last executing test programs: 1m8.10539366s ago: executing program 4 (id=2394): ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x12, 0x5, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r2}, &(0x7f0000000040), &(0x7f0000000140)=r1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0xc, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7fffffff, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r2, &(0x7f0000000400)}, 0x20) 1m8.08382989s ago: executing program 4 (id=2397): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'geneve1\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c30000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x18) sendto$packet(r0, &(0x7f0000000000)="1441c05461f0006fb748ea3d85ad", 0xe, 0x0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0xec, 0x6, @link_local}, 0x14) 1m8.032331161s ago: executing program 4 (id=2399): setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000100)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@dioread_lock}, {@data_err_ignore}, {@resgid}, {@data_err_ignore}, {@jqfmt_vfsv0}, {@nobh}, {@user_xattr}, {@bh}, {@dioread_nolock}]}, 0x1, 0x553, &(0x7f0000001080)="$eJzs3d9rW1UcAPDvTdv91nUwhopIYQ9O5tK19ccEH+aj6HCg7zO0d2U0WUaTjrUO3B7ciy8yBBEH4ru++zj8B/wrBjoYMoo++BK56U2XrUmbddnSmc8Hbjkn9ybnfnPv9/TcnBsSwNCayP4UIl6OiG+SiIMRkeTrRiNfObG23er9q7PZkkSj8elfSXO7rN56rdbz9ueVlyLit68ijhc2tltbXlkolcvpYl6frFcuTdaWV05cqJTm0/n04vTMzKm3Z6bfe/edvsX6xtl/vv/k9oenvj66+t0vdw/dTOJ0HMjXtcfxBK61VyZiIn9PxuL0IxtO9aGxnSQZ9A6wLSN5no9F1gccjJE864H/vy8jogEMqUT+w5BqjQNa1/Z9ug5+btz7YO0CaGP8o2ufjcSe5rXRvtXkoSuj7Hp3vA/tZ238+uetm9kS/fscAmBL165HxMnR0Y39X5L3f9t3sodtHm1D/wfPzu1s/PNmp/FPYX38Ex3GP/s75O52bJ3/hbt9aKarbPz3fsfx7/qk1fhIXnuhOeYbS85fKKdZ3/ZiRByLsd1ZfbP5nFOrdxrd1rWP/7Ila781Fsz34+7o7oefM1eql54k5nb3rke80nH8m6wf/6TD8c/ej7M9tnEkvfVat3Vbx/90NX6KeL3j8X8wo5VsPj852TwfJltnxUZ/3zjye7f2Bx1/dvz3bR7/eNI+X1t7/DZ+3PNv2m3dQ/FH7+f/ruSzZnlX/tiVUr2+OBWxK/l44+PTD57bqre2z+I/dnTz/q/T+b83Ij7vMf4bh39+taf4B3T85x7r+D9+4c5HX/zQrf3e+r+3mqVj+SO99H+97uCTvHcAAAAAAACw0xQi4kAkheJ6uVAoFtfu7zgc+wrlaq1+/Hx16eJcNL8rOx5jhdZM98G2+yGm8vthW/XpR+ozEXEoIr4d2dusF2er5blBBw8AAAAAAAAAAAAAAAAAAAA7xP4u3//P/DEy6L0Dnjo/+Q3Da8v878cvPQE7kv//MLzkPwwv+Q/DS/7D8JL/MLzkPwwv+Q/DS/4DAAAAAAAAAAAAAAAAAAAAAAAAAABAX509cyZbGqv3r85m9bnLy0sL1csn5tLaQrGyNFucrS5eKs5Xq/PltDhbrWz1euVq9dLUdCxdmayntfpkbXnlXKW6dLF+7kKlNJ+eS8eeSVQAAAAAAAAAAAAAAAAAAADwfKktryyUyuV0UUFhW4XRnbEbCn0uDLpnAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAH/gsAAP//6AY3sQ==") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) mount_setattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2000) fallocate(r0, 0x0, 0x0, 0x8000c62) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143041, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file2\x00', 0x200000, &(0x7f00000000c0)={[{@dioread_lock}, {@noblock_validity}, {@lazytime}, {@noblock_validity}]}, 0xfc, 0x564, &(0x7f00000008c0)="$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") bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.numa_stat\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0x8004587d, &(0x7f00000003c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[], 0x50) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000d00000000080000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r5}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000a40)="d8000000180081064e81f782db4cb904021d0800fd007c05e8fe55a10a0005000000000000000e41b0000900ac00060311000000040005000a0012060048035c3b61c102000000007134cf6efb8000a007a290457f01a7cee4090000001fb791643a5ee4ce1b", 0x66}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) recvmmsg(r2, 0x0, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) 1m7.781860945s ago: executing program 4 (id=2405): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00", @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x22, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x63, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000002, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b40)={0xffffffffffffffff, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb, 0x8, 0x8, &(0x7f0000000a00)}}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x4c080) syz_mount_image$ext4(&(0x7f0000000bc0)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x4000, &(0x7f0000000000), 0x2, 0xbb8, &(0x7f00000017c0)="$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") truncate(&(0x7f0000001080)='./file1\x00', 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='kfree\x00', r2}, 0x18) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_procfs(0x0, &(0x7f0000000580)='mountinfo\x00') r4 = syz_io_uring_setup(0x1066, &(0x7f0000000140)={0x0, 0xfad6}, &(0x7f0000000040)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r4, 0x47f5, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x4f) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000400)='./file0/../file0\x00', 0x0, 0x3f, 0x0) sendmsg$nl_generic(r3, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="200000001000010700000000000000000a0000000c0002006e6c3830323131"], 0x20}, 0x1, 0x0, 0x0, 0x20008001}, 0x0) r7 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5}, {0xfff, 0x0, 0xf0, 0x8}]}) close_range(r7, 0xffffffffffffffff, 0x100000000000000) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x8, 0x9, 0x10) unlinkat(0xffffffffffffff9c, 0x0, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143041, 0x0) pwritev2(r8, &(0x7f00000001c0)=[{&(0x7f0000000080)="ff", 0x1}], 0x1, 0xe7b, 0x0, 0x2) ioctl$GIO_FONT(r8, 0x4b60, &(0x7f0000002a00)=""/4096) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101042, 0x45) 1m6.805483011s ago: executing program 4 (id=2418): r0 = syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000280)=ANY=[@ANYRES8=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000040)='9p_protocol_dump\x00', r1}, 0x10) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="2c0018f4bb6d347eaab4d0897c0a9d5ccd918bdec0382ac58a6ed56f531588d98d10cc4e081d308a3a4a90164d01669d41d71dc2b8939c2e61b1ba36cba443b34daa0f088f7316c9690b2fb45d05211a47ace696a0d2495338f01dc1cd870a183794c6cf121a70fe577e584e1d7b1e4961290932dcf13922f0270da24b16255d68959a7dd9e03d923e27cfa154535b316fb83eb57351870386955af55155710faf00bff3d96199e01e5e752c1d914b6204b8d0ed1ff569d4a096ad85b3608dbd1a10c6c7cc"]) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000a00)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1600000000000100040000000100000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000000000000000000000000002", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000300"/28], 0x50) sched_getaffinity(0x0, 0x8, &(0x7f0000000200)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xe24}, {0x0, 0x4000}, {0x0}, {0x0}, {&(0x7f00000020c0), 0x500}], 0x5}, 0x0) 1m5.768046157s ago: executing program 4 (id=2436): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'geneve1\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c3000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x18) sendto$packet(r0, &(0x7f0000000000)="1441c05461f0006fb748ea3d85ad", 0xe, 0x0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0xec, 0x6, @link_local}, 0x14) 1m5.717928528s ago: executing program 32 (id=2436): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'geneve1\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c3000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x18) sendto$packet(r0, &(0x7f0000000000)="1441c05461f0006fb748ea3d85ad", 0xe, 0x0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0xec, 0x6, @link_local}, 0x14) 975.846815ms ago: executing program 1 (id=3752): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file2\x00', 0x14552, &(0x7f0000000b40)=ANY=[], 0xfb, 0x11ff, &(0x7f0000001280)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc4042, 0x1d7) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) sendfile(r0, r0, 0x0, 0xfffe80) 947.924376ms ago: executing program 5 (id=3755): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b0000000700000001000100080000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000f40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') 886.034326ms ago: executing program 5 (id=3758): bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x18) r1 = socket(0x1e, 0x4, 0x0) sendmsg$tipc(r1, &(0x7f0000000200)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x3, {0x4e24}}, 0x10, &(0x7f0000000000)=[{&(0x7f00000004c0)="e8", 0x1}], 0x1, 0x0, 0x0, 0x10}, 0x4800) 802.202718ms ago: executing program 5 (id=3762): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) (async) mount$bind(&(0x7f0000000c40)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2901090, 0x0) chroot(&(0x7f0000000300)='./file0/../file0/../file0/../file0\x00') (async) mount(0x0, &(0x7f0000000d40)='./file0/../file0/../file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, 0x0) pivot_root(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f00000001c0)='./file0/../file0/../file0\x00') (async) syz_open_dev$tty1(0xc, 0x4, 0x2) (async) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000240)={0x0, 'macvlan0\x00', {0x1}, 0xbe9f}) 752.453359ms ago: executing program 1 (id=3764): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) 705.3595ms ago: executing program 0 (id=3765): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x4, 0x0, 0x0) 704.63602ms ago: executing program 5 (id=3766): r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file2\x00', 0x14552, &(0x7f0000000b40)=ANY=[], 0xfb, 0x11ff, &(0x7f0000001280)="$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") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$ext4(&(0x7f00000004c0)='ext2\x00', &(0x7f0000000080)='./file2\x00', 0x4808, &(0x7f0000000400)={[{@sysvgroups}]}, 0x1, 0x51c, &(0x7f0000001300)="$eJzs3U9sI1cZAPBvZpO1k6YkhR4AFbqUwoKqtRNvG1W9UE4VQpUQPXLYhsSJothxFDulCXvIHrkjUaknOHHmgMQBqSfuSBzgxqUckAqsQA0SByOPx7vOH2/S3dhu499PGs2b9zzzvbejec963swLYGLdiIjDiLgeEW9HxHyen+RbvN7dOp/7+P7d1aP7d1eTaLff+meSlXfyou+cjqfyaxYj4odvRPw4ORH0TxHN/YOtlVqtuptnlVv1nXJz/+DWZn1lo7pR3a5UlpeWF1+9/Url0tr6fP03H81ExO9/95UP/3j47Z92qjWXl/W34zJ1mz79IE7HVER8fxjBxuBa3p7rj3PyY53EZUoj4vMR8UL2/M/HtexuHnf8Nn1nhLUDAIah3Z6P9nz/MQBw1aXZHFiSlvK5gLlI01KpO4f3bMymtUaz9dJ6Y297rTtXthDT6fpmrbqYzxUuxHSyvjlVXcrSveNatXLi+HZEPBMRPy/MZMel1UZtbZxffABggj11Yvz/T6E7/gMAV1zxYbIwznoAAKNTHHcFAICRM/4DwOQx/gPA5DH+A8DkMf4DwOQx/gPARPnBm292tvZR/v7rtXf297Ya79xaqza3SvW91dJqY3entNFobGTv7Kmfd71ao7Gz9HLsvVtuVZutcnP/4E69sbfdupO91/tOdXokrQIAHuWZ5z/4SxIRh6/NZFv0ve//3LH6uWHXDhimdNwVAMbm2rgrAIzN6dW+gEnxCebjZ4ZZD2B8+pbovdeXXTyVOOm9C10+tW4ofPrc/NITzP8Dn2nm/2FyPd78v+/ycBWY/4fJ1W4n1vwHgAljjh9Izinv//1/sd13cOL3f/+fGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgEkyl21JWsrXAp+LNC2VIp6OiIWYTtY3a9XFiPhcRPy5MF3oHC9FhHWDAOCzLP17kq//dXP+xbmTpdcL/y1k+4j4yftv/eLdlVZrdynievKvB/mt9/L8yjjqDwCcpzdO98bxno/v313tbaOsz0ff7S4u2ol7lG/dkqmYyvbFbK5h9t9JftyVXNJao4f3IuKLZ7U/yeZGFvKVT0/G78R+eqTx02Px06ysu+/8W3zhEuoCk+aDTv/z+lnPXxo3sv3Zz38x66GeXK//OzrV/6UP+r9rA/q/G8cvtTAwxst/+N6pzPZ8t+xexJenIo56F+/rf3rxkwHxX7xgG//63FdfGFTW/mXEzTir/cmxWOVWfafc3D+4tVlf2ahuVLcrleWl5cVXb79SKWdz1OXeTPVp/3gtGbi8daf9swPiF89p/zcu2P5f/e/tH33tEfG/9fWz7/+zj4jfGRO/ecH4K7O/LQ4q68RfG9D+8+7/SxeM/+HfDtYu+FEAYASa+wdbK7VadfdUYjv/LaCXM33GZz5BIn2y0y+cSCIOhxziYaLw65+9MapYQ0zEaIO+HxHjbrLEeYlx90zAsD186MddEwAAAAAAAAAAAAAAYJBR/DnRuNsIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADA1fX/AAAA//+zq8/P") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r3 = dup(r2) write$P9_RLERRORu(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000280)=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x1}}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) write$binfmt_elf64(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x40010, &(0x7f0000003240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYBLOB="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", @ANYBLOB=',wfdno=', @ANYRESOCT=0x0]) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f00000003c0)) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000880)=ANY=[@ANYBLOB="140000001000010000000200000000000000000a28000000000a0101000000005e1affd5020000000900010073006a9fd7bde1032c000000000000000000b61a173cb55d56ad20000000000000020000000900010073797a30000000000900030073797a32000000001400d0b0dc4ef3564761d33b9d562759ffb3a1ed1291d474e983552c2b57ff360099dc45e55376aa0895521f2a12123cf34fcc7b95d2618a169e0c709c31cd0581f5bc7fed5440bc0e89bcaf3e3a82f0d03d247dbe736574888efbc43cd84919f3a4fc10714cb5"], 0x7c}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000003200)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x47c, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='inet_sock_set_state\x00', r5}, 0x10) listen(r4, 0x3) sendmsg$NFT_BATCH(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x7c}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', 0xc4042, 0x1d7) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="e2baee54511df2010000000000000000e6ffffffff030000ffff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000500)=ANY=[], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x39, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94) r7 = gettid() timer_create(0x0, &(0x7f0000000180)={0x0, 0x1a, 0x4, @tid=r7}, &(0x7f0000bbdffc)) fcntl$F_GET_RW_HINT(r6, 0x40b, &(0x7f0000000040)) r8 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r8, 0x8955, &(0x7f00000001c0)={{0x2, 0x4e23, @multicast1}, {0x306, @multicast}, 0x2, {0x2, 0x4e20, @remote}, 'batadv_slave_0\x00'}) ioprio_get$pid(0x2, r7) 703.28033ms ago: executing program 0 (id=3767): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r0, 0x0, 0xfffffffffffffffc}, 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x0}, @generic={0x66}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 666.21779ms ago: executing program 0 (id=3768): creat(&(0x7f0000000040)='./bus\x00', 0x8) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x70, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = syz_open_dev$evdev(0x0, 0x2, 0x842) ioctl$EVIOCGBITSND(r0, 0x40044591, 0x0) r1 = syz_open_procfs(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000340)='.\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r0]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000180)={[{@nolazytime}, {@lazytime}, {@journal_path={'journal_path', 0x3d, './bus'}}, {@bsdgroups}, {@lazytime}, {@noload}]}, 0x3, 0x45c, &(0x7f0000002400)="$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") 637.059421ms ago: executing program 1 (id=3769): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000680)='kfree\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x101040, 0x0) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r2, 0x0, 0x4000854) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) writev(r3, &(0x7f0000000140)=[{&(0x7f0000000000)='9', 0x1}], 0x1) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0x10, &(0x7f0000000180)=[@in={0x2, 0x4e24, @local}]}, &(0x7f00000002c0)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000300)={r4, @in6={{0xa, 0x4e21, 0x3, @private2={0xfc, 0x2, '\x00', 0x1}, 0x8}}, 0xa, 0x7, 0x6, 0x1, 0x99, 0xc3, 0xf9}, 0x9c) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r5, 0x6) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f000000850000002300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000d00)='kfree\x00', r6}, 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f00000004c0)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x4, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010101, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8943, &(0x7f0000000900)={'syz_tun\x00', @random='\x00\x00\x00 \x00'}) pipe2(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.avg_queue_size\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$UHID_CREATE2(r10, &(0x7f00000004c0)=ANY=[], 0x118) ioctl$TIOCL_GETKMSGREDIRECT(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r8, @ANYBLOB="e100008e0e039690c90401b4f9b48efa4a2685679a46ffea5a12384584a6f9fb79f33da233e96a77464a0100ae78e12033eb36a267ecc8d9f9bf8c758436ec", @ANYRESHEX=r9, @ANYBLOB="2c756e616d653dd0aedec1aa20ffd81d1bf89329217cb058a396eda2ab40a26d93dd083c0074dcab6cab21ae16c4cdf97bdc355f3b41d27b654301345cb3c4cec37953322d01beaa7257964fd30fe2d72f171da72e389f382dea3c8d91906aead5d5aeccc097ef1092ea987c2b00000000000000002c00"]) 597.650461ms ago: executing program 0 (id=3770): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge0\x00', 0x0}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r6}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRES16], &(0x7f0000000040)='GPL\x00', 0x4000, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x14, 0xc, &(0x7f0000000300)=ANY=[@ANYRESHEX=r1, @ANYRESDEC=r2, @ANYRES64=r2, @ANYRESOCT=r6, @ANYRESOCT=r1, @ANYRESDEC=r4, @ANYRESOCT=r0, @ANYRESOCT=r5], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x68, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x14, 