last executing test programs: 2.961629207s ago: executing program 2 (id=304): r0 = memfd_create(&(0x7f0000001600)='[\v\xdbX\xae[\x1aYl\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe0\xbe\xefX\xfd+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\xd2q#\xc6\xca\x97\x9d\xcb\x1e\x80\xd6\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec=\x9e\xc3\xfdkd\x0fl5\xf3\xbe\" 6\r<\xea\x8dz\xcf6\x99\x91\xear8p\xaaR\xd5\xa6\xab#N>\x9a\xdf\xea\x009\xfbB\xc1\xd0_\xc0\'Z\xeb\xd8\xaf\xf0\'J\xe2\xff\xe5x*;(p\xf7p\xce\xbb\xa7\xfe\x04\xd0t\x81\x1a\x1b?m/\x1ex\xf8\x88^\xbaU\xb9\xa6\xab\x8d\a\xa6\"\xd9\x13\xeb\xe2\rh\x8dsx\xaa!\xd5Q\xf8\xce*\x95\x0es\xfaZ\x94t\x19\xdc\xdc\xcf\xb5F\xef\xfclz\x83\x17\x91\xca\xb0Ar\xad\xc0\xb6i\xef\xf1\xdd4\x8c{8\x0f\x9a\xa2O>\xb9\xfc\x01\fW$\xd9\xca\xf2/\xbe\x8ey\xd33\xb8\xd1\xa0\xe4E\x13\xc9\x8e6m\xe7\x88\xbak|\xdc4\x00\xf1c\xeb&j\xd5Be\xcb\xd3\xfb\x13\xac\xc3A\x90\xee0\x14x\x11\x92\x83\bI \x05D\xb0\xeb]_\xf3\xd7\x19\xd2\xf7:\xebl\xff\xbf0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r4, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x1, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r5, 0x11e, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x63, 0x10, &(0x7f0000002e00), &(0x7f0000001000), 0x8, 0xa0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r5, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x25, 0x0, 0x1, 0xf, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x18, 0x4, 0x1, 0x5, 0x810, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x0, @void, @value, @void, @value}, 0x50) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000440)={0x1b, 0x0, 0x0, 0x8, 0x0, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xdc2, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x3, 0x0, @void, @value, @void, @value}, 0x50) r11 = syz_open_dev$vcsu(&(0x7f0000000540), 0xd, 0x311000) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x2, 0x1d, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xe0}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@cb_func={0x18, 0x7}, @exit, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x100}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0x71, &(0x7f0000000240)=""/113, 0x40f00, 0x41, '\x00', r4, @fallback=0x16, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300)={0x0, 0x2, 0x1772, 0x1ff}, 0x10, 0x0, 0xffffffffffffffff, 0x9, &(0x7f0000000580)=[0x1, r7, 0xffffffffffffffff, r0, r8, r9, r10, r11], &(0x7f00000005c0)=[{0x1, 0x4, 0xa, 0x9}, {0x0, 0x5, 0x0, 0x3}, {0x3, 0x3, 0x2, 0xc}, {0x2, 0x2, 0x2, 0x9}, {0x3, 0x5, 0xe, 0xb}, {0x5, 0x2, 0x9, 0x2}, {0x4, 0x5, 0x10, 0xa}, {0x4, 0x5, 0x5, 0x4}, {0x1, 0x2, 0x4, 0x1}], 0x10, 0x9, @void, @value}, 0x94) 2.647960331s ago: executing program 0 (id=309): syz_emit_ethernet(0x16, &(0x7f0000000c00)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @broadcast, @void, {@llc={0x4, {@snap={0xaa, 0x0, "dc", "898122", 0x892f}}}}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, &(0x7f00000003c0)='wg1\x00', 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x30, 0x3, 0x0, 0xfffff038}, {0x80000006, 0xfd, 0x0, 0x4}]}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 2.517970673s ago: executing program 3 (id=310): ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vxcan0\x00', 0x0}) r1 = syz_io_uring_complete(0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x0, 0x0}, 0x8) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x17, &(0x7f0000000240)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xb}}, @exit, @printk={@i}, @func={0x85, 0x0, 0x1, 0x0, 0x1}], &(0x7f0000000300)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x2, 0xf, 0x6, 0x80}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x9, 0x7, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3}, [@map_idx_val={0x18, 0x1, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000040)='GPL\x00', 0xfffffff8, 0xd3, &(0x7f0000000080)=""/211, 0x41000, 0x0, '\x00', r0, @cgroup_sock=0xf, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x2, 0x7, 0x8a, 0x2}, 0x10, r2, r3, 0x9, 0x0, &(0x7f0000000440)=[{0x1, 0x5, 0x2, 0x8}, {0x3, 0x1, 0x6, 0x6}, {0x5, 0x1, 0x1, 0x5}, {0x5, 0x1, 0x5, 0x5}, {0x5, 0x1, 0x3, 0x9}, {0x0, 0x4, 0xf, 0x1}, {0x1, 0x4, 0x1, 0x1}, {0x4, 0x8, 0x10, 0x2}, {0x4, 0x5, 0xa, 0x1}], 0x10, 0x6, @void, @value}, 0x94) r5 = accept4$nfc_llcp(r1, &(0x7f00000005c0), &(0x7f0000000640)=0x60, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680)={0x0}, &(0x7f00000006c0)=0xc) fcntl$lock(r5, 0x6, &(0x7f0000000700)={0x2, 0x1, 0x1, 0x7, r6}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) r7 = fsopen(&(0x7f0000000740)='ext3\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r7, 0x6, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000780)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, &(0x7f00000007c0)=[0x0, 0x0, 0x0], &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x36, &(0x7f0000000840)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0xd0, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) sendmsg$NFT_MSG_GETFLOWTABLE(r1, &(0x7f0000000b40)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000ac0)={0x2c, 0x17, 0xa, 0x5, 0x0, 0x0, {0x3, 0x0, 0x5}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x810}, 0x0) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000b80)='cq_drain_complete\x00', r3, 0x0, 0xd}, 0x18) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r3, 0xf501, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000c00), r1) mknodat$loop(r1, &(0x7f0000000c40)='./file0\x00', 0x2000, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r9 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r9, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e40)={&(0x7f0000000c80)={0x2, 0x12, 0x9, 0x0, 0x33, 0x0, 0x70bd2c, 0x25dfdbfd, [@sadb_address={0x5, 0x7, 0xff, 0x20, 0x0, @in6={0xa, 0x4e20, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}}, @sadb_x_sa2={0x2, 0x13, 0x3, 0x0, 0x0, 0x70bd29, 0x3501}, @sadb_address={0x5, 0x17, 0x33, 0x0, 0x0, @in6={0xa, 0x4e20, 0x7, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4}}, @sadb_x_nat_t_type={0x1, 0x14, 0xfb}, @sadb_key={0x1a, 0x8, 0x610, 0x0, "ed34c98a47c4a745b06d6964ea1c5bec64a887743344926ce280ca333b1340067365f57d107651ea6116e6725018e6234ee4bb548028bfb0bc1bb5c57da54f86d431a3dcecddea0e87a5ec3efcf637a1bab2d8f1a3756b92028fcd2381e44100e7badb8d26479bc967be5a30be26498f1ff4dbdd8b67b67654e2766e80420d8922fab21f65ef3543435d17478d9c46505179f5bb7221d26fcfef30b18beaea814a282e8921d1c7423dfbe6b59e3389f3c68958704b80e84098c3449827d8faeffe5f"}, @sadb_x_nat_t_type={0x1, 0x14, 0x6}, @sadb_x_sec_ctx={0x9, 0x18, 0x19, 0x8, 0x3f, "fc0e718f7d9487dacf8dab7d9a2dd87564b227f1bb5aa68065c744e9bf7b3e8313d36a8acd607f6c5184448e7115050397d923c60cf705ccf6ca732a1af97b"}]}, 0x198}}, 0x800) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000ec0)=@base={0x18, 0x5, 0x5, 0x8000, 0x8000, r1, 0x10001, '\x00', 0x0, r1, 0x3, 0x0, 0x1, 0x0, @value=r1, @void, @void, @value}, 0x50) sendmsg$L2TP_CMD_SESSION_CREATE(r3, &(0x7f0000001040)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001000)={&(0x7f0000000f80)={0x54, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_vlan\x00'}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x1, 0x0}}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @broadcast}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x10}, 0x8800) r10 = socket(0x27, 0x4, 0xc) r11 = syz_genetlink_get_family_id$tipc(&(0x7f00000010c0), r1) sendmsg$TIPC_CMD_DISABLE_BEARER(r10, &(0x7f0000001180)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001140)={&(0x7f0000001100)={0x2c, r11, 0x400, 0x70bd28, 0x25dfdbfb, {{}, {}, {0x10, 0x13, @udp='udp:syz0\x00'}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x50}, 0x844) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f00000011c0)=r4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r10, 0x6, 0x14, &(0x7f0000001200)=0x1, 0x4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000001240)={{0x1, 0x1, 0x18, r8, {0x2}}, './file0\x00'}) ioctl$sock_SIOCDELDLCI(r9, 0x8981, &(0x7f0000001280)={'ip6gretap0\x00', 0x7ff}) 2.517601993s ago: executing program 1 (id=311): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x65, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8000) syz_usb_disconnect(r2) syz_usb_connect(0x0, 0x36, &(0x7f0000000040)=ANY=[], 0x0) ioctl$EVIOCGBITSW(r2, 0x40095505, 0x0) 2.467016224s ago: executing program 3 (id=312): r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$gtp(&(0x7f00000000c0), r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r2, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], 0x0, 0x2d, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000200), &(0x7f0000000240), 0x8, 0x30, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) sendmsg$GTP_CMD_ECHOREQ(r2, &(0x7f0000000500)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x8c, r3, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@GTPA_FAMILY={0x5, 0xd, 0x6}, @GTPA_MS_ADDR6={0x14, 0xc, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xc}}}, @GTPA_PEER_ADDR6={0x14, 0xb, @local}, @GTPA_TID={0xc, 0x3, 0x4}, @GTPA_LINK={0x8, 0x1, r4}, @GTPA_MS_ADDR6={0x14, 0xc, @local}, @GTPA_TID={0xc, 0x3, 0x2}, @GTPA_PEER_ADDR6={0x14, 0xb, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000030) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0x1, &(0x7f0000000540)=@raw=[@call={0x85, 0x0, 0x0, 0x9e}], &(0x7f0000000580)='GPL\x00', 0x93dcc7d, 0xc1, &(0x7f00000005c0)=""/193, 0x40f00, 0x0, '\x00', r4, @fallback=0x8, r2, 0x8, &(0x7f00000006c0)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000700)={0x2, 0xa, 0xc59, 0x5}, 0x10, r5, 0xffffffffffffffff, 0x3, &(0x7f0000000740)=[r0, r2, r2, r2, r2], &(0x7f0000000780)=[{0x0, 0x3, 0x10}, {0x1, 0x2, 0x3, 0x9}, {0xffffffff, 0x1, 0x9, 0x8}], 0x10, 0x8, @void, @value}, 0x94) faccessat(r2, &(0x7f0000000880)='./file0\x00', 0x40) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000008c0)={0xf, 0x0, "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"}) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000c80)={0x0, 0x9, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x2, 0x17, &(0x7f0000000a00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4f, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000ac0)='syzkaller\x00', 0xfff, 0xfa, &(0x7f0000000b00)=""/250, 0x40f00, 0x20, '\x00', 0x0, @fallback=0x29, r2, 0x8, &(0x7f0000000c00)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000c40)={0x5, 0x3, 0x5b, 0x6000000}, 0x10, r5, 0xffffffffffffffff, 0xa, &(0x7f0000000cc0)=[r2, r2, r0, r2, r0, r7, r0], &(0x7f0000000d00)=[{0x5, 0x3, 0xd}, {0x1, 0x5, 0xe, 0x8}, {0x3, 0x5, 0x4, 0x1}, {0x2, 0x5, 0x7, 0x2}, {0x2, 0x4, 0x5, 0x7}, {0x4, 0x4, 0x9, 0xc}, {0x5, 0x2, 0x5, 0x2}, {0x4, 0x1, 0xd, 0x6}, {0x1, 0x3, 0x4, 0x3}, {0x3, 0x2, 0x1, 0x5}], 0x10, 0x100, @void, @value}, 0x94) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000e80)=0x19) pause() r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000f00), r0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000f40)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r2, &(0x7f0000001040)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001000)={&(0x7f0000000f80)={0x50, r8, 0x21, 0x70bd2a, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r9}, @val={0xc, 0x99, {0x6, 0x24}}}}, [@chandef_params=[@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xfffffff8}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x9}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x8827}], @NL80211_ATTR_DURATION={0x8, 0x57, 0x8}, @chandef_params]}, 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x20005000) r10 = openat$cgroup_ro(r2, &(0x7f0000001080)='blkio.bfq.empty_time\x00', 0x0, 0x0) r11 = openat$nvram(0xffffffffffffff9c, &(0x7f0000001240), 0x2000, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x5, 0x6, &(0x7f00000010c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x40}, [@generic={0x9, 0x9, 0x1, 0x1, 0xe942}, @call={0x85, 0x0, 0x0, 0xae}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000001100)='GPL\x00', 0x0, 0xf0, &(0x7f0000001140)=""/240, 0x41100, 0x30, '\x00', r4, @fallback=0xdf567ccb1bd903b7, r11, 0x8, &(0x7f0000001280)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000012c0)={0x5, 0x10, 0x8, 0x7}, 0x10, r5, r2, 0x0, &(0x7f0000001300)=[0x1, 0x1, r2], 0x0, 0x10, 0x80000000, @void, @value}, 0x94) r13 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001440), r10) sendmsg$TIPC_NL_NAME_TABLE_GET(r10, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000014c0)={&(0x7f0000001480)={0x20, r13, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xd}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x5) ioctl$TCSBRKP(r0, 0x5425, 0x8000000000000000) getsockopt$inet_sctp_SCTP_NODELAY(r10, 0x84, 0x3, &(0x7f0000001540), &(0x7f0000001580)=0x4) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r10, &(0x7f0000001680)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001640)={&(0x7f0000001600)={0x14, 0x7, 0x1, 0x401, 0x0, 0x0, {0x5, 0x0, 0x5}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc80c0}, 0x41) ioctl$FS_IOC_FSSETXATTR(r12, 0x401c5820, &(0x7f00000016c0)={0x500, 0xfff, 0x8, 0x1, 0xffff}) truncate(&(0x7f0000001700)='./file0\x00', 0xffffffffffffffff) r14 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r14, 0x8933, &(0x7f0000001740)) r15 = mmap$IORING_OFF_CQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x50, r2, 0x8000000) syz_io_uring_submit(r15, 0x0, &(0x7f00000018c0)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x40, &(0x7f0000001880)=[r10, r6, r10], 0x3, 0x0, 0x1}) 2.369456315s ago: executing program 2 (id=314): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000001e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r4}, 0x10) r5 = getpgrp(0xffffffffffffffff) r6 = gettid() kcmp(r5, r6, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) socket$nl_netfilter(0x10, 0x3, 0xc) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r8) sendmsg$NLBL_MGMT_C_ADDDEF(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="01000000000000000000040000e41300050003030000000a0000005dc000000000010800020005000000140006"], 0x4c}, 0x1, 0x0, 0x0, 0x8004}, 0x4040000) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 2.224028828s ago: executing program 0 (id=316): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002300)='net/ip6_mr_cache\x00') lseek(r0, 0x2b65, 0x2) r1 = openat(r0, 0x0, 0x42, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xb, &(0x7f0000000180)=ANY=[@ANYRES64=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x21, 0x800000000004, @tid=r2}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x200, 0x0) preadv2(r3, &(0x7f0000000180)=[{&(0x7f0000000000)=""/167, 0xa7}], 0x1, 0x0, 0x4, 0x1) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0x4, 0x41, 0x7, 0x6, 0x77b66bbf075a87aa, @mcast2, @dev={0xfe, 0x80, '\x00', 0x31}, 0x700, 0x80, 0x23a, 0x10}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00'}, 0x10) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, &(0x7f0000001780)=0x100000, 0x4) close_range(r4, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0x2) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000001b80)="4476c8a3c3af5369bdfd752ec45c83c8", 0x10) syz_emit_ethernet(0x76, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.604781107s ago: executing program 3 (id=319): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0xe0c81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000002c0)={0x3, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x1e, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32}], 0x1001a) write$sndseq(r0, &(0x7f0000000080)=[{0xd5, 0x8, 0xa, 0x2, @tick=0x7, {0x9, 0x4e}, {0x6, 0x29}, @result={0x1, 0xfffffffa}}, {0x18, 0x46, 0xfd, 0xff, @tick=0x2, {0x1, 0xbb}, {0x9, 0x80}, @control={0x40, 0x8, 0x800}}, {0xfc, 0x7f, 0x6, 0x5, @tick=0x6, {0x6, 0xde}, {0x8, 0x70}, @time=@tick=0x2}, {0x6, 0xf, 0x7, 0x9, @tick=0xfff, {0x0, 0x7}, {0x40, 0x40}, @connect={{0xfa, 0x8}, {0x0, 0xa}}}], 