leftover after parsing attributes in process `syz.0.4534'. [ 276.748163][T16322] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 276.777181][T16325] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 277.152399][T16335] syz.5.4538[16335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.152480][T16335] syz.5.4538[16335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.183242][T16335] syz.5.4538[16335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.219541][T16335] xt_TPROXY: Can be used only with -p tcp or -p udp [ 277.239079][T16335] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 277.257089][T16335] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 277.389692][T16342] Cannot find add_set index 0 as target [ 277.532096][T16347] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4541'. [ 277.552613][T16345] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 277.990892][T16368] syz.0.4550 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 278.091577][T16358] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 278.104347][T16370] netlink: 20 bytes leftover after parsing attributes in process `+}[@'. [ 278.122199][T16358] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 278.167385][T16382] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:1) [ 278.202085][T16384] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4554'. [ 278.230395][T16387] Cannot find add_set index 0 as target [ 278.539637][T16393] syz.0.4556[16393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.539713][T16393] syz.0.4556[16393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.551926][T16393] syz.0.4556[16393] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.566342][T16393] xt_TPROXY: Can be used only with -p tcp or -p udp [ 278.615172][T16393] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 278.637529][T16393] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 278.689089][T16401] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4561'. [ 278.944089][T16408] ref_ctr_offset mismatch. inode: 0x692 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x2000000 [ 279.070387][T16419] netlink: 96 bytes leftover after parsing attributes in process `syz.3.4569'. [ 279.087776][T16421] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 279.141218][T16427] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4571'. [ 279.182181][T16414] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 279.191400][T16414] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 279.269487][T16434] macvlan2: entered promiscuous mode [ 279.274844][T16434] bridge0: entered promiscuous mode [ 279.288487][T16434] bridge0: port 2(macvlan2) entered blocking state [ 279.295086][T16434] bridge0: port 2(macvlan2) entered disabled state [ 279.308077][T16434] macvlan2: entered allmulticast mode [ 279.313563][T16434] bridge0: entered allmulticast mode [ 279.333451][T16434] macvlan2: left allmulticast mode [ 279.338739][T16434] bridge0: left allmulticast mode [ 279.344284][T16434] bridge0: left promiscuous mode [ 279.344899][T16437] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 279.413809][T16439] netlink: 284 bytes leftover after parsing attributes in process `syz.0.4575'. [ 279.588983][T16444] block device autoloading is deprecated and will be removed. [ 279.676998][T16441] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 279.701785][T16441] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 279.852945][T16454] netlink: 96 bytes leftover after parsing attributes in process `syz.5.4580'. [ 280.079805][T16457] FAULT_INJECTION: forcing a failure. [ 280.079805][T16457] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 280.093002][T16457] CPU: 1 UID: 0 PID: 16457 Comm: syz.5.4581 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 280.103797][T16457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 280.113886][T16457] Call Trace: [ 280.117177][T16457] [ 280.120177][T16457] dump_stack_lvl+0xf2/0x150 [ 280.124909][T16457] dump_stack+0x15/0x1a [ 280.129244][T16457] should_fail_ex+0x223/0x230 [ 280.134037][T16457] should_fail+0xb/0x10 [ 280.138292][T16457] should_fail_usercopy+0x1a/0x20 [ 280.143406][T16457] _copy_to_iter+0xd5/0xd00 [ 280.147973][T16457] ? sysfs_kf_seq_show+0x1e5/0x250 [ 280.153307][T16457] ? __virt_addr_valid+0x1ed/0x250 [ 280.158471][T16457] ? __check_object_size+0x364/0x520 [ 280.163788][T16457] seq_read_iter+0x79c/0x930 [ 280.168396][T16457] kernfs_fop_read_iter+0xc0/0x310 [ 280.173585][T16457] vfs_read+0x5dc/0x700 [ 280.177779][T16457] ksys_read+0xe8/0x1b0 [ 280.181985][T16457] __x64_sys_read+0x42/0x50 [ 280.186577][T16457] x64_sys_call+0x2874/0x2dc0 [ 280.191264][T16457] do_syscall_64+0xc9/0x1c0 [ 280.195855][T16457] ? clear_bhb_loop+0x55/0xb0 [ 280.200582][T16457] ? clear_bhb_loop+0x55/0xb0 [ 280.205368][T16457] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 280.211385][T16457] RIP: 0033:0x7f4bb49a5d29 [ 280.215809][T16457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 280.235488][T16457] RSP: 002b:00007f4bb2ff6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 280.243969][T16457] RAX: ffffffffffffffda RBX: 00007f4bb4b96080 RCX: 00007f4bb49a5d29 [ 280.251981][T16457] RDX: 00000000000000b3 RSI: 0000000020001980 RDI: 0000000000000005 [ 280.259958][T16457] RBP: 00007f4bb2ff6090 R08: 0000000000000000 R09: 0000000000000000 [ 280.267992][T16457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 280.276028][T16457] R13: 0000000000000000 R14: 00007f4bb4b96080 R15: 00007ffe1e0d7068 [ 280.284039][T16457] [ 280.315147][T16464] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:1) [ 280.493683][ T29] kauditd_printk_skb: 204 callbacks suppressed [ 280.493698][ T29] audit: type=1326 audit(2000000377.743:14324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16467 comm="syz.3.4586" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04755a5d29 code=0x7ffc0000 [ 280.523673][ T29] audit: type=1326 audit(2000000377.743:14325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16467 comm="syz.3.4586" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04755a5d29 code=0x7ffc0000 [ 280.570333][ T29] audit: type=1326 audit(2000000377.803:14326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16467 comm="syz.3.4586" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f04755a5d29 code=0x7ffc0000 [ 280.594037][ T29] audit: type=1326 audit(2000000377.803:14327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16467 comm="syz.3.4586" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04755a5d29 code=0x7ffc0000 [ 280.617823][ T29] audit: type=1326 audit(2000000377.803:14328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16467 comm="syz.3.4586" exe="/root/syz-executor" sig=0 arch=c000003e syscall=111 compat=0 ip=0x7f04755a5d29 code=0x7ffc0000 [ 280.641505][ T29] audit: type=1326 audit(2000000377.803:14329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16467 comm="syz.3.4586" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04755a5d29 code=0x7ffc0000 [ 280.665332][ T29] audit: type=1326 audit(2000000377.803:14330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16467 comm="syz.3.4586" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f04755a4690 code=0x7ffc0000 [ 280.688568][T16474] 9pnet_fd: Insufficient options for proto=fd [ 280.688924][ T29] audit: type=1326 audit(2000000377.803:14331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16467 comm="syz.3.4586" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f04755a4690 code=0x7ffc0000 [ 280.718594][ T29] audit: type=1326 audit(2000000377.803:14332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16467 comm="syz.3.4586" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04755a5d29 code=0x7ffc0000 [ 280.742287][ T29] audit: type=1326 audit(2000000377.803:14333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16467 comm="syz.3.4586" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f04755a5d29 code=0x7ffc0000 [ 280.753474][T16468] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 280.843867][T16479] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4589'. [ 280.852832][T16479] netlink: 84 bytes leftover after parsing attributes in process `syz.4.4589'. [ 280.876746][T16468] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 280.936770][T16480] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 280.951081][T16483] netlink: 96 bytes leftover after parsing attributes in process `syz.4.4591'. [ 281.179115][T16485] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 281.199391][T16485] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 281.724766][T16506] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:1) [ 281.729589][ C1] vxcan1: j1939_tp_rxtimer: 0xffff88811936c600: rx timeout, send abort [ 281.744538][ C1] vxcan1: j1939_xtp_rx_abort_one: 0xffff88811936c600: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 281.997330][T16517] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 282.039967][T16517] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 282.095417][T16520] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 282.577263][T16544] bridge0: entered promiscuous mode [ 282.582624][T16544] macvlan2: entered promiscuous mode [ 282.590736][T16544] bridge0: port 4(macvlan2) entered blocking state [ 282.597378][T16544] bridge0: port 4(macvlan2) entered disabled state [ 282.604274][T16544] macvlan2: entered allmulticast mode [ 282.609752][T16544] bridge0: entered allmulticast mode [ 282.617038][T16544] macvlan2: left allmulticast mode [ 282.622276][T16544] bridge0: left allmulticast mode [ 282.638115][T16544] bridge0: left promiscuous mode [ 282.674833][T16555] FAULT_INJECTION: forcing a failure. [ 282.674833][T16555] name failslab, interval 1, probability 0, space 0, times 0 [ 282.687539][T16555] CPU: 1 UID: 0 PID: 16555 Comm: syz.5.4615 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 282.698333][T16555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 282.708576][T16555] Call Trace: [ 282.711880][T16555] [ 282.714833][T16555] dump_stack_lvl+0xf2/0x150 [ 282.719564][T16555] dump_stack+0x15/0x1a [ 282.723807][T16555] should_fail_ex+0x223/0x230 [ 282.728655][T16555] ? __pfx_shmem_initxattrs+0x10/0x10 [ 282.734100][T16555] should_failslab+0x8f/0xb0 [ 282.738812][T16555] __kmalloc_noprof+0xab/0x3f0 [ 282.743617][T16555] ? security_inode_init_security+0xbd/0x330 [ 282.749653][T16555] ? __pfx_shmem_initxattrs+0x10/0x10 [ 282.755137][T16555] security_inode_init_security+0xbd/0x330 [ 282.760990][T16555] shmem_mknod+0xa8/0x180 [ 282.765387][T16555] shmem_mkdir+0x33/0x70 [ 282.769721][T16555] vfs_mkdir+0x1f4/0x320 [ 282.774009][T16555] do_mkdirat+0x12f/0x2b0 [ 282.778476][T16555] __x64_sys_mkdirat+0x4e/0x60 [ 282.783302][T16555] x64_sys_call+0x1b6f/0x2dc0 [ 282.788065][T16555] do_syscall_64+0xc9/0x1c0 [ 282.792686][T16555] ? clear_bhb_loop+0x55/0xb0 [ 282.797484][T16555] ? clear_bhb_loop+0x55/0xb0 [ 282.802197][T16555] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 282.808294][T16555] RIP: 0033:0x7f4bb49a5d29 [ 282.812812][T16555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 282.832874][T16555] RSP: 002b:00007f4bb3017038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 282.841415][T16555] RAX: ffffffffffffffda RBX: 00007f4bb4b95fa0 RCX: 00007f4bb49a5d29 [ 282.849452][T16555] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: ffffffffffffff9c [ 282.857465][T16555] RBP: 00007f4bb3017090 R08: 0000000000000000 R09: 0000000000000000 [ 282.865542][T16555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 282.873548][T16555] R13: 0000000000000000 R14: 00007f4bb4b95fa0 R15: 00007ffe1e0d7068 [ 282.881579][T16555] [ 282.927522][T16567] SELinux: policydb version 0 does not match my version range 15-33 [ 282.940397][T16567] SELinux: failed to load policy [ 283.021182][T16569] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 283.042286][T16580] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:1) [ 283.070014][T16569] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 283.091782][T16583] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 283.170235][T16587] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:1) [ 283.177078][T16589] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4629'. [ 283.190604][T16589] netlink: 84 bytes leftover after parsing attributes in process `syz.5.4629'. [ 283.439456][T16602] syz.5.4634[16602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.439672][T16602] syz.5.4634[16602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.477341][T16602] syz.5.4634[16602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.820786][T16630] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:1) [ 283.845760][T16628] Cannot