0xc, &(0x7f0000000300)=ANY=[@ANYRESHEX=r1, @ANYRESDEC=r2, @ANYRES64=r2, @ANYRESOCT=r6, @ANYRESOCT=r1, @ANYRESDEC=r4, @ANYRESOCT=r0, @ANYRESOCT=r5], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x68, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r7}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) mkdir(&(0x7f0000000000)='./control\x00', 0x0) (async) mkdir(&(0x7f0000000000)='./control\x00', 0x0) socket$inet_sctp(0x2, 0x800000000000001, 0x84) (async) socket$inet_sctp(0x2, 0x800000000000001, 0x84) socket$inet_smc(0x2b, 0x1, 0x0) (async) r8 = socket$inet_smc(0x2b, 0x1, 0x0) r9 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r11 = socket(0x2c, 0x3, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x11b, 0x22, 0x0, &(0x7f0000000040)) (async) getsockopt$inet6_IPV6_IPSEC_POLICY(r11, 0x11b, 0x22, 0x0, &(0x7f0000000040)) r12 = socket(0x1e, 0x1, 0x0) connect$tipc(r12, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x10) (async) connect$tipc(r12, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x1, 0x1}}}, 0x10) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000ac0)="0950c2ada9c52049d149e2e4fed9eb45929ba27b95b77749edfffb69bba8dd9257e488f694372a6a95b8f2d04dc979224b8475cd6d657af47c0f5bb9031d792b377d92bda877333e70ac8af2e741ed3f3add3e39d158f9703a8531870c430970c516ece3f6c9029df4c633b4c76cb25001ec0c835e1cbbb1e69e82780fd4d8f2c7f1e20a1ab855752d824715db342790ac0ca8c991bc28ed5d0671", 0xffffffffffffff03) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x49, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r10}, &(0x7f0000000180), &(0x7f00000001c0)=r9}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000002c0)='mm_page_alloc\x00', r13}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) 513.290202ms ago: executing program 0 (id=3771): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20020084, &(0x7f00000018c0)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000b80)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000140)=ANY=[@ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r2, &(0x7f0000000340), &(0x7f0000000040)=@tcp=r0}, 0x20) shutdown(r0, 0x1) recvfrom(r0, &(0x7f0000000240)=""/225, 0xe1, 0x40000120, 0x0, 0x0) 493.875233ms ago: executing program 2 (id=3774): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000070000000000000000002018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) r2 = socket(0x1e, 0x4, 0x0) sendmsg$tipc(r2, &(0x7f0000000200)={&(0x7f00000000c0)=@id={0x1e, 0x3, 0x3, {0x4e24}}, 0x10, &(0x7f0000000000)=[{&(0x7f00000004c0)="e8", 0x1}], 0x1, 0x0, 0x0, 0x10}, 0x4800) 475.122913ms ago: executing program 3 (id=3775): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) lsetxattr$security_selinux(0x0, &(0x7f0000000940), &(0x7f0000000980)='system_u:object_r:semanage_exec_t:s0\x00', 0x25, 0x1) 402.349154ms ago: executing program 1 (id=3776): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r0, 0x0, 0xfffffffffffffffc}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x0}, @generic={0x66}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 357.389205ms ago: executing program 2 (id=3777): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x4, 0x0, 0x0) 356.700995ms ago: executing program 3 (id=3778): r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000140)={0x2, 0xaf, 0x80}) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_IPV6_RTHDR(r3, 0x29, 0x39, &(0x7f00000000c0)={0x89, 0xa, 0x2, 0x9, 0x0, [@private0, @dev={0xfe, 0x80, '\x00', 0x17}, @ipv4={'\x00', '\xff\xff', @multicast2}, @remote, @private1]}, 0x58) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000400)=ANY=[@ANYRESDEC, @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0100000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f00000083c0)={{0x1}}) 356.248695ms ago: executing program 0 (id=3786): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00020000000000000000000000000000000000f60000ff0f00000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e8500000005"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x25, 0x0, @void}, 0x10) syz_emit_ethernet(0x100a, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r4, @ANYRES8=r5, @ANYRES16=r5, @ANYRES32=0x0, @ANYRESDEC, @ANYRESHEX=r5], 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x8, &(0x7f00000001c0)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r6}}]}, &(0x7f0000000300)='GPL\x00', 0x9, 0x1, &(0x7f0000000340)=""/1, 0x0, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x410c84, &(0x7f0000000340), 0x1, 0x775, &(0x7f0000001180)="$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") open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x88882, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) write$binfmt_register(0xffffffffffffffff, &(0x7f0000000100)={0x3a, 'syz3', 0x3a, 'E', 0x3a, 0x6, 0x3a, 'E', 0x3a, '@{@$\x9a$^', 0x3a, './file0', 0x3a, [0x46]}, 0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) write(r8, &(0x7f0000004200)='t', 0x1) sendfile(r8, r7, 0x0, 0x3ffff) sendfile(r8, r7, 0x0, 0x7ffff000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='br_fdb_add\x00', r3}, 0x10) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000100)={'bridge0\x00', 0x0}) sendmsg$nl_route(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="280000001c0001000000", @ANYRES32=r11, @ANYBLOB="4000aa000a0002"], 0x28}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) 336.583675ms ago: executing program 2 (id=3779): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) 319.918236ms ago: executing program 1 (id=3780): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r0, 0x0, 0xfffffffffffffffc}, 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x0}, @generic={0x66}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 253.341787ms ago: executing program 5 (id=3781): creat(&(0x7f0000000040)='./bus\x00', 0x8) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x70, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = syz_open_dev$evdev(0x0, 0x2, 0x842) ioctl$EVIOCGBITSND(r0, 0x40044591, 0x0) r1 = syz_open_procfs(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000340)='.\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r0]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000180)={[{@nolazytime}, {@lazytime}, {@journal_path={'journal_path', 0x3d, './bus'}}, {@bsdgroups}, {@lazytime}, {@noload}]}, 0x3, 0x45c, &(0x7f0000002400)="$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") 252.873096ms ago: executing program 3 (id=3782): r0 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x20) symlinkat(&(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000140)='./file0\x00') openat(r1, &(0x7f00000000c0)='./file0\x00', 0x515a02, 0x52abe154ad664fa4) 252.317867ms ago: executing program 2 (id=3783): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket(0x1a, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x402, 0x80) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) sendfile(r3, r1, 0x0, 0x1) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xd, &(0x7f0000000080)=ANY=[@ANYBLOB="18719cb349b96b8c93c096422d80cf89ff0035"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = socket$qrtr(0x2a, 0x2, 0x0) getsockopt$bt_hci(r4, 0x0, 0x2, &(0x7f0000000a00)=""/4096, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[], 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)}, 0x0) sendmsg$DEVLINK_CMD_RATE_DEL(r2, 0x0, 0x40000) r5 = socket$packet(0x11, 0x3, 0x300) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r6, &(0x7f0000000040)={0xf, 0x8, 0xfa00, {r8, 0xd}}, 0x10) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500001900002020307b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10001, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='dlm_lock_start\x00', r9, 0x0, 0x400}, 0x18) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'hsr0\x00'}) socket$nl_route(0x10, 0x3, 0x0) 239.349417ms ago: executing program 1 (id=3784): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200000200f100850000008600"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r1}, 0x10) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000e50000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300001e334185850000007300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) socket$inet_dccp(0x2, 0x6, 0x0) socket$packet(0x11, 0xa, 0x300) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x2, &(0x7f00000000c0)=[{0x1d}, {0x16}]}) socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket$packet(0x11, 0x3, 0x300) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmmsg(r2, &(0x7f0000000440)=[{{&(0x7f0000000700)=@xdp={0x2c, 0x0, r4}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000180)='O', 0x36}], 0x1}}], 0x1, 0x0) 215.609167ms ago: executing program 3 (id=3785): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='mm_page_alloc\x00', r0, 0x0, 0x81}, 0x18) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r2, 0x0, r1, 0x0, 0x6, 0x0) dup3(r2, r1, 0x0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRESOCT], 0x14}, 0x1, 0x0, 0x0, 0x40095}, 0x0) 168.002188ms ago: executing program 5 (id=3787): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xa8, 0xff}) r1 = socket(0xa, 0x1, 0x0) ioctl(r1, 0x8936, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000100000018110000", @ANYRES32, @ANYRES16=r0], &(0x7f0000000040)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000480)=[0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8c, &(0x7f0000000500)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000600), &(0x7f0000000700), 0x8, 0x85, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000008c0)=ANY=[@ANYRESOCT=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r4}, 0x38) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000080)='kfree\x00', r5}, 0x18) r6 = socket$igmp(0x2, 0x3, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x70, 0x0, 0x90, [0x0, 0x0, 0x0, 0x0, 0x200000001300, 0x200000001330], 0x0, 0x0, &(0x7f0000001300)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc}]}, 0x108) r7 = syz_io_uring_setup(0x44f, &(0x7f00000002c0)={0x0, 0xfffffffe, 0x10100, 0x2}, &(0x7f00000000c0)=0x0, &(0x7f0000000080)=0x0) syz_io_uring_submit(r8, r9, &(0x7f0000000100)=@IORING_OP_RENAMEAT={0x23, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000240)='./cgroup/pids.max/../file0\x00'}) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r11}, 0x10) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) io_uring_enter(r7, 0x2dbe, 0x0, 0x0, 0x0, 0x0) r12 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x2000) read(r12, &(0x7f0000000200)=""/209, 0x128) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r12, 0x4040534e, &(0x7f0000000080)={0x335, @time={0x80, 0xff}}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r12, 0x404c534a, &(0x7f0000000400)={0x0, 0x1f000000}) tkill(r2, 0x7) 101.259089ms ago: executing program 2 (id=3788): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket(0x11, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) bind$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000000)=0xe9, 0x4) sendmsg$netlink(r2, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000280)=ANY=[@ANYBLOB="020114008cdc18000e3580009f000114600000060600ac141414e0000003808a8972bd0b72e41082b1a3d2061fd7fdfe4b88942a31f48597e36e039b1c599db6e466749c2d4c8303a0f7fbda34fb8825f80200e3c0ab42e32a097dbd4be5ffca88faca"], 0xdd12}, {&(0x7f0000000640)={0x10, 0x39, 0x100, 0x70bd2d, 0x25dfdbff}, 0x10}], 0x2, 0x0, 0x0, 0x44000}, 0x20040051) 100.873969ms ago: executing program 3 (id=3789): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20020084, &(0x7f00000018c0)={0x2, 0x4e20}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000b80)=ANY=[@ANYBLOB="b4050000200080006110600000000000c60000000000000295000000000000009f33ef60916e6e893f1eeb0be2566cd0723043c47c896ce0bce66a245ad99b817fd98cd824498949714ffaac8a6f77ef26dcca5582054d54d53cd2b6db714e4b94bdae214fa68a0557eb2c5ca683a4b6fc89398f2b9000f224891060017cfa6fa26fa7a34701008c61897d4a6148a1c11428607c40de60beac671e8e8fdecb03588aa623fa71f871ab5c2ff88afc6002084e5b52710800e835cf0d78e45f70983826fb8579c1fb01d2c5553d2ccb5fc5b51fe6b174bed9907dcff414ed55b0c20cdbe7009a6fe7cc78762f1d4dcdbca64920db9a50f86c21632fd30bf05121438bb74e4670ab5dfe447a4bd344e0bd74ff05d37ef68e3b9db863c758ffffffffb426e1230bc1cd4c02c4c2e6d17dc5c2edf332a62f5fe68fbbbbfcfd78a9f3fdc1f50c445e3f30e703cf05b90fbf940e6652d377474ed5f816f66ac3027460ae991e7f834dd7a7fc2a7003d1a6cf5478533584961c329fcf4fed5c9455640dcd28273dc9753cc979113f2915a3039c3ca60ec53bb1130c2d27fed7d67c440e23d130e51eea1e085bebabe7059de9cbfc51177cce5ef265c92b7957a334ff7be2ca867fd94286e016febfdb5827efc7a6efb01d66a396f84c1ca75daa4ead099694ed03d449b185cc836bab1a41a61bd6f03a54fafcee554bbb52adf8f1d7ede9f9a711256fb45e6c3d12ff560ee69d68733d522d9bbecf52396f15976381c27015403778139808142b48ced145ca8a6da5f322d413d09cc38b832fa05dd3c799042588f9eea6f443baa759257a000000000000000000bed1dad228e11f80cfea5848e436acf6e89dfae0b3d95b911af1818e0081504811a5f3c5d1ced3e592224f1d2ca3bdb2cc89001605db6987899eb99f94265401a95ff0a5a266438f1db461b7ebedd419bc038f7d36bd2bd4b3f92cd1469b63b1ce456a96152d353a8ab65f8bae521db73ff00b5d5cac7a439ab40d97e57f23e703fd6395930b9c3485ab181a83ed568cade43111530ec584cfb48e0cc5d63e2807b2e98525a84f9ac59cf74f3ba279e228e2a0dc8da8017cba3996541008785ab8f041f0a8d1399d88a3a58765e5a0149b9d0ea54b323675149783ec057ec6d6e8e600b9eced07ddcc56b77d8ea08223"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f0000000340), &(0x7f0000000040)=@tcp=r0}, 0x20) shutdown(r0, 0x1) 77.997839ms ago: executing program 3 (id=3790): r0 = shmget$private(0x0, 0xc000, 0x80, &(0x7f0000ff2000/0xc000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000000)=""/213) (async) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000100)=""/172) (async) r1 = io_uring_setup(0x2736, &(0x7f00000001c0)={0x0, 0x579f, 0x2000, 0x3, 0x166}) io_uring_enter(r1, 0x6f3e, 0x5860, 0x20, &(0x7f0000000240), 0x8) (async) r2 = semget(0x3, 0x3, 0x8) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) fstat(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f00000004c0)={{0x2, r3, r4, r5, r6, 0x5c, 0x4}, 0x384, 0x4, 0x0, 0x0, 0x0, 0x0, 0xffff}) (async, rerun: 32) mbind(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x4000, &(0x7f0000000540)=0x2, 0x40, 0x1) (rerun: 32) r7 = socket$inet_dccp(0x2, 0x6, 0x0) fstat(r7, &(0x7f0000000580)) (async, rerun: 64) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000600)=""/247) (rerun: 64) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000700), 0x800, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r8, 0x6, 0x3, &(0x7f0000000740)=0x40, 0x4) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff}) (rerun: 32) socket$kcm(0x29, 0x7, 0x0) (async) mlock2(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x1) semop(r2, &(0x7f00000007c0)=[{0x2, 0x80, 0x800}, {0x0, 0x9}, {0x1, 0x8, 0x800}, {0x1, 0x3, 0x1800}, {0x3, 0x95, 0x1000}], 0x5) (async) getsockopt$inet_tcp_int(r8, 0x6, 0x19, &(0x7f0000000800), &(0x7f0000000840)=0x4) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) fcntl$getownex(r7, 0x10, &(0x7f0000000940)={0x0, 0x0}) getpriority(0x0, r11) (async) mount$9p_fd(0x0, &(0x7f0000000980)='./file1\x00', &(0x7f00000009c0), 0x80000, &(0x7f0000000a00)={'trans=fd,', {'rfdno', 0x3d, r8}, 0x2c, {'wfdno', 0x3d, r9}, 0x2c, {[{@uname={'uname', 0x3d, '\x00'}}, {@noextend}], [{@fowner_eq={'fowner', 0x3d, r10}}, {@hash}, {@appraise}, {@context={'context', 0x3d, 'system_u'}}, {@permit_directio}]}}) semctl$SETVAL(0x0, 0x2, 0x10, &(0x7f0000000ac0)=0x9) r12 = add_key$keyring(&(0x7f0000000c00), &(0x7f0000000c40)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) add_key$fscrypt_v1(&(0x7f0000000b00), &(0x7f0000000b40)={'fscrypt:', @desc3}, &(0x7f0000000b80)={0x0, "554ea25093b5889b7e58869ce66e6f53cf29c306a1fffb636b21d710b0bb67f2b3290ce3ba54ce958e76b87878cc64148d40536094600fb8d455582f04296375", 0x33}, 0x48, r12) (async) accept4$packet(r8, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000cc0)=0x14, 0x0) 0s ago: executing program 2 (id=3791): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r0, 0x0, 0xfffffffffffffffc}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x0}, @generic={0x66}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) kernel console output (not intermixed with test programs): adm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 167.181059][ T29] audit: type=1400 audit(1744442541.830:10954): avc: denied { map_create } for pid=11055 comm="syz.2.2748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 167.200425][ T29] audit: type=1400 audit(1744442541.830:10955): avc: denied { map_read map_write } for pid=11055 comm="syz.2.2748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 167.220516][ T29] audit: type=1400 audit(1744442541.830:10956): avc: denied { prog_load } for pid=11055 comm="syz.2.2748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 167.239814][ T29] audit: type=1400 audit(1744442541.830:10957): avc: denied { bpf } for