0x70) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000300)="d8000000180081054e81f782db4cb904021d080406037c09e8fe55a10a0015400400142603600e122f00160006000400a8000600200003400700027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b31d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025cc40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de603000000e4edef3d93452a92954b43370e9703920723f9a94100"/216, 0xd8}], 0x1, 0x0, 0x0, 0x4a0f0000}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x7a1eb483e7f4d138, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff, 0xee01}}, './file0\x00'}) ioprio_get$uid(0x3, r3) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f0000000100)={0x4, &(0x7f0000000080)=[{0x1100, 0x5, 0xff, 0x8afb}, {0x0, 0x4, 0x8, 0x1d3}, {0x2, 0xf, 0x1, 0x6}, {0x4, 0x3, 0x0, 0x5}]}) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0xffffffffffffffc4) r5 = socket$inet(0x2, 0x1, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x3) r7 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000c80)='./file1\x00', 0x210000, &(0x7f0000000280)={[{@jqfmt_vfsv1}, {}, {@quota}, {@noauto_da_alloc}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@lazytime}, {@noauto_da_alloc}, {@stripe={'stripe', 0x3d, 0x5}}, {@orlov}]}, 0xfc, 0x56f, &(0x7f0000003780)="$eJzs3d9rW1UcAPDvTdPup66DMdQHGezByVy6tv6YIDgfRYcDfZ+hzcpouowmHWsduD24F19kCCIOxD/Adx+H/4B/xUAHQ0bRBxEiN73psjZp2i4z2fL5wG3Pyb23535z7vf2nNyEBDC0jqU/chEvR8Q3ScShlnX5yFYeW9tu9eH1mXRJol7/9M8kkuyx5vZJ9vtAVnkpIn79KuJkbnO71eWV+WK5XFrM6hO1hSsT1eWVU5cWinOludLlqenpM29NT737zts9i/X1839//8ndD898fXz1u5/vH76dxNk4mK1rjeMJ3GitHCv+m5VG4+yGDSd70NggSfp9AOzKSJbno5FeAw7FSJb1wPPvy4ioA0Mqkf8wpJrjgObcvkfz4GfGgw/WJkCN2Mda48+vvTYSextzo/2ryWMzo3S+O96D9tM2fvnjzu10ia1fh9jXpQ6wIzduRsTpfH7z9T/Jrn+7d7rx4vHWNrYxbP9/oJ/upuOfN9qN/3Lr459oM/450CZ3d6N7/ufu96CZjtLx33ttx7/rl67xkaz2QmPMN5pcvFQunY6IFyPiRNS73vo4s3qv3mld6/gvXdL2m2PB7Dju5/c8vs9ssVaMiLFdhvyYBzcjXsm3iz9Z7/+kTf+nz8f5bbZxtHTn1U7rusf/dNV/initbf8/6tZk6/uTE43zYaJ5Vmz2162jv3Vqv9/xp/2/f+v4x5PW+7XVnbfx495/Sp3W7fb8H0s+a5SbSXCtWKstTkaMJR9vfnzq0b7NenP7NP4Tx7e+/rU7/9PJ1+fbjP/WkVsdNx2E/p/dUf/vvHDvoy9+6NT+9vr/zUbpRPZIdv1rLztXtnuAT/r8AQAAAAAAwCDJRcTBSHKF9XIuVyisvb/jSOzPlSvV2smLlaXLs9H4rOx4jOaad7oPtbwfYjJ7P2yzPrWhPh0RhyPi25F9jXphplKe7XfwAAAAAAAAAAAAAAAAAAAAMCAOdPj8f+r3kX4fHfDUNb7YYE+/jwLoh65f+d+Lb3oCBlLX/AeeW/Ifhpf8h+El/2F4yX8YXvIfhpf8h+El/wEAAAAAAAAAAAAAAAAAAAAAAAAAAKCnzp87ly711YfXZ9L67NXlpfnK1VOzpep8YWFppjBTWbxSmKtU5sqlwkxlodvfK1cqVyanYunaRK1UrU1Ul1cuLFSWLtcuXFoozpUulEb/l6gAAAAAAAAAAAAAAAAAAADg2VJdXpkvlsulRYWOhfdjIA7jaQa4Zle75wclCoUOhZtZ9+5srz5elAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABgg/8CAAD//4yLMZo=") r8 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x115) getdents(r7, &(0x7f0000000380)=""/190, 0x3c) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$PPPIOCNEWUNIT(r9, 0xc004743e, &(0x7f0000000340)) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r10, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r10, 0x4004743a, &(0x7f0000000300)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x3c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000440)='fsi_master_gpio_crc_rsp_error\x00', r8, 0x0, 0x9}, 0x18) r11 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x75) write$RDMA_USER_CM_CMD_LISTEN(r11, &(0x7f0000000180)={0x7, 0x8, 0xfa00, {r12, 0x9}}, 0x10) 1.337223251s ago: executing program 1 (id=320): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000020000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = memfd_secret(0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa, 0x11, r2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) syz_mount_image$iso9660(&(0x7f0000002900), &(0x7f0000000000)='./file0\x00', 0x2, &(0x7f00000002c0)=ANY=[], 0x1, 0x5b1, &(0x7f0000001000)="$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") r5 = socket$unix(0x1, 0x1, 0x0) bind$unix(r5, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) bind$packet(r6, &(0x7f0000000300)={0x11, 0xf6, r7, 0x1, 0x0, 0x6, @remote}, 0x14) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) close(r6) epoll_pwait2(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={[0x7b0]}, 0x8) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r9}, 0x10) socket$pppoe(0x18, 0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$inet(0x2, 0x2, 0x1) 1.267642581s ago: executing program 2 (id=321): r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r1 = memfd_create(&(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x3) io_submit(0x0, 0x1, &(0x7f0000000100)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2, 0x1, r1, &(0x7f0000000080)="20ec054d16a6869c4ff867f8b635474d8f733d22518925cc1b01706379a87d37f971df30c738739518ae75c03924b946c535fcc5b0f8073a221d85f18f", 0x3d, 0x3ff, 0x0, 0x3, r0}]) pwritev2(r1, &(0x7f0000000180)=[{&(0x7f0000000140)="ee70054bcdf481a70c002b51a3cd3d006c691fc80a165f63137c82494b68cf8db2094e2f", 0x24}], 0x1, 0x2, 0x2, 0x7) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000001c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000240)=""/218, 0xda}, {&(0x7f0000000340)=""/154, 0x9a}, {&(0x7f0000000400)=""/116, 0x74}], 0x3}, 0x120) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000500)=""/49, 0x31}, {&(0x7f0000000540)=""/221, 0xdd}, {&(0x7f0000000640)}], 0x3}, 0x0) bind$l2tp6(r0, &(0x7f0000000700)={0xa, 0x0, 0x9, @loopback}, 0x20) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r1, 0x8008f512, &(0x7f0000000740)) socket$inet_udplite(0x2, 0x2, 0x88) r2 = shmget(0x0, 0x3000, 0x1, &(0x7f0000ffd000/0x3000)=nil) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000780)=0xb11, 0x4) r3 = openat$snapshot(0xffffffffffffff9c, 0xffffffffffffffff, 0x400100, 0x0) sendfile(r1, r1, &(0x7f00000007c0)=0x1, 0xb) pwritev(r3, &(0x7f0000001c40)=[{&(0x7f0000000800)="24460fdbb3960a52a4a49bed29c34c9b8dc36e42f5b4194ce78c352b9cead28bbfa98c7dddbadd529318efb1305241ee9178ed96cbd1b47a2721c5f165f53d98ac55b0a14819f986530a7e7b4422ba3b6d5761e7d370446f84d6114a5499919185323996490b89ae4da0af2e1c7a75541585410856f8046394314405659b5205f6b6", 0x82}, {&(0x7f00000008c0)="ffe45083f434a03b98510019955253dbda14afac3480ecd54c93f6a69bdf4c82054c7880f0c616fab84a5c", 0x2b}, {&(0x7f0000000900)="f775a74d80675adaf67c557ced86926b3bbb3a693755c7d14e8194bfc8e573fae206f7d839ecbb1bd4972b1304f3e103b27eec4d2f5d596e15440911b11e99d30ca63f19b9439ac8905687075ad9baccf6c2381936fe", 0x56}, {&(0x7f0000000980)="b73ab9ac7bdb7b562842094875f62ec1b944c5bdff066bec7aee26f87dafc4a9c0b498474cf8cd46c4a2f0d9174311f6eb526fc7e02097a3fc109dd192ff4cc54c99a7c91e3670a9b1444d563567b321384c46a9ac73a32edb5418516faf28b5179199fefaa4fa44ada96f9d2bcfeafb97ec07285e64b5a0", 0x78}, {&(0x7f0000000a00)="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", 0x1000}, {&(0x7f0000001a00)="49ac7c2668a12eb919b89840f0b2069a13c8f5c1ae98cec2c23dbfcd65d0c93b427ef175e3a21e63d697f3755e2a2a11d348df1c4cbc969df00ae0974e581bc24c97920142a2b7ba903534fa307cdfb328ef29fdb28505bf98b3a06397bf3646897cb27a16dd0b2ac34198e60730efb0ca378309dd80e7078a4432493cf0b62e23e2b4b527013bb04a2aea100077b0388fa8f31d199b60dc70e77aa33d4b996a98ab4fa0c90cc41e", 0xa8}, {&(0x7f0000001ac0)="4746cad2e97638778b4b12a25abc63009217bf529c0e39cdb8c57706e9772d1a4ce971b08bc69a12950e1c346af7784e8df6e761b6e801c8ecefb26a86", 0x3d}, {&(0x7f0000001b00)="ac2f94cd1cc497055ad1d9c2bb15870d18bde1ee57efee7638e0dcdbffbdb7775bfd86a78eb29268bdbb2c2a672624a4ae18cace369485f349c29dbc973a97f3f8cb3fe6a376a0ed96aa4d03ff783be58e635e2827aca585251d1a9a928130f7e6443f48b537f1f17585718bdd965272dfd6733a1e02e2307028f1db1b41606d2c996441faa9ff71e597a1fbe5d628c7ad4851efdbaf67f3f4faedffb7976872c70a795097549fe00b5c342cb4df637862a13c2eb0823079a2179046a8a70eaec804dc82208cbf9095cad9bfa9964b7ad0b46a9cdc02c973ad541cd424cae58c442484", 0xe3}, {&(0x7f0000001c00)="85d8b3e62a68b7c091e4f38eb52e5c7b220b2bd8e964e075fbdf9223d2415eaed408940bcf6518571107eaef22b64b", 0x2f}], 0x9, 0x6, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001d00)) execve(&(0x7f0000001d40)='./file0\x00', &(0x7f0000001f00)={[&(0x7f0000001d80)='/selinux/commit_pending_bools\x00', &(0x7f0000001dc0)='&,$\\\x00', &(0x7f0000001e00)='\x97^#}\'\x00', &(0x7f0000001e40)='^.\x00', &(0x7f0000001e80)='/selinux/commit_pending_bools\x00', &(0x7f0000001ec0)='!&+\'{}+$\x96\x00']}, &(0x7f0000001fc0)={[&(0x7f0000001f40)='}!\x00', &(0x7f0000001f80)='%\xa0\x00']}) r4 = semget(0x2, 0x4, 0x200) semctl$SETVAL(r4, 0x3, 0x10, &(0x7f0000002000)=0x40) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000002040), 0x408200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000020c0), r0) sendmsg$NL80211_CMD_TDLS_MGMT(r0, &(0x7f0000002180)={&(0x7f0000002080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002140)={&(0x7f0000002100)={0x28, r5, 0x0, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x919, 0x49}}}}, [@NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x38}]}, 0x28}, 0x1, 0x0, 0x0, 0x20010801}, 0x4000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002200)={&(0x7f00000021c0)='rxrpc_rx_eproto\x00', r0, 0x0, 0x3}, 0x18) semctl$SETVAL(r4, 0x5, 0x10, &(0x7f0000002240)=0xa79) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000002280)={0x1000, 0x6, 0x4, 0x2, 0x6, 0x0, [{0x2, 0x4000000000000000, 0xf5, '\x00', 0x400}, {0x4, 0x7d, 0x6, '\x00', 0x400}, {0x3, 0x7, 0xffffffffffff7bc5, '\x00', 0x800}, {0x7fffffff, 0x0, 0x9, '\x00', 0x2}, {0xa, 0xa0, 0x9, '\x00', 0x800}, {0x9, 0x2, 0x7fffffff, '\x00', 0x1}]}) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000002400)=0x1) semget$private(0x0, 0x4, 0x50d) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl802154(&(0x7f0000002480), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r6, &(0x7f00000025c0)={&(0x7f0000002440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000002580)={&(0x7f0000002500)={0x4c, r7, 0x10, 0x70bd2c, 0x25dfdbfe, {}, [@NL802154_ATTR_SEC_LEVEL={0x24, 0x2d, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x4}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x80}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}]}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x2000c810) 1.232724542s ago: executing program 1 (id=322): mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002300000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000a00)=@delchain={0x20c, 0x65, 0x2, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0x8}, {0x7, 0x9}, {0x6}}, [@filter_kind_options=@f_bpf={{0x8}, {0x34, 0x2, [@TCA_BPF_FD={0x8}, @TCA_BPF_FLAGS_GEN={0x8, 0x9, 0x6}, @TCA_BPF_FLAGS_GEN={0x8, 0x9, 0x6}, @TCA_BPF_CLASSID={0x8, 0x3, {0x7, 0xffff}}, @TCA_BPF_FLAGS_GEN={0x8, 0x9, 0x8}, @TCA_BPF_FLAGS_GEN={0x8, 0x9, 0x5}]}}, @filter_kind_options=@f_route={{0xa}, {0x4}}, @TCA_RATE={0x6, 0x5, {0x6, 0x22}}, @filter_kind_options=@f_route={{0xa}, {0x188, 0x2, [@TCA_ROUTE4_FROM={0x8}, @TCA_ROUTE4_IIF={0x8}, @TCA_ROUTE4_IIF={0x8}, @TCA_ROUTE4_ACT={0xf0, 0x6, [@m_vlan={0xec, 0xf, 0x0, 0x0, {{0x9}, {0x4}, {0xbd, 0x6, "4536d5ba67cb41f3417191a0b4758169ba997e9dbec50e599419b7f290f4ee70efc0bdcb1d84cd2098b9c95fa81553821d25bbee1244fda18d438c3a5d696ee14197d17ea59071f0fd93760930ba453b3e23095f617d12282ec3f8190afeb1ac2e8d254fdac5b6ea11185f9256c3bab37a15cafe5f112d56723f0fb5c49b6449e58fc91a26d527012f701a9cfebef7787238f0d549914d85db8de6456cd08e0cd88f542f218759aebb2337e303783a52c6e45d646c6ef46ddb"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3}}}}]}, @TCA_ROUTE4_POLICE={0x7c, 0x5, [@TCA_POLICE_TBF={0x3c, 0x1, {0x7ff, 0xffffffffffffffff, 0x3, 0xa, 0x6, {0x7, 0x2, 0x1, 0x89, 0x0, 0x4}, {0x10, 0x2, 0x1006, 0xfffe, 0x1, 0xeaa1}, 0x6, 0x200, 0xfffff801}}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x8, 0xf4, 0x7fffffff, 0x7, {0x1, 0x0, 0x4, 0xd0c7, 0xffff, 0x86}, {0x10, 0x0, 0x0, 0x11, 0x1, 0xfffffffd}, 0x9, 0x80000, 0x9}}]}]}}]}, 0x20c}, 0x1, 0x0, 0x0, 0x81}, 0x4004) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x20, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r1}, 0x3d) r3 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r3, &(0x7f0000000000)={0xa, 0x0, 0x1, @empty, 0x0, 0x3}, 0x20) connect$l2tp6(r3, &(0x7f0000000f40)={0xa, 0x0, 0x0, @local}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x8e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r4}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) pwrite64(r6, 0x0, 0x0, 0x0) recvmmsg(r5, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x3a1}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x14}, {&(0x7f00000007c0)=""/154, 0x21}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r0}, 0x10) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r7, &(0x7f0000000500)="a4", 0x34000, 0x2000c851, &(0x7f0000000140)={0xa, 0x4e23, 0x2000000, @loopback, 0xffffffff}, 0x1c) 1.232107892s ago: executing program 2 (id=323): openat$pidfd(0xffffffffffffff9c, &(0x7f0000000200), 0x58900, 0x0) (async) r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000200), 0x58900, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000140)=@bpf_ext={0x1c, 0xf, 0x0, &(0x7f00000002c0)='GPL\x00', 0xa, 0x0, 0x0, 0x40e00, 0x40, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000640)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x9, 0xa51, 0x3}, 0x10, 0x2390b, 0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0, 0x10, 0xb1, @void, @value}, 0x94) socket$nl_netfilter(0x10, 0x3, 0xc) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020a07b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4f, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @void, @value}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020a07b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4f, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r2}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r2}, 0x18) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x6000, 0x0) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r5 = dup2(r4, r4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000e00)='kfree\x00', 0xffffffffffffffff, 0x0, 0x4ab}, 0x18) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r6, 0x40505330, &(0x7f00000000c0)={0x800000, 0x80, 0x401, 0x6, 0x4000, 0xac9}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r5, 0x40505330, &(0x7f0000000bc0)={0x800080, 0x804, 0x7, 0x9, 0x40, 0x558}) socket$kcm(0x10, 0x400000002, 0x0) (async) r7 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r7, &(0x7f0000000080)=ANY=[@ANYBLOB="180000007800911fdabcf8b3077fa54a07"], 0xfe33) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x2da, 0x1, 0x4, 0x200040000004, 0x10}) bpf$PROG_LOAD(0x5, 0x0, 0x0) flock(0xffffffffffffffff, 0x5) timer_create(0x0, 0x0, &(0x7f0000bbdffc)) (async) timer_create(0x0, 0x0, &(0x7f0000bbdffc)) flock(0xffffffffffffffff, 0x2) (async) flock(0xffffffffffffffff, 0x2) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) 1.203763233s ago: executing program 0 (id=324): r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r2, 0x0, 0x800000}, 0x18) fchdir(r3) 1.135673314s ago: executing program 0 (id=325): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff0000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000780)='net/tcp6\x00') preadv(r3, &(0x7f00000000c0)=[{&(0x7f0000001140)=""/4096, 0x1000}], 0x1, 0x300, 0x0) 1.135476834s ago: executing program 2 (id=326): syz_emit_ethernet(0x16, &(0x7f0000000c00)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @broadcast, @void, {@llc={0x4, {@snap={0xaa, 0x0, "dc", "898122", 0x892f}}}}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, &(0x7f00000003c0)='wg1\x00', 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x30, 0x3, 0x0, 0xfffff038}, {0x80000006, 0xfd, 0x0, 0x4}]}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 1.135245063s ago: executing program 3 (id=327): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r0}, &(0x7f0000000400), &(0x7f00000004c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r2}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 1.015940615s ago: executing program 1 (id=329): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) r1 = getpid() r2 = gettid() r3 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8)={[0xfffffffffffffffc]}, 0x8) rt_tgsigqueueinfo(r1, r2, 0x3e, &(0x7f0000000000)={0x0, 0x0, 0x7}) read(r3, &(0x7f0000000740)=""/377, 