find add_set index 0 as target [ 284.112823][T16625] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 284.146254][T16625] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 284.209076][T16652] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 284.241114][T16652] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 284.735582][T16659] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 284.769656][T16659] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 284.792690][T16663] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 285.145679][T16671] FAULT_INJECTION: forcing a failure. [ 285.145679][T16671] name failslab, interval 1, probability 0, space 0, times 0 [ 285.158457][T16671] CPU: 0 UID: 0 PID: 16671 Comm: syz.0.4655 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 285.169354][T16671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 285.179431][T16671] Call Trace: [ 285.182728][T16671] [ 285.185677][T16671] dump_stack_lvl+0xf2/0x150 [ 285.190358][T16671] dump_stack+0x15/0x1a [ 285.194546][T16671] should_fail_ex+0x223/0x230 [ 285.199324][T16671] should_failslab+0x8f/0xb0 [ 285.204047][T16671] __kmalloc_noprof+0xab/0x3f0 [ 285.208836][T16671] ? sk_prot_alloc+0xab/0x190 [ 285.213615][T16671] ? should_fail_ex+0xd7/0x230 [ 285.218416][T16671] sk_prot_alloc+0xab/0x190 [ 285.223069][T16671] sk_alloc+0x33/0x360 [ 285.227153][T16671] ? bpf_prog_test_run_skb+0x1da/0xc00 [ 285.232643][T16671] bpf_prog_test_run_skb+0x244/0xc00 [ 285.238041][T16671] ? __pfx_bpf_prog_test_run_skb+0x10/0x10 [ 285.243889][T16671] bpf_prog_test_run+0x20f/0x3a0 [ 285.248854][T16671] __sys_bpf+0x400/0x7a0 [ 285.253119][T16671] __x64_sys_bpf+0x43/0x50 [ 285.257728][T16671] x64_sys_call+0x2914/0x2dc0 [ 285.262429][T16671] do_syscall_64+0xc9/0x1c0 [ 285.266950][T16671] ? clear_bhb_loop+0x55/0xb0 [ 285.271701][T16671] ? clear_bhb_loop+0x55/0xb0 [ 285.276401][T16671] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 285.282379][T16671] RIP: 0033:0x7f0761055d29 [ 285.286830][T16671] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 285.306667][T16671] RSP: 002b:00007f075f6c1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 285.315117][T16671] RAX: ffffffffffffffda RBX: 00007f0761245fa0 RCX: 00007f0761055d29 [ 285.323104][T16671] RDX: 0000000000000048 RSI: 0000000020000080 RDI: 000000000000000a [ 285.331091][T16671] RBP: 00007f075f6c1090 R08: 0000000000000000 R09: 0000000000000000 [ 285.339141][T16671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 285.347191][T16671] R13: 0000000000000000 R14: 00007f0761245fa0 R15: 00007ffcdf714f28 [ 285.355225][T16671] [ 285.476558][T16677] FAULT_INJECTION: forcing a failure. [ 285.476558][T16677] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 285.489719][T16677] CPU: 0 UID: 0 PID: 16677 Comm: syz.1.4657 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 285.500569][T16677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 285.510771][T16677] Call Trace: [ 285.514134][T16677] [ 285.517117][T16677] dump_stack_lvl+0xf2/0x150 [ 285.521835][T16677] dump_stack+0x15/0x1a [ 285.526024][T16677] should_fail_ex+0x223/0x230 [ 285.530724][T16677] should_fail+0xb/0x10 [ 285.534908][T16677] should_fail_usercopy+0x1a/0x20 [ 285.539992][T16677] _copy_from_iter+0xd5/0xd00 [ 285.544850][T16677] ? kmalloc_reserve+0x16e/0x190 [ 285.549818][T16677] ? __build_skb_around+0x196/0x1f0 [ 285.555046][T16677] ? __alloc_skb+0x21f/0x310 [ 285.559659][T16677] ? __virt_addr_valid+0x1ed/0x250 [ 285.564889][T16677] ? __check_object_size+0x364/0x520 [ 285.570304][T16677] netlink_sendmsg+0x460/0x6e0 [ 285.575115][T16677] ? __pfx_netlink_sendmsg+0x10/0x10 [ 285.580459][T16677] __sock_sendmsg+0x140/0x180 [ 285.585236][T16677] ____sys_sendmsg+0x312/0x410 [ 285.590024][T16677] __sys_sendmsg+0x19d/0x230 [ 285.594661][T16677] __x64_sys_sendmsg+0x46/0x50 [ 285.599466][T16677] x64_sys_call+0x2734/0x2dc0 [ 285.604233][T16677] do_syscall_64+0xc9/0x1c0 [ 285.608921][T16677] ? clear_bhb_loop+0x55/0xb0 [ 285.613623][T16677] ? clear_bhb_loop+0x55/0xb0 [ 285.618415][T16677] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 285.624375][T16677] RIP: 0033:0x7fc8763e5d29 [ 285.628805][T16677] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 285.648450][T16677] RSP: 002b:00007fc874a57038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 285.656927][T16677] RAX: ffffffffffffffda RBX: 00007fc8765d5fa0 RCX: 00007fc8763e5d29 [ 285.664948][T16677] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000006 [ 285.673127][T16677] RBP: 00007fc874a57090 R08: 0000000000000000 R09: 0000000000000000 [ 285.681168][T16677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 285.689163][T16677] R13: 0000000000000000 R14: 00007fc8765d5fa0 R15: 00007ffdf6467228 [ 285.697151][T16677] [ 285.759980][T16681] Cannot find add_set index 0 as target [ 285.798935][T16683] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16683 comm=syz.4.4660 [ 285.851611][T16686] __nla_validate_parse: 1 callbacks suppressed [ 285.851627][T16686] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4660'. [ 285.916284][T16689] SELinux: syz.1.4663 (16689) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 285.979717][ T29] kauditd_printk_skb: 418 callbacks suppressed [ 285.979810][ T29] audit: type=1326 audit(2000000383.233:14752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16690 comm="syz.0.4662" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0761055d29 code=0x7ffc0000 [ 286.046581][ T29] audit: type=1326 audit(2000000383.233:14753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16690 comm="syz.0.4662" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0761055d29 code=0x7ffc0000 [ 286.070257][ T29] audit: type=1326 audit(2000000383.263:14754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16690 comm="syz.0.4662" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0761055d29 code=0x7ffc0000 [ 286.094087][ T29] audit: type=1326 audit(2000000383.263:14755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16690 comm="syz.0.4662" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0761055d29 code=0x7ffc0000 [ 286.117783][ T29] audit: type=1326 audit(2000000383.263:14756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16690 comm="syz.0.4662" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0761055d29 code=0x7ffc0000 [ 286.141476][ T29] audit: type=1326 audit(2000000383.263:14757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16690 comm="syz.0.4662" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0761055d29 code=0x7ffc0000 [ 286.165276][ T29] audit: type=1326 audit(2000000383.263:14758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16690 comm="syz.0.4662" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0761055d29 code=0x7ffc0000 [ 286.188892][ T29] audit: type=1326 audit(2000000383.263:14759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16690 comm="syz.0.4662" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0761055d29 code=0x7ffc0000 [ 286.212630][ T29] audit: type=1326 audit(2000000383.263:14760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16690 comm="syz.0.4662" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0761055d29 code=0x7ffc0000 [ 286.236312][ T29] audit: type=1326 audit(2000000383.263:14761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16690 comm="syz.0.4662" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0761055d29 code=0x7ffc0000 [ 286.291715][T16700] netlink: 184 bytes leftover after parsing attributes in process `syz.5.4666'. [ 286.395670][T16703] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4668'. [ 286.437946][T16703] batman_adv: batadv0: Interface deactivated: dummy0 [ 286.444806][T16703] batman_adv: batadv0: Removing interface: dummy0 [ 286.488437][T16703] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 286.495902][T16703] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 286.602755][T16703] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 286.610283][T16703] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 286.709185][T16717] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 286.762164][T16717] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 287.087261][T16727] SELinux: policydb version 0 does not match my version range 15-33 [ 287.112060][T16727] SELinux: failed to load policy [ 287.599511][T16739] lo speed is unknown, defaulting to 1000 [ 287.622438][T16739] lo speed is unknown, defaulting to 1000 [ 287.708031][T16743] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 287.714911][T16745] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:1) [ 287.752616][T16745] netlink: 96 bytes leftover after parsing attributes in process `syz.3.4677'. [ 288.182906][T16753] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 288.229584][T16753] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 288.239053][T16758] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4684'. [ 288.248041][T16758] netlink: 84 bytes leftover after parsing attributes in process `syz.1.4684'. [ 288.604444][T16774] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 288.837393][T16780] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 288.856223][T16782] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 288.876670][T16782] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 288.895970][T16780] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 289.025935][T16777] blktrace: Concurrent blktraces are not allowed on sg0 [ 289.238840][T16789] netlink: 20 bytes leftover after parsing attributes in process `syz.1.4692'. [ 289.482603][T16796] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4695'. [ 289.524808][T16796] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 289.532308][T16796] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 289.568795][T16796] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 289.576269][T16796] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 289.765032][T16800] x_tables: ip6_tables: socket match: used from hooks OUTPUT, but only valid from PREROUTING/INPUT [ 289.805762][T16805] ref_ctr_offset mismatch. inode: 0x7f2 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x2000000 [ 290.003862][T16815] ref_ctr_offset mismatch. inode: 0x7f8 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x2000000 [ 290.066464][T16817] lo speed is unknown, defaulting to 1000 [ 290.082321][T16821] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 290.138120][T16821] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 290.149792][T16817] lo speed is unknown, defaulting to 1000 [ 290.328779][T16829] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 290.490852][T16832] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 290.537269][T16832] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 290.958529][T16841] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4709'. [ 291.038931][T16842] lo speed is unknown, defaulting to 1000 [ 291.045267][T16842] lo speed is unknown, defaulting to 1000 [ 291.190983][T16841] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 291.198574][T16841] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 291.310196][T16844] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 291.421348][T16841] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 291.428839][T16841] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 291.751205][T16844] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 291.761963][ T29] kauditd_printk_skb: 404 callbacks suppressed [ 291.761986][ T29] audit: type=1326 audit(2000000389.013:15166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16834 comm="syz.4.4708" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f791f5f5d29 code=0x7ffc0000 [ 291.835651][ T29] audit: type=1326 audit(2000000389.073:15167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16834 comm="syz.4.4708" exe="/root/syz-executor" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7f791f5f5d29 code=0x7ffc0000 [ 291.897948][ T29] audit: type=1326 audit(2000000389.123:15168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16834 comm="syz.4.4708" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f791f5f5d29 code=0x7ffc0000 [ 291.921714][ T29] audit: type=1326 audit(2000000389.123:15169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16834 comm="syz.4.4708" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f791f5f5d29 code=0x7ffc0000 [ 292.123959][T16859] lo speed is unknown, defaulting to 1000 [ 292.130426][T16859] lo speed is unknown, defaulting to 1000 [ 292.610632][T16863] netlink: 96 bytes leftover after parsing attributes in process `syz.5.4715'. [ 293.006189][ T29] audit: type=1326 audit(2000000390.223:15170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16868 