pid=11055 comm="syz.2.2748" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 167.260601][ T29] audit: type=1400 audit(1744442541.830:10958): avc: denied { perfmon } for pid=11055 comm="syz.2.2748" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 167.281704][ T29] audit: type=1400 audit(1744442541.830:10959): avc: denied { prog_run } for pid=11055 comm="syz.2.2748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 167.300916][ T29] audit: type=1400 audit(1744442541.860:10960): avc: denied { name_bind } for pid=10993 comm="syz.5.2723" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 167.322879][ T29] audit: type=1400 audit(1744442541.860:10961): avc: denied { node_bind } for pid=10993 comm="syz.5.2723" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 167.353978][T11056] __nla_validate_parse: 3 callbacks suppressed [ 167.354071][T11056] netlink: 3 bytes leftover after parsing attributes in process `syz.2.2748'. [ 167.380883][T11056] batadv1: entered allmulticast mode [ 167.503493][T11067] wireguard0: entered promiscuous mode [ 167.509107][T11067] wireguard0: entered allmulticast mode [ 167.855822][T11096] netlink: 'syz.2.2764': attribute type 10 has an invalid length. [ 167.905036][T11096] team0: Device hsr_slave_0 failed to register rx_handler [ 167.977363][ T6095] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 168.129560][T11110] pim6reg1: entered promiscuous mode [ 168.134931][T11110] pim6reg1: entered allmulticast mode [ 168.321283][T11119] openvswitch: netlink: Message has 6 unknown bytes. [ 168.330586][T11117] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2771'. [ 169.331114][T11155] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2797'. [ 170.145395][T11170] netlink: 100 bytes leftover after parsing attributes in process `syz.3.2794'. [ 170.536794][ T6081] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 170.755026][T11194] pim6reg1: entered promiscuous mode [ 170.761000][T11194] pim6reg1: entered allmulticast mode [ 170.959576][T11200] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2803'. [ 171.098555][T11205] openvswitch: netlink: Message has 6 unknown bytes. [ 171.355052][T11211] netlink: 100 bytes leftover after parsing attributes in process `syz.2.2809'. [ 171.379733][T11209] vhci_hcd: default hub control req: 0000 v0000 i0000 l65535 [ 171.824913][T11235] openvswitch: netlink: Message has 6 unknown bytes. [ 171.961189][T11244] netlink: 100 bytes leftover after parsing attributes in process `syz.2.2823'. [ 172.039153][T11247] FAULT_INJECTION: forcing a failure. [ 172.039153][T11247] name failslab, interval 1, probability 0, space 0, times 0 [ 172.051868][T11247] CPU: 0 UID: 0 PID: 11247 Comm: syz.3.2824 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 172.051943][T11247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 172.051958][T11247] Call Trace: [ 172.051967][T11247] [ 172.052000][T11247] dump_stack_lvl+0xf6/0x150 [ 172.052027][T11247] dump_stack+0x15/0x1a [ 172.052047][T11247] should_fail_ex+0x261/0x270 [ 172.052086][T11247] should_failslab+0x8f/0xb0 [ 172.052144][T11247] __kmalloc_cache_noprof+0x55/0x320 [ 172.052171][T11247] ? __xdp_reg_mem_model+0x186/0x3f0 [ 172.052208][T11247] ? _raw_spin_unlock+0x26/0x50 [ 172.052232][T11247] __xdp_reg_mem_model+0x186/0x3f0 [ 172.052292][T11247] xdp_reg_mem_model+0x22/0x40 [ 172.052332][T11247] bpf_test_run_xdp_live+0x17c/0x1050 [ 172.052361][T11247] ? synchronize_rcu_expedited+0x6d5/0x790 [ 172.052389][T11247] ? __pfx_wait_rcu_exp_gp+0x10/0x10 [ 172.052492][T11247] ? bpf_dispatcher_xdp_func+0x20/0x30 [ 172.052533][T11247] ? cpus_read_unlock+0x7b/0xc0 [ 172.052560][T11247] ? 0xffffffffa0003c00 [ 172.052577][T11247] ? synchronize_rcu+0x4a/0x320 [ 172.052677][T11247] ? 0xffffffffa0003c00 [ 172.052720][T11247] ? 0xffffffffa0003c00 [ 172.052748][T11247] ? __pfx_xdp_test_run_init_page+0x10/0x10 [ 172.052791][T11247] bpf_prog_test_run_xdp+0x526/0x8e0 [ 172.052816][T11247] ? __rcu_read_unlock+0x4e/0x70 [ 172.052876][T11247] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 172.052906][T11247] bpf_prog_test_run+0x20e/0x3a0 [ 172.052933][T11247] __sys_bpf+0x440/0x800 [ 172.052967][T11247] __x64_sys_bpf+0x43/0x50 [ 172.052990][T11247] x64_sys_call+0x23da/0x2e10 [ 172.053015][T11247] do_syscall_64+0xc9/0x1c0 [ 172.053178][T11247] ? clear_bhb_loop+0x25/0x80 [ 172.053204][T11247] ? clear_bhb_loop+0x25/0x80 [ 172.053294][T11247] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 172.053318][T11247] RIP: 0033:0x7f7cbad4d169 [ 172.053334][T11247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 172.053353][T11247] RSP: 002b:00007f7cb93b7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 172.053375][T11247] RAX: ffffffffffffffda RBX: 00007f7cbaf65fa0 RCX: 00007f7cbad4d169 [ 172.053390][T11247] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 172.053404][T11247] RBP: 00007f7cb93b7090 R08: 0000000000000000 R09: 0000000000000000 [ 172.053418][T11247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 172.053431][T11247] R13: 0000000000000000 R14: 00007f7cbaf65fa0 R15: 00007ffe0bf7c318 [ 172.053471][T11247] [ 172.311173][ T29] kauditd_printk_skb: 1167 callbacks suppressed [ 172.311188][ T29] audit: type=1400 audit(1744442547.040:12129): avc: denied { read } for pid=11243 comm="syz.5.2822" dev="nsfs" ino=4026533003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 172.350653][ T29] audit: type=1400 audit(1744442547.070:12130): avc: denied { read open } for pid=11243 comm="syz.5.2822" path="net:[4026533003]" dev="nsfs" ino=4026533003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 172.374725][ T29] audit: type=1400 audit(1744442547.070:12131): avc: denied { create } for pid=11243 comm="syz.5.2822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 172.526424][ T29] audit: type=1400 audit(1744442547.110:12132): avc: denied { read write } for pid=3302 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 172.550842][ T29] audit: type=1400 audit(1744442547.110:12133): avc: denied { read write open } for pid=3302 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 172.576215][ T29] audit: type=1400 audit(1744442547.110:12134): avc: denied { ioctl } for pid=3302 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=101 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 172.602049][ T29] audit: type=1400 audit(1744442547.110:12135): avc: denied { write } for pid=11243 comm="syz.5.2822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 172.622836][ T29] audit: type=1400 audit(1744442547.110:12136): avc: denied { read } for pid=11243 comm="syz.5.2822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 172.643426][ T29] audit: type=1400 audit(1744442547.140:12137): avc: denied { allowed } for pid=11253 comm="syz.1.2826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 172.663122][ T29] audit: type=1326 audit(1744442547.140:12138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11246 comm="syz.3.2824" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f7cbad4bb7c code=0x7ffc0000 [ 172.705599][T11267] openvswitch: netlink: Message has 6 unknown bytes. [ 172.905458][T11278] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2837'. [ 172.921659][T11278] team0: left allmulticast mode [ 172.926688][T11278] team_slave_0: left allmulticast mode [ 172.932324][T11278] team_slave_1: left allmulticast mode [ 172.938000][T11278] bridge0: port 3(team0) entered disabled state [ 172.969156][T11278] bridge_slave_1: left allmulticast mode [ 172.974964][T11278] bridge_slave_1: left promiscuous mode [ 172.980874][T11278] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.047428][ T6081] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 173.077137][T11278] bridge_slave_0: left allmulticast mode [ 173.083405][T11278] bridge_slave_0: left promiscuous mode [ 173.089226][T11278] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.679489][T11306] pim6reg1: entered promiscuous mode [ 173.684913][T11306] pim6reg1: entered allmulticast mode [ 174.732974][T11351] dvmrp5: entered allmulticast mode [ 174.742534][T11351] dvmrp5: left allmulticast mode [ 174.801543][T11360] vhci_hcd: invalid port number 15 [ 174.806778][T11360] vhci_hcd: invalid port number 15 [ 174.815714][T11360] binfmt_misc: register: failed to install interpreter file ./file2 [ 175.107348][T11384] netlink: 100 bytes leftover after parsing attributes in process `syz.2.2881'. [ 175.163450][T11387] 9pnet_fd: Insufficient options for proto=fd [ 175.334472][T11400] netlink: 24 bytes leftover after parsing attributes in process `syz.1.2886'. [ 175.466143][T11409] syzkaller0: tun_chr_ioctl cmd 1074025676 [ 175.472083][T11409] syzkaller0: owner set to 768 [ 175.490579][T11408] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2886'. [ 175.908767][T11435] netlink: 100 bytes leftover after parsing attributes in process `syz.0.2898'. [ 175.931875][T11438] netlink: 20 bytes leftover after parsing attributes in process `syz.5.2903'. [ 175.941620][T11438] netlink: 20 bytes leftover after parsing attributes in process `syz.5.2903'. [ 176.199558][T11453] netlink: 'syz.5.2909': attribute type 10 has an invalid length. [ 176.216449][T11453] 8021q: adding VLAN 0 to HW filter on device team0 [ 176.224890][T11453] bond0: (slave team0): Enslaving as an active interface with an up link [ 176.306891][ T6087] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 176.653228][T11478] xt_CT: You must specify a L4 protocol and not use inversions on it [ 176.683405][T11478] FAULT_INJECTION: forcing a failure. [ 176.683405][T11478] name failslab, interval 1, probability 0, space 0, times 0 [ 176.696226][T11478] CPU: 0 UID: 0 PID: 11478 Comm: syz.5.2921 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 176.696261][T11478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 176.696276][T11478] Call Trace: [ 176.696284][T11478] [ 176.696292][T11478] dump_stack_lvl+0xf6/0x150 [ 176.696373][T11478] dump_stack+0x15/0x1a [ 176.696402][T11478] should_fail_ex+0x261/0x270 [ 176.696492][T11478] should_failslab+0x8f/0xb0 [ 176.696531][T11478] __kvmalloc_node_noprof+0x12c/0x520 [ 176.696591][T11478] ? __nf_hook_entries_try_shrink+0x243/0x450 [ 176.696673][T11478] ? save_fpregs_to_fpstate+0xff/0x160 [ 176.696709][T11478] __nf_hook_entries_try_shrink+0x243/0x450 [ 176.696796][T11478] ? finish_task_switch+0xb5/0x2b0 [ 176.696832][T11478] __nf_unregister_net_hook+0x322/0x400 [ 176.696864][T11478] nf_unregister_net_hooks+0xb0/0xe0 [ 176.696893][T11478] nf_ct_netns_do_put+0x1da/0x260 [ 176.696941][T11478] nf_ct_netns_put+0xe3/0x1e0 [ 176.696966][T11478] xt_ct_tg_check+0x5aa/0x6c0 [ 176.697036][T11478] xt_ct_tg_check_v0+0xc7/0x130 [ 176.697093][T11478] xt_check_target+0x27e/0x4b0 [ 176.697119][T11478] ? strcmp+0x21/0x50 [ 176.697157][T11478] ? xt_find_target+0x1ce/0x200 [ 176.697209][T11478] translate_table+0xc6d/0xfe0 [ 176.697264][T11478] do_ipt_set_ctl+0x7ac/0x8a0 [ 176.697303][T11478] ? _raw_spin_unlock_bh+0x36/0x40 [ 176.697327][T11478] ? tcp_release_cb+0x108/0x390 [ 176.697426][T11478] nf_setsockopt+0x195/0x1b0 [ 176.697529][T11478] ip_setsockopt+0xea/0x100 [ 176.697568][T11478] tcp_setsockopt+0x93/0xb0 [ 176.697596][T11478] sock_common_setsockopt+0x64/0x80 [ 176.697618][T11478] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 176.697699][T11478] __sys_setsockopt+0x187/0x200 [ 176.697728][T11478] __x64_sys_setsockopt+0x66/0x80 [ 176.697825][T11478] x64_sys_call+0x2a09/0x2e10 [ 176.697852][T11478] do_syscall_64+0xc9/0x1c0 [ 176.697893][T11478] ? clear_bhb_loop+0x25/0x80 [ 176.697920][T11478] ? clear_bhb_loop+0x25/0x80 [ 176.698008][T11478] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 176.698031][T11478] RIP: 0033:0x7f0b997fd169 [ 176.698049][T11478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 176.698069][T11478] RSP: 002b:00007f0b97e5f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 176.698092][T11478] RAX: ffffffffffffffda RBX: 00007f0b99a15fa0 RCX: 00007f0b997fd169 [ 176.698172][T11478] RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000004 [ 176.698188][T11478] RBP: 00007f0b97e5f090 R08: 0000000000000260 R09: 0000000000000000 [ 176.698203][T11478] R10: 0000200000000600 R11: 0000000000000246 R12: 0000000000000002 [ 176.698217][T11478] R13: 0000000000000000 R14: 00007f0b99a15fa0 R15: 00007ffe77348478 [ 176.698282][T11478] [ 177.055530][T11487] openvswitch: netlink: Message has 6 unknown bytes. [ 177.217282][T11501] netlink: 36 bytes leftover after parsing attributes in process `syz.3.2930'. [ 177.317185][ T29] kauditd_printk_skb: 1450 callbacks suppressed [ 177.317203][ T29] audit: type=1326 audit(1744442552.050:13587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11504 comm="syz.3.2932" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7cbad4d169 code=0x7ffc0000 [ 177.372387][ T29] audit: type=1400 audit(1744442552.060:13588): avc: denied { create } for pid=11492 comm="syz.1.2928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 177.392191][ T29] audit: type=1400 audit(1744442552.080:13589): avc: denied { prog_load } for pid=11492 comm="syz.1.2928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 177.411567][ T29] audit: type=1400 audit(1744442552.080:13590): avc: denied { bpf } for pid=11492 comm="syz.1.2928" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 177.432418][ T29] audit: type=1400 audit(1744442552.080:13591): avc: denied { perfmon } for pid=11492 comm="syz.1.2928" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 177.453841][ T29] audit: type=1400 audit(1744442552.080:13592): avc: denied { prog_run } for pid=11492 comm="syz.1.2928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 177.473272][ T29] audit: type=1326 audit(1744442552.080:13593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11504 comm="syz.3.2932" exe="/root/syz-executor" sig=0 arch=c000003e syscall=53 compat=0 ip=0x7f7cbad4d169 code=0x7ffc0000 [ 177.496924][ T29] audit: type=1400 audit(1744442552.080:13594): avc: denied { create } for pid=11504 comm="syz.3.2932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 177.516642][ T29] audit: type=1326 audit(1744442552.080:13595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11504 comm="syz.3.2932" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7cbad4d169 code=0x7ffc0000 [ 177.540322][ T29] audit: type=1326 audit(1744442552.080:13596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11504 comm="syz.3.2932" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f7cbad4d169 code=0x7ffc0000 [ 177.628310][T11517] FAULT_INJECTION: forcing a failure. [ 177.628310][T11517] name failslab, interval 1, probability 0, space 0, times 0 [ 177.640997][T11517] CPU: 1 UID: 0 PID: 11517 Comm: syz.2.2937 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 177.641026][T11517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 177.641040][T11517] Call Trace: [ 177.641048][T11517] [ 177.641057][T11517] dump_stack_lvl+0xf6/0x150 [ 177.641086][T11517] dump_stack+0x15/0x1a [ 177.641106][T11517] should_fail_ex+0x261/0x270 [ 177.641190][T11517] should_failslab+0x8f/0xb0 [ 177.641223][T11517] kmem_cache_alloc_noprof+0x59/0x340 [ 177.641249][T11517] ? getname_flags+0x81/0x3b0 [ 177.641276][T11517] getname_flags+0x81/0x3b0 [ 177.641305][T11517] do_sys_openat2+0x65/0x110 [ 177.641356][T11517] __x64_sys_openat+0xf8/0x120 [ 177.641395][T11517] x64_sys_call+0x1ac/0x2e10 [ 177.641420][T11517] do_syscall_64+0xc9/0x1c0 [ 177.641491][T11517] ? clear_bhb_loop+0x25/0x80 [ 177.641513][T11517] ? clear_bhb_loop+0x25/0x80 [ 177.641534][T11517] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 177.641584][T11517] RIP: 0033:0x7f63925ad169 [ 177.641602][T11517] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 177.641624][T11517] RSP: 002b:00007f6390c17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 177.641646][T11517] RAX: ffffffffffffffda RBX: 00007f63927c5fa0 RCX: 00007f63925ad169 [ 177.641661][T11517] RDX: 000000000000275a RSI: 00002000000001c0 RDI: ffffffffffffff9c [ 177.641672][T11517] RBP: 00007f6390c17090 R08: 0000000000000000 R09: 0000000000000000 [ 177.641735][T11517] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 177.641749][T11517] R13: 0000000000000000 R14: 00007f63927c5fa0 R15: 00007ffc5ad944b8 [ 177.641772][T11517] [ 177.925148][T11523] netlink: 12 bytes leftover after parsing attributes in process `syz.5.2934'. [ 178.030247][T11532] SELinux: syz.0.2944 (11532) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 178.245216][T11546] netlink: 24 bytes leftover after parsing attributes in process `syz.1.2950'. [ 178.291809][T11549] netlink: 56 bytes leftover after parsing attributes in process `syz.0.2951'. [ 178.340784][T11549] vlan0: entered allmulticast mode [ 178.485790][T11559] netlink: 20 bytes leftover after parsing attributes in process `syz.3.2956'. [ 178.729288][T11578] netlink: 'syz.5.2962': attribute type 10 has an invalid length. [ 178.766071][T11578] hsr_slave_0: left promiscuous mode [ 178.785657][T11578] hsr_slave_1: left promiscuous mode [ 178.837031][T11589] openvswitch: netlink: Message has 6 unknown bytes. [ 178.857246][ T6080] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 179.212079][T11612] xt_CT: You must specify a L4 protocol and not use inversions on it [ 180.100282][T11620] chnl_net:caif_netlink_parms(): no params data found [ 180.152999][T11662] openvswitch: netlink: Message has 6 unknown bytes. [ 180.183719][T11665] FAULT_INJECTION: forcing a failure. [ 180.183719][T11665] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 180.196939][T11665] CPU: 1 UID: 0 PID: 11665 Comm: syz.3.2992 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 180.196970][T11665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 180.196986][T11665] Call Trace: [ 180.196992][T11665] [ 180.197002][T11665] dump_stack_lvl+0xf6/0x150 [ 180.197034][T11665] dump_stack+0x15/0x1a [ 180.197055][T11665] should_fail_ex+0x261/0x270 [ 180.197088][T11665] should_fail+0xb/0x10 [ 180.197117][T11665] should_fail_usercopy+0x1a/0x20 [ 180.197188][T11665] strncpy_from_user+0x25/0x230 [ 180.197212][T11665] ? getname_flags+0x81/0x3b0 [ 180.197270][T11665] getname_flags+0xb0/0x3b0 [ 180.197290][T11665] do_sys_openat2+0x65/0x110 [ 180.197314][T11665] __x64_sys_openat+0xf8/0x120 [ 180.197380][T11665] x64_sys_call+0x1ac/0x2e10 [ 180.197403][T11665] do_syscall_64+0xc9/0x1c0 [ 180.197432][T11665] ? clear_bhb_loop+0x25/0x80 [ 180.197458][T11665] ? clear_bhb_loop+0x25/0x80 [ 180.197483][T11665] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 180.197547][T11665] RIP: 0033:0x7f7cbad4d169 [ 180.197564][T11665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 180.197585][T11665] RSP: 002b:00007f7cb93b7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 180.197641][T11665] RAX: ffffffffffffffda RBX: 00007f7cbaf65fa0 RCX: 00007f7cbad4d169 [ 180.197655][T11665] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: ffffffffffffff9c [ 180.197668][T11665] RBP: 00007f7cb93b7090 R08: 0000000000000000 R09: 0000000000000000 [ 180.197679][T11665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 180.197692][T11665] R13: 0000000000000000 R14: 00007f7cbaf65fa0 R15: 00007ffe0bf7c318 [ 180.197754][T11665] [ 180.207612][T11620] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.388909][T11620] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.396194][T11620] bridge_slave_0: entered allmulticast mode [ 180.402873][T11620] bridge_slave_0: entered promiscuous mode [ 180.411431][T11620] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.418546][T11620] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.425718][T11620] bridge_slave_1: entered allmulticast mode [ 180.432543][T11620] bridge_slave_1: entered promiscuous mode [ 180.458256][T11620] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 180.468968][T11620] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 180.501716][T11620] team0: Port device team_slave_0 added [ 180.523948][T11620] team0: Port device team_slave_1 added [ 180.587776][T11620] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 180.594776][T11620] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 180.621091][T11620] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 180.635948][T11620] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 180.643096][T11620] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 180.669188][T11620] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 180.708099][T11620] hsr_slave_0: entered promiscuous mode [ 180.714184][T11620] hsr_slave_1: entered promiscuous mode [ 180.849172][T11695] FAULT_INJECTION: forcing a failure. [ 180.849172][T11695] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 180.862311][T11695] CPU: 1 UID: 0 PID: 11695 Comm: syz.5.3007 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 180.862339][T11695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 180.862409][T11695] Call Trace: [ 180.862417][T11695] [ 180.862425][T11695] dump_stack_lvl+0xf6/0x150 [ 180.862452][T11695] dump_stack+0x15/0x1a [ 180.862473][T11695] should_fail_ex+0x261/0x270 [ 180.862507][T11695] should_fail+0xb/0x10 [ 180.862597][T11695] should_fail_usercopy+0x1a/0x20 [ 180.862635][T11695] _copy_from_user+0x1c/0xa0 [ 180.862671][T11695] memdup_user+0x6b/0xd0 [ 180.862696][T11695] proc_pid_attr_write+0x15d/0x220 [ 180.862779][T11695] vfs_writev+0x3f3/0x880 [ 180.862804][T11695] ? get_pid_task+0x94/0xd0 [ 180.862834][T11695] ? __pfx_proc_pid_attr_write+0x10/0x10 [ 180.862876][T11695] ? mutex_lock+0xd/0x40 [ 180.862969][T11695] do_writev+0xf7/0x230 [ 180.863003][T11695] __x64_sys_writev+0x45/0x50 [ 180.863035][T11695] x64_sys_call+0x1d68/0x2e10 [ 180.863159][T11695] do_syscall_64+0xc9/0x1c0 [ 180.863194][T11695] ? clear_bhb_loop+0x25/0x80 [ 180.863218][T11695] ? clear_bhb_loop+0x25/0x80 [ 180.863244][T11695] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 180.863340][T11695] RIP: 0033:0x7f0b997fd169 [ 180.863385][T11695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 180.863403][T11695] RSP: 002b:00007f0b97e5f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 180.863425][T11695] RAX: ffffffffffffffda RBX: 00007f0b99a15fa0 RCX: 00007f0b997fd169 [ 180.863438][T11695] RDX: 0000000000000008 RSI: 00002000000000c0 RDI: 0000000000000004 [ 180.863449][T11695] RBP: 00007f0b97e5f090 R08: 0000000000000000 R09: 0000000000000000 [ 180.863461][T11695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 180.863509][T11695] R13: 0000000000000000 R14: 00007f0b99a15fa0 R15: 00007ffe77348478 [ 180.863531][T11695] [ 181.092032][T11620] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 181.154323][T11620] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 181.199347][T11709] netlink: 24 bytes leftover after parsing attributes in process `syz.2.3010'. [ 181.244423][T11620] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 181.291289][T11620] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 181.474627][T11620] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 181.492894][T11620] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 181.505917][T11620] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 181.535397][T11620] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 181.650528][T11620] 8021q: adding VLAN 0 to HW filter on device bond0 [ 181.681010][T11620] 8021q: adding VLAN 0 to HW filter on device team0 [ 181.703863][ T6095] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.710995][ T6095] bridge0: port 1(bridge_slave_0) entered forwarding state [ 181.758066][ T6123] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.765200][ T6123] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.827760][T11729] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3017'. [ 181.881548][T11729] netlink: 2 bytes leftover after parsing attributes in process `syz.3.3017'. [ 181.895870][T11620] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 181.910646][T11729] netlink: 'syz.3.3017': attribute type 10 has an invalid length. [ 181.918768][T11729] netlink: 40 bytes leftover after parsing attributes in process `syz.3.3017'. [ 181.958915][T11729] team0: Port device geneve1 added [ 182.070731][ T6081] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 182.152524][T11620] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 182.337230][ T29] kauditd_printk_skb: 1214 callbacks suppressed [ 182.337245][ T29] audit: type=1400 audit(1744442557.070:14807): avc: denied { name_bind } for pid=11747 comm="syz.5.3021" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 182.365424][ T29] audit: type=1400 audit(1744442557.070:14808): avc: denied { node_bind } for pid=11747 comm="syz.5.3021" saddr=224.0.0.2 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 182.456640][T11620] veth0_vlan: entered promiscuous mode [ 182.484399][ T29] audit: type=1400 audit(1744442557.180:14809): avc: denied { prog_load } for pid=11747 comm="syz.5.3021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 182.503799][ T29] audit: type=1400 audit(1744442557.180:14810): avc: denied { bpf } for pid=11747 comm="syz.5.3021" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 182.524657][ T29] audit: type=1400 audit(1744442557.190:14811): avc: denied { prog_load } for pid=11747 comm="syz.5.3021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 182.543929][ T29] audit: type=1400 audit(1744442557.190:14812): avc: denied { bpf } for pid=11747 comm="syz.5.3021" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 182.550323][T11620] veth1_vlan: entered promiscuous mode [ 182.564682][ T29] audit: type=1400 audit(1744442557.190:14813): avc: denied { perfmon } for pid=11747 comm="syz.5.3021" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 182.591298][ T29] audit: type=1400 audit(1744442557.190:14814): avc: denied { map_create } for pid=11751 comm="syz.2.3022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 182.610785][ T29] audit: type=1400 audit(1744442557.190:14815): avc: denied { map_read map_write } for pid=11751 comm="syz.2.3022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 182.630968][ T29] audit: type=1400 audit(1744442557.190:14816): avc: denied { perfmon } for pid=11747 comm="syz.5.3021" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 182.737638][T11758] netlink: 36 bytes leftover after parsing attributes in process `syz.2.3023'. [ 182.764576][T11620] veth0_macvtap: entered promiscuous mode [ 182.801511][T11620] veth1_macvtap: entered promiscuous mode [ 182.823428][T11620] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 182.834099][T11620] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 182.843984][T11620] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 182.854577][T11620] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 182.864602][T11620] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 182.875306][T11620] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 182.885233][T11620] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 182.895686][T11620] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 182.905555][T11620] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 182.916113][T11620] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 182.926219][T11620] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 182.936742][T11620] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 182.963423][T11620] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 182.978776][T11620] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 182.989387][T11620] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 182.999252][T11620] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 183.009770][T11620] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 183.019643][T11620] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 183.030211][T11620] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 183.040172][T11620] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 183.050639][T11620] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 183.060507][T11620] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 183.071045][T11620] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 183.156647][T11620] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 183.178457][T11620] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 183.187267][T11620] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 183.196108][T11620] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 183.204842][T11620] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 183.272029][T11774] netlink: 100 bytes leftover after parsing attributes in process `syz.2.3030'. [ 183.390639][T11781] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3034'. [ 183.401199][T11785] IPv6: NLM_F_CREATE should be specified when creating new route [ 183.445049][T11781] netlink: 2 bytes leftover after parsing attributes in process `syz.1.3034'. [ 183.482323][T11781] netlink: 'syz.1.3034': attribute type 10 has an invalid length. [ 183.490295][T11781] netlink: 40 bytes leftover after parsing attributes in process `syz.1.3034'. [ 183.516979][T11781] geneve1: entered promiscuous mode [ 183.528967][T11781] team0: Port device geneve1 added [ 184.148210][T11802] chnl_net:caif_netlink_parms(): no params data found [ 184.206354][T11802] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.213527][T11802] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.221019][T11802] bridge_slave_0: entered allmulticast mode [ 184.228080][T11802] bridge_slave_0: entered promiscuous mode [ 184.237331][T11802] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.244413][T11802] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.251811][T11802] bridge_slave_1: entered allmulticast mode [ 184.258389][T11802] bridge_slave_1: entered promiscuous mode [ 184.282301][T11802] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 184.294931][T11802] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 184.327454][T11802] team0: Port device team_slave_0 added [ 184.336743][T11802] team0: Port device team_slave_1 added [ 184.374240][T11802] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 184.381300][T11802] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 184.407416][T11802] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 184.430282][T11844] netlink: 12 bytes leftover after parsing attributes in process `syz.0.3054'. [ 184.442654][T11802] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 184.449677][T11802] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 184.475810][T11802] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 184.508475][T11845] sch_tbf: burst 0 is lower than device ip6_vti0 mtu (1364) ! [ 184.592421][T11802] hsr_slave_0: entered promiscuous mode [ 184.615734][T11802] hsr_slave_1: entered promiscuous mode [ 184.617651][ T6087] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 184.639715][T11802] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 184.659027][T11802] Cannot create hsr debugfs directory [ 184.898354][T11802] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 184.983564][T11802] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 185.073744][T11802] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 185.109265][T11878] netlink: 36 bytes leftover after parsing attributes in process `syz.5.3068'. [ 185.126321][T11802] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 185.310254][T11802] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 185.356778][T11802] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 185.378424][T11802] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 185.411022][T11802] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 185.574115][T11802] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.637166][T11802] 8021q: adding VLAN 0 to HW filter on device team0 [ 185.666218][ T6087] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.673376][ T6087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.720088][ T6087] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.727329][ T6087] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.018569][T11802] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 186.182546][T11933] netlink: 80 bytes leftover after parsing attributes in process `syz.1.3086'. [ 186.281123][T11802] veth0_vlan: entered promiscuous mode [ 186.308818][T11802] veth1_vlan: entered promiscuous mode [ 186.371734][T11802] veth0_macvtap: entered promiscuous mode [ 186.393001][T11802] veth1_macvtap: entered promiscuous mode [ 186.417885][T11802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 186.428472][T11802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.438449][T11802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 186.449017][T11802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.458913][T11802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 186.469565][T11802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.479425][T11802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 186.489925][T11802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.499782][T11802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 186.510268][T11802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.520142][T11802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 186.530611][T11802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.540560][T11802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 186.551108][T11802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.577252][T11802] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 186.587242][T11802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 186.598051][T11802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.607926][T11802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 186.618423][T11802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.628303][T11802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 