0x179) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r4], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8923, &(0x7f0000000000)={'vlan1\x00', @broadcast}) 936.618436ms ago: executing program 3 (id=331): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000001e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r4}, 0x10) r5 = getpgrp(0xffffffffffffffff) r6 = gettid() kcmp(r5, r6, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r7) sendmsg$NLBL_MGMT_C_ADDDEF(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="01000000000000000000040000e41300050003030000000a0000005dc000000000010800020005000000140006"], 0x4c}, 0x1, 0x0, 0x0, 0x8004}, 0x4040000) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 867.850937ms ago: executing program 0 (id=332): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000020000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = memfd_secret(0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa, 0x11, r2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) syz_mount_image$iso9660(&(0x7f0000002900), &(0x7f0000000000)='./file0\x00', 0x2, &(0x7f00000002c0)=ANY=[], 0x1, 0x5b1, &(0x7f0000001000)="$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") r5 = socket$unix(0x1, 0x1, 0x0) bind$unix(r5, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) bind$packet(r6, &(0x7f0000000300)={0x11, 0xf6, r7, 0x1, 0x0, 0x6, @remote}, 0x14) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) close(r6) epoll_pwait2(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={[0x7b0]}, 0x8) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r9}, 0x10) socket$pppoe(0x18, 0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$inet(0x2, 0x2, 0x1) 780.094049ms ago: executing program 2 (id=333): socket$inet6_tcp(0xa, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000"], 0x48) open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x81801) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x9}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000001100)=0x804, 0x4) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000080)=0x4, 0x4) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00'}, 0x18) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r2 = mq_open(&(0x7f0000000040)='!se\xf7ih,\x17i\xacP\xe6lNnuxselinux\x00', 0x6e93ebbbcc0884f2, 0x22, &(0x7f0000000300)={0x0, 0x1, 0x6}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0x20, &(0x7f0000000280)={@in6={{0xa, 0x4e23, 0x4, @ipv4={'\x00', '\xff\xff', @local}}}, 0x0, 0x0, 0x38, 0x0, "0f424a2bc651a9f11381328af8daf6f4bd2827984afeb6b627cea1ba22d1af57aa193c5024c9e8b22a8796a538ed893952a1aa555418ba1b4d0bc0712c028ec32a9bc2fb29b52d39e8626bc90abcc02a"}, 0xd8) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) 772.235389ms ago: executing program 0 (id=334): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002300)='net/ip6_mr_cache\x00') lseek(r0, 0x2b65, 0x2) r1 = openat(r0, 0x0, 0x42, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xb, &(0x7f0000000180)=ANY=[@ANYRES64=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x21, 0x800000000004, @tid=r2}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x200, 0x0) preadv2(r3, &(0x7f0000000180)=[{&(0x7f0000000000)=""/167, 0xa7}], 0x1, 0x0, 0x4, 0x1) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000240)={'syztnl1\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0x4, 0x41, 0x7, 0x6, 0x77b66bbf075a87aa, @mcast2, @dev={0xfe, 0x80, '\x00', 0x31}, 0x700, 0x80, 0x23a, 0x10}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00'}, 0x10) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r5, 0x11b, 0x3, &(0x7f0000001780)=0x100000, 0x4) close_range(r4, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000200)='./file0\x00', 0x2) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000001b80)="4476c8a3c3af5369bdfd752ec45c83c8", 0x10) syz_emit_ethernet(0x76, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 437.826654ms ago: executing program 4 (id=342): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa4000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000780)='net/tcp6\x00') preadv(r3, &(0x7f00000000c0)=[{&(0x7f0000001140)=""/4096, 0x1000}], 0x1, 0x300, 0x0) 385.598995ms ago: executing program 4 (id=343): syz_emit_ethernet(0x16, &(0x7f0000000c00)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @broadcast, @void, {@llc={0x4, {@snap={0xaa, 0x0, "dc", "898122", 0x892f}}}}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, &(0x7f00000003c0)='wg1\x00', 0x4) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x30, 0x3, 0x0, 0xfffff038}, {0x80000006, 0xfd, 0x0, 0x4}]}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 368.527775ms ago: executing program 4 (id=344): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000020000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = memfd_secret(0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xa, 0x11, r2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) syz_mount_image$iso9660(&(0x7f0000002900), &(0x7f0000000000)='./file0\x00', 0x2, &(0x7f00000002c0)=ANY=[], 0x1, 0x5b1, &(0x7f0000001000)="$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") r5 = socket$unix(0x1, 0x1, 0x0) bind$unix(r5, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'syz_tun\x00'}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) close(r6) epoll_pwait2(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={[0x7b0]}, 0x8) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r9}, 0x10) socket$pppoe(0x18, 0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$inet(0x2, 0x2, 0x1) 346.739775ms ago: executing program 4 (id=345): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001000000"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000b6000000"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000780)='net/tcp6\x00') preadv(r3, &(0x7f00000000c0)=[{&(0x7f0000001140)=""/4096, 0x1000}], 0x1, 0x300, 0x0) 293.488456ms ago: executing program 4 (id=346): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (async) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async, rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000040)={0x7, 0x8, 0x101, 0x8}, 0x8) (async) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r4, &(0x7f0000000500)="a4", 0x34000, 0x2000c851, &(0x7f0000000140)={0xa, 0x4e23, 0x2000000, @loopback, 0xffffffff}, 0x1c) 234.215247ms ago: executing program 4 (id=347): bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000800)={@map, 0xffffffffffffffff, 0x7, 0x0, 0x0, @void, @value}, 0x20) (fail_nth: 2) 33.5255ms ago: executing program 1 (id=348): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r0}, &(0x7f0000000400), &(0x7f00000004c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r2}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 28.98536ms ago: executing program 3 (id=349): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000012c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) (async) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) (async) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) (async, rerun: 64) mount$bind(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) (async, rerun: 64) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) (async) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2125099, 0x0) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x89901) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0/../file0\x00', 0x80009, 0x0, 0x31, 0x0, 0x0) (async) setxattr$security_capability(0x0, &(0x7f0000000280), 0x0, 0x0, 0x0) (async) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000040)=@v3, 0x18, 0x0) (async) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) 0s ago: executing program 1 (id=350): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_clone(0x41000000, &(0x7f0000000380)="f6a05c3b9e66b223ede1ac41ee2be24f838b24c5afdb0cb4848c", 0x1a, &(0x7f0000000500), &(0x7f0000000580), &(0x7f00000005c0)="e210c243dd85d2cb7440e2d759eae8f676fb37cd42f8dca4a28bc04f62c0c81f25f81130b21dea0a39473f1d25196e61374d510a1da5926d9c8ba5bcfa66a9cc194cbf99ee9be737fa8c3e6b17f768ef3da8b64885d71e7acbf35822862d85acfa564051e4d88bcf33bc56e02f4d20fd28cd6d80d64b8684f72f051c") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1e, 0xb, &(0x7f0000000580)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2a, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="4c00000002060108000034e40000000000000000050001000600000005000400000000000900020073797a3100000000050005000200000c12000300686173683a6e65742c706f7274"], 0x4c}}, 0x2) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000003c0)={0x0, 0x29, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="50000000090601020000000000000000020000000900020073797a31000000000500010007000000280007800c00018008000140ffffffff0500070084000000060004404e22000006000540", @ANYRES32=r0], 0x50}, 0x1, 0x0, 0x0, 0x10000003}, 0x80) syz_open_dev$usbfs(0x0, 0x77, 0x1501) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3, 0xffffffffffffffff}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYBLOB="d118acdec9cb66af368aad52b987ca53431b8fb64c1e90b00e827f288f27639e78424563555b8dbb40b92f7ae45ef95b2cf1c45f1d7abc60b1307718a87d2cbcf9f66af307b31a3f771770c8996ddb19bc65effcfbc4777e30606640822ba8f573575cdaccacd71dacccef8347d68d87b59b017eaf1fb0600adad030009b0b14ee367470145047ee40f08f35c69500fbda10a05ed7", @ANYRESDEC=r0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000280)=0x0, &(0x7f0000000300)=0x4) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYRESOCT=r4], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x22, '\x00', r6, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000002c0)='mmap_lock_acquire_returned\x00', r7}, 0x10) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xc5fffffd) kernel console output (not intermixed with test programs): syzkaller syzkaller login: [ 20.479816][ T29] kauditd_printk_skb: 45 callbacks suppressed [ 20.479850][ T29] audit: type=1400 audit(1748727052.791:57): avc: denied { transition } for pid=3195 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 20.484290][ T29] audit: type=1400 audit(1748727052.791:58): avc: denied { noatsecure } for pid=3195 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 20.487429][ T29] audit: type=1400 audit(1748727052.801:59): avc: denied { write } for pid=3195 comm="sh" path="pipe:[1585]" dev="pipefs" ino=1585 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 20.490830][ T29] audit: type=1400 audit(1748727052.801:60): avc: denied { rlimitinh } for pid=3195 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 20.493696][ T29] audit: type=1400 audit(1748727052.801:61): avc: denied { siginh } for pid=3195 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '10.128.1.66' (ED25519) to the list of known hosts. [ 29.030083][ T29] audit: type=1400 audit(1748727061.341:62): avc: denied { mounton } for pid=3307 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 29.031285][ T3307] cgroup: Unknown subsys name 'net' [ 29.052920][ T29] audit: type=1400 audit(1748727061.351:63): avc: denied { mount } for pid=3307 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 29.080347][ T29] audit: type=1400 audit(1748727061.381:64): avc: denied { unmount } for pid=3307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 29.280985][ T3307] cgroup: Unknown subsys name 'cpuset' [ 29.287270][ T3307] cgroup: Unknown subsys name 'rlimit' [ 29.420078][ T29] audit: type=1400 audit(1748727061.731:65): avc: denied { setattr } for pid=3307 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 29.443396][ T29] audit: type=1400 audit(1748727061.741:66): avc: denied { create } for pid=3307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 29.464004][ T29] audit: type=1400 audit(1748727061.741:67): avc: denied { write } for pid=3307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.478621][ T3309] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 29.484378][ T29] audit: type=1400 audit(1748727061.741:68): avc: denied { read } for pid=3307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 29.513273][ T29] audit: type=1400 audit(1748727061.741:69): avc: denied { mounton } for pid=3307 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 29.518264][ T3307] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 29.538125][ T29] audit: type=1400 audit(1748727061.741:70): avc: denied { mount } for pid=3307 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 29.570436][ T29] audit: type=1400 audit(1748727061.821:71): avc: denied { relabelto } for pid=3309 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 30.723756][ T3316] chnl_net:caif_netlink_parms(): no params data found [ 30.747216][ T3324] chnl_net:caif_netlink_parms(): no params data found [ 30.804269][ T3320] chnl_net:caif_netlink_parms(): no params data found [ 30.839097][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.846321][ T3316] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.853550][ T3316] bridge_slave_0: entered allmulticast mode [ 30.859887][ T3316] bridge_slave_0: entered promiscuous mode [ 30.869050][ T3322] chnl_net:caif_netlink_parms(): no params data found [ 30.885600][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.892801][ T3316] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.899938][ T3316] bridge_slave_1: entered allmulticast mode [ 30.906581][ T3316] bridge_slave_1: entered promiscuous mode [ 30.944553][ T3324] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.951749][ T3324] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.959664][ T3324] bridge_slave_0: entered allmulticast mode [ 30.966270][ T3324] bridge_slave_0: entered promiscuous mode [ 30.972928][ T3324] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.980009][ T3324] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.987353][ T3324] bridge_slave_1: entered allmulticast mode [ 30.993822][ T3324] bridge_slave_1: entered promiscuous mode [ 31.006724][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.030853][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.041197][ T3324] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.065620][ T3324] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.098383][ T3316] team0: Port device team_slave_0 added [ 31.105242][ T3316] team0: Port device team_slave_1 added [ 31.116985][ T3320] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.124156][ T3320] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.131487][ T3320] bridge_slave_0: entered allmulticast mode [ 31.138005][ T3320] bridge_slave_0: entered promiscuous mode [ 31.164434][ T3320] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.171536][ T3320] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.178868][ T3320] bridge_slave_1: entered allmulticast mode [ 31.185335][ T3320] bridge_slave_1: entered promiscuous mode [ 31.191611][ T3322] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.198741][ T3322] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.206149][ T3322] bridge_slave_0: entered allmulticast mode [ 31.212799][ T3322] bridge_slave_0: entered promiscuous mode [ 31.219416][ T3322] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.226645][ T3322] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.233980][ T3322] bridge_slave_1: entered allmulticast mode [ 31.240491][ T3322] bridge_slave_1: entered promiscuous mode [ 31.247452][ T3324] team0: Port device team_slave_0 added [ 31.257676][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.264700][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.290695][ T3316] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.302072][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.309078][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.335064][ T3316] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.356862][ T3324] team0: Port device team_slave_1 added [ 31.387625][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.399917][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.410368][ T3322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 