comm="syz.3.4718" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04755a5d29 code=0x7ffc0000 [ 293.029926][ T29] audit: type=1326 audit(2000000390.223:15171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16868 comm="syz.3.4718" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04755a5d29 code=0x7ffc0000 [ 293.053701][ T29] audit: type=1326 audit(2000000390.223:15172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16868 comm="syz.3.4718" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f04755a5d29 code=0x7ffc0000 [ 293.058960][T16874] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 293.077725][ T29] audit: type=1326 audit(2000000390.223:15173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16868 comm="syz.3.4718" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04755a5d29 code=0x7ffc0000 [ 293.110078][ T29] audit: type=1326 audit(2000000390.223:15174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16868 comm="syz.3.4718" exe="/root/syz-executor" sig=0 arch=c000003e syscall=111 compat=0 ip=0x7f04755a5d29 code=0x7ffc0000 [ 293.133942][ T29] audit: type=1326 audit(2000000390.223:15175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16868 comm="syz.3.4718" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f04755a5d29 code=0x7ffc0000 [ 293.183414][T16874] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 293.239935][T16878] Cannot find add_set index 0 as target [ 293.281769][T16880] bridge0: entered promiscuous mode [ 293.287017][T16880] macvlan2: entered promiscuous mode [ 293.294517][T16880] bridge0: port 4(macvlan2) entered blocking state [ 293.301178][T16880] bridge0: port 4(macvlan2) entered disabled state [ 293.310647][T16880] macvlan2: entered allmulticast mode [ 293.316050][T16880] bridge0: entered allmulticast mode [ 293.328197][T16880] macvlan2: left allmulticast mode [ 293.333359][T16880] bridge0: left allmulticast mode [ 293.368646][T16880] bridge0: left promiscuous mode [ 294.034778][T16896] netlink: 96 bytes leftover after parsing attributes in process `syz.3.4729'. [ 294.159883][T16899] lo speed is unknown, defaulting to 1000 [ 294.166122][T16899] lo speed is unknown, defaulting to 1000 [ 294.358659][T16900] ref_ctr_offset mismatch. inode: 0x80e offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x2000000 [ 294.969742][T16905] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:1) [ 295.180902][T16910] Cannot find add_set index 0 as target [ 295.268064][T16916] ref_ctr_offset mismatch. inode: 0x768 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x2000000 [ 295.445337][T16922] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4737'. [ 295.578433][T16926] netlink: 20 bytes leftover after parsing attributes in process `+}[@'. [ 295.637823][T16926] netdevsim netdevsim4 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 295.646217][T16926] netdevsim netdevsim4 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 295.655162][T16926] netdevsim netdevsim4 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 295.663469][T16926] netdevsim netdevsim4 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 295.675219][T16934] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 295.755878][T16941] SELinux: policydb version 0 does not match my version range 15-33 [ 295.781686][T16938] macvlan2: entered promiscuous mode [ 295.787029][T16938] bridge0: entered promiscuous mode [ 295.799049][T16941] SELinux: failed to load policy [ 295.802431][T16938] bridge0: port 2(macvlan2) entered blocking state [ 295.810641][T16938] bridge0: port 2(macvlan2) entered disabled state [ 295.838255][T16938] macvlan2: entered allmulticast mode [ 295.843820][T16938] bridge0: entered allmulticast mode [ 295.859253][T16938] macvlan2: left allmulticast mode [ 295.864424][T16938] bridge0: left allmulticast mode [ 295.872596][T16949] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4747'. [ 295.881690][T16949] netlink: 84 bytes leftover after parsing attributes in process `syz.4.4747'. [ 295.890862][T16938] bridge0: left promiscuous mode [ 296.035630][T16957] netlink: 96 bytes leftover after parsing attributes in process `syz.1.4750'. [ 296.302266][T16961] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 296.331094][T16961] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 296.406882][T16980] bridge0: entered promiscuous mode [ 296.419167][T16980] macvlan2: entered promiscuous mode [ 296.433129][T16980] bridge0: port 4(macvlan2) entered blocking state [ 296.439773][T16980] bridge0: port 4(macvlan2) entered disabled state [ 296.460015][T16980] macvlan2: entered allmulticast mode [ 296.465493][T16980] bridge0: entered allmulticast mode [ 296.478560][T16980] macvlan2: left allmulticast mode [ 296.483715][T16980] bridge0: left allmulticast mode [ 296.497480][T16980] bridge0: left promiscuous mode [ 296.565446][T16984] pim6reg: entered allmulticast mode [ 296.621920][T16984] pim6reg: left allmulticast mode [ 296.762842][T16995] bridge0: entered promiscuous mode [ 296.768266][T16995] macvlan2: entered promiscuous mode [ 296.775100][T16995] bridge0: port 3(macvlan2) entered blocking state [ 296.781795][T16995] bridge0: port 3(macvlan2) entered disabled state [ 296.788627][T16995] macvlan2: entered allmulticast mode [ 296.794018][T16995] bridge0: entered allmulticast mode [ 296.815149][T16995] macvlan2: left allmulticast mode [ 296.820368][T16995] bridge0: left allmulticast mode [ 296.839615][T16995] bridge0: left promiscuous mode [ 296.867776][T16997] netlink: 96 bytes leftover after parsing attributes in process `syz.1.4766'. [ 296.983031][T17007] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 297.012500][T17009] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 297.078116][T17013] SELinux: policydb version 0 does not match my version range 15-33 [ 297.086682][T17013] SELinux: failed to load policy [ 297.312750][T17023] bridge0: entered promiscuous mode [ 297.321400][ T29] kauditd_printk_skb: 212 callbacks suppressed [ 297.321413][ T29] audit: type=1326 audit(2000000394.573:15388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17020 comm="syz.1.4776" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc8763e5d29 code=0x7ffc0000 [ 297.364108][T17023] macvlan2: entered promiscuous mode [ 297.379247][T17023] bridge0: port 4(macvlan2) entered blocking state [ 297.385888][T17023] bridge0: port 4(macvlan2) entered disabled state [ 297.402769][ T29] audit: type=1326 audit(2000000394.603:15389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17020 comm="syz.1.4776" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc8763e5d29 code=0x7ffc0000 [ 297.426470][ T29] audit: type=1326 audit(2000000394.603:15390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17020 comm="syz.1.4776" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc8763e5d29 code=0x7ffc0000 [ 297.450194][ T29] audit: type=1326 audit(2000000394.603:15391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17020 comm="syz.1.4776" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc8763e5d29 code=0x7ffc0000 [ 297.473806][ T29] audit: type=1326 audit(2000000394.603:15392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17020 comm="syz.1.4776" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc8763e5d29 code=0x7ffc0000 [ 297.497445][ T29] audit: type=1326 audit(2000000394.603:15393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17020 comm="syz.1.4776" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc8763e5d29 code=0x7ffc0000 [ 297.521051][ T29] audit: type=1326 audit(2000000394.603:15394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17020 comm="syz.1.4776" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc8763e5d29 code=0x7ffc0000 [ 297.544634][ T29] audit: type=1326 audit(2000000394.603:15395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17020 comm="syz.1.4776" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc8763e5d29 code=0x7ffc0000 [ 297.568206][ T29] audit: type=1326 audit(2000000394.613:15396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17020 comm="syz.1.4776" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc8763e5d29 code=0x7ffc0000 [ 297.591926][ T29] audit: type=1326 audit(2000000394.623:15397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17020 comm="syz.1.4776" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc8763e5d29 code=0x7ffc0000 [ 297.615887][T17023] macvlan2: entered allmulticast mode [ 297.621317][T17023] bridge0: entered allmulticast mode [ 297.658359][T17023] macvlan2: left allmulticast mode [ 297.663528][T17023] bridge0: left allmulticast mode [ 297.677236][T17023] bridge0: left promiscuous mode [ 297.984650][T17058] lo speed is unknown, defaulting to 1000 [ 297.996951][T17058] lo speed is unknown, defaulting to 1000 May 18 03:33:20 syzkaller kern.warn kernel: [ 297.984650][T17058] lo speed is unknown, defaulting to 1000 May 18 03:33:20 syzkaller kern.warn kernel: [ 297.996951][T17058] lo speed is unknown, defaulting to 1000 [ 298.520757][T17070] FAULT_INJECTION: forcing a failure. [ 298.520757][T17070] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 298.533943][T17070] CPU: 0 UID: 0 PID: 17070 Comm: syz.1.4795 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 298.544752][T17070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 298.554921][T17070] Call Trace: [ 298.558217][T17070] [ 298.561182][T17070] dump_stack_lvl+0xf2/0x150 [ 298.565832][T17070] dump_stack+0x15/0x1a [ 298.570483][T17070] should_fail_ex+0x223/0x230 [ 298.575221][T17070] should_fail+0xb/0x10 [ 298.579405][T17070] should_fail_usercopy+0x1a/0x20 [ 298.584548][T17070] _copy_to_user+0x20/0xa0 [ 298.589036][T17070] simple_read_from_buffer+0xa0/0x110 [ 298.594446][T17070] proc_fail_nth_read+0xf9/0x140 [ 298.599449][T17070] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 298.605039][T17070] vfs_read+0x1a2/0x700 [ 298.609380][T17070] ? __rcu_read_unlock+0x4e/0x70 [ 298.614373][T17070] ? __fget_files+0x17c/0x1c0 [ 298.619090][T17070] ksys_read+0xe8/0x1b0 [ 298.623261][T17070] __x64_sys_read+0x42/0x50 [ 298.627814][T17070] x64_sys_call+0x2874/0x2dc0 [ 298.632572][T17070] do_syscall_64+0xc9/0x1c0 [ 298.637090][T17070] ? clear_bhb_loop+0x55/0xb0 [ 298.641838][T17070] ? clear_bhb_loop+0x55/0xb0 [ 298.646602][T17070] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 298.652571][T17070] RIP: 0033:0x7fc8763e473c [ 298.657003][T17070] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 298.676641][T17070] RSP: 002b:00007fc874a57030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 298.685164][T17070] RAX: ffffffffffffffda RBX: 00007fc8765d5fa0 RCX: 00007fc8763e473c [ 298.693173][T17070] RDX: 000000000000000f RSI: 00007fc874a570a0 RDI: 0000000000000004 [ 298.701216][T17070] RBP: 00007fc874a57090 R08: 0000000000000000 R09: 0000000000000000 [ 298.709248][T17070] R10: 0000000020000080 R11: 0000000000000246 R12: 0000000000000001 [ 298.717376][T17070] R13: 0000000000000000 R14: 00007fc8765d5fa0 R15: 00007ffdf6467228 [ 298.725458][T17070] May 18 03:33:20 syzkaller kern.notice kernel: [ 298.520757][T17070] FAULT_INJECTION: forcing a failure. May 18 03:33:20 syzkaller kern.notice kernel: [ 298.520757][T17070] name fail_usercopy, interval 1, probability 0, space 0, times 0 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.533943][T17070] CPU: 0 UID: 0 PID: 17070 Comm: syz.1.4795 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.544752][T17070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.554921][T17070] Call Trace: May 18 03:33:20 syzkaller kern.warn kernel: [ 298.558217][T17070] May 18 03:33:20 syzkaller kern.warn kernel: [ 298.561182][T17070] dump_stack_lvl+0xf2/0x150 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.565832][T17070] dump_stack+0x15/0x1a May 18 03:33:20 syzkaller kern.warn kernel: [ 298.570483][T17070] should_fail_ex+0x223/0x230 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.575221][T17070] should_fail+0xb/0x10 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.579405][T17070] should_fail_usercopy+0x1a/0x20 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.584548][T17070] _copy_to_user+0x20/0xa0 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.589036][T17070] simple_read_from_buffer+0xa0/0x110 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.594446][T17070] proc_fail_nth_read+0xf9/0x140 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.599449][T17070] ? __pfx_proc_fail_nth_read+0x10/0x10 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.605039][T17070] vfs_read+0x1a2/0x700 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.609380][T17070] ? __rcu_read_unlock+0x4e/0x70 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.614373][T17070] ? __fget_files+0x17c/0x1c0 