186.638751][T11802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.648608][T11802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 186.659074][T11802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.668944][T11802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 186.679466][T11802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.689331][T11802] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 186.699830][T11802] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 186.754998][T11802] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 186.778460][T11802] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.787361][T11802] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.796120][T11802] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.805177][T11802] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 186.831421][T11954] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 186.900602][T11959] netlink: 72 bytes leftover after parsing attributes in process `syz.1.3094'. [ 187.187045][ T6123] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 187.351957][ T29] kauditd_printk_skb: 1222 callbacks suppressed [ 187.351973][ T29] audit: type=1400 audit(1744442562.080:16039): avc: denied { prog_load } for pid=11973 comm="syz.5.3098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 187.377618][ T29] audit: type=1400 audit(1744442562.080:16040): avc: denied { bpf } for pid=11973 comm="syz.5.3098" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 187.382129][T11978] netlink: 12 bytes leftover after parsing attributes in process `syz.0.3099'. [ 187.398452][ T29] audit: type=1400 audit(1744442562.080:16041): avc: denied { perfmon } for pid=11973 comm="syz.5.3098" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 187.429758][ T29] audit: type=1400 audit(1744442562.090:16042): avc: denied { open } for pid=11977 comm="syz.0.3099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 187.449261][ T29] audit: type=1400 audit(1744442562.090:16043): avc: denied { perfmon } for pid=11977 comm="syz.0.3099" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 187.470478][ T29] audit: type=1400 audit(1744442562.090:16044): avc: denied { kernel } for pid=11977 comm="syz.0.3099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 187.490364][ T29] audit: type=1400 audit(1744442562.100:16045): avc: denied { perfmon } for pid=11977 comm="syz.0.3099" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 187.511632][ T29] audit: type=1400 audit(1744442562.100:16046): avc: denied { create } for pid=11977 comm="syz.0.3099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 187.532671][ T29] audit: type=1400 audit(1744442562.110:16047): avc: denied { module_request } for pid=11968 comm="syz-executor" kmod="netdev-rose1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 187.554960][ T29] audit: type=1400 audit(1744442562.110:16048): avc: denied { write } for pid=11977 comm="syz.0.3099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 187.807195][T11968] chnl_net:caif_netlink_parms(): no params data found [ 187.935016][T11968] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.942229][T11968] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.965762][T11968] bridge_slave_0: entered allmulticast mode [ 187.975713][T11968] bridge_slave_0: entered promiscuous mode [ 187.983966][T11968] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.991139][T11968] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.998635][T11968] bridge_slave_1: entered allmulticast mode [ 188.007599][T11968] bridge_slave_1: entered promiscuous mode [ 188.043049][T11968] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 188.067562][T11968] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 188.123999][T11968] team0: Port device team_slave_0 added [ 188.131830][T11968] team0: Port device team_slave_1 added [ 188.195397][T11968] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 188.202460][T11968] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 188.228447][T11968] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 188.297044][T11968] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 188.304077][T11968] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 188.330066][T11968] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 188.462499][T11968] hsr_slave_0: entered promiscuous mode [ 188.543165][T11968] hsr_slave_1: entered promiscuous mode [ 188.559792][T11968] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 188.585087][T11968] Cannot create hsr debugfs directory [ 188.620965][T12022] FAULT_INJECTION: forcing a failure. [ 188.620965][T12022] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 188.634175][T12022] CPU: 1 UID: 0 PID: 12022 Comm: syz.0.3113 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 188.634214][T12022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 188.634229][T12022] Call Trace: [ 188.634285][T12022] [ 188.634295][T12022] dump_stack_lvl+0xf6/0x150 [ 188.634325][T12022] dump_stack+0x15/0x1a [ 188.634345][T12022] should_fail_ex+0x261/0x270 [ 188.634416][T12022] should_fail+0xb/0x10 [ 188.634439][T12022] should_fail_usercopy+0x1a/0x20 [ 188.634565][T12022] _copy_to_user+0x20/0xa0 [ 188.634605][T12022] simple_read_from_buffer+0xb2/0x130 [ 188.634644][T12022] proc_fail_nth_read+0x103/0x140 [ 188.634694][T12022] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 188.634733][T12022] vfs_read+0x1b2/0x710 [ 188.634828][T12022] ? __rcu_read_unlock+0x4e/0x70 [ 188.634857][T12022] ? __fget_files+0x186/0x1c0 [ 188.634884][T12022] ksys_read+0xeb/0x1b0 [ 188.634915][T12022] __x64_sys_read+0x42/0x50 [ 188.634943][T12022] x64_sys_call+0x2a3b/0x2e10 [ 188.634991][T12022] do_syscall_64+0xc9/0x1c0 [ 188.635024][T12022] ? clear_bhb_loop+0x25/0x80 [ 188.635046][T12022] ? clear_bhb_loop+0x25/0x80 [ 188.635067][T12022] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 188.635089][T12022] RIP: 0033:0x7fd184a6bb7c [ 188.635163][T12022] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 188.635180][T12022] RSP: 002b:00007fd1830d7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 188.635206][T12022] RAX: ffffffffffffffda RBX: 00007fd184c85fa0 RCX: 00007fd184a6bb7c [ 188.635221][T12022] RDX: 000000000000000f RSI: 00007fd1830d70a0 RDI: 0000000000000005 [ 188.635233][T12022] RBP: 00007fd1830d7090 R08: 0000000000000000 R09: 0000000000000000 [ 188.635245][T12022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 188.635256][T12022] R13: 0000000000000000 R14: 00007fd184c85fa0 R15: 00007ffd87570e68 [ 188.635276][T12022] [ 189.012859][T11968] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 189.070190][T12039] FAULT_INJECTION: forcing a failure. [ 189.070190][T12039] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 189.083576][T12039] CPU: 0 UID: 0 PID: 12039 Comm: syz.0.3121 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 189.083609][T12039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 189.083625][T12039] Call Trace: [ 189.083633][T12039] [ 189.083642][T12039] dump_stack_lvl+0xf6/0x150 [ 189.083733][T12039] dump_stack+0x15/0x1a [ 189.083750][T12039] should_fail_ex+0x261/0x270 [ 189.083778][T12039] should_fail_alloc_page+0xfd/0x110 [ 189.083854][T12039] __alloc_frozen_pages_noprof+0x11d/0x360 [ 189.083887][T12039] alloc_pages_mpol+0xb6/0x260 [ 189.083915][T12039] vma_alloc_folio_noprof+0x19c/0x300 [ 189.083949][T12039] handle_mm_fault+0xdda/0x2e80 [ 189.084033][T12039] ? mas_walk+0x204/0x320 [ 189.084060][T12039] ? __rcu_read_unlock+0x4e/0x70 [ 189.084095][T12039] exc_page_fault+0x3b9/0x6a0 [ 189.084167][T12039] asm_exc_page_fault+0x26/0x30 [ 189.084200][T12039] RIP: 0033:0x7fd18492fbe3 [ 189.084219][T12039] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 189.084242][T12039] RSP: 002b:00007fd1830d64a0 EFLAGS: 00010206 [ 189.084260][T12039] RAX: 0000000000002000 RBX: 00007fd1830d6540 RCX: 00007fd17acb7000 [ 189.084275][T12039] RDX: 00007fd1830d66e0 RSI: 0000000000000003 RDI: 00007fd1830d65e0 [ 189.084289][T12039] RBP: 0000000000000048 R08: 0000000000000006 R09: 0000000000000022 [ 189.084381][T12039] R10: 0000000000000024 R11: 00007fd1830d6540 R12: 0000000000000001 [ 189.084395][T12039] R13: 00007fd184b093e0 R14: 00000000000000ff R15: 00007fd1830d65e0 [ 189.084419][T12039] [ 189.084430][T12039] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 189.255881][T11968] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 189.318680][T11968] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 189.350413][T12053] netlink: 24 bytes leftover after parsing attributes in process `syz.0.3127'. [ 189.377733][T11968] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 189.436517][T12055] netlink: 16 bytes leftover after parsing attributes in process `syz.3.3128'. [ 189.478395][T11968] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 189.489707][T11968] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 189.503839][T11968] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 189.522646][T11968] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 189.533789][T12061] netlink: 24 bytes leftover after parsing attributes in process `syz.3.3129'. [ 189.577790][T11968] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.605037][T11968] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.623332][ T6087] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.630645][ T6087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.640469][ T6087] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.647597][ T6087] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.670261][T11968] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 189.680752][T11968] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 189.739430][ T6081] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 189.820274][T12068] netlink: 24 bytes leftover after parsing attributes in process `syz.0.3130'. [ 189.858162][T11968] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.150723][T11968] veth0_vlan: entered promiscuous mode [ 190.199718][T11968] veth1_vlan: entered promiscuous mode [ 190.290653][T11968] veth0_macvtap: entered promiscuous mode [ 190.300636][T11968] veth1_macvtap: entered promiscuous mode [ 190.361099][T11968] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 190.371745][T11968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.381802][T11968] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 190.392282][T11968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.402261][T11968] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 190.412872][T11968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.422892][T11968] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 190.433402][T11968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.443307][T11968] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 190.453785][T11968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.463727][T11968] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 190.474395][T11968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.484377][T11968] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 190.494865][T11968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.504778][T11968] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 190.515286][T11968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.533215][T11968] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 190.602169][T11968] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 190.612846][T11968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.622809][T11968] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 190.633441][T11968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.643319][T11968] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 190.653786][T11968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.663640][T11968] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 190.674112][T11968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.684067][T11968] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 190.694531][T11968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.704895][T11968] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 190.715417][T11968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.725278][T11968] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 190.735733][T11968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 190.749323][T11968] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 190.768213][T11968] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.777153][T11968] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.785876][T11968] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.794759][T11968] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 191.028580][T12124] ip6_tunnel: non-ECT from fc00:0000:0000:0000:0000:0000:0000:0000 with DS=0x3 [ 191.069978][T12124] block device autoloading is deprecated and will be removed. [ 191.077675][T12124] syz.1.3096: attempt to access beyond end of device [ 191.077675][T12124] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 191.124290][T12129] netlink: 12 bytes leftover after parsing attributes in process `syz.0.3151'. [ 191.688913][T12166] openvswitch: netlink: Message has 6 unknown bytes. [ 191.801578][T12170] ALSA: seq fatal error: cannot create timer (-19) [ 191.861669][T12175] pim6reg1: entered promiscuous mode [ 191.867086][T12175] pim6reg1: entered allmulticast mode [ 191.885540][T12177] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3174'. [ 191.891708][T12175] tipc: Started in network mode [ 191.894635][T12177] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3174'. [ 191.899620][T12175] tipc: Node identity 00000000000000000000ffff7f000001, cluster identity 4711 [ 191.908662][T12177] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3174'. [ 191.917590][T12175] tipc: Enabling of bearer rejected, failed to enable media [ 192.064310][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.085979][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.095498][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.107800][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.138950][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.168990][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.178765][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.190698][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.214705][T12194] openvswitch: netlink: Message has 6 unknown bytes. [ 192.224877][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.237057][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.280492][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.327959][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.329120][T12201] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3180'. [ 192.348626][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.359989][ T29] kauditd_printk_skb: 1030 callbacks suppressed [ 192.360003][ T29] audit: type=1400 audit(1744442567.090:17079): avc: denied { map_create } for pid=12202 comm="syz.0.3184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 192.390685][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.400236][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.420065][ T29] audit: type=1400 audit(1744442567.090:17080): avc: denied { perfmon } for pid=12202 comm="syz.0.3184" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 192.428564][T12200] netlink: 8 bytes leftover after parsing attributes in process `syz.5.3182'. [ 192.441255][ T29] audit: type=1400 audit(1744442567.090:17081): avc: denied { map_read map_write } for pid=12202 comm="syz.0.3184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 192.460767][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.470261][ T29] audit: type=1400 audit(1744442567.120:17082): avc: denied { create } for pid=12198 comm="syz.5.3182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 192.500268][ T29] audit: type=1400 audit(1744442567.120:17083): avc: denied { write } for pid=12198 comm="syz.5.3182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 192.520832][ T29] audit: type=1400 audit(1744442567.120:17084): avc: denied { read } for pid=12198 comm="syz.5.3182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 192.541417][ T29] audit: type=1400 audit(1744442567.120:17085): avc: denied { prog_load } for pid=12198 comm="syz.5.3182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 192.560731][ T29] audit: type=1400 audit(1744442567.120:17086): avc: denied { bpf } for pid=12198 comm="syz.5.3182" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 192.581552][ T29] audit: type=1400 audit(1744442567.120:17087): avc: denied { perfmon } for pid=12198 comm="syz.5.3182" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 192.602656][ T29] audit: type=1400 audit(1744442567.120:17088): avc: denied { prog_run } for pid=12198 comm="syz.5.3182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 192.624973][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.636465][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.645798][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.661976][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.673661][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.685941][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.700296][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.709884][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.720722][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.730566][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.749612][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.759625][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.769367][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.788749][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.798313][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.814422][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.824919][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.834823][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.871574][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.881167][T12187] usb usb1: usbfs: process 12187 (syz.3.3178) did not claim interface 0 before use [ 192.944254][ T6123] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 193.062304][T12222] openvswitch: netlink: Message has 6 unknown bytes. [ 193.885385][T12266] SELinux: failed to load policy [ 193.995586][T12275] FAULT_INJECTION: forcing a failure. [ 193.995586][T12275] name failslab, interval 1, probability 0, space 0, times 0 [ 194.008387][T12275] CPU: 0 UID: 0 PID: 12275 Comm: syz.2.3214 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 194.008476][T12275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 194.008493][T12275] Call Trace: [ 194.008501][T12275] [ 194.008511][T12275] dump_stack_lvl+0xf6/0x150 [ 194.008617][T12275] dump_stack+0x15/0x1a [ 194.008638][T12275] should_fail_ex+0x261/0x270 [ 194.008726][T12275] should_failslab+0x8f/0xb0 [ 194.008764][T12275] __kmalloc_cache_noprof+0x55/0x320 [ 194.008787][T12275] ? audit_log_d_path+0x8e/0x150 [ 194.008840][T12275] audit_log_d_path+0x8e/0x150 [ 194.008868][T12275] audit_log_d_path_exe+0x42/0x70 [ 194.008896][T12275] audit_log_task+0x1f1/0x250 [ 194.008919][T12275] audit_seccomp+0x68/0x130 [ 194.008943][T12275] __seccomp_filter+0x694/0x10e0 [ 194.009056][T12275] __secure_computing+0x7e/0x160 [ 194.009224][T12275] syscall_trace_enter+0xcf/0x1f0 [ 194.009258][T12275] do_syscall_64+0xaa/0x1c0 [ 194.009339][T12275] ? clear_bhb_loop+0x25/0x80 [ 194.009363][T12275] ? clear_bhb_loop+0x25/0x80 [ 194.009389][T12275] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 194.009536][T12275] RIP: 0033:0x7fd9b642bb7c [ 194.009552][T12275] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 194.009608][T12275] RSP: 002b:00007fd9b4a8f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 194.009631][T12275] RAX: ffffffffffffffda RBX: 00007fd9b6645fa0 RCX: 00007fd9b642bb7c [ 194.009643][T12275] RDX: 000000000000000f RSI: 00007fd9b4a8f0a0 RDI: 0000000000000006 [ 194.009654][T12275] RBP: 00007fd9b4a8f090 R08: 0000000000000000 R09: 0000000000000000 [ 194.009674][T12275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 194.009689][T12275] R13: 0000000000000000 R14: 00007fd9b6645fa0 R15: 00007ffe13234f38 [ 194.009709][T12275] [ 194.394265][T12290] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 194.406362][T12290] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 194.482288][T12294] xt_hashlimit: max too large, truncated to 1048576 [ 194.492773][T12294] xt_limit: Overflow, try lower: 0/0 [ 194.518893][T12296] FAULT_INJECTION: forcing a failure. [ 194.518893][T12296] name failslab, interval 1, probability 0, space 0, times 0 [ 194.531678][T12296] CPU: 1 UID: 0 PID: 12296 Comm: syz.2.3224 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 194.531708][T12296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 194.531720][T12296] Call Trace: [ 194.531727][T12296] [ 194.531735][T12296] dump_stack_lvl+0xf6/0x150 [ 194.531802][T12296] dump_stack+0x15/0x1a [ 194.531823][T12296] should_fail_ex+0x261/0x270 [ 194.531856][T12296] should_failslab+0x8f/0xb0 [ 194.531893][T12296] __kmalloc_noprof+0xad/0x410 [ 194.531917][T12296] ? kobject_get_path+0x91/0x1c0 [ 194.531960][T12296] kobject_get_path+0x91/0x1c0 [ 194.531997][T12296] kobject_uevent_env+0x1b9/0x550 [ 194.532021][T12296] ? device_remove_attrs+0x14f/0x190 [ 194.532046][T12296] kobject_uevent+0x1c/0x30 [ 194.532070][T12296] device_del+0x6fc/0x780 [ 194.532089][T12296] ? __try_to_del_timer_sync+0x14a/0x160 [ 194.532115][T12296] device_unregister+0x15/0x40 [ 194.532168][T12296] wakeup_source_sysfs_remove+0x25/0x30 [ 194.532193][T12296] wakeup_source_unregister+0xee/0x110 [ 194.532232][T12296] __ep_remove+0x2fa/0x440 [ 194.532301][T12296] eventpoll_release_file+0x8d/0x190 [ 194.532354][T12296] __fput+0x593/0x640 [ 194.532384][T12296] ____fput+0x1c/0x30 [ 194.532409][T12296] task_work_run+0x13c/0x1b0 [ 194.532468][T12296] syscall_exit_to_user_mode+0xa8/0x120 [ 194.532500][T12296] do_syscall_64+0xd6/0x1c0 [ 194.532540][T12296] ? clear_bhb_loop+0x25/0x80 [ 194.532563][T12296] ? clear_bhb_loop+0x25/0x80 [ 194.532605][T12296] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 194.532682][T12296] RIP: 0033:0x7fd9b642d169 [ 194.532700][T12296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 194.532801][T12296] RSP: 002b:00007fd9b4a8f038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 194.532822][T12296] RAX: 0000000000000000 RBX: 00007fd9b6645fa0 RCX: 00007fd9b642d169 [ 194.532837][T12296] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 194.532850][T12296] RBP: 00007fd9b4a8f090 R08: 0000000000000000 R09: 0000000000000000 [ 194.532878][T12296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 194.532892][T12296] R13: 0000000000000000 R14: 00007fd9b6645fa0 R15: 00007ffe13234f38 [ 194.532913][T12296] [ 194.865280][T12307] x_tables: ip_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 194.876646][T12307] __nla_validate_parse: 2 callbacks suppressed [ 194.876662][T12307] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3228'. [ 195.192912][T12317] netlink: 80 bytes leftover after parsing attributes in process `syz.0.3232'. [ 195.439743][T12333] FAULT_INJECTION: forcing a failure. [ 195.439743][T12333] name failslab, interval 1, probability 0, space 0, times 0 [ 195.452548][T12333] CPU: 1 UID: 0 PID: 12333 Comm: syz.3.3239 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 195.452580][T12333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 195.452593][T12333] Call Trace: [ 195.452599][T12333] [ 195.452607][T12333] dump_stack_lvl+0xf6/0x150 [ 195.452635][T12333] dump_stack+0x15/0x1a [ 195.452654][T12333] should_fail_ex+0x261/0x270 [ 195.452689][T12333] should_failslab+0x8f/0xb0 [ 195.452725][T12333] kmem_cache_alloc_noprof+0x59/0x340 [ 195.452752][T12333] ? vm_area_dup+0x32/0x260 [ 195.452777][T12333] vm_area_dup+0x32/0x260 [ 195.452797][T12333] __split_vma+0xf9/0x630 [ 195.452827][T12333] vma_modify+0x1a2/0x200 [ 195.452861][T12333] vma_modify_flags+0x10a/0x140 [ 195.452904][T12333] mlock_fixup+0x113/0x3f0 [ 195.452937][T12333] apply_vma_lock_flags+0x196/0x260 [ 195.452967][T12333] do_mlock+0x407/0x580 [ 195.452994][T12333] ? __secure_computing+0x7e/0x160 [ 195.453030][T12333] __x64_sys_mlock2+0x72/0x90 [ 195.453056][T12333] x64_sys_call+0x2671/0x2e10 [ 195.453077][T12333] do_syscall_64+0xc9/0x1c0 [ 195.453106][T12333] ? clear_bhb_loop+0x25/0x80 [ 195.453130][T12333] ? clear_bhb_loop+0x25/0x80 [ 195.453154][T12333] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 195.453175][T12333] RIP: 0033:0x7f7cbad4d169 [ 195.453190][T12333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 195.453208][T12333] RSP: 002b:00007f7cb93b7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000145 [ 195.453226][T12333] RAX: ffffffffffffffda RBX: 00007f7cbaf65fa0 RCX: 00007f7cbad4d169 [ 195.453240][T12333] RDX: 0000000000000000 RSI: 00000000000040ef RDI: 0000200000004000 [ 195.453254][T12333] RBP: 00007f7cb93b7090 R08: 0000000000000000 R09: 0000000000000000 [ 195.453266][T12333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 195.453277][T12333] R13: 0000000000000000 R14: 00007f7cbaf65fa0 R15: 00007ffe0bf7c318 [ 195.453296][T12333] [ 195.655485][ T6123] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 195.863191][T12349] openvswitch: netlink: Message has 6 unknown bytes. [ 196.038548][T12367] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=12367 comm=syz.1.3255 [ 196.242396][T12380] openvswitch: netlink: Message has 6 unknown bytes. [ 196.270694][T12381] SELinux: failed to load policy [ 196.392819][T12389] FAULT_INJECTION: forcing a failure. [ 196.392819][T12389] name failslab, interval 1, probability 0, space 0, times 0 [ 196.405626][T12389] CPU: 1 UID: 0 PID: 12389 Comm: syz.1.3266 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 196.405656][T12389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 196.405668][T12389] Call Trace: [ 196.405674][T12389] [ 196.405680][T12389] dump_stack_lvl+0xf6/0x150 [ 196.405705][T12389] dump_stack+0x15/0x1a [ 196.405775][T12389] should_fail_ex+0x261/0x270 [ 196.405803][T12389] should_failslab+0x8f/0xb0 [ 196.405835][T12389] __kmalloc_noprof+0xad/0x410 [ 196.405904][T12389] ? copy_splice_read+0xb8/0x5d0 [ 196.405988][T12389] copy_splice_read+0xb8/0x5d0 [ 196.406022][T12389] ? __pfx_splice_write_null+0x10/0x10 [ 196.406057][T12389] ? __pfx_copy_splice_read+0x10/0x10 [ 196.406090][T12389] splice_direct_to_actor+0x26c/0x680 [ 196.406165][T12389] ? __pfx_direct_splice_actor+0x10/0x10 [ 196.406201][T12389] do_splice_direct+0xd9/0x150 [ 196.406243][T12389] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 196.406283][T12389] do_sendfile+0x40a/0x690 [ 196.406313][T12389] __x64_sys_sendfile64+0x113/0x160 [ 196.406335][T12389] x64_sys_call+0xfc3/0x2e10 [ 196.406360][T12389] do_syscall_64+0xc9/0x1c0 [ 196.406389][T12389] ? clear_bhb_loop+0x25/0x80 [ 196.406423][T12389] ? clear_bhb_loop+0x25/0x80 [ 196.406454][T12389] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 196.406480][T12389] RIP: 0033:0x7f08b67dd169 [ 196.406496][T12389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 196.406515][T12389] RSP: 002b:00007f08b4e3f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 196.406616][T12389] RAX: ffffffffffffffda RBX: 00007f08b69f5fa0 RCX: 00007f08b67dd169 [ 196.406630][T12389] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 196.406644][T12389] RBP: 00007f08b4e3f090 R08: 0000000000000000 R09: 0000000000000000 [ 196.406681][T12389] R10: 000000040000f63c R11: 0000000000000246 R12: 0000000000000001 [ 196.406695][T12389] R13: 0000000000000000 R14: 00007f08b69f5fa0 R15: 00007fff0befaf28 [ 196.406716][T12389] [ 196.752952][T12400] FAULT_INJECTION: forcing a failure. [ 196.752952][T12400] name failslab, interval 1, probability 0, space 0, times 0 [ 196.765734][T12400] CPU: 0 UID: 0 PID: 12400 Comm: syz.0.3271 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 196.765812][T12400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 196.765857][T12400] Call Trace: [ 196.765864][T12400] [ 196.765872][T12400] dump_stack_lvl+0xf6/0x150 [ 196.765897][T12400] dump_stack+0x15/0x1a [ 196.765913][T12400] should_fail_ex+0x261/0x270 [ 196.765952][T12400] should_failslab+0x8f/0xb0 [ 196.766011][T12400] __kmalloc_node_track_caller_noprof+0xaa/0x410 [ 196.766042][T12400] ? sidtab_sid2str_get+0xb8/0x140 [ 196.766065][T12400] ? skb_put+0xba/0x100 [ 196.766101][T12400] kmemdup_noprof+0x2b/0x70 [ 196.766124][T12400] sidtab_sid2str_get+0xb8/0x140 [ 196.766148][T12400] security_sid_to_context_core+0x1eb/0x2f0 [ 196.766173][T12400] security_sid_to_context+0x27/0x30 [ 196.766194][T12400] avc_audit_post_callback+0x9f/0x540 [ 196.766273][T12400] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 196.766301][T12400] common_lsm_audit+0x1c6/0x230 [ 196.766327][T12400] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 196.766359][T12400] slow_avc_audit+0xff/0x140 [ 196.766388][T12400] selinux_capable+0x1a7/0x260 [ 196.766444][T12400] security_capable+0x81/0x90 [ 196.766471][T12400] ns_capable+0x4d/0xb0 [ 196.766494][T12400] bpf_token_capable+0x43/0xd0 [ 196.766528][T12400] bpf_prog_load+0x24a/0x10e0 [ 196.766551][T12400] ? avc_has_perm_noaudit+0x1cc/0x210 [ 196.766664][T12400] __sys_bpf+0x533/0x800 [ 196.766693][T12400] __x64_sys_bpf+0x43/0x50 [ 196.766775][T12400] x64_sys_call+0x23da/0x2e10 [ 196.766797][T12400] do_syscall_64+0xc9/0x1c0 [ 196.766828][T12400] ? clear_bhb_loop+0x25/0x80 [ 196.766853][T12400] ? clear_bhb_loop+0x25/0x80 [ 196.766875][T12400] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 196.766950][T12400] RIP: 0033:0x7fd184a6d169 [ 196.766966][T12400] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 196.767027][T12400] RSP: 002b:00007fd1830d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 196.767046][T12400] RAX: ffffffffffffffda RBX: 00007fd184c85fa0 RCX: 00007fd184a6d169 [ 196.767058][T12400] RDX: 0000000000000094 RSI: 0000200000000340 RDI: 0000000000000005 [ 196.767070][T12400] RBP: 00007fd1830d7090 R08: 0000000000000000 R09: 0000000000000000 [ 196.767082][T12400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 196.767094][T12400] R13: 0000000000000000 R14: 00007fd184c85fa0 R15: 00007ffd87570e68 [ 196.767113][T12400] [ 197.088667][T12403] 9pnet_fd: Insufficient options for proto=fd [ 197.098713][T12407] openvswitch: netlink: Message has 6 unknown bytes. [ 197.354329][T12424] smc: net device bond0 applied user defined pnetid SYZ2 [ 197.365701][T12424] smc: net device bond0 erased user defined pnetid SYZ2 [ 197.382558][ T29] kauditd_printk_skb: 1203 callbacks suppressed [ 197.382576][ T29] audit: type=1400 audit(1744442572.110:18290): avc: denied { open } for pid=12429 comm="syz.3.3285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 197.408636][ T29] audit: type=1400 audit(1744442572.110:18291): avc: denied { perfmon } for pid=12429 comm="syz.3.3285" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 197.429843][ T29] audit: type=1400 audit(1744442572.110:18292): avc: denied { kernel } for pid=12429 comm="syz.3.3285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 197.479431][ T29] audit: type=1400 audit(1744442572.120:18293): avc: denied { prog_load } for pid=12398 comm="syz.5.3272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 197.494241][T12434] audit: audit_backlog=65 > audit_backlog_limit=64 [ 197.498820][ T29] audit: type=1400 audit(1744442572.120:18294): avc: denied { bpf } for pid=12398 comm="syz.5.3272" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 197.505278][T12434] audit: audit_lost=10 audit_rate_limit=0 audit_backlog_limit=64 [ 197.526628][ T29] audit: type=1400 audit(1744442572.120:18295): avc: denied { perfmon } for pid=12398 comm="syz.5.3272" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 197.526664][ T29] audit: type=1400 audit(1744442572.120:18296): avc: denied { prog_run } for pid=12398 comm="syz.5.3272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 197.534370][T12434] audit: backlog limit exceeded [ 197.632527][T12438] 9pnet_fd: Insufficient options for proto=fd [ 197.702754][T12442] openvswitch: netlink: Message has 6 unknown bytes. [ 198.057537][ T6087] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 198.338890][T12498] 9pnet_fd: Insufficient options for proto=fd [ 198.712089][T12528] 9pnet_fd: Insufficient options for proto=fd [ 198.942131][T12548] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3340'. [ 198.969251][T12552] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12552 comm=syz.0.3342 [ 199.003045][T12554] FAULT_INJECTION: forcing a failure. [ 199.003045][T12554] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 199.017263][T12554] CPU: 0 UID: 0 PID: 12554 Comm: syz.5.3343 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 199.017296][T12554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 199.017309][T12554] Call Trace: [ 199.017316][T12554] [ 199.017326][T12554] dump_stack_lvl+0xf6/0x150 [ 199.017355][T12554] dump_stack+0x15/0x1a [ 199.017410][T12554] should_fail_ex+0x261/0x270 [ 199.017500][T12554] should_fail_alloc_page+0xfd/0x110 [ 199.017556][T12554] __alloc_frozen_pages_noprof+0x11d/0x360 [ 199.017610][T12554] alloc_pages_mpol+0xb6/0x260 [ 199.017639][T12554] vma_alloc_folio_noprof+0x19c/0x300 [ 199.017671][T12554] do_wp_page+0x64f/0x24e0 [ 199.017734][T12554] ? __rcu_read_lock+0x36/0x50 [ 199.017765][T12554] handle_mm_fault+0xc6c/0x2e80 [ 199.017865][T12554] ? mas_walk+0x204/0x320 [ 199.017948][T12554] ? __rcu_read_unlock+0x4e/0x70 [ 199.018056][T12554] exc_page_fault+0x3b9/0x6a0 [ 199.018082][T12554] asm_exc_page_fault+0x26/0x30 [ 199.018105][T12554] RIP: 