31.435008][ T3323] chnl_net:caif_netlink_parms(): no params data found [ 31.445073][ T3322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 31.459491][ T3324] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.466565][ T3324] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.492602][ T3324] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.516392][ T3320] team0: Port device team_slave_0 added [ 31.527572][ T3324] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.534599][ T3324] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.560587][ T3324] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.573362][ T3316] hsr_slave_0: entered promiscuous mode [ 31.579382][ T3316] hsr_slave_1: entered promiscuous mode [ 31.588924][ T3320] team0: Port device team_slave_1 added [ 31.600726][ T3322] team0: Port device team_slave_0 added [ 31.609371][ T3322] team0: Port device team_slave_1 added [ 31.632698][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.639673][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.665753][ T3320] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.690165][ T3320] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.697172][ T3320] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.723157][ T3320] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.738672][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 31.745762][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.771802][ T3322] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 31.785731][ T3322] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 31.792815][ T3322] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 31.818750][ T3322] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 31.869316][ T3323] bridge0: port 1(bridge_slave_0) entered blocking state [ 31.876527][ T3323] bridge0: port 1(bridge_slave_0) entered disabled state [ 31.883771][ T3323] bridge_slave_0: entered allmulticast mode [ 31.890132][ T3323] bridge_slave_0: entered promiscuous mode [ 31.898631][ T3324] hsr_slave_0: entered promiscuous mode [ 31.904761][ T3324] hsr_slave_1: entered promiscuous mode [ 31.910721][ T3324] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 31.918279][ T3324] Cannot create hsr debugfs directory [ 31.951574][ T3323] bridge0: port 2(bridge_slave_1) entered blocking state [ 31.958733][ T3323] bridge0: port 2(bridge_slave_1) entered disabled state [ 31.966005][ T3323] bridge_slave_1: entered allmulticast mode [ 31.972821][ T3323] bridge_slave_1: entered promiscuous mode [ 31.994974][ T3320] hsr_slave_0: entered promiscuous mode [ 32.001070][ T3320] hsr_slave_1: entered promiscuous mode [ 32.006895][ T3320] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 32.014507][ T3320] Cannot create hsr debugfs directory [ 32.048636][ T3323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 32.077805][ T3322] hsr_slave_0: entered promiscuous mode [ 32.083980][ T3322] hsr_slave_1: entered promiscuous mode [ 32.089894][ T3322] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 32.097518][ T3322] Cannot create hsr debugfs directory [ 32.104144][ T3323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 32.146771][ T3323] team0: Port device team_slave_0 added [ 32.165296][ T3323] team0: Port device team_slave_1 added [ 32.200835][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 32.207813][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.233909][ T3323] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 32.258406][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 32.265512][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 32.291622][ T3323] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 32.339958][ T3324] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 32.354507][ T3323] hsr_slave_0: entered promiscuous mode [ 32.360730][ T3323] hsr_slave_1: entered promiscuous mode [ 32.366609][ T3323] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 32.374515][ T3323] Cannot create hsr debugfs directory [ 32.380089][ T3324] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 32.402432][ T3324] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 32.419795][ T3324] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 32.455997][ T3316] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 32.464713][ T3316] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 32.477744][ T3316] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 32.488840][ T3316] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 32.529958][ T3320] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 32.547098][ T3320] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 32.563820][ T3320] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 32.572678][ T3320] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 32.607284][ T3322] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 32.617747][ T3322] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 32.627871][ T3322] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 32.637435][ T3322] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 32.684342][ T3324] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.703098][ T3323] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 32.716490][ T3324] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.723745][ T3323] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 32.743010][ T145] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.750167][ T145] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.761052][ T3323] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 32.775132][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.794541][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 32.801909][ T3323] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 32.812586][ T145] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.819666][ T145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.854725][ T3320] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.864373][ T3316] 8021q: adding VLAN 0 to HW filter on device team0 [ 32.883959][ T2265] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.891153][ T2265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.921374][ T1694] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.928546][ T1694] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.937349][ T1694] bridge0: port 1(bridge_slave_0) entered blocking state [ 32.944511][ T1694] bridge0: port 1(bridge_slave_0) entered forwarding state [ 32.964147][ T1694] bridge0: port 2(bridge_slave_1) entered blocking state [ 32.971344][ T1694] bridge0: port 2(bridge_slave_1) entered forwarding state [ 32.982966][ T3322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.005642][ T3322] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.033429][ T3324] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.048970][ T2265] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.056126][ T2265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.064882][ T2265] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.072030][ T2265] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.096359][ T3323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 33.108719][ T3320] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 33.133396][ T3323] 8021q: adding VLAN 0 to HW filter on device team0 [ 33.175159][ T3316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.186147][ T1694] bridge0: port 1(bridge_slave_0) entered blocking state [ 33.193298][ T1694] bridge0: port 1(bridge_slave_0) entered forwarding state [ 33.203221][ T1694] bridge0: port 2(bridge_slave_1) entered blocking state [ 33.210336][ T1694] bridge0: port 2(bridge_slave_1) entered forwarding state [ 33.287839][ T3323] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 33.305971][ T3324] veth0_vlan: entered promiscuous mode [ 33.320137][ T3324] veth1_vlan: entered promiscuous mode [ 33.347649][ T3320] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.374264][ T3322] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.403718][ T3323] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 33.421816][ T3324] veth0_macvtap: entered promiscuous mode [ 33.429228][ T3324] veth1_macvtap: entered promiscuous mode [ 33.482653][ T3316] veth0_vlan: entered promiscuous mode [ 33.489731][ T3324] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.515609][ T3316] veth1_vlan: entered promiscuous mode [ 33.544627][ T3324] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.568653][ T3324] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.577539][ T3324] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.586393][ T3324] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.595242][ T3324] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.618028][ T3316] veth0_macvtap: entered promiscuous mode [ 33.640914][ T3322] veth0_vlan: entered promiscuous mode [ 33.647069][ T3320] veth0_vlan: entered promiscuous mode [ 33.659479][ T3322] veth1_vlan: entered promiscuous mode [ 33.670150][ T3316] veth1_macvtap: entered promiscuous mode [ 33.679378][ T3320] veth1_vlan: entered promiscuous mode [ 33.721032][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.735747][ T3324] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 33.742619][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.765612][ T3323] veth0_vlan: entered promiscuous mode [ 33.779768][ T3323] veth1_vlan: entered promiscuous mode [ 33.797330][ T3322] veth0_macvtap: entered promiscuous mode [ 33.813293][ T3316] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.822208][ T3316] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.831050][ T3316] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.839755][ T3316] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 33.862039][ T3322] veth1_macvtap: entered promiscuous mode [ 33.893475][ T3320] veth0_macvtap: entered promiscuous mode [ 33.908831][ T3323] veth0_macvtap: entered promiscuous mode [ 33.925131][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 33.933781][ T3320] veth1_macvtap: entered promiscuous mode [ 33.947439][ T3323] veth1_macvtap: entered promiscuous mode [ 33.968503][ T3322] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 33.989029][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.003033][ T3322] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.011842][ T3322] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.020641][ T3322] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.022178][ T3463] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8'. [ 34.029391][ T3322] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.042593][ T29] kauditd_printk_skb: 33 callbacks suppressed [ 34.042613][ T29] audit: type=1400 audit(1748727066.341:105): avc: denied { write } for pid=3462 comm="syz.2.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.073016][ T29] audit: type=1400 audit(1748727066.341:106): avc: denied { read } for pid=3462 comm="syz.2.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 34.093064][ T29] audit: type=1400 audit(1748727066.341:107): avc: denied { create } for pid=3462 comm="syz.2.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 34.113374][ T29] audit: type=1400 audit(1748727066.341:108): avc: denied { write } for pid=3462 comm="syz.2.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 34.136171][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.147375][ T3320] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.168291][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.179091][ T3320] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.188026][ T3320] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.196987][ T3320] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.202513][ T29] audit: type=1400 audit(1748727066.511:109): avc: denied { name_bind } for pid=3466 comm="syz.2.9" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 34.205850][ T3320] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.227039][ T29] audit: type=1400 audit(1748727066.511:110): avc: denied { node_bind } for pid=3466 comm="syz.2.9" saddr=224.0.0.2 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 34.278124][ T29] audit: type=1400 audit(1748727066.581:111): avc: denied { create } for pid=3466 comm="syz.2.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 34.292275][ T3323] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.306306][ T3323] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.315104][ T3323] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.323958][ T3323] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 34.324899][ T3467] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3467 comm=syz.2.9 [ 34.410593][ T29] audit: type=1400 audit(1748727066.731:112): avc: denied { open } for pid=3472 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 34.429887][ T29] audit: type=1400 audit(1748727066.731:113): avc: denied { kernel } for pid=3472 comm="syz.3.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 34.458684][ T3479] FAULT_INJECTION: forcing a failure. [ 34.458684][ T3479] name failslab, interval 1, probability 0, space 0, times 1 [ 34.471522][ T3479] CPU: 0 UID: 0 PID: 3479 Comm: syz.2.10 Not tainted 6.15.0-syzkaller-09161-g0f70f5b08a47 #0 PREEMPT(voluntary) [ 34.471552][ T3479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 34.471571][ T3479] Call Trace: [ 34.471578][ T3479] [ 34.471587][ T3479] __dump_stack+0x1d/0x30 [ 34.471609][ T3479] dump_stack_lvl+0xe8/0x140 [ 34.471632][ T3479] dump_stack+0x15/0x1b [ 34.471701][ T3479] should_fail_ex+0x265/0x280 [ 34.471736][ T3479] should_failslab+0x8c/0xb0 [ 34.471758][ T3479] kmem_cache_alloc_noprof+0x50/0x310 [ 34.471839][ T3479] ? security_file_alloc+0x32/0x100 [ 34.471862][ T3479] security_file_alloc+0x32/0x100 [ 34.471888][ T3479] init_file+0x5c/0x1d0 [ 34.471998][ T3479] alloc_empty_file+0x8b/0x200 [ 34.472032][ T3479] alloc_file_pseudo+0xc6/0x160 [ 34.472102][ T3479] hugetlb_file_setup+0x298/0x3d0 [ 34.472140][ T3479] ksys_mmap_pgoff+0x157/0x310 [ 34.472184][ T3479] x64_sys_call+0x1602/0x2fb0 [ 34.472229][ T3479] do_syscall_64+0xd2/0x200 [ 34.472263][ T3479] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 34.472290][ T3479] ? clear_bhb_loop+0x40/0x90 [ 34.472312][ T3479] ? clear_bhb_loop+0x40/0x90 [ 34.472402][ T3479] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 34.472431][ T3479] RIP: 0033:0x7f5e14c4e969 [ 34.472457][ T3479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.472479][ T3479] RSP: 002b:00007f5e132b7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 34.472506][ T3479] RAX: ffffffffffffffda RBX: 00007f5e14e75fa0 RCX: 00007f5e14c4e969 [ 34.472576][ T3479] RDX: 0000000000000002 RSI: 0000000000ff5000 RDI: 0000200000000000 [ 34.472592][ T3479] RBP: 00007f5e132b7090 R08: ffffffffffffffff R09: 0000000000000000 [ 34.472607][ T3479] R10: 000000000004c831 R11: 0000000000000246 R12: 0000000000000001 [ 34.472619][ T3479] R13: 0000000000000000 R14: 00007f5e14e75fa0 R15: 00007fff0a8fe818 [ 34.472638][ T3479] [ 34.473704][ T29] audit: type=1400 audit(1748727066.771:114): avc: denied { create } for pid=3474 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 34.721322][ T3482] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5'. [ 34.738872][ T3482] loop4: detected capacity change from 0 to 1764 [ 34.754812][ T3482] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5'. [ 34.852276][ T3482] syz.4.5 (3482) used greatest stack depth: 10176 bytes left [ 34.862277][ C1] hrtimer: interrupt took 27315 ns [ 34.872625][ T3492] netlink: 664 bytes leftover after parsing attributes in process `syz.0.14'. [ 34.897091][ T3484] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 34.905966][ T3484] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 34.932662][ T3494] netlink: 4 bytes leftover after parsing attributes in process `syz.4.15'. [ 34.941610][ T3494] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 34.943145][ T3496] loop0: detected capacity change from 0 to 512 [ 34.949038][ T3494] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 