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.619090][T17070] ksys_read+0xe8/0x1b0 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.623261][T17070] __x64_sys_read+0x42/0x50 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.627814][T17070] x64_sys_call+0x2874/0x2dc0 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.632572][T17070] do_syscall_64+0xc9/0x1c0 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.637090][T17070] ? clear_bhb_loop+0x55/0xb0 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.641838][T17070] ? clear_bhb_loop+0x55/0xb0 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.646602][T17070] entry_SYSCALL_64_after_hwframe+0x77/0x7f May 18 03:33:20 syzkaller kern.warn kernel: [ 298.652571][T17070] RIP: 0033:0x7fc8763e473c May 18 03:33:20 syzkaller kern.warn kernel: [ 298.657003][T17070] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.676641][T17070] RSP: 002b:00007fc874a57030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.685164][T17070] RAX: ffffffffffffffda RBX: 00007fc8765d5fa0 RCX: 00007fc8763e473c May 18 03:33:20 syzkaller kern.warn kernel: [ 298.693173][T17070] RDX: 000000000000000f RSI: 00007fc874a570a0 RDI: 0000000000000004 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.701216][T17070] RBP: 00007fc874a57090 R08: 0000000000000000 R09: 0000000000000000 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.709248][T17070] R10: 0000000020000080 R11: 0000000000000246 R12: 0000000000000001 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.717376][T17070] R13: 0000000000000000 R14: 00007fc8765d5fa0 R15: 00007ffdf6467228 May 18 03:33:20 syzkaller kern.warn kernel: [ 298.725458][T17070] [ 299.265095][T17107] lo speed is unknown, defaulting to 1000 May 18 03:33:21 syzkaller kern.warn kernel: [ 299.265095][T17107] lo speed is unknown, defaulting to 1000 [ 299.328642][T17107] lo speed is unknown, defaulting to 1000 May 18 03:33:21 syzkaller kern.warn kernel: [ 299.328642][T17107] lo speed is unknown, defaulting to 1000 [ 299.768453][T17133] FAULT_INJECTION: forcing a failure. [ 299.768453][T17133] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 299.781562][T17133] CPU: 1 UID: 0 PID: 17133 Comm: syz.0.4821 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 299.792479][T17133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 299.802613][T17133] Call Trace: [ 299.805907][T17133] [ 299.808863][T17133] dump_stack_lvl+0xf2/0x150 [ 299.813615][T17133] dump_stack+0x15/0x1a [ 299.817867][T17133] should_fail_ex+0x223/0x230 [ 299.822599][T17133] should_fail+0xb/0x10 [ 299.826789][T17133] should_fail_usercopy+0x1a/0x20 [ 299.831856][T17133] _copy_from_iter+0xd5/0xd00 [ 299.836618][T17133] ? kmalloc_reserve+0x16e/0x190 [ 299.841583][T17133] ? __build_skb_around+0x196/0x1f0 [ 299.846846][T17133] ? __alloc_skb+0x21f/0x310 [ 299.851495][T17133] ? __virt_addr_valid+0x1ed/0x250 [ 299.856826][T17133] ? __check_object_size+0x364/0x520 [ 299.862162][T17133] netlink_sendmsg+0x460/0x6e0 [ 299.866987][T17133] ? __pfx_netlink_sendmsg+0x10/0x10 [ 299.872363][T17133] __sock_sendmsg+0x140/0x180 [ 299.877077][T17133] ____sys_sendmsg+0x312/0x410 [ 299.881880][T17133] __sys_sendmmsg+0x227/0x4b0 [ 299.886721][T17133] __x64_sys_sendmmsg+0x57/0x70 [ 299.891733][T17133] x64_sys_call+0x29aa/0x2dc0 [ 299.896500][T17133] do_syscall_64+0xc9/0x1c0 [ 299.901023][T17133] ? clear_bhb_loop+0x55/0xb0 [ 299.905837][T17133] ? clear_bhb_loop+0x55/0xb0 [ 299.910542][T17133] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 299.917001][T17133] RIP: 0033:0x7f0761055d29 [ 299.921468][T17133] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 299.941557][T17133] RSP: 002b:00007f075f6c1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 299.950095][T17133] RAX: ffffffffffffffda RBX: 00007f0761245fa0 RCX: 00007f0761055d29 [ 299.958101][T17133] RDX: 040000000000009f RSI: 00000000200002c0 RDI: 0000000000000003 [ 299.966141][T17133] RBP: 00007f075f6c1090 R08: 0000000000000000 R09: 0000000000000000 [ 299.974199][T17133] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 299.982254][T17133] R13: 0000000000000000 R14: 00007f0761245fa0 R15: 00007ffcdf714f28 [ 299.990255][T17133] May 18 03:33:22 syzkaller kern.notice kernel: [ 299.768453][T17133] FAULT_INJECTION: forcing a failure. May 18 03:33:22 syzkaller kern.notice kernel: [ 299.768453][T17133] name fail_usercopy, interval 1, probability 0, space 0, times 0 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.781562][T17133] CPU: 1 UID: 0 PID: 17133 Comm: syz.0.4821 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.792479][T17133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.802613][T17133] Call Trace: May 18 03:33:22 syzkaller kern.warn kernel: [ 299.805907][T17133] May 18 03:33:22 syzkaller kern.warn kernel: [ 299.808863][T17133] dump_stack_lvl+0xf2/0x150 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.813615][T17133] dump_stack+0x15/0x1a May 18 03:33:22 syzkaller kern.warn kernel: [ 299.817867][T17133] should_fail_ex+0x223/0x230 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.822599][T17133] should_fail+0xb/0x10 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.826789][T17133] should_fail_usercopy+0x1a/0x20 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.831856][T17133] _copy_from_iter+0xd5/0xd00 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.836618][T17133] ? kmalloc_reserve+0x16e/0x190 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.841583][T17133] ? __build_skb_around+0x196/0x1f0 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.846846][T17133] ? __alloc_skb+0x21f/0x310 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.851495][T17133] ? __virt_addr_valid+0x1ed/0x250 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.856826][T17133] ? __check_object_size+0x364/0x520 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.862162][T17133] netlink_sendmsg+0x460/0x6e0 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.866987][T17133] ? __pfx_netlink_sendmsg+0x10/0x10 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.872363][T17133] __sock_sendmsg+0x140/0x180 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.877077][T17133] ____sys_sendmsg+0x312/0x410 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.881880][T17133] __sys_sendmmsg+0x227/0x4b0 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.886721][T17133] __x64_sys_sendmmsg+0x57/0x70 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.891733][T17133] x64_sys_call+0x29aa/0x2dc0 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.896500][T17133] do_syscall_64+0xc9/0x1c0 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.901023][T17133] ? clear_bhb_loop+0x55/0xb0 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.905837][T17133] ? clear_bhb_loop+0x55/0xb0 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.910542][T17133] entry_SYSCALL_64_after_hwframe+0x77/0x7f May 18 03:33:22 syzkaller kern.warn kernel: [ 299.917001][T17133] RIP: 0033:0x7f0761055d29 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.921468][T17133] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.941557][T17133] RSP: 002b:00007f075f6c1038 EFLAGS: 00000246 ORIG_R[ 300.287518][T17145] lo speed is unknown, defaulting to 1000 AX: 0000000000000133 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.950095][T17133] RAX: ffffffffffffffda RBX: 00007f0761245fa0 RCX: 00007f0761055d29 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.958101][T17133] RDX: 040000000000009f RSI: 00000000200002c0 RDI: 0000000000000003 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.966141][T17133] RBP: 00007f075f6c1090 R08: [ 300.325919][T17148] Cannot find add_set index 0 as target [ 300.328478][T17145] lo speed is unknown, defaulting to 1000 0000000000000000 R09: 0000000000000000 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.974199][T17133] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.982254][T17133] R13: 0000000000000000 R14: 00007f0761245fa0 R15: 00007ffcdf714f28 May 18 03:33:22 syzkaller kern.warn kernel: [ 299.990255][T17133] May 18 03:33:22 syzkaller kern.warn kernel: [ 300.287518][T17145] lo speed is unknown, defaulting to 1000 May 18 03:33:22 syzkaller kern.info kernel: [ 300.325919][T17148] Cannot find add_set index 0 as target May 18 03:33:22 syzkaller kern.warn kernel: [ 300.328478][T17145] lo speed is unknown, defaulting to 1000 [ 301.405160][T17198] lo speed is unknown, defaulting to 1000 May 18 03:33:23 [ 301.419497][T17198] lo speed is unknown, defaulting to 1000 syzkaller kern.warn kernel: [ 301.405160][T17198] lo speed is unknown, defaulting to 1000 May 18 03:33:23 syzkaller kern.warn kernel: [ 301.419497][T17198] lo speed is unknown, defaulting to 1000 [ 301.473448][T17210] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:1) May 18 03:33:23 syzkaller kern.warn kernel: [ 301.473448][T17210] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:1) [ 302.339629][ T29] kauditd_printk_skb: 1237 callbacks suppressed [ 302.339711][ T29] audit: type=1400 audit(2000000004.490:16635): avc: denied { map_create } for pid=17304 comm="syz.5.4899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 18 03:33:24 syzkaller kern.warn kernel: [ 302.339629][ T29] kauditd_printk_skb: 1237 callbacks suppressed May 18 03:33:24 syzkaller kern.notice kernel: [ 302.339711][ T29] audit: ty[ 302.382060][ T29] audit: type=1400 audit(2000000004.490:16636): avc: denied { prog_load } for pid=17304 comm="syz.5.4899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 pe=1400 audit(20[ 302.401874][ T29] audit: type=1400 audit(2000000004.490:16637): avc: denied { prog_load } for pid=17304 comm="syz.5.4899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 00000004.490:166[ 302.422387][ T29] audit: type=1400 audit(2000000004.490:16638): avc: denied { load_policy } for pid=17304 comm="syz.5.4899" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=0 35): avc: denie[ 302.444159][ T29] audit: type=1400 audit(2000000004.510:16639): avc: denied { create } for pid=17308 comm="syz.5.4900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 d { map_create [ 302.466243][ T29] audit: type=1400 audit(2000000004.510:16640): avc: denied { open } for pid=17308 comm="syz.5.4900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 } for pid=17304[ 302.487085][ T29] audit: type=1400 audit(2000000004.510:16641): avc: denied { create } for pid=17308 comm="syz.5.4900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 comm="syz.5.489[ 302.508921][ T29] audit: type=1400 audit(2000000004.510:16642): avc: denied { create } for pid=17308 comm="syz.5.4900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 9" scontext=root[ 302.531037][ T29] audit: type=1400 audit(2000000004.510:16643): avc: denied { read append } for pid=17308 comm="syz.5.4900" name="mISDNtimer" dev="devtmpfs" ino=248 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 :sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 18 03:33:24 syzkaller kern.notice kernel: [ 302.382060][ T29] audit: type=1400 audit(2000000004.490:16636): avc: denied { prog_load } for pid=17304 comm="syz.5.4899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 302.531067][ T29] audit: type=1400 audit(2000000004.510:16644): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:24 syzkaller kern.notice kernel: [ 302.401874][ T29] audit: type=1400 audit(2000000004.490:16637): avc: denied { prog_load } for pid=17304 comm="syz.5.4899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 18 03:33:24 syzkaller kern.notice kernel: [ 302.422387][ T29] audit: type=1400 audit(2000000004.490:16638): avc: denied { load_policy } for pid=17304 comm="syz.5.4899" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive May 18 03:33:24 syzkaller kern.notice kernel: [ 302.444159][ T29] audit: type=1400 audit(2000000004.510:16639): avc: denied { create } for pid=17308 comm="syz.5.4900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permi May 18 03:33:24 syzkaller kern.notice kernel: [ 302.466243][ T29] audit: type=1400 audit(2000000004.510:16640): avc: denied { open } for pid=17308 comm="syz.5.4900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 May 18 03:33:24 syzkaller kern.notice kernel: [ 302.487085][ T29] audit: type=1400 audit(2000000004.510:16641): avc: denied { create } for pid=17308 comm="syz.5.4900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive May 18 03:33:24 syzkaller kern.notice kernel: [ 302.508921][ T29] audit: type=1400 audit(2000000004.510:16642): avc: denied { create } for pid=17308 comm="syz.5.4900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permi May 18 03:33:24 syzkaller kern.notice kernel: [ 302.531037][ T29] audit: type=1400 