0033:0x7f0b996bfc90 [ 199.018173][T12554] Code: 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 47 0f b6 0c 08 45 84 c9 74 08 <45> 88 0c 00 49 8b 47 10 48 83 c0 01 49 89 47 10 83 e9 01 73 d3 41 [ 199.018191][T12554] RSP: 002b:00007f0b97e5e4a0 EFLAGS: 00010202 [ 199.018206][T12554] RAX: 0000000000006005 RBX: 00007f0b97e5e540 RCX: 0000000000000101 [ 199.018218][T12554] RDX: 00000000000000ff RSI: 0000000000000400 RDI: 00007f0b97e5e5e0 [ 199.018231][T12554] RBP: 0000000000000102 R08: 00007f0b8fa3f000 R09: 0000000000000004 [ 199.018311][T12554] R10: 0000200000000d42 R11: 0000000000000444 R12: 0000000000000301 [ 199.018326][T12554] R13: 00007f0b998993e0 R14: 0000000000000013 R15: 00007f0b97e5e5e0 [ 199.018349][T12554] [ 199.018362][T12554] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 199.301600][T12567] FAULT_INJECTION: forcing a failure. [ 199.301600][T12567] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 199.314922][T12567] CPU: 0 UID: 0 PID: 12567 Comm: syz.0.3349 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 199.315023][T12567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 199.315036][T12567] Call Trace: [ 199.315042][T12567] [ 199.315051][T12567] dump_stack_lvl+0xf6/0x150 [ 199.315088][T12567] dump_stack+0x15/0x1a [ 199.315109][T12567] should_fail_ex+0x261/0x270 [ 199.315140][T12567] should_fail_alloc_page+0xfd/0x110 [ 199.315179][T12567] __alloc_frozen_pages_noprof+0x11d/0x360 [ 199.315276][T12567] alloc_pages_mpol+0xb6/0x260 [ 199.315300][T12567] alloc_pages_noprof+0xe8/0x130 [ 199.315330][T12567] __pmd_alloc+0x4d/0x440 [ 199.315353][T12567] handle_mm_fault+0x188d/0x2e80 [ 199.315428][T12567] ? mas_walk+0x204/0x320 [ 199.315455][T12567] ? __rcu_read_unlock+0x4e/0x70 [ 199.315497][T12567] exc_page_fault+0x3b9/0x6a0 [ 199.315602][T12567] ? do_syscall_64+0xd6/0x1c0 [ 199.315635][T12567] asm_exc_page_fault+0x26/0x30 [ 199.315660][T12567] RIP: 0033:0x7fd18492fc86 [ 199.315678][T12567] Code: f0 72 6e 48 63 cd 48 01 c1 49 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 <47> 0f b6 0c 08 45 84 c9 74 08 45 88 0c 00 49 8b 47 10 48 83 c0 01 [ 199.315700][T12567] RSP: 002b:00007fd1830d64a0 EFLAGS: 00010246 [ 199.315735][T12567] RAX: 0000000000000001 RBX: 00007fd1830d6540 RCX: 0000000000000101 [ 199.315749][T12567] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00007fd1830d65e0 [ 199.315763][T12567] RBP: 0000000000000102 R08: 00007fd17acb7000 R09: 0000000000000000 [ 199.315778][T12567] R10: 0000000000000000 R11: 00007fd1830d6550 R12: 0000000000000001 [ 199.315791][T12567] R13: 00007fd184b093e0 R14: 0000000000000000 R15: 00007fd1830d65e0 [ 199.315814][T12567] [ 199.315846][T12567] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 199.855714][T12588] hub 9-0:1.0: USB hub found [ 199.863023][T12588] hub 9-0:1.0: 8 ports detected [ 200.778040][ T6081] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 201.328329][T12657] netlink: 'syz.3.3381': attribute type 1 has an invalid length. [ 201.336185][T12657] netlink: 224 bytes leftover after parsing attributes in process `syz.3.3381'. [ 201.511658][T12665] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3387'. [ 201.583913][T12665] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3387'. [ 201.680397][T12677] FAULT_INJECTION: forcing a failure. [ 201.680397][T12677] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 201.693565][T12677] CPU: 1 UID: 0 PID: 12677 Comm: syz.0.3392 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 201.693736][T12677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 201.693751][T12677] Call Trace: [ 201.693758][T12677] [ 201.693767][T12677] dump_stack_lvl+0xf6/0x150 [ 201.693856][T12677] dump_stack+0x15/0x1a [ 201.693876][T12677] should_fail_ex+0x261/0x270 [ 201.693909][T12677] should_fail+0xb/0x10 [ 201.693937][T12677] should_fail_usercopy+0x1a/0x20 [ 201.693971][T12677] _copy_from_user+0x1c/0xa0 [ 201.694104][T12677] do_ipt_set_ctl+0x444/0x8a0 [ 201.694149][T12677] nf_setsockopt+0x195/0x1b0 [ 201.694286][T12677] ip_setsockopt+0xea/0x100 [ 201.694329][T12677] udp_setsockopt+0x95/0xb0 [ 201.694364][T12677] sock_common_setsockopt+0x64/0x80 [ 201.694389][T12677] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 201.694434][T12677] __sys_setsockopt+0x187/0x200 [ 201.694494][T12677] __x64_sys_setsockopt+0x66/0x80 [ 201.694527][T12677] x64_sys_call+0x2a09/0x2e10 [ 201.694555][T12677] do_syscall_64+0xc9/0x1c0 [ 201.694590][T12677] ? clear_bhb_loop+0x25/0x80 [ 201.694651][T12677] ? clear_bhb_loop+0x25/0x80 [ 201.694676][T12677] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 201.694698][T12677] RIP: 0033:0x7fd184a6d169 [ 201.694774][T12677] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 201.694796][T12677] RSP: 002b:00007fd1830d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 201.694820][T12677] RAX: ffffffffffffffda RBX: 00007fd184c85fa0 RCX: 00007fd184a6d169 [ 201.694833][T12677] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000006 [ 201.694845][T12677] RBP: 00007fd1830d7090 R08: 0000000000000538 R09: 0000000000000000 [ 201.694857][T12677] R10: 0000200000000540 R11: 0000000000000246 R12: 0000000000000001 [ 201.694869][T12677] R13: 0000000000000000 R14: 00007fd184c85fa0 R15: 00007ffd87570e68 [ 201.694956][T12677] [ 201.866606][T12685] xt_hashlimit: max too large, truncated to 1048576 [ 201.933732][T12688] 9pnet_fd: Insufficient options for proto=fd [ 202.063083][T12698] xt_hashlimit: max too large, truncated to 1048576 [ 202.292027][T12718] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3410'. [ 202.302131][T12717] 9pnet_fd: Insufficient options for proto=fd [ 202.411103][ T29] kauditd_printk_skb: 1569 callbacks suppressed [ 202.411129][ T29] audit: type=1400 audit(1744442577.140:19851): avc: denied { create } for pid=12725 comm="syz.5.3414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 202.486736][ T29] audit: type=1400 audit(1744442577.150:19852): avc: denied { bpf } for pid=12721 comm="syz.1.3411" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 202.507588][ T29] audit: type=1400 audit(1744442577.160:19853): avc: denied { prog_run } for pid=12721 comm="syz.1.3411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 202.526850][ T29] audit: type=1400 audit(1744442577.170:19854): avc: denied { prog_load } for pid=12725 comm="syz.5.3414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 202.546582][ T29] audit: type=1400 audit(1744442577.170:19855): avc: denied { create } for pid=12725 comm="syz.5.3414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 202.567762][ T29] audit: type=1400 audit(1744442577.170:19856): avc: denied { map_create } for pid=12725 comm="syz.5.3414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 202.587177][ T29] audit: type=1400 audit(1744442577.170:19857): avc: denied { map_read map_write } for pid=12725 comm="syz.5.3414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 202.607260][ T29] audit: type=1400 audit(1744442577.170:19858): avc: denied { map_create } for pid=12725 comm="syz.5.3414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 202.626856][ T29] audit: type=1400 audit(1744442577.170:19859): avc: denied { bpf } for pid=12725 comm="syz.5.3414" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 202.647848][ T29] audit: type=1400 audit(1744442577.170:19860): avc: denied { prog_load } for pid=12725 comm="syz.5.3414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 202.874015][T12748] 9pnet_fd: Insufficient options for proto=fd [ 202.887843][T12750] syz_tun: refused to change device tx_queue_len [ 203.826490][ T6095] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 203.881857][T12836] FAULT_INJECTION: forcing a failure. [ 203.881857][T12836] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 203.895078][T12836] CPU: 1 UID: 0 PID: 12836 Comm: syz.5.3462 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 203.895102][T12836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 203.895113][T12836] Call Trace: [ 203.895119][T12836] [ 203.895126][T12836] dump_stack_lvl+0xf6/0x150 [ 203.895164][T12836] dump_stack+0x15/0x1a [ 203.895179][T12836] should_fail_ex+0x261/0x270 [ 203.895202][T12836] should_fail+0xb/0x10 [ 203.895222][T12836] should_fail_usercopy+0x1a/0x20 [ 203.895246][T12836] _copy_to_user+0x20/0xa0 [ 203.895281][T12836] simple_read_from_buffer+0xb2/0x130 [ 203.895308][T12836] proc_fail_nth_read+0x103/0x140 [ 203.895326][T12836] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 203.895355][T12836] vfs_read+0x1b2/0x710 [ 203.895390][T12836] ? __rcu_read_unlock+0x4e/0x70 [ 203.895414][T12836] ? __fget_files+0x186/0x1c0 [ 203.895436][T12836] ksys_read+0xeb/0x1b0 [ 203.895460][T12836] __x64_sys_read+0x42/0x50 [ 203.895493][T12836] x64_sys_call+0x2a3b/0x2e10 [ 203.895513][T12836] do_syscall_64+0xc9/0x1c0 [ 203.895566][T12836] ? clear_bhb_loop+0x25/0x80 [ 203.895591][T12836] ? clear_bhb_loop+0x25/0x80 [ 203.895612][T12836] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 203.895630][T12836] RIP: 0033:0x7f0b997fbb7c [ 203.895644][T12836] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 203.895665][T12836] RSP: 002b:00007f0b97e5f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 203.895681][T12836] RAX: ffffffffffffffda RBX: 00007f0b99a15fa0 RCX: 00007f0b997fbb7c [ 203.895692][T12836] RDX: 000000000000000f RSI: 00007f0b97e5f0a0 RDI: 0000000000000004 [ 203.895703][T12836] RBP: 00007f0b97e5f090 R08: 0000000000000000 R09: 0000000000000000 [ 203.895714][T12836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 203.895784][T12836] R13: 0000000000000000 R14: 00007f0b99a15fa0 R15: 00007ffe77348478 [ 203.895800][T12836] [ 204.458851][T12875] FAULT_INJECTION: forcing a failure. [ 204.458851][T12875] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 204.472063][T12875] CPU: 0 UID: 0 PID: 12875 Comm: syz.0.3480 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 204.472091][T12875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 204.472136][T12875] Call Trace: [ 204.472144][T12875] [ 204.472154][T12875] dump_stack_lvl+0xf6/0x150 [ 204.472182][T12875] dump_stack+0x15/0x1a [ 204.472201][T12875] should_fail_ex+0x261/0x270 [ 204.472231][T12875] should_fail+0xb/0x10 [ 204.472320][T12875] should_fail_usercopy+0x1a/0x20 [ 204.472395][T12875] _copy_from_user+0x1c/0xa0 [ 204.472427][T12875] kstrtouint_from_user+0x84/0x100 [ 204.472456][T12875] ? 0xffffffff81000000 [ 204.472493][T12875] ? selinux_file_permission+0x22d/0x360 [ 204.472593][T12875] proc_fail_nth_write+0x54/0x160 [ 204.472617][T12875] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 204.472640][T12875] vfs_write+0x295/0x950 [ 204.472671][T12875] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 204.472720][T12875] ? __fget_files+0x186/0x1c0 [ 204.472745][T12875] ksys_write+0xeb/0x1b0 [ 204.472775][T12875] __x64_sys_write+0x42/0x50 [ 204.472965][T12875] x64_sys_call+0x2a45/0x2e10 [ 204.472992][T12875] do_syscall_64+0xc9/0x1c0 [ 204.473037][T12875] ? clear_bhb_loop+0x25/0x80 [ 204.473071][T12875] ? clear_bhb_loop+0x25/0x80 [ 204.473093][T12875] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 204.473120][T12875] RIP: 0033:0x7fd184a6bc1f [ 204.473138][T12875] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 204.473160][T12875] RSP: 002b:00007fd1830d7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 204.473224][T12875] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd184a6bc1f [ 204.473237][T12875] RDX: 0000000000000001 RSI: 00007fd1830d70a0 RDI: 0000000000000003 [ 204.473249][T12875] RBP: 00007fd1830d7090 R08: 0000000000000000 R09: 0000000000000000 [ 204.473264][T12875] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 204.473279][T12875] R13: 0000000000000000 R14: 00007fd184c85fa0 R15: 00007ffd87570e68 [ 204.473301][T12875] [ 204.703651][T12877] mapping of prio or/and queue is allowed only from OUTPUT/FORWARD/POSTROUTING chains [ 204.932063][T12901] FAULT_INJECTION: forcing a failure. [ 204.932063][T12901] name failslab, interval 1, probability 0, space 0, times 0 [ 204.944990][T12901] CPU: 1 UID: 0 PID: 12901 Comm: syz.2.3491 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 204.945020][T12901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 204.945098][T12901] Call Trace: [ 204.945107][T12901] [ 204.945117][T12901] dump_stack_lvl+0xf6/0x150 [ 204.945148][T12901] dump_stack+0x15/0x1a [ 204.945168][T12901] should_fail_ex+0x261/0x270 [ 204.945197][T12901] should_failslab+0x8f/0xb0 [ 204.945256][T12901] __kmalloc_cache_noprof+0x55/0x320 [ 204.945285][T12901] ? audit_log_d_path+0x8e/0x150 [ 204.945312][T12901] audit_log_d_path+0x8e/0x150 [ 204.945338][T12901] audit_log_d_path_exe+0x42/0x70 [ 204.945381][T12901] audit_log_task+0x1f1/0x250 [ 204.945466][T12901] audit_seccomp+0x68/0x130 [ 204.945486][T12901] __seccomp_filter+0x694/0x10e0 [ 204.945516][T12901] ? kernelmode_fixup_or_oops+0x58/0xb0 [ 204.945563][T12901] __secure_computing+0x7e/0x160 [ 204.945602][T12901] syscall_trace_enter+0xcf/0x1f0 [ 204.945634][T12901] do_syscall_64+0xaa/0x1c0 [ 204.945665][T12901] ? clear_bhb_loop+0x25/0x80 [ 204.945699][T12901] ? clear_bhb_loop+0x25/0x80 [ 204.945725][T12901] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 204.945752][T12901] RIP: 0033:0x7fd9b642bb7c [ 204.945770][T12901] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 204.945836][T12901] RSP: 002b:00007fd9b4a8f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 204.945856][T12901] RAX: ffffffffffffffda RBX: 00007fd9b6645fa0 RCX: 00007fd9b642bb7c [ 204.945870][T12901] RDX: 000000000000000f RSI: 00007fd9b4a8f0a0 RDI: 0000000000000003 [ 204.945885][T12901] RBP: 00007fd9b4a8f090 R08: 0000000000000000 R09: 0000000000000000 [ 204.945899][T12901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 204.945914][T12901] R13: 0000000000000000 R14: 00007fd9b6645fa0 R15: 00007ffe13234f38 [ 204.945942][T12901] [ 205.563833][T12937] syz_tun: refused to change device tx_queue_len [ 205.686830][T12943] FAULT_INJECTION: forcing a failure. [ 205.686830][T12943] name failslab, interval 1, probability 0, space 0, times 0 [ 205.699716][T12943] CPU: 1 UID: 0 PID: 12943 Comm: syz.2.3512 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 205.699749][T12943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 205.699764][T12943] Call Trace: [ 205.699773][T12943] [ 205.699783][T12943] dump_stack_lvl+0xf6/0x150 [ 205.699816][T12943] dump_stack+0x15/0x1a [ 205.699833][T12943] should_fail_ex+0x261/0x270 [ 205.699904][T12943] should_failslab+0x8f/0xb0 [ 205.699936][T12943] kmem_cache_alloc_node_noprof+0x5c/0x340 [ 205.700034][T12943] ? __alloc_skb+0x10d/0x320 [ 205.700061][T12943] __alloc_skb+0x10d/0x320 [ 205.700084][T12943] netlink_alloc_large_skb+0xad/0xe0 [ 205.700113][T12943] netlink_sendmsg+0x3da/0x720 [ 205.700144][T12943] ? __pfx_netlink_sendmsg+0x10/0x10 [ 205.700172][T12943] __sock_sendmsg+0x140/0x180 [ 205.700206][T12943] ____sys_sendmsg+0x350/0x4e0 [ 205.700237][T12943] __sys_sendmsg+0x1a0/0x240 [ 205.700359][T12943] __x64_sys_sendmsg+0x46/0x50 [ 205.700386][T12943] x64_sys_call+0x26f3/0x2e10 [ 205.700413][T12943] do_syscall_64+0xc9/0x1c0 [ 205.700568][T12943] ? clear_bhb_loop+0x25/0x80 [ 205.700650][T12943] ? clear_bhb_loop+0x25/0x80 [ 205.700772][T12943] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 205.700833][T12943] RIP: 0033:0x7fd9b642d169 [ 205.700849][T12943] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 205.700870][T12943] RSP: 002b:00007fd9b4a8f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 205.700893][T12943] RAX: ffffffffffffffda RBX: 00007fd9b6645fa0 RCX: 00007fd9b642d169 [ 205.700908][T12943] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 205.700923][T12943] RBP: 00007fd9b4a8f090 R08: 0000000000000000 R09: 0000000000000000 [ 205.700936][T12943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 205.700950][T12943] R13: 0000000000000000 R14: 00007fd9b6645fa0 R15: 00007ffe13234f38 [ 205.700971][T12943] [ 206.083889][T12961] syz_tun: refused to change device tx_queue_len [ 206.208987][T12974] Cannot find add_set index 0 as target [ 206.360617][T12991] syz_tun: refused to change device tx_queue_len [ 206.390909][ T6080] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 206.660144][T13017] FAULT_INJECTION: forcing a failure. [ 206.660144][T13017] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 206.673311][T13017] CPU: 1 UID: 0 PID: 13017 Comm: syz.3.3545 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 206.673342][T13017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 206.673355][T13017] Call Trace: [ 206.673362][T13017] [ 206.673369][T13017] dump_stack_lvl+0xf6/0x150 [ 206.673520][T13017] dump_stack+0x15/0x1a [ 206.673541][T13017] should_fail_ex+0x261/0x270 [ 206.673636][T13017] should_fail+0xb/0x10 [ 206.673665][T13017] should_fail_usercopy+0x1a/0x20 [ 206.673697][T13017] _copy_from_user+0x1c/0xa0 [ 206.673749][T13017] kstrtouint_from_user+0x84/0x100 [ 206.673787][T13017] ? 