34.979787][ T3496] EXT4-fs (loop0): mounted filesystem 00800000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 34.993606][ T3494] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 35.001131][ T3494] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 35.032662][ T3316] EXT4-fs (loop0): unmounting filesystem 00800000-0000-0000-0000-000000000000. [ 35.508370][ T3508] tipc: Started in network mode [ 35.513565][ T3508] tipc: Node identity be00cb6fc523, cluster identity 4711 [ 35.520817][ T3508] tipc: Enabled bearer , priority 0 [ 35.541457][ T3506] netlink: 60 bytes leftover after parsing attributes in process `syz.3.13'. [ 35.558505][ T3505] tipc: Disabling bearer [ 35.643911][ T3511] netlink: 16 bytes leftover after parsing attributes in process `syz.2.20'. [ 35.653461][ T3511] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 35.666373][ T3511] netlink: 4 bytes leftover after parsing attributes in process `syz.2.20'. [ 35.683211][ T3511] bridge_slave_1: left allmulticast mode [ 35.689014][ T3511] bridge_slave_1: left promiscuous mode [ 35.694808][ T3511] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.721926][ T3511] bridge_slave_0: left allmulticast mode [ 35.727621][ T3511] bridge_slave_0: left promiscuous mode [ 35.733448][ T3511] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.867874][ T3489] infiniband syz!: set active [ 35.872659][ T3489] infiniband syz!: added team_slave_0 [ 35.879013][ T3489] workqueue: Failed to create a rescuer kthread for wq "ib_mad1": -EINTR [ 35.879328][ T3489] infiniband syz!: Couldn't open port 1 [ 35.897732][ T3489] RDS/IB: syz!: added [ 35.901953][ T3489] smc: adding ib device syz! with port count 1 [ 35.908128][ T3489] smc: ib device syz! port 1 has pnetid [ 36.239163][ T3522] process 'syz.3.24' launched '/dev/fd/3' with NULL argv: empty string added [ 36.327945][ T3529] $Hÿ: renamed from bond0 (while UP) [ 36.340692][ T3529] $Hÿ: entered promiscuous mode [ 36.345947][ T3529] bond_slave_0: entered promiscuous mode [ 36.352012][ T3529] bond_slave_1: entered promiscuous mode [ 36.361206][ T3531] loop3: detected capacity change from 0 to 128 [ 36.631325][ T12] kworker/u8:0: attempt to access beyond end of device [ 36.631325][ T12] loop3: rw=1, sector=145, nr_sectors = 8 limit=128 [ 36.747834][ T12] kworker/u8:0: attempt to access beyond end of device [ 36.747834][ T12] loop3: rw=1, sector=161, nr_sectors = 8 limit=128 [ 36.768227][ T3542] netlink: 4 bytes leftover after parsing attributes in process `syz.1.32'. [ 36.835265][ T3542] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 36.843079][ T3542] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 36.875724][ T12] kworker/u8:0: attempt to access beyond end of device [ 36.875724][ T12] loop3: rw=1, sector=177, nr_sectors = 8 limit=128 [ 36.968220][ T3542] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 36.975743][ T3542] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 36.993528][ T12] kworker/u8:0: attempt to access beyond end of device [ 36.993528][ T12] loop3: rw=1, sector=193, nr_sectors = 8 limit=128 [ 37.107291][ T12] kworker/u8:0: attempt to access beyond end of device [ 37.107291][ T12] loop3: rw=1, sector=209, nr_sectors = 8 limit=128 [ 37.245940][ T12] kworker/u8:0: attempt to access beyond end of device [ 37.245940][ T12] loop3: rw=1, sector=225, nr_sectors = 8 limit=128 [ 37.504753][ T12] kworker/u8:0: attempt to access beyond end of device [ 37.504753][ T12] loop3: rw=1, sector=241, nr_sectors = 8 limit=128 [ 37.543180][ T12] kworker/u8:0: attempt to access beyond end of device [ 37.543180][ T12] loop3: rw=1, sector=257, nr_sectors = 8 limit=128 [ 37.694027][ T3534] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 37.835640][ T3547] netlink: 60 bytes leftover after parsing attributes in process `syz.0.29'. [ 38.137001][ T3551] loop0: detected capacity change from 0 to 256 [ 38.160492][ T3551] FAT-fs (loop0): bogus sectors per cluster 30 [ 38.166838][ T3551] FAT-fs (loop0): Can't find a valid FAT filesystem [ 38.182853][ T3532] syz.4.27 (3532) used greatest stack depth: 6712 bytes left [ 38.248924][ T12] kworker/u8:0: attempt to access beyond end of device [ 38.248924][ T12] loop3: rw=1, sector=273, nr_sectors = 8 limit=128 [ 38.262647][ T12] kworker/u8:0: attempt to access beyond end of device [ 38.262647][ T12] loop3: rw=1, sector=289, nr_sectors = 8 limit=128 [ 38.321845][ T3563] netdevsim netdevsim2 netdevsim0: entered promiscuous mode [ 38.330787][ T3563] ip6gretap0: entered promiscuous mode [ 38.395994][ T3570] binfmt_misc: register: failed to install interpreter file ./file0 [ 38.434734][ T3574] FAULT_INJECTION: forcing a failure. [ 38.434734][ T3574] name failslab, interval 1, probability 0, space 0, times 0 [ 38.447537][ T3574] CPU: 1 UID: 0 PID: 3574 Comm: syz.2.42 Not tainted 6.15.0-syzkaller-09161-g0f70f5b08a47 #0 PREEMPT(voluntary) [ 38.447573][ T3574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 38.447659][ T3574] Call Trace: [ 38.447667][ T3574] [ 38.447677][ T3574] __dump_stack+0x1d/0x30 [ 38.447705][ T3574] dump_stack_lvl+0xe8/0x140 [ 38.447732][ T3574] dump_stack+0x15/0x1b [ 38.447754][ T3574] should_fail_ex+0x265/0x280 [ 38.447907][ T3574] should_failslab+0x8c/0xb0 [ 38.447937][ T3574] kmem_cache_alloc_node_noprof+0x57/0x320 [ 38.447974][ T3574] ? __alloc_skb+0x101/0x320 [ 38.448005][ T3574] __alloc_skb+0x101/0x320 [ 38.448087][ T3574] ? audit_log_start+0x365/0x6c0 [ 38.448177][ T3574] audit_log_start+0x380/0x6c0 [ 38.448223][ T3574] audit_seccomp+0x48/0x100 [ 38.448310][ T3574] ? __seccomp_filter+0x68c/0x10d0 [ 38.448342][ T3574] __seccomp_filter+0x69d/0x10d0 [ 38.448373][ T3574] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 38.448400][ T3574] ? vfs_write+0x75e/0x8e0 [ 38.448505][ T3574] __secure_computing+0x82/0x150 [ 38.448606][ T3574] syscall_trace_enter+0xcf/0x1e0 [ 38.448716][ T3574] do_syscall_64+0xac/0x200 [ 38.448751][ T3574] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 38.448804][ T3574] ? clear_bhb_loop+0x40/0x90 [ 38.448831][ T3574] ? clear_bhb_loop+0x40/0x90 [ 38.448858][ T3574] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 38.448885][ T3574] RIP: 0033:0x7f5e14c4e969 [ 38.448904][ T3574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 38.448928][ T3574] RSP: 002b:00007f5e132b7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000094 [ 38.449008][ T3574] RAX: ffffffffffffffda RBX: 00007f5e14e75fa0 RCX: 00007f5e14c4e969 [ 38.449023][ T3574] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000000 [ 38.449035][ T3574] RBP: 00007f5e132b7090 R08: 0000000000000000 R09: 0000000000000000 [ 38.449049][ T3574] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 38.449065][ T3574] R13: 0000000000000000 R14: 00007f5e14e75fa0 R15: 00007fff0a8fe818 [ 38.449151][ T3574] [ 39.071305][ T3596] __nla_validate_parse: 8 callbacks suppressed [ 39.071321][ T3596] netlink: 24 bytes leftover after parsing attributes in process `syz.0.49'. [ 39.089384][ T3596] netlink: 28 bytes leftover after parsing attributes in process `syz.0.49'. [ 39.098360][ T3596] netlink: 28 bytes leftover after parsing attributes in process `syz.0.49'. [ 39.109802][ T3596] netdevsim netdevsim0 netdevsim0: entered promiscuous mode [ 39.121877][ T3596] ip6gretap0: entered promiscuous mode [ 39.132002][ T3596] debugfs: Directory 'hsr1' with parent 'hsr' already present! [ 39.156327][ T3597] netlink: 56 bytes leftover after parsing attributes in process `syz.0.49'. [ 39.178143][ T3596] Cannot create hsr debugfs directory [ 39.193616][ T3597] netlink: 8 bytes leftover after parsing attributes in process `syz.0.49'. [ 39.195389][ T3601] netdevsim netdevsim1 netdevsim0: set [1, 1] type 2 family 0 port 43837 - 0 [ 39.211228][ T3601] netdevsim netdevsim1 netdevsim1: set [1, 1] type 2 family 0 port 43837 - 0 [ 39.220057][ T3601] netdevsim netdevsim1 netdevsim2: set [1, 1] type 2 family 0 port 43837 - 0 [ 39.228907][ T3601] netdevsim netdevsim1 netdevsim3: set [1, 1] type 2 family 0 port 43837 - 0 [ 39.239153][ T3601] netdevsim netdevsim1 netdevsim0: set [1, 2] type 2 family 0 port 49633 - 0 [ 39.248049][ T3601] netdevsim netdevsim1 netdevsim1: set [1, 2] type 2 family 0 port 49633 - 0 [ 39.257027][ T3601] netdevsim netdevsim1 netdevsim2: set [1, 2] type 2 family 0 port 49633 - 0 [ 39.265908][ T3601] netdevsim netdevsim1 netdevsim3: set [1, 2] type 2 family 0 port 49633 - 0 [ 39.277838][ T3601] geneve2: entered promiscuous mode [ 39.283126][ T3601] geneve2: entered allmulticast mode [ 39.319049][ T3604] netlink: 664 bytes leftover after parsing attributes in process `syz.0.53'. [ 39.319196][ T3606] binfmt_misc: register: failed to install interpreter file ./file0 [ 39.402138][ T3612] netlink: 132 bytes leftover after parsing attributes in process `syz.0.57'. [ 39.529513][ T29] kauditd_printk_skb: 89 callbacks suppressed [ 39.529529][ T29] audit: type=1400 audit(1748727071.841:202): avc: denied { create } for pid=3615 comm="syz.0.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 39.560108][ T29] audit: type=1400 audit(1748727071.871:203): avc: denied { read } for pid=3615 comm="syz.0.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 39.584524][ T3608] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 39.594006][ T3608] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 39.683057][ T3585] syz.2.46 (3585) used greatest stack depth: 6080 bytes left [ 39.731370][ T29] audit: type=1400 audit(1748727072.051:204): avc: denied { create } for pid=3620 comm="syz.3.61" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 39.753702][ T29] audit: type=1400 audit(1748727072.071:205): avc: denied { write } for pid=3620 comm="syz.3.61" name="file0" dev="tmpfs" ino=56 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 39.775890][ T29] audit: type=1400 audit(1748727072.071:206): avc: denied { open } for pid=3620 comm="syz.3.61" path="/7/file0" dev="tmpfs" ino=56 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 39.794513][ T3622] netlink: 'syz.3.61': attribute type 13 has an invalid length. [ 39.807007][ T29] audit: type=1400 audit(1748727072.131:207): avc: denied { write } for pid=3619 comm="syz.2.60" name="001" dev="devtmpfs" ino=168 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 39.838856][ T29] audit: type=1400 audit(1748727072.151:208): avc: denied { create } for pid=3625 comm="syz.4.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 39.858320][ T29] audit: type=1400 audit(1748727072.151:209): avc: denied { ioctl } for pid=3625 comm="syz.4.63" path="socket:[3975]" dev="sockfs" ino=3975 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 39.858474][ T3623] loop2: detected capacity change from 0 to 512 [ 39.882576][ T29] audit: type=1400 audit(1748727072.151:210): avc: denied { bind } for pid=3625 comm="syz.4.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 39.917343][ T29] audit: type=1400 audit(1748727072.231:211): avc: denied { read } for pid=3625 comm="syz.4.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 39.941332][ T3622] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.948621][ T3622] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.023857][ T3622] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 40.038096][ T3622] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 40.047618][ T3637] loop2: detected capacity change from 0 to 512 [ 40.073637][ T3637] EXT4-fs warning (device loop2): ext4_enable_quotas:7168: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 40.089082][ T3637] EXT4-fs (loop2): mount failed [ 40.113389][ T3622] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 40.122471][ T3622] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 40.131794][ T3622] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 40.141001][ T3622] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 40.273401][ T3646] syzkaller0: entered promiscuous mode [ 40.278916][ T3646] syzkaller0: entered allmulticast mode [ 40.806571][ T3670] loop4: detected capacity change from 0 to 512 [ 40.838623][ T3670] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 40.900583][ T3670] EXT4-fs (loop4): 1 orphan inode deleted [ 40.923094][ T12] EXT4-fs error (device loop4): ext4_release_dquot:6969: comm kworker/u8:0: Failed to release dquot type 1 [ 41.090689][ T3670] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.105257][ T3670] ext4 filesystem being mounted at /14/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 41.118390][ T3670] EXT4-fs error (device loop4): ext4_lookup:1787: inode #15: comm syz.4.77: iget: bad i_size value: 360287970189639690 [ 41.144168][ T3670] EXT4-fs error (device loop4): ext4_lookup:1787: inode #15: comm syz.4.77: iget: bad i_size value: 360287970189639690 [ 41.217349][ T3323] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.340919][ T3687] loop4: detected capacity change from 0 to 128 [ 41.389081][ T3700] random: crng reseeded on system resumption [ 41.429994][ T3704] mmap: syz.3.88 (3704) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 41.472950][ T3710] FAULT_INJECTION: forcing a failure. [ 41.472950][ T3710] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 41.486290][ T3710] CPU: 1 UID: 0 PID: 3710 Comm: syz.3.89 Not tainted 6.15.0-syzkaller-09161-g0f70f5b08a47 #0 PREEMPT(voluntary) [ 41.486322][ T3710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 41.486358][ T3710] Call Trace: [ 41.486366][ T3710] [ 41.486376][ T3710] __dump_stack+0x1d/0x30 [ 41.486427][ T3710] dump_stack_lvl+0xe8/0x140 [ 41.486505][ T3710] dump_stack+0x15/0x1b [ 41.486527][ T3710] should_fail_ex+0x265/0x280 [ 41.486571][ T3710] should_fail_alloc_page+0xf2/0x100 [ 41.486604][ T3710] __alloc_frozen_pages_noprof+0xff/0x360 [ 41.486700][ T3710] alloc_pages_mpol+0xb3/0x250 [ 41.486737][ T3710] vma_alloc_folio_noprof+0x1aa/0x300 [ 41.486771][ T3710] do_wp_page+0x673/0x23d0 [ 41.486793][ T3710] ? __rcu_read_lock+0x37/0x50 [ 41.486830][ T3710] handle_mm_fault+0x77d/0x2c00 [ 41.486861][ T3710] ? mas_walk+0xf2/0x120 [ 41.486902][ T3710] do_user_addr_fault+0x636/0x1090 [ 41.487001][ T3710] ? fpregs_assert_state_consistent+0xb4/0xe0 [ 41.487047][ T3710] exc_page_fault+0x62/0xa0 [ 41.487074][ T3710] asm_exc_page_fault+0x26/0x30 [ 41.487168][ T3710] RIP: 0033:0x7f227c580cc3 [ 41.487280][ T3710] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 41.487305][ T3710] RSP: 002b:00007f227ad264a0 EFLAGS: 00010202 [ 41.487325][ T3710] RAX: 0000000000000400 RBX: 00007f227ad26540 RCX: 00007f2272907000 [ 41.487342][ T3710] RDX: 00007f227ad266e0 RSI: 0000000000000001 RDI: 00007f227ad265e0 [ 41.487359][ T3710] RBP: 00000000000000f9 R08: 0000000000000009 R09: 00000000000001bd [ 41.487371][ T3710] R10: 00000000000001d4 R11: 00007f227ad26540 R12: 0000000000000001 [ 41.487384][ T3710] R13: 00007f227c75bfc0 R14: 0000000000000020 R15: 00007f227ad265e0 [ 41.487449][ T3710] [ 41.487462][ T3710] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 41.676608][ T3679] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 41.685209][ T3679] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 41.695639][ T3710] loop3: detected capacity change from 0 to 512 [ 41.806343][ T3720] xt_CT: No such helper "netbios-ns" [ 41.959874][ T3734] FAULT_INJECTION: forcing a failure. [ 41.959874][ T3734] name failslab, interval 1, probability 0, space 0, times 0 [ 41.972679][ T3734] CPU: 0 UID: 0 PID: 3734 Comm: syz.3.96 Not tainted 6.15.0-syzkaller-09161-g0f70f5b08a47 #0 PREEMPT(voluntary) [ 41.972749][ T3734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 41.972762][ T3734] Call Trace: [ 41.972769][ T3734] [ 41.972777][ T3734] __dump_stack+0x1d/0x30 [ 41.972828][ T3734] dump_stack_lvl+0xe8/0x140 [ 41.972849][ T3734] dump_stack+0x15/0x1b [ 41.972865][ T3734] should_fail_ex+0x265/0x280 [ 41.972911][ T3734] should_failslab+0x8c/0xb0 [ 41.972938][ T3734] kmem_cache_alloc_noprof+0x50/0x310 [ 41.973110][ T3734] ? __break_lease+0x78/0xe80 [ 41.973151][ T3734] __break_lease+0x78/0xe80 [ 41.973191][ T3734] __vfs_setxattr_locked+0x12c/0x1d0 [ 41.973235][ T3734] vfs_setxattr+0x132/0x270 [ 41.973291][ T3734] file_setxattr+0x139/0x1b0 [ 41.973317][ T3734] path_setxattrat+0x290/0x310 [ 41.973358][ T3734] __x64_sys_fsetxattr+0x6b/0x80 [ 41.973385][ T3734] x64_sys_call+0x2f7c/0x2fb0 [ 41.973414][ T3734] do_syscall_64+0xd2/0x200 [ 41.973499][ T3734] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 41.973546][ T3734] ? clear_bhb_loop+0x40/0x90 [ 41.973571][ T3734] ? clear_bhb_loop+0x40/0x90 [ 41.973616][ T3734] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 41.973680][ T3734] RIP: 0033:0x7f227c6be969 [ 41.973697][ T3734] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 41.973715][ T3734] RSP: 002b:00007f227ad27038 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 41.973738][ T3734] RAX: ffffffffffffffda RBX: 00007f227c8e5fa0 RCX: 00007f227c6be969 [ 41.973753][ T3734] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000006 [ 41.973769][ T3734] RBP: 00007f227ad27090 R08: 0000000000000000 R09: 0000000000000000 [ 41.973784][ T3734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 41.973848][ T3734] R13: 0000000000000000 R14: 00007f227c8e5fa0 R15: 00007ffea3de61a8 [ 41.973867][ T3734] [ 42.271159][ T9] hid (null): report_id 12188 is invalid [ 42.277708][ T9] hid-generic 0007:0009:0007.0001: report_id 12188 is invalid [ 42.285324][ T9] hid-generic 0007:0009:0007.0001: item 0 2 1 8 parsing failed [ 42.298585][ T9] hid-generic 0007:0009:0007.0001: probe with driver hid-generic failed with error -22 [ 42.518540][ T3755] syz.2.104 uses obsolete (PF_INET,SOCK_PACKET) [ 42.578003][ T3762] netlink: 132 bytes leftover after parsing attributes in process `syz.3.106'. [ 42.591199][ T3762] netlink: 3 bytes leftover after parsing attributes in process `syz.3.106'. [ 42.607413][ T3762] batadv1: entered allmulticast mode [ 42.685892][ T3769] tipc: Can't bind to reserved service type 2 [ 42.693765][ T3767] loop2: detected capacity change from 0 to 512 [ 42.701110][ T3767] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 42.718259][ T3769] xt_hashlimit: size too large, truncated to 1048576 [ 42.725113][ T3769] xt_hashlimit: Unknown mode mask 80FF, kernel too old? [ 42.735974][ T3767] EXT4-fs (loop2): 1 truncate cleaned up [ 42.749161][ T3767] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 42.827759][ T3774] FAULT_INJECTION: forcing a failure. [ 42.827759][ T3774] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 42.840987][ T3774] CPU: 1 UID: 0 PID: 3774 Comm: syz.3.110 Not tainted 6.15.0-syzkaller-09161-g0f70f5b08a47 #0 PREEMPT(voluntary) [ 42.841050][ T3774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 42.841063][ T3774] Call Trace: [ 42.841070][ T3774] [ 42.841129][ T3774] __dump_stack+0x1d/0x30 [ 42.841155][ T3774] dump_stack_lvl+0xe8/0x140 [ 42.841200][ T3774] dump_stack+0x15/0x1b [ 42.841239][ T3774] should_fail_ex+0x265/0x280 [ 42.841279][ T3774] should_fail+0xb/0x20 [ 42.841315][ T3774] should_fail_usercopy+0x1a/0x20 [ 42.841395][ T3774] _copy_from_user+0x1c/0xb0 [ 42.841425][ T3774] memdup_user+0x5e/0xd0 [ 42.841457][ T3774] strndup_user+0x68/0xb0 [ 42.841564][ T3774] __se_sys_fsopen+0x3c/0x1e0 [ 42.841593][ T3774] __x64_sys_fsopen+0x31/0x40 [ 42.841661][ T3774] x64_sys_call+0x2a54/0x2fb0 [ 42.841691][ T3774] do_syscall_64+0xd2/0x200 [ 42.841720][ T3774] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 42.841747][ T3774] ? clear_bhb_loop+0x40/0x90 [ 42.841772][ T3774] ? clear_bhb_loop+0x40/0x90 [ 42.841802][ T3774] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 42.841831][ T3774] RIP: 0033:0x7f227c6be969 [ 42.841851][ T3774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 42.841874][ T3774] RSP: 002b:00007f227ad27038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ae [ 42.841966][ T3774] RAX: ffffffffffffffda RBX: 00007f227c8e5fa0 RCX: 00007f227c6be969 [ 42.841978][ T3774] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000240 [ 42.841991][ T3774] RBP: 00007f227ad27090 R08: 0000000000000000 R09: 0000000000000000 [ 42.842008][ T3774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 42.842038][ T3774] R13: 0000000000000000 R14: 00007f227c8e5fa0 R15: 00007ffea3de61a8 [ 42.842062][ T3774] [ 42.904260][ T3777] binfmt_misc: register: failed to install interpreter file ./file0 [ 43.062409][ T3779] FAULT_INJECTION: forcing a failure. [ 43.062409][ T3779] name failslab, interval 1, probability 0, space 0, times 0 [ 43.062949][ T3324] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.075102][ T3779] CPU: 1 UID: 0 PID: 3779 Comm: syz.0.112 Not tainted 6.15.0-syzkaller-09161-g0f70f5b08a47 #0 PREEMPT(voluntary) [ 43.075216][ T3779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 43.075235][ T3779] Call Trace: [ 43.075244][ T3779] [ 43.075256][ T3779] __dump_stack+0x1d/0x30 [ 43.075285][ T3779] dump_stack_lvl+0xe8/0x140 [ 43.075312][ T3779] dump_stack+0x15/0x1b [ 43.075335][ T3779] should_fail_ex+0x265/0x280 [ 43.075429][ T3779] should_failslab+0x8c/0xb0 [ 43.075499][ T3779] kmem_cache_alloc_noprof+0x50/0x310 [ 43.075536][ T3779] ? skb_clone+0x151/0x1f0 [ 43.075582][ T3779] skb_clone+0x151/0x1f0 [ 43.075619][ T3779] __netlink_deliver_tap+0x2c9/0x500 [ 43.075676][ T3779] netlink_unicast+0x64c/0x670 [ 43.075714][ T3779] netlink_sendmsg+0x58b/0x6b0 [ 43.075754][ T3779] ? __pfx_netlink_sendmsg+0x10/0x10 [ 43.075792][ T3779] __sock_sendmsg+0x142/0x180 [ 43.075838][ T3779] sock_write_iter+0x165/0x1b0 [ 43.075911][ T3779] do_iter_readv_writev+0x3eb/0x4b0 [ 43.075945][ T3779] vfs_writev+0x2df/0x8b0 [ 43.076056][ T3779] do_writev+0xe7/0x210 [ 43.076091][ T3779] __x64_sys_writev+0x45/0x50 [ 43.076141][ T3779] x64_sys_call+0x2006/0x2fb0 [ 43.076171][ T3779] do_syscall_64+0xd2/0x200 [ 43.076280][ T3779] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 43.076317][ T3779] ? clear_bhb_loop+0x40/0x90 [ 43.076435][ T3779] ? clear_bhb_loop+0x40/0x90 [ 43.076465][ T3779] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 43.076495][ T3779] RIP: 0033:0x7fec68dce969 [ 43.076531][ T3779] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 43.076556][ T3779] RSP: 002b:00007fec67437038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 43.076593][ T3779] RAX: ffffffffffffffda RBX: 00007fec68ff5fa0 RCX: 00007fec68dce969 [ 43.076663][ T3779] RDX: 0000000000000001 RSI: 0000200000000140 RDI: 0000000000000006 [ 43.076680][ T3779] RBP: 00007fec67437090 R08: 0000000000000000 R09: 0000000000000000 [ 43.076696][ T3779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 43.076713][ T3779] R13: 0000000000000000 R14: 00007fec68ff5fa0 R15: 00007ffd163aaeb8 [ 43.076738][ T3779] [ 43.431836][ T3802] netlink: 8 bytes leftover after parsing attributes in process `syz.4.120'. [ 43.913561][ T3818] binfmt_misc: register: failed to install interpreter file ./file0 [ 44.430414][ T3832] 9pnet_fd: Insufficient options for proto=fd [ 44.443512][ T3832] loop3: detected capacity change from 0 to 512 [ 44.485312][ T3832] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities [ 44.604223][ T29] kauditd_printk_skb: 215 callbacks suppressed [ 44.604291][ T29] audit: type=1400 audit(1748727076.921:425): avc: denied { setopt } for pid=3843 comm="syz.3.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 44.605459][ T3823] syzkaller0: entered promiscuous mode [ 44.635794][ T3823] syzkaller0: entered allmulticast mode [ 44.713911][ T29] audit: type=1400 audit(1748727077.031:426): avc: denied { read } for pid=3847 comm="syz.3.139" name="msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 44.736521][ T29] audit: type=1400 audit(1748727077.031:427): avc: denied { open } for pid=3847 comm="syz.3.139" path="/dev/cpu/0/msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 45.035381][ T29] audit: type=1326 audit(1748727077.351:428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3850 comm="syz.0.140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fec68dce969 code=0x7ffc0000 [ 45.118988][ T29] audit: type=1326 audit(1748727077.381:429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3850 comm="syz.0.140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fec68dce969 code=0x7ffc0000 [ 45.142381][ T29] audit: type=1326 audit(1748727077.381:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3850 comm="syz.0.140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=53 compat=0 ip=0x7fec68dce969 code=0x7ffc0000 [ 45.165766][ T29] audit: type=1326 audit(1748727077.381:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3850 comm="syz.0.140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fec68dce969 code=0x7ffc0000 [ 45.189212][ T29] audit: type=1326 audit(1748727077.381:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3850 comm="syz.0.140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fec68dce969 code=0x7ffc0000 [ 45.212550][ T29] audit: type=1326 audit(1748727077.381:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3850 comm="syz.0.140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fec68dcd2d0 code=0x7ffc0000 [ 45.235933][ T29] audit: type=1326 audit(1748727077.381:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3850 comm="syz.0.140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7fec68dd0197 code=0x7ffc0000 [ 45.405299][ T3872] FAULT_INJECTION: forcing a failure. [ 45.405299][ T3872] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 45.418467][ T3872] CPU: 0 UID: 0 PID: 3872 Comm: syz.3.147 Not tainted 6.15.0-syzkaller-09161-g0f70f5b08a47 #0 PREEMPT(voluntary) [ 45.418642][ T3872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 45.418658][ T3872] Call Trace: [ 45.418667][ T3872] [ 45.418792][ T3872] __dump_stack+0x1d/0x30 [ 45.418875][ T3872] dump_stack_lvl+0xe8/0x140 [ 45.418921][ T3872] dump_stack+0x15/0x1b [ 45.418942][ T3872] should_fail_ex+0x265/0x280 [ 45.418980][ T3872] should_fail+0xb/0x20 [ 45.419015][ T3872] should_fail_usercopy+0x1a/0x20 [ 45.419042][ T3872] _copy_from_user+0x1c/0xb0 [ 45.419071][ T3872] ipv6_flowlabel_opt+0xa3/0x1230 [ 45.419106][ T3872] ? selinux_file_open+0x2df/0x330 [ 45.419137][ T3872] ? __rcu_read_unlock+0x4f/0x70 [ 45.419248][ T3872] ? mntput_no_expire+0x6f/0x3d0 [ 45.419288][ T3872] ? mntput+0x4b/0x80 [ 45.419319][ T3872] ? _raw_spin_unlock_bh+0x36/0x40 [ 45.419432][ T3872] ? lock_sock_nested+0x112/0x140 [ 45.419476][ T3872] ? should_fail_ex+0xdb/0x280 [ 45.419511][ T3872] do_ipv6_setsockopt+0xc92/0x22e0 [ 45.419544][ T3872] ? kstrtoull+0x111/0x140 [ 45.419593][ T3872] ? __rcu_read_unlock+0x4f/0x70 [ 45.419621][ T3872] ? avc_has_perm_noaudit+0x1b1/0x200 [ 45.419727][ T3872] ? selinux_netlbl_socket_setsockopt+0x1f9/0x2d0 [ 45.419753][ T3872] ipv6_setsockopt+0x59/0x130 [ 45.419790][ T3872] tcp_setsockopt+0x98/0xb0 [ 45.419825][ T3872] sock_common_setsockopt+0x66/0x80 [ 45.419895][ T3872] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 45.419930][ T3872] __sys_setsockopt+0x184/0x200 [ 45.419962][ T3872] __x64_sys_setsockopt+0x64/0x80 [ 45.419997][ T3872] x64_sys_call+0x2bd5/0x2fb0 [ 45.420025][ T3872] do_syscall_64+0xd2/0x200 [ 45.420058][ T3872] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 45.420085][ T3872] ? clear_bhb_loop+0x40/0x90 [ 45.420125][ T3872] ? clear_bhb_loop+0x40/0x90 [ 45.420154][ T3872] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 45.420181][ T3872] RIP: 0033:0x7f227c6be969 [ 45.420206][ T3872] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 45.420229][ T3872] RSP: 002b:00007f227ad27038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 45.420333][ T3872] RAX: ffffffffffffffda RBX: 00007f227c8e5fa0 RCX: 00007f227c6be969 [ 45.420349][ T3872] RDX: 0000000000000020 RSI: 0000000000000029 RDI: 0000000000000003 [ 45.420373][ T3872] RBP: 00007f227ad27090 R08: 0000000000000021 R09: 0000000000000000 [ 45.420385][ T3872] R10: 00002000000000c0 R11: 0000000000000246 R12: 0000000000000001 [ 45.420461][ T3872] R13: 0000000000000000 R14: 00007f227c8e5fa0 R15: 00007ffea3de61a8 [ 45.420484][ T3872] [ 45.724061][ T3878] Zero length message leads to an empty skb [ 45.732477][ T3878] netlink: 'syz.4.150': attribute type 10 has an invalid length. [ 45.740324][ T3878] netlink: 2 bytes leftover after parsing attributes in process `syz.4.150'. [ 45.782687][ T3878] team0: entered promiscuous mode [ 45.787954][ T3878] team_slave_0: entered promiscuous mode [ 45.794015][ T3878] team_slave_1: entered promiscuous mode [ 45.805518][ T3878] bridge0: port 3(team0) entered blocking state [ 45.812025][ T3878] bridge0: port 3(team0) entered disabled state [ 45.822354][ T3878] team0: entered allmulticast mode [ 45.827972][ T3878] team_slave_0: entered allmulticast mode [ 45.833833][ T3878] team_slave_1: entered allmulticast mode [ 45.851864][ T3878] bridge0: port 3(team0) entered blocking state [ 45.858239][ T3878] bridge0: port 3(team0) entered forwarding state [ 45.924493][ T3893] loop3: detected capacity change from 0 to 128 [ 45.967910][ T3895] netlink: 'syz.2.159': attribute type 10 has an invalid length. [ 45.999219][ T3895] batman_adv: batadv0: Adding interface: team0 [ 46.005523][ T3895] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 46.006178][ T3898] atomic_op ffff88812438b928 conn xmit_atomic 0000000000000000 [ 46.030866][ T3895] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 46.074589][ T3898] netlink: 8 bytes leftover after parsing attributes in process `syz.4.160'. [ 46.083514][ T3898] netlink: 8 bytes leftover after parsing attributes in process `syz.4.160'. [ 46.095681][ T3900] capability: warning: `syz.0.161' uses deprecated v2 capabilities in a way that may be insecure [ 46.143679][ T3909] netlink: 'syz.2.159': attribute type 10 has an invalid length. [ 46.151600][ T3909] netlink: 2 bytes leftover after parsing attributes in process `syz.2.159'. [ 46.162773][ T3910] FAULT_INJECTION: forcing a failure. [ 46.162773][ T3910] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 46.175949][ T3910] CPU: 1 UID: 0 PID: 3910 Comm: syz.0.164 Not tainted 6.15.0-syzkaller-09161-g0f70f5b08a47 #0 PREEMPT(voluntary) [ 46.175982][ T3910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 46.176062][ T3910] Call Trace: [ 46.176070][ T3910] [ 46.176080][ T3910] __dump_stack+0x1d/0x30 [ 46.176107][ T3910] dump_stack_lvl+0xe8/0x140 [ 46.176133][ T3910] dump_stack+0x15/0x1b [ 46.176155][ T3910] should_fail_ex+0x265/0x280 [ 46.176197][ T3910] should_fail+0xb/0x20 [ 46.176301][ T3910] should_fail_usercopy+0x1a/0x20 [ 46.176326][ T3910] _copy_from_user+0x1c/0xb0 [ 46.176356][ T3910] copy_from_bpfptr+0x5c/0x90 [ 46.176400][ T3910] bpf_prog_load+0x74a/0x1070 [ 46.176482][ T3910] ? security_bpf+0x2b/0x90 [ 46.176577][ T3910] __sys_bpf+0x51d/0x790 [ 46.176627][ T3910] __x64_sys_bpf+0x41/0x50 [ 46.176692][ T3910] x64_sys_call+0x2478/0x2fb0 [ 46.176714][ T3910] do_syscall_64+0xd2/0x200 [ 46.176747][ T3910] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 46.176777][ T3910] ? clear_bhb_loop+0x40/0x90 [ 46.176798][ T3910] ? clear_bhb_loop+0x40/0x90 [ 46.176823][ T3910] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 46.176922][ T3910] RIP: 0033:0x7fec68dce969 [ 46.176937][ T3910] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 46.176959][ T3910] RSP: 002b:00007fec67437038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 46.176983][ T3910] RAX: ffffffffffffffda RBX: 00007fec68ff5fa0 RCX: 00007fec68dce969 [ 46.176999][ T3910] RDX: 0000000000000094 RSI: 00002000000007c0 RDI: 0000000000000005 [ 46.177015][ T3910] RBP: 00007fec67437090 R08: 0000000000000000 R09: 0000000000000000 [ 46.177063][ T3910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 46.177080][ T3910] R13: 0000000000000000 R14: 00007fec68ff5fa0 R15: 00007ffd163aaeb8 [ 46.177104][ T3910] [ 46.371772][ T3909] team0: entered promiscuous mode [ 46.376885][ T3909] team_slave_0: entered promiscuous mode [ 46.382712][ T3909] team_slave_1: entered promiscuous mode [ 46.389769][ T3909] 8021q: adding VLAN 0 to HW filter on device team0 [ 46.400683][ T3909] batman_adv: batadv0: Interface activated: team0 [ 46.407351][ T3909] batman_adv: batadv0: Interface deactivated: team0 [ 46.414018][ T3909] batman_adv: batadv0: Removing interface: team0 [ 46.482890][ T3912] ipvlan2: entered promiscuous mode [ 46.503343][ T3912] bridge0: port 4(ipvlan2) entered blocking state [ 46.509892][ T3912] bridge0: port 4(ipvlan2) entered disabled state [ 46.516814][ T3912] ipvlan2: entered allmulticast mode [ 46.522283][ T3912] bridge0: entered allmulticast mode [ 46.528105][ T3912] ipvlan2: left allmulticast mode [ 46.533276][ T3912] bridge0: left allmulticast mode [ 46.872541][ T3959] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 46.882413][ T3959] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 47.052505][ T3976] $Hÿ: renamed from bond0 (while UP) [ 47.059794][ T3976] $Hÿ: entered promiscuous mode [ 47.064968][ T3976] bond_slave_0: entered promiscuous mode [ 47.071068][ T3976] bond_slave_1: entered promiscuous mode [ 47.285337][ T3990] binfmt_misc: register: failed to install interpreter file ./file0 [ 47.820333][ T4013] FAULT_INJECTION: forcing a failure. [ 47.820333][ T4013] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 47.833801][ T4013] CPU: 1 UID: 0 PID: 4013 Comm: syz.4.198 Not tainted 6.15.0-syzkaller-09161-g0f70f5b08a47 #0 PREEMPT(voluntary) [ 47.833888][ T4013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 47.833967][ T4013] Call Trace: [ 47.833974][ T4013] [ 47.833982][ T4013] __dump_stack+0x1d/0x30 [ 47.834010][ T4013] dump_stack_lvl+0xe8/0x140 [ 47.834036][ T4013] dump_stack+0x15/0x1b [ 47.834059][ T4013] should_fail_ex+0x265/0x280 [ 47.834167][ T4013] should_fail_alloc_page+0xf2/0x100 [ 47.834192][ T4013] __alloc_frozen_pages_noprof+0xff/0x360 [ 47.834232][ T4013] alloc_pages_mpol+0xb3/0x250 [ 47.834274][ T4013] alloc_migration_target_by_mpol+0x11b/0x280 [ 47.834344][ T4013] migrate_pages_batch+0x2e4/0x17d0 [ 47.834370][ T4013] ? sysvec_apic_timer_interrupt+0x44/0x80 [ 47.834395][ T4013] ? __pfx_alloc_migration_target_by_mpol+0x10/0x10 [ 47.834450][ T4013] ? kcsan_setup_watchpoint+0x415/0x430 [ 47.834482][ T4013] migrate_pages+0xf5f/0x1770 [ 47.834516][ T4013] ? __pfx_alloc_migration_target_by_mpol+0x10/0x10 [ 47.834633][ T4013] __se_sys_mbind+0x975/0xac0 [ 47.834675][ T4013] __x64_sys_mbind+0x78/0x90 [ 47.834712][ T4013] x64_sys_call+0x14af/0x2fb0 [ 47.834784][ T4013] do_syscall_64+0xd2/0x200 [ 47.834818][ T4013] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 47.834845][ T4013] ? clear_bhb_loop+0x40/0x90 [ 47.834867][ T4013] ? clear_bhb_loop+0x40/0x90 [ 47.834897][ T4013] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 47.834923][ T4013] RIP: 0033:0x7feb8904e969 [ 47.834939][ T4013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 47.835032][ T4013] RSP: 002b:00007feb87696038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 47.835057][ T4013] RAX: ffffffffffffffda RBX: 00007feb89276080 RCX: 00007feb8904e969 [ 47.835070][ T4013] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000001000 [ 47.835097][ T4013] RBP: 00007feb87696090 R08: 0000000000000000 R09: 0000000000000002 [ 47.835113][ T4013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 47.835128][ T4013] R13: 0000000000000000 R14: 00007feb89276080 R15: 00007ffc24403af8 [ 47.835151][ T4013] [ 48.216071][ T4023] FAULT_INJECTION: forcing a failure. [ 48.216071][ T4023] name failslab, interval 1, probability 0, space 0, times 0 [ 48.228774][ T4023] CPU: 0 UID: 0 PID: 4023 Comm: syz.2.200 Not tainted 6.15.0-syzkaller-09161-g0f70f5b08a47 #0 PREEMPT(voluntary) [ 48.228805][ T4023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 48.228817][ T4023] Call Trace: [ 48.228876][ T4023] [ 48.228884][ T4023] __dump_stack+0x1d/0x30 [ 48.228910][ T4023] dump_stack_lvl+0xe8/0x140 [ 48.228953][ T4023] dump_stack+0x15/0x1b [ 48.228973][ T4023] should_fail_ex+0x265/0x280 [ 48.229011][ T4023] should_failslab+0x8c/0xb0 [ 48.229119][ T4023] __kmalloc_noprof+0xa5/0x3e0 [ 48.229147][ T4023] ? security_prepare_creds+0x52/0x120 [ 48.229174][ T4023] security_prepare_creds+0x52/0x120 [ 48.229197][ T4023] prepare_creds+0x34a/0x4c0 [ 48.229220][ T4023] lookup_user_key+0x12a/0xd10 [ 48.229308][ T4023] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 48.229355][ T4023] __se_sys_request_key+0x174/0x290 [ 48.229429][ T4023] ? fput+0x8f/0xc0 [ 48.229466][ T4023] __x64_sys_request_key+0x55/0x70 [ 48.229500][ T4023] x64_sys_call+0x2f19/0x2fb0 [ 48.229530][ T4023] do_syscall_64+0xd2/0x200 [ 48.229617][ T4023] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 48.229704][ T4023] ? clear_bhb_loop+0x40/0x90 [ 48.229726][ T4023] ? clear_bhb_loop+0x40/0x90 [ 48.229815][ T4023] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 48.229853][ T4023] RIP: 0033:0x7f5e14c4e969 [ 48.229870][ T4023] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 48.229894][ T4023] RSP: 002b:00007f5e132b7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 48.229919][ T4023] RAX: ffffffffffffffda RBX: 00007f5e14e75fa0 RCX: 00007f5e14c4e969 [ 48.229934][ T4023] RDX: 00002000000000c0 RSI: 0000200000000000 RDI: 0000200000000040 [ 48.229995][ T4023] RBP: 00007f5e132b7090 R08: 0000000000000000 R09: 0000000000000000 [ 48.230011][ T4023] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 48.230028][ T4023] R13: 0000000000000000 R14: 00007f5e14e75fa0 R15: 00007fff0a8fe818 [ 48.230049][ T4023] [ 48.679084][ T4052] loop2: detected capacity change from 0 to 8192 [ 48.780150][ T4058] loop4: detected capacity change from 0 to 512 [ 48.827253][ T4058] EXT4-fs warning (device loop4): ext4_multi_mount_protect:398: Unable to create kmmpd thread for loop4. [ 49.011706][ T4070] netlink: 20 bytes leftover after parsing attributes in process `syz.2.222'. [ 49.076263][ T4073] binfmt_misc: register: failed to install interpreter file ./file0 [ 49.246744][ T4080] loop4: detected capacity change from 0 to 8192 [ 49.316242][ T4088] netlink: 4 bytes leftover after parsing attributes in process `syz.2.229'. [ 49.361330][ T4090] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 49.577231][ T4109] binfmt_misc: register: failed to install interpreter file ./file0 [ 49.620815][ T4113] xt_hashlimit: max too large, truncated to 1048576 [ 49.631266][ T4113] FAULT_INJECTION: forcing a failure. [ 49.631266][ T4113] name failslab, interval 1, probability 0, space 0, times 0 [ 49.643948][ T4113] CPU: 1 UID: 0 PID: 4113 Comm: syz.1.236 Not tainted 6.15.0-syzkaller-09161-g0f70f5b08a47 #0 PREEMPT(voluntary) [ 49.643984][ T4113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 49.644000][ T4113] Call Trace: [ 49.644008][ T4113] [ 49.644017][ T4113] __dump_stack+0x1d/0x30 [ 49.644043][ T4113] dump_stack_lvl+0xe8/0x140 [ 49.644064][ T4113] dump_stack+0x15/0x1b [ 49.644080][ T4113] should_fail_ex+0x265/0x280 [ 49.644188][ T4113] should_failslab+0x8c/0xb0 [ 49.644217][ T4113] __kvmalloc_node_noprof+0x126/0x4f0 [ 49.644299][ T4113] ? nf_hook_entries_grow+0x1bc/0x450 [ 49.644359][ T4113] ? rcu_segcblist_enqueue+0x92/0xb0 [ 49.644437][ T4113] nf_hook_entries_grow+0x1bc/0x450 [ 49.644468][ T4113] __nf_register_net_hook+0x18e/0x480 [ 49.644550][ T4113] nf_register_net_hook+0x88/0x130 [ 49.644575][ T4113] nf_register_net_hooks+0x44/0x150 [ 49.644654][ T4113] nf_ct_netns_do_get+0x2b1/0x380 [ 49.644708][ T4113] nf_ct_netns_get+0x87/0xc0 [ 49.644734][ T4113] conntrack_mt_check+0x35/0xa0 [ 49.644763][ T4113] xt_check_match+0x2ad/0x4f0 [ 49.644794][ T4113] ? xt_find_match+0x1d1/0x210 [ 49.644821][ T4113] ? xt_find_match+0x1b5/0x210 [ 49.644878][ T4113] translate_table+0xa9c/0xf90 [ 49.644912][ T4113] ? _copy_from_user+0x89/0xb0 [ 49.644942][ T4113] do_ipt_set_ctl+0x66f/0x820 [ 49.644972][ T4113] nf_setsockopt+0x196/0x1b0 [ 49.645080][ T4113] ip_setsockopt+0x102/0x110 [ 49.645179][ T4113] udp_setsockopt+0x99/0xb0 [ 49.645202][ T4113] sock_common_setsockopt+0x66/0x80 [ 49.645247][ T4113] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 49.645339][ T4113] __sys_setsockopt+0x184/0x200 [ 49.645376][ T4113] __x64_sys_setsockopt+0x64/0x80 [ 49.645408][ T4113] x64_sys_call+0x2bd5/0x2fb0 [ 49.645432][ T4113] do_syscall_64+0xd2/0x200 [ 49.645458][ T4113] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 49.645575][ T4113] ? clear_bhb_loop+0x40/0x90 [ 49.645596][ T4113] ? clear_bhb_loop+0x40/0x90 [ 49.645694][ T4113] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 49.645723][ T4113] RIP: 0033:0x7f144c90e969 [ 49.645744][ T4113] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 49.645765][ T4113] RSP: 002b:00007f144af56038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 49.645783][ T4113] RAX: ffffffffffffffda RBX: 00007f144cb36080 RCX: 00007f144c90e969 [ 49.645795][ T4113] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000005 [ 49.645807][ T4113] RBP: 00007f144af56090 R08: 00000000000003c8 R09: 0000000000000000 [ 49.645838][ T4113] R10: 0000200000000540 R11: 0000000000000246 R12: 0000000000000002 [ 49.645851][ T4113] R13: 0000000000000000 R14: 00007f144cb36080 R15: 00007fff72954f78 [ 49.645913][ T4113] [ 49.645925][ T4113] xt_conntrack: cannot load conntrack support for proto=2 [ 49.731022][ T4104] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 49.734517][ T29] kauditd_printk_skb: 372 callbacks suppressed [ 49.734535][ T29] audit: type=1400 audit(1748727082.051:805): avc: denied { read write } for pid=4103 comm="syz.4.235" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 49.762464][ T4104] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 49.763274][ T29] audit: type=1400 audit(1748727082.051:806): avc: denied { open } for pid=4103 comm="syz.4.235" path="/dev/raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 49.994878][ T29] audit: type=1400 audit(1748727082.051:807): avc: denied { ioctl } for pid=4103 comm="syz.4.235" path="/dev/raw-gadget" dev="devtmpfs" ino=142 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 50.038483][ T4121] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 50.057177][ T4121] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 50.073910][ T4121] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 50.124989][ T29] audit: type=1400 audit(1748727082.441:808): avc: denied { getopt } for pid=4125 comm="syz.3.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 50.145332][ T4126] hub 9-0:1.0: USB hub found [ 50.150274][ T4121] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 50.158883][ T4126] hub 9-0:1.0: 8 ports detected [ 50.174063][ T4121] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 50.183932][ T4126] loop3: detected capacity change from 0 to 512 [ 50.210306][ T4121] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 50.218396][ T4126] EXT4-fs error (device loop3): ext4_orphan_get:1393: inode #15: comm syz.3.243: casefold flag without casefold feature [ 50.235804][ T4126] EXT4-fs error (device loop3): ext4_orphan_get:1398: comm syz.3.243: couldn't read orphan inode 15 (err -117) [ 50.249187][ T4121] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(19) [ 50.255869][ T4121] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 50.263478][ T4121] vhci_hcd vhci_hcd.0: Device attached [ 50.270754][ T4126] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 50.284749][ T4129] vhci_hcd: connection closed [ 50.284970][ T31] vhci_hcd: stop threads [ 50.294076][ T31] vhci_hcd: release socket [ 50.298573][ T31] vhci_hcd: disconnect device [ 50.300263][ T29] audit: type=1400 audit(1748727082.601:809): avc: denied { mount } for pid=4125 comm="syz.3.243" name="/" dev="loop3" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 50.324862][ T29] audit: type=1400 audit(1748727082.601:810): avc: denied { add_name } for pid=4125 comm="syz.3.243" name="cpuset.effective_cpus" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 50.346924][ T29] audit: type=1400 audit(1748727082.601:811): avc: denied { create } for pid=4125 comm="syz.3.243" name="cpuset.effective_cpus" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 50.382249][ T29] audit: type=1400 audit(1748727082.681:812): avc: denied { read append open } for pid=4125 comm="syz.3.243" path="/44/file0/cpuset.effective_cpus" dev="loop3" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 50.407211][ T29] audit: type=1400 audit(1748727082.681:813): avc: denied { ioctl } for pid=4125 comm="syz.3.243" path="/44/file0/cpuset.effective_cpus" dev="loop3" ino=18 ioctlcmd=0x9375 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 50.432635][ T29] audit: type=1400 audit(1748727082.691:814): avc: denied { create } for pid=4125 comm="syz.3.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 50.454054][ T3322] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 50.537422][ T4140] binfmt_misc: register: failed to install interpreter file ./file0 [ 50.569946][ T4145] netlink: 'syz.4.250': attribute type 21 has an invalid length. [ 50.577808][ T4145] netlink: 128 bytes leftover after parsing attributes in process `syz.4.250'. [ 50.593942][ T4145] FAULT_INJECTION: forcing a failure. [ 50.593942][ T4145] name failslab, interval 1, probability 0, space 0, times 0 [ 50.606769][ T4145] CPU: 1 UID: 0 PID: 4145 Comm: syz.4.250 Not tainted 6.15.0-syzkaller-09161-g0f70f5b08a47 #0 PREEMPT(voluntary) [ 50.606803][ T4145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 50.606819][ T4145] Call Trace: [ 50.606826][ T4145] [ 50.606836][ T4145] __dump_stack+0x1d/0x30 [ 50.606861][ T4145] dump_stack_lvl+0xe8/0x140 [ 50.606900][ T4145] dump_stack+0x15/0x1b [ 50.606921][ T4145] should_fail_ex+0x265/0x280 [ 50.606959][ T4145] should_failslab+0x8c/0xb0 [ 50.606981][ T4145] __kmalloc_noprof+0xa5/0x3e0 [ 50.607019][ T4145] ? fib_create_info+0xbb1/0x1980 [ 50.607059][ T4145] fib_create_info+0xbb1/0x1980 [ 50.607108][ T4145] fib_table_insert+0x60/0xeb0 [ 50.607264][ T4145] ? fib_trie_table+0xd0/0xf0 [ 50.607305][ T4145] ? fib_new_table+0x1ac/0x1c0 [ 50.607334][ T4145] inet_rtm_newroute+0xab/0x140 [ 50.607396][ T4145] ? __pfx_inet_rtm_newroute+0x10/0x10 [ 50.607431][ T4145] rtnetlink_rcv_msg+0x5fb/0x6d0 [ 50.607480][ T4145] netlink_rcv_skb+0x123/0x220 [ 50.607544][ T4145] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 50.607664][ T4145] rtnetlink_rcv+0x1c/0x30 [ 50.607693][ T4145] netlink_unicast+0x59e/0x670 [ 50.607806][ T4145] netlink_sendmsg+0x58b/0x6b0 [ 50.607845][ T4145] ? __pfx_netlink_sendmsg+0x10/0x10 [ 50.607880][ T4145] __sock_sendmsg+0x142/0x180 [ 50.607919][ T4145] ____sys_sendmsg+0x31e/0x4e0 [ 50.608045][ T4145] ___sys_sendmsg+0x17b/0x1d0 [ 50.608181][ T4145] __x64_sys_sendmsg+0xd4/0x160 [ 50.608225][ T4145] x64_sys_call+0x2999/0x2fb0 [ 50.608254][ T4145] do_syscall_64+0xd2/0x200 [ 50.608287][ T4145] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 50.608395][ T4145] ? clear_bhb_loop+0x40/0x90 [ 50.608485][ T4145] ? clear_bhb_loop+0x40/0x90 [ 50.608515][ T4145] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 50.608543][ T4145] RIP: 0033:0x7feb8904e969 [ 50.608567][ T4145] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 50.608591][ T4145] RSP: 002b:00007feb876b7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 50.608616][ T4145] RAX: ffffffffffffffda RBX: 00007feb89275fa0 RCX: 00007feb8904e969 [ 50.608633][ T4145] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 50.608649][ T4145] RBP: 00007feb876b7090 R08: 0000000000000000 R09: 0000000000000000 [ 50.608664][ T4145] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 50.608680][ T4145] R13: 0000000000000000 R14: 00007feb89275fa0 R15: 00007ffc24403af8 [ 50.608731][ T4145] [ 50.877898][ T4149] loop0: detected capacity change from 0 to 512 [ 50.913645][ T4149] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm syz.0.251: bg 0: block 248: padding at end of block bitmap is not set [ 50.934294][ T4149] EXT4-fs error (device loop0): ext4_acquire_dquot:6933: comm syz.0.251: Failed to acquire dquot type 1 [ 50.947203][ T4149] EXT4-fs (loop0): 1 truncate cleaned up [ 50.954242][ T4149] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 50.967025][ T4149] ext4 filesystem being mounted at /48/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 51.025871][ T3316] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 51.066508][ T4170] usb usb9: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 51.074049][ T4170] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 51.192622][ T4188] netlink: 8 bytes leftover after parsing attributes in process `syz.4.264'. [ 51.206647][ T4160] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 51.226678][ T4160] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 51.363580][ T4193] wireguard0: entered promiscuous mode [ 51.412030][ T4195] 9pnet_fd: Insufficient options for proto=fd [ 51.418394][ T4194] 9pnet_fd: Insufficient options for proto=fd [ 51.569420][ T4210] vhci_hcd: invalid port number 23 [ 51.576097][ T4210] netlink: 12 bytes leftover after parsing attributes in process `syz.2.274'. [ 52.077268][ T4245] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 52.360777][ T4254] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 52.369325][ T4254] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 52.684306][ T4275] netlink: 24 bytes leftover after parsing attributes in process `syz.4.294'. [ 52.697361][ T4276] netlink: 8 bytes leftover after parsing attributes in process `syz.2.292'. [ 52.707890][ T4275] FAULT_INJECTION: forcing a failure. [ 52.707890][ T4275] name failslab, interval 1, probability 0, space 0, times 0 [ 52.720730][ T4275] CPU: 0 UID: 0 PID: 4275 Comm: syz.4.294 Not tainted 6.15.0-syzkaller-09161-g0f70f5b08a47 #0 PREEMPT(voluntary) [ 52.720758][ T4275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 52.720771][ T4275] Call Trace: [ 52.720829][ T4275] [ 52.720839][ T4275] __dump_stack+0x1d/0x30 [ 52.720867][ T4275] dump_stack_lvl+0xe8/0x140 [ 52.720893][ T4275] dump_stack+0x15/0x1b [ 52.720914][ T4275] should_fail_ex+0x265/0x280 [ 52.721011][ T4275] should_failslab+0x8c/0xb0 [ 52.721040][ T4275] kmem_cache_alloc_node_noprof+0x57/0x320 [ 52.721077][ T4275] ? __alloc_skb+0x101/0x320 [ 52.721100][ T4275] __alloc_skb+0x101/0x320 [ 52.721220][ T4275] netlink_alloc_large_skb+0xba/0xf0 [ 52.721246][ T4275] netlink_sendmsg+0x3cf/0x6b0 [ 52.721325][ T4275] ? __pfx_netlink_sendmsg+0x10/0x10 [ 52.721419][ T4275] __sock_sendmsg+0x142/0x180 [ 52.721461][ T4275] ____sys_sendmsg+0x31e/0x4e0 [ 52.721496][ T4275] ___sys_sendmsg+0x17b/0x1d0 [ 52.721548][ T4275] __x64_sys_sendmsg+0xd4/0x160 [ 52.721607][ T4275] x64_sys_call+0x2999/0x2fb0 [ 52.721658][ T4275] do_syscall_64+0xd2/0x200 [ 52.721684][ T4275] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 52.721716][ T4275] ? clear_bhb_loop+0x40/0x90 [ 52.721745][ T4275] ? clear_bhb_loop+0x40/0x90 [ 52.721787][ T4275] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 52.721809][ T4275] RIP: 0033:0x7feb8904e969 [ 52.721830][ T4275] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 52.721854][ T4275] RSP: 002b:00007feb876b7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 52.721875][ T4275] RAX: ffffffffffffffda RBX: 00007feb89275fa0 RCX: 00007feb8904e969 [ 52.721889][ T4275] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000003 [ 52.721991][ T4275] RBP: 00007feb876b7090 R08: 0000000000000000 R09: 0000000000000000 [ 52.722007][ T4275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 52.722022][ T4275] R13: 0000000000000000 R14: 00007feb89275fa0 R15: 00007ffc24403af8 [ 52.722048][ T4275] [ 53.073156][ T4292] ======================================================= [ 53.073156][ T4292] WARNING: The mand mount option has been deprecated and [ 53.073156][ T4292] and is ignored by this kernel. Remove the mand [ 53.073156][ T4292] option from the mount to silence this warning. [ 53.073156][ T4292] ======================================================= [ 53.115970][ T4290] ipvlan2: entered promiscuous mode [ 53.122147][ T4290] bridge0: port 3(ipvlan2) entered blocking state [ 53.128913][ T4290] bridge0: port 3(ipvlan2) entered disabled state [ 53.140559][ T4290] ipvlan2: entered allmulticast mode [ 53.145934][ T4290] bridge0: entered allmulticast mode [ 53.151980][ T4290] ipvlan2: left allmulticast mode [ 53.157059][ T4290] bridge0: left allmulticast mode [ 53.186490][ T4288] ipvlan2: entered promiscuous mode [ 53.193084][ T4288] bridge0: port 3(ipvlan2) entered blocking state [ 53.199589][ T4288] bridge0: port 3(ipvlan2) entered disabled state [ 53.210085][ T4288] ipvlan2: entered allmulticast mode [ 53.215478][ T4288] bridge0: entered allmulticast mode [ 53.221534][ T4288] ipvlan2: left allmulticast mode [ 53.226622][ T4288] bridge0: left allmulticast mode [ 53.239285][ T4297] FAULT_INJECTION: forcing a failure. [ 53.239285][ T4297] name failslab, interval 1, probability 0, space 0, times 0 [ 53.252647][ T4297] CPU: 0 UID: 0 PID: 4297 Comm: syz.0.302 Not tainted 6.15.0-syzkaller-09161-g0f70f5b08a47 #0 PREEMPT(voluntary) [ 53.252680][ T4297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 53.252693][ T4297] Call Trace: [ 53.252699][ T4297] [ 53.252705][ T4297] __dump_stack+0x1d/0x30 [ 53.252726][ T4297] dump_stack_lvl+0xe8/0x140 [ 53.252809][ T4297] dump_stack+0x15/0x1b [ 53.252831][ T4297] should_fail_ex+0x265/0x280 [ 53.252873][ T4297] should_failslab+0x8c/0xb0 [ 53.252919][ T4297] kmem_cache_alloc_noprof+0x50/0x310 [ 53.252947][ T4297] ? getname_flags+0x80/0x3b0 [ 53.253013][ T4297] getname_flags+0x80/0x3b0 [ 53.253035][ T4297] user_path_at+0x28/0x130 [ 53.253136][ T4297] __se_sys_mount+0x25b/0x2e0 [ 53.253156][ T4297] __x64_sys_mount+0x67/0x80 [ 53.253176][ T4297] x64_sys_call+0xd36/0x2fb0 [ 53.253267][ T4297] do_syscall_64+0xd2/0x200 [ 53.253351][ T4297] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 53.253371][ T4297] ? clear_bhb_loop+0x40/0x90 [ 53.253390][ T4297] ? clear_bhb_loop+0x40/0x90 [ 53.253410][ T4297] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 53.253448][ T4297] RIP: 0033:0x7fec68dce969 [ 53.253461][ T4297] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 53.253477][ T4297] RSP: 002b:00007fec67437038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 53.253494][ T4297] RAX: ffffffffffffffda RBX: 00007fec68ff5fa0 RCX: 00007fec68dce969 [ 53.253562][ T4297] RDX: 00002000000002c0 RSI: 0000200000000280 RDI: 0000200000000100 [ 53.253573][ T4297] RBP: 00007fec67437090 R08: 0000200000000300 R09: 0000000000000000 [ 53.253584][ T4297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 53.253595][ T4297] R13: 0000000000000000 R14: 00007fec68ff5fa0 R15: 00007ffd163aaeb8 [ 53.253692][ T4297] [ 53.493320][ T4303] netlink: 'syz.2.304': attribute type 1 has an invalid length. [ 53.508292][ T4303] 8021q: adding VLAN 0 to HW filter on device bond1 [ 53.524547][ T4303] 8021q: adding VLAN 0 to HW filter on device bond1 [ 53.531990][ T4303] bond1: (slave vxcan3): The slave device specified does not support setting the MAC address [ 53.544020][ T4303] bond1: (slave vxcan3): Error -95 calling set_mac_address [ 53.703803][ T4312] netlink: 12 bytes leftover after parsing attributes in process `syz.0.307'. [ 53.804283][ T4310] loop1: detected capacity change from 0 to 32768 [ 53.850635][ T3303] loop1: p1 p3 < p5 p6 > [ 53.865227][ T4310] loop1: p1 p3 < p5 p6 > [ 54.011312][ T3310] udevd[3310]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 54.024846][ T3485] udevd[3485]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 54.037989][ T4323] udevd[4323]: inotify_add_watch(7, /dev/loop1p5, 10) failed: No such file or directory [ 54.065511][ T4324] udevd[4324]: inotify_add_watch(7, /dev/loop1p6, 10) failed: No such file or directory [ 54.120987][ T4043] udevd[4043]: inotify_add_watch(7, /dev/loop1p6, 10) failed: No such file or directory [ 54.121791][ T3485] udevd[3485]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 54.132229][ T3303] udevd[3303]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 54.151879][ T4324] udevd[4324]: inotify_add_watch(7, /dev/loop1p5, 10) failed: No such file or directory [ 54.181995][ T4328] netlink: 8 bytes leftover after parsing attributes in process `syz.2.314'. [ 54.213038][ T3485] udevd[3485]: inotify_add_watch(7, /dev/loop1p6, 10) failed: No such file or directory [ 54.244918][ T4332] ipvlan2: entered promiscuous mode [ 54.252570][ T4332] bridge0: port 4(ipvlan2) entered blocking state [ 54.259057][ T4332] bridge0: port 4(ipvlan2) entered disabled state [ 54.265967][ T4332] ipvlan2: entered allmulticast mode [ 54.271414][ T4332] bridge0: entered allmulticast mode [ 54.277652][ T4332] ipvlan2: left allmulticast mode [ 54.282915][ T4332] bridge0: left allmulticast mode [ 54.402019][ T4330] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 54.416156][ T4330] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 54.868269][ T4343] netlink: 'syz.3.319': attribute type 21 has an invalid length. [ 54.876238][ T4343] netlink: 128 bytes leftover after parsing attributes in process `syz.3.319'. [ 54.885565][ T4343] netlink: 'syz.3.319': attribute type 4 has an invalid length. [ 54.893400][ T4343] netlink: 3 bytes leftover after parsing attributes in process `syz.3.319'. [ 54.903809][ T29] kauditd_printk_skb: 239 callbacks suppressed [ 54.903824][ T29] audit: type=1326 audit(1748727087.221:1052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4342 comm="syz.3.319" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f227c6be969 code=0x7ffc0000 [ 54.912351][ T4343] loop3: detected capacity change from 0 to 1024 [ 54.933508][ T29] audit: type=1326 audit(1748727087.221:1053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4342 comm="syz.3.319" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f227c6be969 code=0x7ffc0000 [ 54.933611][ T29] audit: type=1326 audit(1748727087.221:1054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4342 comm="syz.3.319" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f227c6be969 code=0x7ffc0000 [ 54.942449][ T4343] EXT4-fs: Ignoring removed orlov option [ 54.963258][ T29] audit: type=1326 audit(1748727087.221:1055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4342 comm="syz.3.319" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f227c6be969 code=0x7ffc0000 [ 54.963294][ T29] audit: type=1326 audit(1748727087.221:1056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4342 comm="syz.3.319" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f227c6be969 code=0x7ffc0000 [ 54.963322][ T29] audit: type=1326 audit(1748727087.221:1057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4342 comm="syz.3.319" exe="/root/syz-executor" sig=0 arch=c000003e syscall=252 compat=0 ip=0x7f227c6be969 code=0x7ffc0000 [ 55.030266][ T29] audit: type=1326 audit(1748727087.221:1058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4342 comm="syz.3.319" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f227c6be969 code=0x7ffc0000 [ 55.086466][ T29] audit: type=1326 audit(1748727087.221:1059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4342 comm="syz.3.319" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f227c6be969 code=0x7ffc0000 [ 55.091743][ T4343] EXT4-fs (loop3): stripe (5) is not aligned with cluster size (16), stripe is disabled [ 55.109835][ T29] audit: type=1326 audit(1748727087.221:1060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4342 comm="syz.3.319" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f227c6be969 code=0x7ffc0000 [ 55.143183][ T29] audit: type=1326 audit(1748727087.221:1061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4342 comm="syz.3.319" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f227c6be969 code=0x7ffc0000 [ 55.221343][ T4343] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 55.312975][ T3322] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 55.513632][ T4372] ÿÿÿÿÿÿ: renamed from vlan1 (while UP) [ 55.605998][ T4376] netlink: 8 bytes leftover after parsing attributes in process `syz.3.331'. [ 55.765368][ T4388] ipvlan2: entered promiscuous mode [ 55.772103][ T4388] bridge0: port 4(ipvlan2) entered blocking state [ 55.778645][ T4388] bridge0: port 4(ipvlan2) entered disabled state [ 55.785503][ T4388] ipvlan2: entered allmulticast mode [ 55.790940][ T4388] bridge0: entered allmulticast mode [ 55.796663][ T4388] ipvlan2: left allmulticast mode [ 55.801748][ T4388] bridge0: left allmulticast mode [ 56.176234][ T4417] FAULT_INJECTION: forcing a failure. [ 56.176234][ T4417] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 56.189457][ T4417] CPU: 1 UID: 0 PID: 4417 Comm: syz.4.347 Not tainted 6.15.0-syzkaller-09161-g0f70f5b08a47 #0 PREEMPT(voluntary) [ 56.189492][ T4417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 56.189508][ T4417] Call Trace: [ 56.189516][ T4417] [ 56.189526][ T4417] __dump_stack+0x1d/0x30 [ 56.189585][ T4417] dump_stack_lvl+0xe8/0x140 [ 56.189602][ T4417] dump_stack+0x15/0x1b [ 56.189617][ T4417] should_fail_ex+0x265/0x280 [ 56.189654][ T4417] should_fail+0xb/0x20 [ 56.189690][ T4417] should_fail_usercopy+0x1a/0x20 [ 56.189706][ T4417] _copy_to_user+0x20/0xa0 [ 56.189727][ T4417] simple_read_from_buffer+0xb5/0x130 [ 56.189820][ T4417] proc_fail_nth_read+0x100/0x140 [ 56.189840][ T4417] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 56.189857][ T4417] vfs_read+0x1a0/0x6f0 [ 56.189955][ T4417] ? __rcu_read_unlock+0x4f/0x70 [ 56.189974][ T4417] ? __rcu_read_unlock+0x4f/0x70 [ 56.190068][ T4417] ? __fget_files+0x184/0x1c0 [ 56.190154][ T4417] ksys_read+0xda/0x1a0 [ 56.190172][ T4417] __x64_sys_read+0x40/0x50 [ 56.190188][ T4417] x64_sys_call+0x2d77/0x2fb0 [ 56.190242][ T4417] do_syscall_64+0xd2/0x200 [ 56.190278][ T4417] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 56.190364][ T4417] ? clear_bhb_loop+0x40/0x90 [ 56.190384][ T4417] ? clear_bhb_loop+0x40/0x90 [ 56.190417][ T4417] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 56.190445][ T4417] RIP: 0033:0x7feb8904d37c [ 56.190460][ T4417] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 56.190488][ T4417] RSP: 002b:00007feb876b7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 56.190508][ T4417] RAX: ffffffffffffffda RBX: 00007feb89275fa0 RCX: 00007feb8904d37c [ 56.190525][ T4417] RDX: 000000000000000f RSI: 00007feb876b70a0 RDI: 0000000000000003 [ 56.190539][ T4417] RBP: 00007feb876b7090 R08: 0000000000000000 R09: 0000000000000000 [ 56.190616][ T4417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 56.190632][ T4417] R13: 0000000000000001 R14: 00007feb89275fa0 R15: 00007ffc24403af8 [ 56.190715][ T4417] [ 56.432214][ T4423] ================================================================== [ 56.440359][ T4423] BUG: KCSAN: data-race in mas_replace_node / mas_state_walk [ 56.447781][ T4423] [ 56.450129][ T4423] write to 0xffff888106d08500 of 8 bytes by task 4420 on cpu 0: [ 56.457787][ T4423] mas_replace_node+0x1c9/0x440 [ 56.462669][ T4423] mas_wr_store_entry+0x2425/0x2b60 [ 56.467885][ T4423] mas_store_prealloc+0x74d/0x9e0 [ 56.472923][ T4423] vma_iter_store_new+0x1c5/0x200 [ 56.477967][ T4423] vma_complete+0x125/0x570 [ 56.482481][ T4423] __split_vma+0x54c/0x610 [ 56.486912][ T4423] vma_modify+0x107/0x210 [ 56.491256][ T4423] vma_modify_flags+0x101/0x130 [ 56.496118][ T4423] mprotect_fixup+0x2cc/0x570 [ 56.500812][ T4423] do_mprotect_pkey+0x6d6/0x980 [ 56.505686][ T4423] __x64_sys_mprotect+0x48/0x60 [ 56.510560][ T4423] x64_sys_call+0x2794/0x2fb0 [ 56.515337][ T4423] do_syscall_64+0xd2/0x200 [ 56.519870][ T4423] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 56.525775][ T4423] [ 56.528103][ T4423] read to 0xffff888106d08500 of 8 bytes by task 4423 on cpu 1: [ 56.535657][ T4423] mas_state_walk+0x485/0x650 [ 56.540380][ T4423] mas_walk+0x30/0x120 [ 56.544460][ T4423] lock_vma_under_rcu+0xa2/0x2f0 [ 56.549407][ T4423] do_user_addr_fault+0x233/0x1090 [ 56.554551][ T4423] exc_page_fault+0x62/0xa0 [ 56.559073][ T4423] asm_exc_page_fault+0x26/0x30 [ 56.563937][ T4423] [ 56.566310][ T4423] value changed: 0xffff888106d08106 -> 0xffff888106d08500 [ 56.573420][ T4423] [ 56.575747][ T4423] Reported by Kernel Concurrency Sanitizer on: [ 56.581903][ T4423] CPU: 1 UID: 0 PID: 4423 Comm: syz.3.349 Not tainted 6.15.0-syzkaller-09161-g0f70f5b08a47 #0 PREEMPT(voluntary) [ 56.593920][ T4423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 56.603988][ T4423] ================================================================== [ 56.760577][ T4433] futex_wake_op: syz.1.350 tries to shift op by -1; fix this program