audit(2000000004.510:16643): avc: denied { read append } for pid=17308 comm="syz.5.4900" name="mISDNtimer" dev="devtmpfs" ino=248 scontext=root:sysadm_r:sysadm_t tcontext=system_u:objec May 18 03:33:24 syzkaller kern.notice kernel: [ 302.531067][ T29] audit: type=1400 audit(2000000004.510:16644): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 303.412391][T17382] lo speed is unknown, defaulting to 1000 May 18 03:33:25 syzkaller kern.warn kernel: [ 303.412391][T17382] lo speed is unknown, defaulting to 1000 [ 303.440565][T17382] lo speed is unknown, defaulting to 1000 May 18 03:33:25 syzkaller kern.warn kernel: [ 303.440565][T17382] lo speed is unknown, defaulting to 1000 [ 303.494035][T17392] lo speed is unknown, defaulting to 1000 May 18 03:33:25 syzkaller kern.warn kernel: [ 303.494035][T17392] lo speed is unknown, defaulting to 1000 [ 303.539564][T17392] lo speed is unknown, defaulting to 1000 May 18 03:33:25 syzkaller kern.warn kernel: [ 303.539564][T17392] lo speed is unknown, defaulting to 1000 [ 304.549207][T17445] FAULT_INJECTION: forcing a failure. [ 304.549207][T17445] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 304.562371][T17445] CPU: 0 UID: 0 PID: 17445 Comm: syz.5.4959 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 304.573310][T17445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 304.583386][T17445] Call Trace: [ 304.586684][T17445] [ 304.589659][T17445] dump_stack_lvl+0xf2/0x150 [ 304.594340][T17445] dump_stack+0x15/0x1a [ 304.598539][T17445] should_fail_ex+0x223/0x230 [ 304.603245][T17445] should_fail+0xb/0x10 [ 304.607422][T17445] should_fail_usercopy+0x1a/0x20 [ 304.612490][T17445] _copy_to_user+0x20/0xa0 [ 304.616949][T17445] simple_read_from_buffer+0xa0/0x110 [ 304.622417][T17445] proc_fail_nth_read+0xf9/0x140 [ 304.627441][T17445] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 304.633032][T17445] vfs_read+0x1a2/0x700 [ 304.637260][T17445] ? __rcu_read_unlock+0x4e/0x70 [ 304.642221][T17445] ? __fget_files+0x17c/0x1c0 [ 304.646931][T17445] ksys_read+0xe8/0x1b0 [ 304.651120][T17445] __x64_sys_read+0x42/0x50 [ 304.656157][T17445] x64_sys_call+0x2874/0x2dc0 [ 304.660863][T17445] do_syscall_64+0xc9/0x1c0 [ 304.665389][T17445] ? clear_bhb_loop+0x55/0xb0 [ 304.670126][T17445] ? clear_bhb_loop+0x55/0xb0 [ 304.674821][T17445] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 304.680775][T17445] RIP: 0033:0x7f4bb49a473c [ 304.685212][T17445] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 304.704953][T17445] RSP: 002b:00007f4bb3017030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 304.713402][T17445] RAX: ffffffffffffffda RBX: 00007f4bb4b95fa0 RCX: 00007f4bb49a473c [ 304.721400][T17445] RDX: 000000000000000f RSI: 00007f4bb30170a0 RDI: 0000000000000003 [ 304.729394][T17445] RBP: 00007f4bb3017090 R08: 0000000000000000 R09: 0000000000000000 [ 304.737384][T17445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 304.745381][T17445] R13: 0000000000000000 R14: 00007f4bb4b95fa0 R15: 00007ffe1e0d7068 [ 304.753410][T17445] May 18 03:33:26 syzkaller kern.notice kernel: [ 304.549207][T17445] FAULT_INJECTION: forcing a failure. May 18 03:33:26 syzkaller kern.notice kernel: [ 304.549207][T17445] name fail_usercopy, interval 1, probability 0, space 0, times 0 May 18 03:33:26 syzkaller kern.warn kernel: [ 304.562371][T17445] CPU: 0 UID: 0 PID: 17445 Comm: syz.5.4959 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 May 18 03:33:26 syzkaller kern.warn kernel: [ 304.573310][T17445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 May 18 03:33:26 syzkaller kern.warn kernel: [ 304.583386][T17445] Call Trace: May 18 03:33:26 syzkaller kern.warn kernel: [ 304.586684][T17445] May 18 03:33:26 syzkaller kern.warn kernel: [ 304.589659][T17445] dump_stack_lvl+0xf2/0x150 May 18 03:33:26 syzkaller kern.warn kernel: [ 304.594340][T17445] dump_stack+0x15/0x1a May 18 03:33:26 syzkaller kern.warn kernel: [ 304.598539][T17445] should_fail_ex+0x223/0x230 May 18 03:33:26 syzkaller kern.warn kernel: [ 304.603245][T17445] should_fail+0xb/0x10 May 18 03:33:26 syzkaller kern.warn kernel: [ 304.607422][T17445] should_fail_usercopy+0x1a/0x20 May 18 03:33:26 syzkaller kern.warn kernel: [ 304.612490][T17445] _copy_to_user+0x20/0xa0 May 18 03:33:26 syzkaller kern.warn kernel: [ 304.616949][T17445] simple_read_from_buffer+0xa0/0x110 May 18 03:33:26 syzkaller kern.warn kernel: [ 304.622417][T17445] proc_fail_nth_read+0xf9/0x140 May 18 03:33:26 syzkaller kern.warn kernel: [ 304.627441][T17445] ? __pfx_proc_fail_nth_read+0x10/0x10 May 18 03:33:26 syzkaller kern.warn kernel: [ 304.633032][T17445] vfs_read+0x1a2/0x700 May 18 03:33:26 syzkaller kern.warn kernel: [ 304.637260][T17445] ? __rcu_read_unlock+0x4e/0x70 May 18 03:33:26 syzkaller kern.warn kernel: [ 304.642221][T17445] ? __fget_files+0x17c/0x1c0 May 18 03:33:26 syzkaller kern.warn kernel: [ 304.646931][T17445] ksys_read+0xe8/0x1b0 May 18 03:33:26 syzkaller kern.warn kernel: [ 304.651120][T17445] __x64_sys_read+0x42/0x50 May 18 03:33:26 syzkaller kern.warn kernel: [ 304.656157][T17445] x64_sys_call+0x2874/0x2dc0 May 18 03:33:26 syzkaller kern.warn kernel: [ 304.660863][T17445] do_syscall_64+0xc9/0x1c0 May [ 304.954365][T17467] FAULT_INJECTION: forcing a failure. [ 304.954365][T17467] name failslab, interval 1, probability 0, space 0, times 0 18 03:33:26 syzk[ 304.968501][T17467] CPU: 0 UID: 0 PID: 17467 Comm: syz.5.4966 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 aller kern.warn [ 304.980329][T17467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 kernel: [ 304.6[ 304.991785][T17467] Call Trace: 65389][T17445] [ 304.996443][T17467] ? clear_bhb_loop[ 305.000785][T17467] dump_stack_lvl+0xf2/0x150 +0x55/0xb0 May [ 305.006766][T17467] dump_stack+0x15/0x1a 18 03:33:26 syzk[ 305.012289][T17467] should_fail_ex+0x223/0x230 aller kern.warn [ 305.018343][T17467] ? allocate_file_region_entries+0xe1/0x330 kernel: [ 304.6[ 305.025784][T17467] should_failslab+0x8f/0xb0 70126][T17445] [ 305.031821][T17467] __kmalloc_cache_noprof+0x4e/0x320 ? clear_bhb_loop[ 305.038399][T17467] allocate_file_region_entries+0xe1/0x330 +0x55/0xb0 May [ 305.045655][T17467] region_chg+0x238/0x2d0 18 03:33:26 syzk[ 305.051282][T17467] hugetlb_fault+0xe11/0x1a70 aller kern.warn [ 305.057339][T17467] handle_mm_fault+0x18f9/0x2ac0 [ 305.063631][T17467] ? __rcu_read_unlock+0x4e/0x70 kernel: [ 304.6[ 305.068603][T17467] ? mt_find+0x72a/0x890 74821][T17445] [ 305.074274][T17467] ? down_read+0x171/0x4b0 entry_SYSCALL_64[ 305.080014][T17467] ? hugetlb_vma_unlock_read+0x8c/0xb0 _after_hwframe+0[ 305.086846][T17467] __get_user_pages+0xf2c/0x2670 x77/0x7f May 18[ 305.093175][T17467] __mm_populate+0x25b/0x3b0 03:33:26 syzkal[ 305.099141][T17467] do_mlock+0x415/0x510 ler kern.warn ke[ 305.104743][T17467] ? putname+0xcf/0xf0 rnel: [ 304.680[ 305.110296][T17467] ? ksys_write+0x167/0x1b0 775][T17445] RIP[ 305.116149][T17467] __x64_sys_mlock+0x36/0x40 : 0033:0x7f4bb49[ 305.122110][T17467] x64_sys_call+0x26b2/0x2dc0 a473c May 18 03[ 305.128161][T17467] do_syscall_64+0xc9/0x1c0 :33:26 syzkaller[ 305.134038][T17467] ? clear_bhb_loop+0x55/0xb0 kern.warn kerne[ 305.140085][T17467] ? clear_bhb_loop+0x55/0xb0 l: [ 304.685212[ 305.146168][T17467] entry_SYSCALL_64_after_hwframe+0x77/0x7f ][T17445] Code: [ 305.153431][T17467] RIP: 0033:0x7f4bb49a5d29 ec 28 48 89 54 2[ 305.159257][T17467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 4 18 48 89 74 24[ 305.180266][T17467] RSP: 002b:00007f4bb2ff6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 305.190049][T17467] RAX: ffffffffffffffda RBX: 00007f4bb4b96080 RCX: 00007f4bb49a5d29 10 89 7c 24 08 [ 305.198044][T17467] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 00000000207d8000 e8 99 93 02 00 4[ 305.207399][T17467] RBP: 00007f4bb2ff6090 R08: 0000000000000000 R09: 0000000000000000 8 8b 54 24 18 48[ 305.216753][T17467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 8b 74 24 10 41 [ 305.226099][T17467] R13: 0000000000000000 R14: 00007f4bb4b96080 R15: 00007ffe1e0d7068 89 c0 8b 7c 24 0[ 305.235551][T17467] 8 31 c0 0f 05 <4[ 305.239423][T17477] FAULT_INJECTION: forcing a failure. [ 305.239423][T17477] name fail_usercopy, interval 1, probability 0, space 0, times 0 8> 3d 00 f0 ff f[ 305.254555][T17477] CPU: 1 UID: 0 PID: 17477 Comm: syz.3.4973 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 305.266512][T17477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 305.276666][T17477] Call Trace: [ 305.280002][T17477] [ 305.282981][T17477] dump_stack_lvl+0xf2/0x150 [ 305.287642][T17477] dump_stack+0x15/0x1a [ 305.291936][T17477] should_fail_ex+0x223/0x230 [ 305.296727][T17477] should_fail+0xb/0x10 [ 305.300929][T17477] should_fail_usercopy+0x1a/0x20 [ 305.305994][T17477] _copy_from_user+0x1e/0xb0 [ 305.310618][T17477] copy_msghdr_from_user+0x54/0x2a0 [ 305.315862][T17477] ? __fget_files+0x17c/0x1c0 [ 305.320607][T17477] __sys_sendmsg+0x13e/0x230 [ 305.325312][T17477] __x64_sys_sendmsg+0x46/0x50 [ 305.330199][T17477] x64_sys_call+0x2734/0x2dc0 [ 305.334974][T17477] do_syscall_64+0xc9/0x1c0 [ 305.339842][T17477] ? clear_bhb_loop+0x55/0xb0 [ 305.344562][T17477] ? clear_bhb_loop+0x55/0xb0 [ 305.349285][T17477] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 305.355290][T17477] RIP: 0033:0x7f04755a5d29 f 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 May 18 03:33:26 syzkaller kern.warn kernel: [ 304.704953][T17445] RSP: 002b:00007f4bb3017030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 May 18 03:33:26 syzkaller kern.warn kernel: [ 304.713402][T17445] RAX: ffffffffffffffda RBX: 00007f4bb4b95fa0 RCX: 00007f4bb49a473c May 18 03:33:26 syzkaller kern.warn kernel: [ 304.721400][T17445] RDX: 000000000000000f RSI: 00007f4bb30170a0 RDI: 0000000000000003 May 18 03:33:26 syzkaller kern.warn kernel: [ 304.729394][T17445] RBP: 00007f4bb3017090 R08: 0000000000000000 R09: 0000000000000000 May 18 03:33:26 syzkaller kern.warn kernel: [ 304.737384][T17445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 May 18 03:33:26 syzkaller kern.warn kernel[ 305.359766][T17477] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 : [ 304.745381][T17445] R13: 0000000000000000 R14: 00007f4bb4b95fa0 R15: 00007ffe1e0d7068 May 18 03:33:26 syzkaller kern.warn kernel: [ 304.753410][T17445] [ 305.359791][T17477] RSP: 002b:00007f0473c17038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 305.359833][T17477] RAX: ffffffffffffffda RBX: 00007f0475795fa0 RCX: 00007f04755a5d29 [ 305.359849][T17477] RDX: 0000000000000890 RSI: 0000000020000340 RDI: 0000000000000003 [ 305.359867][T17477] RBP: 00007f0473c17090 R08: 0000000000000000 R09: 0000000000000000 [ 305.359884][T17477] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 305.359900][T17477] R13: 0000000000000000 R14: 00007f0475795fa0 R15: 00007ffe0315f9d8 [ 305.359925][T17477] May 18 03:33:27 syzkaller kern.notice kernel: [ 304.954365][T17467] FAULT_INJECTION: forcing a failure. May 18 03:33:27 syzkaller kern.notice kernel: [ 304.954365][T17467] name failslab, interval 1, probability 0, space 0, times 0 May 18 03:33:27 syzkaller kern.warn kernel: [ 304.968501][T17467] CPU: 0 UID: 0 PID: 17467 Comm: syz[ 305.620147][T17484] lo speed is unknown, defaulting to 1000 .5.4966 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 May 18 03:33:27 syzkaller kern.warn kernel: [ 304.980329][T17467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 May 18 03:33:27 syzkaller kern.warn kernel: [ 304.991785][T17467] Call Trace: May 18 03:33:27 syzkaller kern.warn kernel: [ 304.996443][T17467] May 18 03:33:27 syzkaller kern.warn kernel: [ 305.000785][T17467] dump_stack_lvl+0xf2/0x150 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.006[ 305.671295][T17484] lo speed is unknown, defaulting to 1000 766][T17467] dump_stack+0x15/0x1a May 18 03:33:27 syzkaller kern.warn kernel: [ 305.012289][T17467] should_f[ 305.687019][T17490] lo speed is unknown, defaulting to 1000 ail_ex+0x223/0x230 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.018343][T17467] ? allocate_file_region_entries+0xe1/0x330 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.025784][T17467] should_failslab+0x8f/0xb0 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.031821][T17467] __kmalloc_cache_noprof+0x4e/0x320 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.038399][T17467] allocate_file_region_entries+0xe1/0x330 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.045655][T17467] region_chg+0x238/0x2d0 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.051282][T17467] hugetlb_fa[ 305.745671][T17490] lo speed is unknown, defaulting to 1000 ult+0xe11/0x1a70 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.057339][T17467] handle_mm_fault+0x18f9/0x2ac0 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.063631][T17467] ? __rcu_read_unlock+0x4e/0x70 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.068603][T17467] ? mt_find+0x72a/0x890 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.074274][T17467] ? down_read+0x171/0x4b0 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.080014][T17467] ? hugetlb_vma_unlock_read+0x8c/0xb0 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.086846][T17467] __get_user_pages+0xf2c/0x2670 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.093175][T17467] __mm_populate+0x25b/0x3b0 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.099141][T17467] do_mlock+0x415/0x510 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.104743][T17467] ? putname+0xcf/0xf0 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.110296][T17467] ? ksys_write+0x167/0x1b0 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.116149][T17467] [ 305.841568][T17494] lo speed is unknown, defaulting to 1000 __x64_sys_mlock+0x36/0x40 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.122110][T17467] x64_sys_call+0x26b2/0x2dc0 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.128161][T17467] do_syscall_64+0xc9/0x1c0 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.134038][T17467] ? clear_bhb_loop+0x55/0xb0 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.1400[ 305.879328][T17494] lo speed is unknown, defaulting to 1000 85][T17467] ? c[ 305.886693][T17501] bridge0: port 3(syz_tun) entered blocking state lear_bhb_loop+0x[ 305.894252][T17501] bridge0: port 3(syz_tun) entered disabled state 55/0xb0 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.146168][T17467] entry_SYSCALL_64_after_hwframe+0x77/0x7f May 18 03:33:27 syzkaller kern.warn kernel: [ 305.153431][T17467] RIP: 0033:0x7f4bb49a5d29 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.159257][T17467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 May 18 03:33:27 syzkaller kern.w[ 305.945585][T17501] syz_tun: entered allmulticast mode arn kernel: [ 305.180266][T17467] RSP: 002b:00007f4bb2ff6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.190049][T17467] RAX: ffffffffffffffda RBX: 00007f4bb4b96080 RCX: 00007f4bb49a5d29 May 18 03:33:27 syzkaller kern.[ 305.974564][T17501] syz_tun: entered promiscuous mode warn kernel: [ 305.198044][T17467] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 00000000207d8000 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.207399][T17467] RBP: 00007f4bb2ff6090 R08: 0000000000000000 R09: 0000000000000000 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.216753][T17467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 May 18 03:33:27 syzkaller kern.warn kernel: [[ 306.016014][T17501] bridge0: port 3(syz_tun) entered blocking state 305.226099][T1[ 306.023619][T17501] bridge0: port 3(syz_tun) entered forwarding state 7467] R13: 0000000000000000 R14: 00007f4bb4b96080 R15: 00007ffe1e0d7068 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.235551][T17467] May 18 03:33:27 syzkaller kern.notice kernel: [ 305.23942May 18 03:33:27 May 18 03:33:27 May 18 03:33:27 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.349285][T17477] entry_SYSCALL_64_after_hwframe+0x77/0x7f May 18 03:33:27 syzkaller kern.warn kernel: [ 305.355290][T17477]May 18 03:33:27 May 18 03:33:27 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.671295][T17484] lo speed is unknown, defaulting to 1000 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.687019][T17490] lo speed is unknown, defaulting to 1000 May 18 03:33:27 syzkaller kern.warn kernel: [ 305.745671][T17490] lo speed is unknown, defaulting to 1000 May 18 03:33:28 syzkaller kern.warn kernel: [ 305.841568][T17494] lo speed is unknown, defaulting to 1000 May 18 03:33:28 syzkaller kern.warn kernel: [ 305.879328][T17494] lo speed is unknown, defaulting to 1000 May 18 03:33:28 syzkaller kern.info kernel: [ 305.886693][T17501] bridge0: port 3(syz_tun) entered blocking state May 18 03:33:28 syzkaller kern.info kernel: [ 305.894252][T17501] bridge0: port 3(syz_tun) entered disabled state May 18 03:33:28 syzkaller kern.info kernel: [ 305.945585][T17501] syz_tun: entered allmulticast mode May 18 03:33:28 syzkaller kern.info kernel: [ 305.974564][T17501] syz_tun: entered promiscuous mode May 18 03:33:28 syzkaller kern.info kernel: [ 306.016014][T17501] bridge0: port 3(syz_tun) entered blocking state May 18 03:33:28 syzkaller kern.info kernel: [ 306.023619][T17501] bridge0: port 3(syz_tun) entered forwarding state [ 306.342417][T17509] lo speed is unknown, defaulting to 1000 May 18 03:33:28 syzkaller kern.warn kernel: [ 306.342417][T17509] lo speed is unknown, defaulting to 1000 [ 306.389656][T17509] lo speed is unknown, defaulting to 1000 May 18 03:33:28 syzkaller kern.warn kernel: [ 306.389656][T17509] lo speed is unknown, defaulting to 1000 [ 307.361096][ T29] kauditd_printk_skb: 1040 callbacks suppressed [ 307.361114][ T29] audit: type=1400 audit(2000000009.510:17685): avc: denied { map_create } for pid=17541 comm="syz.3.4996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 18 03:33:29 syzkaller kern.warn kernel: [ 307.361096][ T29] kauditd_printk_skb: 1040 callbacks suppressed May 18 03:33:29 syzkaller kern.notice kernel: [ 307.361114][ T29] audit: type=1400 audit(2000000009.510:17685): avc: denied { map_create } for pid=17541 comm="syz.3.4996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm[ 307.417242][ T29] audit: type=1400 audit(2000000009.510:17686): avc: denied { prog_load } for pid=17541 comm="syz.3.4996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 _t tclass=bpf pe[ 307.437354][ T29] audit: type=1400 audit(2000000009.510:17687): avc: denied { execmem } for pid=17541 comm="syz.3.4996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 rmissive=0 [ 307.458073][ T29] audit: type=1400 audit(2000000009.510:17688): avc: denied { prog_load } for pid=17539 comm="syz.5.4995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 307.478275][ T29] audit: type=1400 audit(2000000009.510:17689): avc: denied { prog_load } for pid=17539 comm="syz.5.4995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 307.483772][T17543] lo speed is unknown, defaulting to 1000 [ 307.497670][ T29] audit: type=1400 audit(2000000009.510:17690): avc: denied { map_create } for pid=17539 comm="syz.5.4995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 307.523002][ T29] audit: type=1400 audit(2000000009.510:17691): avc: denied { prog_load } for pid=17539 comm="syz.5.4995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 18 03:33:29 [ 307.542383][ T29] audit: type=1400 audit(2000000009.510:17692): avc: denied { prog_load } for pid=17539 comm="syz.5.4995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 syzkaller kern.n[ 307.562929][ T29] audit: type=1400 audit(2000000009.510:17693): avc: denied { prog_load } for pid=17539 comm="syz.5.4995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 otice kernel: [ [ 307.583547][ T29] audit: type=1400 audit(2000000009.510:17694): avc: denied { prog_load } for pid=17539 comm="syz.5.4995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 307.417242][ [ 307.605166][T17543] lo speed is unknown, defaulting to 1000 T29] audit: type=1400 audit(2000000009.510:17686): avc: denied { prog_load } for pid=17541 comm="syz.3.4996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 18 03:33:29 syzkaller kern.notice kernel: [ 307.437354][ T29] audit: type=1400 audit(2000000009.510:17687): avc: denied { execmem } for pid=17541 comm="syz.3.4996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 May 18 03:33:29 syzkaller kern.notice kernel: [ 307.458073][ T29] audit: type=1400 audit(2000000009.510:17688): avc: denied { prog_load } for pid=17539 comm="syz.5.4995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 18 03:33:29 syzkaller kern.notice kernel: [ 307.478275][ T29] audit: type=1400 audit(2000000009.510:17689): avc: denied { prog_load } for pid=17539 comm="syz.5.4995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 18 03:33:29 syzkaller kern.warn kernel: [ 307.483772][T17543] lo speed is unknown, defaulting to 1000 May 18 03:33:29 syzkaller kern.notice kernel: [ 307.497670][ T29] audit: type=1400 audit(2000000009.510:17690): avc: denied { map_create } for pid=17539 comm="syz.5.4995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 18 03:33:29 syzkaller kern.notice kernel: [ 307.523002][ T29] audit: type=1400 audit(2000000009.510:17691): avc: denied { prog_load } for pid=17539 comm="syz.5.4995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 18 03:33:29 syzkaller kern.notice kernel: [ 307.542383][ T29] audit: type=1400 audit(2000000009.510:17692): avc: denied { prog_load } for pid=17539 comm="syz.5.4995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 18 03:33:29 syzkaller kern.notice kernel: [ 307.562929][ T29] audit: type=1400 audit(2000000009.510:17693): avc: denied { prog_load } for pid=17539 comm="syz.5.4995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 18 03:33:29 syzkaller kern.notice kernel: [ 307.583547][ T29] audit: type=1400 audit(2000000009.510:17694): avc: denied { prog_load } for pid=17539 comm="syz.5.4995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 18 03:33:29 syzkaller kern.warn kernel: [ 307.605166][T17543] lo speed is unknown, defaulting to 1000 [ 308.009259][T17566] FAULT_INJECTION: forcing a failure. [ 308.009259][T17566] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 308.022377][T17566] CPU: 0 UID: 0 PID: 17566 Comm: syz.1.5006 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 308.033194][T17566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 308.043321][T17566] Call Trace: [ 308.046662][T17566] [ 308.049612][T17566] dump_stack_lvl+0xf2/0x150 [ 308.054314][T17566] dump_stack+0x15/0x1a [ 308.058533][T17566] should_fail_ex+0x223/0x230 [ 308.063234][T17566] should_fail+0xb/0x10 [ 308.067421][T17566] should_fail_usercopy+0x1a/0x20 [ 308.072503][T17566] _copy_from_iter+0xd5/0xd00 [ 308.077284][T17566] ? kmalloc_reserve+0x16e/0x190 [ 308.082243][T17566] ? __build_skb_around+0x196/0x1f0 [ 308.087469][T17566] ? __alloc_skb+0x21f/0x310 [ 308.092093][T17566] ? __virt_addr_valid+0x1ed/0x250 [ 308.097250][T17566] ? __check_object_size+0x364/0x520 [ 308.102619][T17566] netlink_sendmsg+0x460/0x6e0 [ 308.107519][T17566] ? __pfx_netlink_sendmsg+0x10/0x10 [ 308.112880][T17566] __sock_sendmsg+0x140/0x180 [ 308.117670][T17566] ____sys_sendmsg+0x312/0x410 [ 308.122458][T17566] __sys_sendmsg+0x19d/0x230 [ 308.127262][T17566] __x64_sys_sendmsg+0x46/0x50 [ 308.132129][T17566] x64_sys_call+0x2734/0x2dc0 [ 308.136854][T17566] do_syscall_64+0xc9/0x1c0 [ 308.141426][T17566] ? clear_bhb_loop+0x55/0xb0 [ 308.146135][T17566] ? clear_bhb_loop+0x55/0xb0 [ 308.150837][T17566] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 308.156869][T17566] RIP: 0033:0x7fc8763e5d29 [ 308.161301][T17566] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 308.180985][T17566] RSP: 002b:00007fc874a57038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 308.189495][T17566] RAX: ffffffffffffffda RBX: 00007fc8765d5fa0 RCX: 00007fc8763e5d29 [ 308.197506][T17566] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 308.205648][T17566] RBP: 00007fc874a57090 R08: 0000000000000000 R09: 0000000000000000 [ 308.213650][T17566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 308.221706][T17566] R13: 0000000000000000 R14: 00007fc8765d5fa0 R15: 00007ffdf6467228 [ 308.229708][T17566] May 18 03:33:30 syzkaller kern.notice kernel: [ 308.009259][T17566] FAULT_INJECTION: forcing a failure. May 18 03:33:30 syzkaller kern.notice kernel: [ 308.009259][T17566] name fail_usercopy, interval 1, probability 0, space 0, times 0 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.022377][T17566] CPU: 0 UID: 0 PID: 17566 Comm: syz.1.5006 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.033194][T17566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.043321][T17566] Call Trace: May 18 03:33:30 syzkaller kern.warn kernel: [ 308.046662][T17566] May 18 03:33:30 syzkaller kern.warn kernel: [ 308.049612][T17566] dump_stack_lvl+0xf2/0x150 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.054314][T17566] dump_stack+0x15/0x1a May 18 03:33:30 syzkaller kern.warn kernel: [ 308.058533][T17566] should_fail_ex+0x223/0x230 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.063234][T17566] should_fail+0xb/0x10 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.067421][T17566] should_fail_usercopy+0x1a/0x20 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.072503][T17566] _copy_from_iter+0xd5/0xd00 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.077284][T17566] ? kmalloc_reserve+0x16e/0x190 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.082243][T17566] ? __build_skb_around+0x196/0x1f0 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.087469][T17566] ? __alloc_skb+0x21f/0x310 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.092093][T17566] ? __virt_addr_valid+0x1ed/0x250 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.097250][T17566] ? __check_object_size+0x364/0x520 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.102619][T17566] netlink_sendmsg+0x460/0x6e0 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.107519][T17566] ? __pfx_netlink_sendmsg+0x10/0x10 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.112880][T17566] __sock_sendmsg+0x140/0x180 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.117670][T17566] ____sys_sendmsg+0x312/0x410 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.122458][T17566] __sys_sendmsg+0x19d/0x230 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.127262][T17566] __x64_sys_sendmsg+0x46/0x50 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.132129][T17566] x64_sys_call+0x2734/0x2dc0 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.136854][T17566] do_syscall_64+0xc9/0x1c0 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.141426][T17566] ? clear_bhb_loop+0x55/0xb0 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.146135][T17566] ? clear_bhb_loop+0x55/0xb0 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.150837][T17566] entry_SYSCALL_64_after_hwframe+0x77/0x7f May 18 03:33:30 syzkaller kern.warn kernel: [ 308.156869][T17566] RIP: 0033:0x7fc8763e5d29 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.161301][T17566] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.180985][T17566] RSP: 002b:00007fc874a57038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e May 18 03:33:30 syzkaller kern.warn kernel: [ 308.189495][T17566] RAX: ffffffffffffffda RBX: 00007fc8765d5fa0 RCX: 00007fc8763e5d29 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.197506][T17566] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.205648][T17566] RBP: 00007fc874a57090 R08: 0000000000000000 R09: 0000000000000000 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.213650][T17566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.221706][T17566] R13: 0000000000000000 R14: 00007fc8765d5fa0 R15: 00007ffdf6467228 May 18 03:33:30 syzkaller kern.warn kernel: [ 308.229708][T17566] [ 309.028827][T17604] lo: entered allmulticast mode May 18 03:33:31 syzkaller kern.info kernel: [ 309.028827][T17604] lo: entered allmulticast mode [ 309.053986][T17604] lo: entered promiscuous mode [ 309.058832][T17604] lo: left allmulticast mode May 18 03:33:31 syzkaller kern.info kernel: [ 309.053986][T17604] lo: entered promiscuous mode May 18 03:33:31 syzkaller kern.info kernel: [ 309.058832][T17604] lo: left allmulticast mode [ 309.113657][T17608] FAULT_INJECTION: forcing a failure. [ 309.113657][T17608] name failslab, interval 1, probability 0, space 0, times 0 [ 309.126397][T17608] CPU: 0 UID: 0 PID: 17608 Comm: syz.5.5023 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 309.137276][T17608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 309.147358][T17608] Call Trace: [ 309.150661][T17608] [ 309.153619][T17608] dump_stack_lvl+0xf2/0x150 [ 309.158264][T17608] dump_stack+0x15/0x1a [ 309.162468][T17608] should_fail_ex+0x223/0x230 [ 309.167183][T17608] should_failslab+0x8f/0xb0 [ 309.171827][T17608] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 309.178240][T17608] ? sidtab_sid2str_get+0xb8/0x140 [ 309.183431][T17608] kmemdup_noprof+0x2a/0x60 [ 309.188043][T17608] sidtab_sid2str_get+0xb8/0x140 [ 309.193005][T17608] security_sid_to_context_core+0x1eb/0x2f0 [ 309.198922][T17608] security_sid_to_context+0x27/0x30 [ 309.204261][T17608] selinux_lsmprop_to_secctx+0x2c/0x40 [ 309.209773][T17608] security_lsmprop_to_secctx+0x4a/0x90 [ 309.215421][T17608] audit_log_task_context+0x93/0x1c0 [ 309.220728][T17608] audit_log_task+0xf9/0x1c0 [ 309.225386][T17608] audit_seccomp+0x68/0x130 [ 309.229901][T17608] __seccomp_filter+0x6fa/0x1180 [ 309.234902][T17608] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 309.240710][T17608] ? vfs_write+0x596/0x920 [ 309.245192][T17608] ? __schedule+0x6fa/0x930 [ 309.249709][T17608] __secure_computing+0x9f/0x1c0 [ 309.254710][T17608] syscall_trace_enter+0xd1/0x1f0 [ 309.259816][T17608] do_syscall_64+0xaa/0x1c0 [ 309.264326][T17608] ? clear_bhb_loop+0x55/0xb0 [ 309.269075][T17608] ? clear_bhb_loop+0x55/0xb0 [ 309.273761][T17608] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 309.279758][T17608] RIP: 0033:0x7f4bb49a5d29 [ 309.284380][T17608] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 309.303999][T17608] RSP: 002b:00007f4bb3017038 EFLAGS: 00000246 ORIG_RAX: 00000000000000dd [ 309.312422][T17608] RAX: ffffffffffffffda RBX: 00007f4bb4b95fa0 RCX: 00007f4bb49a5d29 [ 309.320405][T17608] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 309.328388][T17608] RBP: 00007f4bb3017090 R08: 0000000000000000 R09: 0000000000000000 [ 309.336416][T17608] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000001 [ 309.344482][T17608] R13: 0000000000000000 R14: 00007f4bb4b95fa0 R15: 00007ffe1e0d7068 [ 309.352467][T17608] May 18 03:33:31 syzkaller kern.notice kernel: [ 309.113657][T17608] FAULT_INJECTION: forcing a failure. May 18 03:33:31 syzkaller kern.notice kernel: [ 309.113657][T17608] name failslab, interval 1, probability 0, space 0, times 0 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.126397][T17608] CPU: 0 UID: 0 PID: 17608 Comm: syz.5.5023 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.137276][T17608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.147358][T17608] Call Trace: May 18 03:33:31 syzkaller kern.warn kernel: [ 309.150661][T17608] May 18 03:33:31 syzkaller kern.warn kernel: [ 309.153619][T17608] dump_stack_lvl+0xf2/0x150 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.158264][T17608] dump_stack+0x15/0x1a May 18 03:33:31 syzkaller kern.warn kernel: [ 309.162468][T17608] should_fail_ex+0x223/0x230 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.167183][T17608] should_failslab+0x8f/0xb0 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.171827][T17608] __kmalloc_node_track_caller_noprof+0xa8/0x410 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.178240][T17608] ? sidtab_sid2str_get+0xb8/0x140 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.183431][T17608] kmemdup_noprof+0x2a/0x60 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.188043][T17608] sidtab_sid2str_get+0xb8/0x140 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.193005][T17608] security_sid_to_context_core+0x1eb/0x2f0 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.198922][T17608] security_sid_to_context+0x27/0x30 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.204261][T17608] selinux_lsmprop_to_secctx+0x2c/0x40 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.209773][T17608] security_lsmprop_to_secctx+0x4a/0x90 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.215421][T17608] audit_log_task_context+0x93/0x1c0 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.220728][T17608] audit_log_task+0xf9/0x1c0 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.225386][T17608] audit_seccomp+0x68/0x130 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.229901][T17608] __seccomp_filter+0x6fa/0x1180 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.234902][T17608] ? __pfx_proc_fail_nth_write+0x10/0x10 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.240710][T17608] ? vfs_write+0x596/0x920 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.245192][T17608] ? __schedule+0x6fa/0x930 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.249709][T17608] __secure_computing+0x9f/0x1c0 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.254710][T17608] syscall_trace_enter+0xd1/0x1f0 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.259816][T17608] do_syscall_64+0xaa/0x1c0 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.264326][T17608] ? clear_bhb_loop+0x55/0xb0 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.269075][T17608] ? clear_bhb_loop+0x55/0xb0 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.273761][T17608] entry_SYSCALL_64_after_hwframe+0x77/0x7f May 18 03:33:31 syzkaller kern.warn kernel: [ 309.279758][T17608] RIP: 0033:0x7f4bb49a5d29 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.284380][T17608] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.303999][T17608] RSP: 002b:00007f4bb3017038 EFLAGS: 00000246 ORIG_RAX: 00000000000000dd May 18 03:33:31 syzkaller kern.warn kernel: [ 309.312422][T17608] RAX: ffffffffffffffda RBX: 00007f4bb4b95fa0 RCX: 00007f4bb49a5d29 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.320405][T17608] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.328388][T17608] RBP: 00007f4bb3017090 R08: 0000000000000000 R09: 0000000000000000 May 18 03:33:31 syzkaller kern.warn kernel: [ 309.336416][T17608] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000001 May 18 03:33:31 syzkaller kern.warn kernel: [ 3[ 310.842028][T17695] netlink: 'syz.3.5060': attribute type 1 has an invalid length. May 18 03:33:33 syzkaller kern.warn kernel: [ 310.842028][T17695] netlink: 'syz.3.5060': attribute type 1 has an invalid length. [ 311.312013][T17729] lo speed is unknown, defaulting to 1000 May 18 03:33:33 syzkaller kern.warn kernel: [ 311.312013][T17729] lo speed is unknown, defaulting to 1000 [ 311.348305][T17729] lo speed is unknown, defaulting to 1000 May 18 03:33:33 syzkaller kern.warn kernel: [ 311.348305][T17729] lo speed is unknown, defaulting to 1000 [ 311.641166][T17747] FAULT_INJECTION: forcing a failure. [ 311.641166][T17747] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 311.654382][T17747] CPU: 1 UID: 0 PID: 17747 Comm: syz.4.5081 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 311.665290][T17747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 311.675430][T17747] Call Trace: [ 311.678734][T17747] [ 311.681699][T17747] dump_stack_lvl+0xf2/0x150 [ 311.686439][T17747] dump_stack+0x15/0x1a [ 311.690703][T17747] should_fail_ex+0x223/0x230 [ 311.695442][T17747] should_fail+0xb/0x10 [ 311.699637][T17747] should_fail_usercopy+0x1a/0x20 [ 311.704800][T17747] _copy_to_user+0x20/0xa0 [ 311.709254][T17747] simple_read_from_buffer+0xa0/0x110 [ 311.714666][T17747] proc_fail_nth_read+0xf9/0x140 [ 311.719746][T17747] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 311.725431][T17747] vfs_read+0x1a2/0x700 [ 311.729620][T17747] ? __rcu_read_unlock+0x4e/0x70 [ 311.734588][T17747] ? __fget_files+0x17c/0x1c0 [ 311.739454][T17747] ksys_read+0xe8/0x1b0 [ 311.743808][T17747] __x64_sys_read+0x42/0x50 [ 311.748773][T17747] x64_sys_call+0x2874/0x2dc0 [ 311.753480][T17747] do_syscall_64+0xc9/0x1c0 [ 311.758125][T17747] ? clear_bhb_loop+0x55/0xb0 [ 311.762834][T17747] ? clear_bhb_loop+0x55/0xb0 [ 311.767590][T17747] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 311.773740][T17747] RIP: 0033:0x7f791f5f473c [ 311.778184][T17747] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 311.797875][T17747] RSP: 002b:00007f791dc67030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 311.806374][T17747] RAX: ffffffffffffffda RBX: 00007f791f7e5fa0 RCX: 00007f791f5f473c [ 311.814368][T17747] RDX: 000000000000000f RSI: 00007f791dc670a0 RDI: 0000000000000004 [ 311.822352][T17747] RBP: 00007f791dc67090 R08: 0000000000000000 R09: 0000000000000000 [ 311.830348][T17747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 311.838340][T17747] R13: 0000000000000000 R14: 00007f791f7e5fa0 R15: 00007ffcbd0ad848 [ 311.846437][T17747] May 18 03:33:34 syzkaller kern.notice kernel: [ 311.641166][T17747] FAULT_INJECTION: forcing a failure. May 18 03:33:34 syzkaller kern.notice kernel: [ 311.641166][T17747] name fail_usercopy, interval 1, probability 0, space 0, times 0 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.654382][T17747] CPU: 1 UID: 0 PID: 17747 Comm: syz.4.5081 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.665290][T17747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.675430][T17747] Call Trace: May 18 03:33:34 syzkaller kern.warn kernel: [ 311.678734][T17747] May 18 03:33:34 syzkaller kern.warn kernel: [ 311.681699][T17747] dump_stack_lvl+0xf2/0x150 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.686439][T17747] dump_stack+0x15/0x1a May 18 03:33:34 syzkaller kern.warn kernel: [ 311.690703][T17747] should_fail_ex+0x223/0x230 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.695442][T17747] should_fail+0xb/0x10 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.699637][T17747] should_fail_usercopy+0x1a/0x20 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.704800][T17747] _copy_to_user+0x20/0xa0 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.709254][T17747] simple_read_from_buffer+0xa0/0x110 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.714666][T17747] proc_fail_nth_read+0xf9/0x140 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.719746][T17747] ? __pfx_proc_fail_nth_read+0x10/0x10 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.725431][T17747] vfs_read+0x1a2/0x700 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.729620][T17747] ? __rcu_read_unlock+0x4e/0x70 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.734588][T17747] ? __fget_files+0x17c/0x1c0 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.739454][T17747] ksys_read+0xe8/0x1b0 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.743808][T17747] __x64_sys_read+0x42/0x50 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.748773][T17747] x64_sys_call+0x2874/0x2dc0 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.753480][T17747] do_syscall_64+0xc9/0x1c0 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.758125][T17747] ? clear_bhb_loop+0x55/0xb0 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.762834][T17747] ? clear_bhb_loop+0x55/0xb0 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.767590][T17747] entry_SYSCALL_64_after_hwframe+0x77/0x7f May 18 03:33:34 syzkaller kern.warn kernel: [ 311.773740][T17747] RIP: 0033:0x7f791f5f473c May 18 03:33:34 syzkaller kern.warn kernel: [ 311.778184][T17747] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.797875][T17747] RSP: 002b:00007f791dc67030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.806374][T17747] RAX: ffffffffffffffda RBX: 00007f791f7e5fa0 RCX: 00007f791f5f473c May 18 03:33:34 syzkaller kern.warn kernel: [ 311.814368][T17747] RDX: 000000000000000f RSI: 00007f791dc670a0 RDI: 0000000000000004 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.822352][T17747] RBP: 00007f791dc67090 R08: 0000000000000000 R09: 0000000000000000 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.830348][T17747] R10: 0000000000000000 R11: 00[ 312.162910][T17767] lo speed is unknown, defaulting to 1000 00000000000246 R12: 0000000000000001 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.838340][T17747] R13: 0000000000000000 R14: 00007f791f7e5fa0 R15: 00007ffcbd0ad848 May 18 03:33:34 syzkaller kern.warn kernel: [ 311.846437][T17747] May 18 03:33:34 syzkaller kern.warn kernel: [ 312.162910][T17767] lo speed is unknown, defaulting to 1000 [ 312.228188][T17767] lo speed is unknown, defaulting to 1000 May 18 03:33:34 syzkaller kern.warn kernel: [ 312.228188][T17767] lo speed is unknown, defaulting to 1000 [ 312.379686][T17779] block device autoloading is deprecated and will be removed. [ 312.388204][ T29] kauditd_printk_skb: 978 callbacks suppressed [ 312.388220][ T29] audit: type=1400 audit(2000000014.540:18672): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 May 18 03:33:34 syzkaller kern.warn kernel: [ 312.379686][T17779] block device autoloading is deprecated and will be removed. [ 312.427157][T17779] syz.5.5096: attempt to access beyond end of device [ 312.427157][T17779] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 May 18 03:33:34 syzkaller kern.warn kernel: [ 312.388204][ T29] kauditd_printk_skb: 978 callbacks suppressed May 18 03:33:34 syzkaller kern.notice kernel: [ 312.388220][ T29] audit: type=1400 audit(2000000014.540:18672): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:3[ 312.482380][ T29] audit: type=1400 audit(2000000014.570:18673): avc: denied { read write } for pid=17781 comm="syz.0.5097" name="loop0" dev="devtmpfs" ino=591 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 3:34 syzkaller k[ 312.506955][ T29] audit: type=1400 audit(2000000014.600:18674): avc: denied { create } for pid=17772 comm="syz.3.5093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 ern.info kernel:[ 312.529285][ T29] audit: type=1400 audit(2000000014.600:18675): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 312.427157][[ 312.552549][ T29] audit: type=1400 audit(2000000014.600:18676): avc: denied { create } for pid=17772 comm="syz.3.5093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 T17779] syz.5.50[ 312.574970][ T29] audit: type=1400 audit(2000000014.600:18677): avc: denied { prog_load } for pid=17772 comm="syz.3.5093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 96: attempt to a[ 312.595252][ T29] audit: type=1400 audit(2000000014.600:18678): avc: denied { prog_load } for pid=17772 comm="syz.3.5093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 ccess beyond end[ 312.615836][ T29] audit: type=1400 audit(2000000014.600:18679): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 of device May [ 312.639269][ T29] audit: type=1400 audit(2000000014.600:18680): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 18 03:33:34 syzk[ 312.639306][ T29] audit: type=1400 audit(2000000014.600:18681): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 aller kern.info kernel: [ 312.427157][T17779] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 May 18 03:33:34 syzkaller kern.notice kernel: [ 312.482380][ T29] audit: type=1400 audit(2000000014.570:18673): avc: denied { read write } for pid=17781 comm="syz.0.5097" name="loop0" dev="devtmpfs" ino=591 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:de May 18 03:33:34 syzkaller kern.notice kernel: [ 312.506955][ T29] audit: type=1400 audit(2000000014.600:18674): avc: denied { create } for pid=17772 comm="syz.3.5093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permi May 18 03:33:34 syzkaller kern.notice kernel: [ 312.529285][ T29] audit: type=1400 audit(2000000014.600:18675): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:33:34 syzkaller kern.notice kernel: [ 312.552549][ T29] audit: type=1400 audit(2000000014.600:18676): avc: denied { create } for pid=17772 comm="syz.3.5093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permi May 18 03:33:34 syzkaller kern.notice kernel: [ 312.574970][ T29] audit: type=1400 audit(2000000014.600:18677): avc: denied { prog_load } for pid=17772 comm="syz.3.5093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 18 03:33:34 syzkaller kern.notice kernel: [ 312.595252][ T29] audit: type=1400 audit(2000000014.600:18678): avc: denied { prog_load } for pid=17772 comm="syz.3.5093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 May 18 03:33:34 syzkaller kern.notice kernel: [ 312.615836][ T29] audit: type=1400 audit(2000000014.600:18679): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:33:34 syzkaller kern.notice kernel: [ 312.639269][ T29] audit: type=1400 audit(2000000014.600:18680): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass May 18 03:33:34 syzkaller kern.notice kernel: [ 312.639306][ T29] audit: type=1400 audit(2000000014.600:18681): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass [ 313.500212][T17838] lo speed is unknown, defaulting to 1000 May 18 03:33:35 syzkaller kern.warn kernel: [ 313.500212][T17838] lo speed is unknown, defaulting to 1000 [ 313.518789][T17838] lo speed is unknown, defaulting to 1000 May 18 03:33:35 syzkaller kern.warn kernel: [ 313.518789][T17838] lo speed is unknown, defaulting to 1000 [ 313.647560][T12315] ================================================================== [ 313.655693][T12315] BUG: KCSAN: data-race in shmem_getattr / shmem_recalc_inode [ 313.663189][T12315] [ 313.665533][T12315] read-write to 0xffff8881193ac2f8 of 8 bytes by task 17810 on cpu 0: [ 313.673704][T12315] shmem_recalc_inode+0x36/0x1b0 [ 313.678665][T12315] shmem_get_folio_gfp+0x7ce/0xd90 [ 313.683822][T12315] shmem_write_begin+0xa2/0x180 [ 313.688785][T12315] generic_perform_write+0x1a8/0x4a0 [ 313.694120][T12315] shmem_file_write_iter+0xc2/0xe0 [ 313.699262][T12315] __kernel_write_iter+0x24b/0x4e0 [ 313.704395][T12315] dump_user_range+0x3ac/0x550 [ 313.709196][T12315] elf_core_dump+0x1bdc/0x1ce0 [ 313.713989][T12315] do_coredump+0x1898/0x1f40 [ 313.718628][T12315] get_signal+0xd4f/0x1000 [ 313.723078][T12315] arch_do_signal_or_restart+0x95/0x4b0 [ 313.728655][T12315] irqentry_exit_to_user_mode+0xa7/0x120 [ 313.734332][T12315] irqentry_exit+0x12/0x50 [ 313.738785][T12315] asm_exc_page_fault+0x26/0x30 [ 313.743742][T12315] [ 313.746071][T12315] read to 0xffff8881193ac2f8 of 8 bytes by task 12315 on cpu 1: [ 313.753718][T12315] shmem_getattr+0x42/0x200 [ 313.758239][T12315] vfs_statx_path+0x171/0x2d0 [ 313.762980][T12315] vfs_statx+0xe1/0x170 [ 313.767156][T12315] __se_sys_newfstatat+0xdc/0x300 [ 313.772326][T12315] __x64_sys_newfstatat+0x55/0x70 [ 313.777402][T12315] x64_sys_call+0x236d/0x2dc0 [ 313.782103][T12315] do_syscall_64+0xc9/0x1c0 [ 313.786620][T12315] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 313.792539][T12315] [ 313.794875][T12315] value changed: 0x0000000000001bff -> 0x0000000000001c00 [ 313.801999][T12315] [ 313.804332][T12315] Reported by Kernel Concurrency Sanitizer on: [ 313.810503][T12315] CPU: 1 UID: 0 PID: 12315 Comm: syz-executor Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 313.821470][T12315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 313.831667][T12315] ================================================================== May 18 03:33:36 syzkaller kern.err kernel: [ 313.647560][T12315] ================================================================== May 18 03:33:36 syzkaller kern.err kernel: [ 313.655693][T12315] BUG: KCSAN: data-race in shmem_getattr / shmem_recalc_inode May 18 03:33:36 syzkaller kern.err kernel: [ 313.663189][T12315] May 18 03:33:36 syzkaller kern.err kernel: [ 313.665533][T12315] read-write to 0xffff8881193ac2f8 of 8 bytes by task 17810 on cpu 0: May 18 03:33:36 syzkaller kern.warn kernel: [ 313.673704][T12315] shmem_recalc_inode+0x36/0x1b0 May 18 03:33:36 syzkaller kern.warn kernel: [ 313.678665][T12315] shmem_get_folio_gfp+0x7ce/0xd90 May 18 03:33:36 syzkaller kern.warn kernel: [ 313.683822][T12315] shmem_write_begin+0xa2/0x180 May 18 03:33:36 syzkaller kern.warn kernel: [ 313.688785][T12315] generic_perform_write+0x1a8/0x4a0 May 18 03:33:36 syzkaller kern.warn kernel: [ 313.694120][T12315] shmem_file_write_iter+0xc2/0xe0 May 18 03:33:36 syzkaller kern.warn kernel: [ 313.699262][T12315] __kernel_write_iter+0x24b/0x4e0 May 18 03:33:36 syzkaller kern.warn kernel: [ 313.704395][T12315] dump_user_range+0x3ac/0x550 May 18 03:33:36 syzkaller kern.warn kernel: [ 313.709196][T12315] elf_core_dump+0x1bdc/0x1ce0 May 18 03:33:36 syzkaller kern.warn kernel: [ 313.713989][T12315] do_coredump+0x1898/0x1f40 May 18 03:33:36 syzkaller kern.warn kernel: [ 313.718628][T12315] get_signal+0xd4f/0x1000 May 18 03:33:36 syzkaller kern.warn kernel: [ 313.723078][T12315] arch_do_signal_or_restart+0x95/0x4b0 May 18 03:33:36 syzkaller kern.warn kernel: [ 313.728655][T12315] irqentry_exit_to_user_mode+0xa7/0x120 May 18 03:33:36 syzkaller kern.warn kernel: [ 313.734332][T12315] irqentry_exit+0x12/0x50 May 18 03:33:36 syzkaller kern.warn kernel: [ 313.738785][T12315] asm_exc_page_fault+0x26/0x30 May 18 03:33:36 syzkaller kern.err kernel: [ 313.743742][T12315] May 18 03:33:36 syzkaller kern.err kernel: [ 313.746071][T12315] read to 0xffff8881193ac2f8 of 8 bytes by task 12315 on cpu 1: May 18 03:33:36 syzkaller kern.warn kernel: [ 313.753718][T12315] shmem_getattr+0x42/0x200 May 18 03:33:36 syzkaller kern.warn kernel: [ 313.758239][T12315] vfs_statx_path+0x171/0x2d0 May 18 03:33:36 syzkaller kern.warn kernel: [ 313.762980][T12315] vfs_statx+0xe1/0x170 May 18 03:33:36 syzkaller kern.warn kernel: [ 313.767156][T12315] __se_sys_newfstatat+0xdc/0x300 May 18 03:33:36 syzkaller kern.warn kernel: [ 313.772326][T12315] __x64_sys_newfstatat+0x55/0x70 May 18 03:33:36 syzkaller kern.warn kernel: [ 313.777402][T12315] x64_sys_call+0x236d/0x2dc0 May 18 03:33:36 syzkaller kern.warn kernel: [ 313.782103][T12315] do_syscall_64+0xc9/0x1c0 May 18 03:33:36 syzkaller kern.warn kernel: [ 313.786620][T12315] entry_SYSCALL_64_after_hwframe+0x77/0x7f May 18 03:33:36 syzkaller kern.err kernel: [ 313.792539][T12315] May 18 03:33:36 syzkaller kern.err kernel: [ 313.794875][T12315] value changed: 0x0000000000001bff -> 0x0000000000001c00 May 18 03:33:36 syzkaller kern.err kernel: [ 313.801999][T12315] May 18 03:33:36 syzkaller kern.err kernel: [ 313.804332][T12315] Reported by Kernel Concurrency Sanitizer on: May 18 03:33:36 syzkaller kern.warn kernel: [ 313.810503][T12315] CPU: 1 UID: 0 PID: 12315 Comm: syz-executor Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 May 18 03:33:36 syzkaller kern.warn kernel: [ 313.821470][T12315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 May 18 03:33:36 syzkaller kern.err kernel: [ 313.831667][T12315] ==================================================================