0xffffffff81000000 [ 206.673803][T13017] ? selinux_file_permission+0x22d/0x360 [ 206.673835][T13017] proc_fail_nth_write+0x54/0x160 [ 206.673865][T13017] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 206.673929][T13017] vfs_write+0x295/0x950 [ 206.673961][T13017] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 206.674041][T13017] ? __fget_files+0x186/0x1c0 [ 206.674066][T13017] ksys_write+0xeb/0x1b0 [ 206.674100][T13017] __x64_sys_write+0x42/0x50 [ 206.674192][T13017] x64_sys_call+0x2a45/0x2e10 [ 206.674221][T13017] do_syscall_64+0xc9/0x1c0 [ 206.674258][T13017] ? clear_bhb_loop+0x25/0x80 [ 206.674285][T13017] ? clear_bhb_loop+0x25/0x80 [ 206.674343][T13017] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 206.674483][T13017] RIP: 0033:0x7f7cbad4bc1f [ 206.674501][T13017] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 206.674523][T13017] RSP: 002b:00007f7cb93b7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 206.674544][T13017] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7cbad4bc1f [ 206.674559][T13017] RDX: 0000000000000001 RSI: 00007f7cb93b70a0 RDI: 0000000000000003 [ 206.674596][T13017] RBP: 00007f7cb93b7090 R08: 0000000000000000 R09: 0000000000000000 [ 206.674610][T13017] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 206.674624][T13017] R13: 0000000000000000 R14: 00007f7cbaf65fa0 R15: 00007ffe0bf7c318 [ 206.674645][T13017] [ 207.020862][T13039] syz_tun: refused to change device tx_queue_len [ 207.369787][T13078] syz_tun: refused to change device tx_queue_len [ 207.428797][ T29] kauditd_printk_skb: 1110 callbacks suppressed [ 207.428816][ T29] audit: type=1400 audit(1744442582.160:20971): avc: denied { map_create } for pid=13082 comm="syz.0.3576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 207.461747][ T29] audit: type=1400 audit(1744442582.160:20972): avc: denied { prog_load } for pid=13085 comm="syz.2.3578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 207.481129][ T29] audit: type=1400 audit(1744442582.190:20973): avc: denied { prog_load } for pid=13082 comm="syz.0.3576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 207.500609][ T29] audit: type=1400 audit(1744442582.190:20974): avc: denied { prog_load } for pid=13082 comm="syz.0.3576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 207.520140][ T29] audit: type=1400 audit(1744442582.190:20975): avc: denied { prog_load } for pid=13082 comm="syz.0.3576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 207.553093][ T29] audit: type=1400 audit(1744442582.220:20976): avc: denied { prog_load } for pid=13083 comm="syz.3.3577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 207.572441][ T29] audit: type=1400 audit(1744442582.220:20977): avc: denied { create } for pid=13088 comm="syz.1.3579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 207.593463][ T29] audit: type=1400 audit(1744442582.220:20978): avc: denied { open } for pid=13088 comm="syz.1.3579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 207.612894][ T29] audit: type=1400 audit(1744442582.240:20979): avc: denied { open } for pid=13088 comm="syz.1.3579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 207.632365][ T29] audit: type=1400 audit(1744442582.240:20980): avc: denied { watch } for pid=13088 comm="syz.1.3579" path="/49/file0" dev="tmpfs" ino=278 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 207.684193][T13099] FAULT_INJECTION: forcing a failure. [ 207.684193][T13099] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 207.697967][T13099] CPU: 0 UID: 0 PID: 13099 Comm: syz.3.3582 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 207.698043][T13099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 207.698055][T13099] Call Trace: [ 207.698062][T13099] [ 207.698071][T13099] dump_stack_lvl+0xf6/0x150 [ 207.698102][T13099] dump_stack+0x15/0x1a [ 207.698119][T13099] should_fail_ex+0x261/0x270 [ 207.698179][T13099] should_fail+0xb/0x10 [ 207.698207][T13099] should_fail_usercopy+0x1a/0x20 [ 207.698237][T13099] _copy_from_user+0x1c/0xa0 [ 207.698281][T13099] kstrtouint_from_user+0x84/0x100 [ 207.698350][T13099] ? 0xffffffff81000000 [ 207.698410][T13099] ? selinux_file_permission+0x22d/0x360 [ 207.698494][T13099] proc_fail_nth_write+0x54/0x160 [ 207.698517][T13099] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 207.698585][T13099] vfs_write+0x295/0x950 [ 207.698625][T13099] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 207.698672][T13099] ? __fget_files+0x186/0x1c0 [ 207.698723][T13099] ksys_write+0xeb/0x1b0 [ 207.698753][T13099] __x64_sys_write+0x42/0x50 [ 207.698781][T13099] x64_sys_call+0x2a45/0x2e10 [ 207.698806][T13099] do_syscall_64+0xc9/0x1c0 [ 207.698839][T13099] ? clear_bhb_loop+0x25/0x80 [ 207.698883][T13099] ? clear_bhb_loop+0x25/0x80 [ 207.698909][T13099] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 207.698934][T13099] RIP: 0033:0x7f7cbad4bc1f [ 207.698950][T13099] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 207.698970][T13099] RSP: 002b:00007f7cb93b7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 207.698992][T13099] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7cbad4bc1f [ 207.699081][T13099] RDX: 0000000000000001 RSI: 00007f7cb93b70a0 RDI: 0000000000000004 [ 207.699143][T13099] RBP: 00007f7cb93b7090 R08: 0000000000000000 R09: 0000000000000000 [ 207.699155][T13099] R10: ffffffffffffffff R11: 0000000000000293 R12: 0000000000000001 [ 207.699167][T13099] R13: 0000000000000000 R14: 00007f7cbaf65fa0 R15: 00007ffe0bf7c318 [ 207.699185][T13099] [ 207.945537][T13116] syz_tun: refused to change device tx_queue_len [ 208.092809][T13125] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13125 comm=syz.3.3594 [ 208.309626][T13151] syz_tun: refused to change device tx_queue_len [ 208.380485][T13161] FAULT_INJECTION: forcing a failure. [ 208.380485][T13161] name failslab, interval 1, probability 0, space 0, times 0 [ 208.393244][T13161] CPU: 1 UID: 0 PID: 13161 Comm: syz.1.3610 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 208.393274][T13161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 208.393286][T13161] Call Trace: [ 208.393293][T13161] [ 208.393301][T13161] dump_stack_lvl+0xf6/0x150 [ 208.393335][T13161] dump_stack+0x15/0x1a [ 208.393356][T13161] should_fail_ex+0x261/0x270 [ 208.393390][T13161] should_failslab+0x8f/0xb0 [ 208.393426][T13161] kmem_cache_alloc_node_noprof+0x5c/0x340 [ 208.393488][T13161] ? __alloc_skb+0x10d/0x320 [ 208.393535][T13161] __alloc_skb+0x10d/0x320 [ 208.393640][T13161] ? audit_log_start+0x37f/0x6e0 [ 208.393730][T13161] audit_log_start+0x39a/0x6e0 [ 208.393753][T13161] ? audit_log_end+0x1d0/0x1e0 [ 208.393792][T13161] audit_seccomp+0x4b/0x130 [ 208.393811][T13161] __seccomp_filter+0x694/0x10e0 [ 208.393849][T13161] ? __perf_event_task_sched_out+0x13c/0xf00 [ 208.393873][T13161] ? __list_add_valid_or_report+0x38/0xe0 [ 208.393982][T13161] ? _raw_spin_unlock+0x26/0x50 [ 208.394008][T13161] __secure_computing+0x7e/0x160 [ 208.394040][T13161] syscall_trace_enter+0xcf/0x1f0 [ 208.394080][T13161] do_syscall_64+0xaa/0x1c0 [ 208.394113][T13161] ? clear_bhb_loop+0x25/0x80 [ 208.394139][T13161] ? clear_bhb_loop+0x25/0x80 [ 208.394165][T13161] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 208.394187][T13161] RIP: 0033:0x7f08b67dbb7c [ 208.394205][T13161] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 208.394244][T13161] RSP: 002b:00007f08b4e3f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 208.394267][T13161] RAX: ffffffffffffffda RBX: 00007f08b69f5fa0 RCX: 00007f08b67dbb7c [ 208.394279][T13161] RDX: 000000000000000f RSI: 00007f08b4e3f0a0 RDI: 0000000000000003 [ 208.394341][T13161] RBP: 00007f08b4e3f090 R08: 0000000000000000 R09: 0000000000000000 [ 208.394354][T13161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 208.394366][T13161] R13: 0000000000000000 R14: 00007f08b69f5fa0 R15: 00007fff0befaf28 [ 208.394385][T13161] [ 208.795570][T13182] syz_tun: refused to change device tx_queue_len [ 208.936770][ T6095] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 208.985802][T13198] FAULT_INJECTION: forcing a failure. [ 208.985802][T13198] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 208.999135][T13198] CPU: 1 UID: 0 PID: 13198 Comm: syz.2.3628 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 208.999186][T13198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 208.999199][T13198] Call Trace: [ 208.999205][T13198] [ 208.999213][T13198] dump_stack_lvl+0xf6/0x150 [ 208.999236][T13198] dump_stack+0x15/0x1a [ 208.999255][T13198] should_fail_ex+0x261/0x270 [ 208.999302][T13198] should_fail+0xb/0x10 [ 208.999332][T13198] should_fail_usercopy+0x1a/0x20 [ 208.999366][T13198] _copy_from_user+0x1c/0xa0 [ 208.999407][T13198] kstrtouint_from_user+0x84/0x100 [ 208.999439][T13198] ? 0xffffffff81000000 [ 208.999455][T13198] ? selinux_file_permission+0x22d/0x360 [ 208.999511][T13198] proc_fail_nth_write+0x54/0x160 [ 208.999534][T13198] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 208.999583][T13198] vfs_write+0x295/0x950 [ 208.999628][T13198] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 208.999665][T13198] ? __fget_files+0x186/0x1c0 [ 208.999687][T13198] ksys_write+0xeb/0x1b0 [ 208.999722][T13198] __x64_sys_write+0x42/0x50 [ 208.999810][T13198] x64_sys_call+0x2a45/0x2e10 [ 208.999837][T13198] do_syscall_64+0xc9/0x1c0 [ 208.999870][T13198] ? clear_bhb_loop+0x25/0x80 [ 208.999892][T13198] ? clear_bhb_loop+0x25/0x80 [ 208.999977][T13198] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 208.999999][T13198] RIP: 0033:0x7fd9b642bc1f [ 209.000013][T13198] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 209.000087][T13198] RSP: 002b:00007fd9b4a8f030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 209.000121][T13198] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd9b642bc1f [ 209.000134][T13198] RDX: 0000000000000001 RSI: 00007fd9b4a8f0a0 RDI: 0000000000000003 [ 209.000146][T13198] RBP: 00007fd9b4a8f090 R08: 0000000000000000 R09: 0000000000000000 [ 209.000208][T13198] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 209.000220][T13198] R13: 0000000000000000 R14: 00007fd9b6645fa0 R15: 00007ffe13234f38 [ 209.000239][T13198] [ 209.386842][T13210] syz_tun: refused to change device tx_queue_len [ 210.209832][T13255] FAULT_INJECTION: forcing a failure. [ 210.209832][T13255] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 210.222989][T13255] CPU: 0 UID: 0 PID: 13255 Comm: syz.5.3651 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 210.223016][T13255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 210.223090][T13255] Call Trace: [ 210.223098][T13255] [ 210.223108][T13255] dump_stack_lvl+0xf6/0x150 [ 210.223138][T13255] dump_stack+0x15/0x1a [ 210.223179][T13255] should_fail_ex+0x261/0x270 [ 210.223207][T13255] should_fail+0xb/0x10 [ 210.223234][T13255] should_fail_usercopy+0x1a/0x20 [ 210.223261][T13255] _copy_to_user+0x20/0xa0 [ 210.223347][T13255] simple_read_from_buffer+0xb2/0x130 [ 210.223390][T13255] proc_fail_nth_read+0x103/0x140 [ 210.223415][T13255] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 210.223526][T13255] vfs_read+0x1b2/0x710 [ 210.223557][T13255] ? __rcu_read_unlock+0x4e/0x70 [ 210.223653][T13255] ? __fget_files+0x186/0x1c0 [ 210.223728][T13255] ksys_read+0xeb/0x1b0 [ 210.223759][T13255] __x64_sys_read+0x42/0x50 [ 210.223800][T13255] x64_sys_call+0x2a3b/0x2e10 [ 210.223823][T13255] do_syscall_64+0xc9/0x1c0 [ 210.223858][T13255] ? clear_bhb_loop+0x25/0x80 [ 210.223882][T13255] ? clear_bhb_loop+0x25/0x80 [ 210.223934][T13255] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 210.223960][T13255] RIP: 0033:0x7f0b997fbb7c [ 210.223988][T13255] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 210.224008][T13255] RSP: 002b:00007f0b97e1d030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 210.224027][T13255] RAX: ffffffffffffffda RBX: 00007f0b99a16160 RCX: 00007f0b997fbb7c [ 210.224039][T13255] RDX: 000000000000000f RSI: 00007f0b97e1d0a0 RDI: 0000000000000007 [ 210.224050][T13255] RBP: 00007f0b97e1d090 R08: 0000000000000000 R09: 0000000000000000 [ 210.224064][T13255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 210.224151][T13255] R13: 0000000000000001 R14: 00007f0b99a16160 R15: 00007ffe77348478 [ 210.224172][T13255] [ 210.662713][T13271] syz_tun: refused to change device tx_queue_len [ 210.707923][T13277] xt_CT: You must specify a L4 protocol and not use inversions on it [ 210.728685][T13279] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3662'. [ 211.024352][T13293] SELinux: Context system_u:object_r:agp_device_t:s0 is not valid (left unmapped). [ 211.075260][T13294] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3670'. [ 211.220861][T13305] syz_tun: refused to change device tx_queue_len [ 211.286786][T13314] FAULT_INJECTION: forcing a failure. [ 211.286786][T13314] name failslab, interval 1, probability 0, space 0, times 0 [ 211.299656][T13314] CPU: 1 UID: 0 PID: 13314 Comm: syz.2.3677 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 211.299690][T13314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 211.299705][T13314] Call Trace: [ 211.299713][T13314] [ 211.299722][T13314] dump_stack_lvl+0xf6/0x150 [ 211.299751][T13314] dump_stack+0x15/0x1a [ 211.299772][T13314] should_fail_ex+0x261/0x270 [ 211.299802][T13314] should_failslab+0x8f/0xb0 [ 211.299833][T13314] kmem_cache_alloc_noprof+0x59/0x340 [ 211.299858][T13314] ? mas_alloc_nodes+0x1f4/0x4a0 [ 211.299898][T13314] mas_alloc_nodes+0x1f4/0x4a0 [ 211.299935][T13314] mas_preallocate+0x48d/0x6b0 [ 211.299968][T13314] mmap_region+0x983/0x1490 [ 211.300015][T13314] do_mmap+0x9ef/0xc80 [ 211.300054][T13314] vm_mmap_pgoff+0x16d/0x2d0 [ 211.300092][T13314] ksys_mmap_pgoff+0xd0/0x340 [ 211.300119][T13314] ? fpregs_assert_state_consistent+0x83/0xa0 [ 211.300155][T13314] x64_sys_call+0x1945/0x2e10 [ 211.300182][T13314] do_syscall_64+0xc9/0x1c0 [ 211.300212][T13314] ? clear_bhb_loop+0x25/0x80 [ 211.300232][T13314] ? clear_bhb_loop+0x25/0x80 [ 211.300253][T13314] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 211.300274][T13314] RIP: 0033:0x7fd9b642d1a3 [ 211.300292][T13314] Code: f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 41 89 ca 41 f7 c1 ff 0f 00 00 75 14 b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 25 c3 0f 1f 40 00 48 c7 c0 a8 ff ff ff 64 c7 [ 211.300315][T13314] RSP: 002b:00007fd9b4a8ee18 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 211.300334][T13314] RAX: ffffffffffffffda RBX: 000000000000057f RCX: 00007fd9b642d1a3 [ 211.300349][T13314] RDX: 0000000000000003 RSI: 0000000008400000 RDI: 0000000000000000 [ 211.300364][T13314] RBP: 0000200000000b02 R08: 00000000ffffffff R09: 0000000000000000 [ 211.300378][T13314] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000004 [ 211.300392][T13314] R13: 00007fd9b4a8eef0 R14: 00007fd9b4a8eeb0 R15: 0000200000000240 [ 211.300417][T13314] [ 211.861504][T13350] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(4) [ 211.868068][T13350] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 211.875569][T13350] vhci_hcd vhci_hcd.0: Device attached [ 211.892681][T13353] vhci_hcd: connection closed [ 211.892831][ T6087] vhci_hcd: stop threads [ 211.901861][ T6087] vhci_hcd: release socket [ 211.906427][ T6087] vhci_hcd: disconnect device [ 211.946475][T13356] lo: entered promiscuous mode [ 212.137225][ T5833] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 212.294995][T13385] FAULT_INJECTION: forcing a failure. [ 212.294995][T13385] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 212.308212][T13385] CPU: 1 UID: 0 PID: 13385 Comm: syz.3.3711 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 212.308247][T13385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 212.308273][T13385] Call Trace: [ 212.308280][T13385] [ 212.308290][T13385] dump_stack_lvl+0xf6/0x150 [ 212.308319][T13385] dump_stack+0x15/0x1a [ 212.308402][T13385] should_fail_ex+0x261/0x270 [ 212.308478][T13385] should_fail+0xb/0x10 [ 212.308504][T13385] should_fail_usercopy+0x1a/0x20 [ 212.308533][T13385] _copy_from_user+0x1c/0xa0 [ 212.308575][T13385] kstrtouint_from_user+0x84/0x100 [ 212.308610][T13385] ? 0xffffffff81000000 [ 212.308626][T13385] ? selinux_file_permission+0x22d/0x360 [ 212.308756][T13385] proc_fail_nth_write+0x54/0x160 [ 212.308776][T13385] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 212.308809][T13385] vfs_write+0x295/0x950 [ 212.308843][T13385] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 212.308888][T13385] ? __fget_files+0x186/0x1c0 [ 212.308978][T13385] ksys_write+0xeb/0x1b0 [ 212.309034][T13385] __x64_sys_write+0x42/0x50 [ 212.309094][T13385] x64_sys_call+0x2a45/0x2e10 [ 212.309121][T13385] do_syscall_64+0xc9/0x1c0 [ 212.309150][T13385] ? clear_bhb_loop+0x25/0x80 [ 212.309172][T13385] ? clear_bhb_loop+0x25/0x80 [ 212.309289][T13385] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 212.309316][T13385] RIP: 0033:0x7f7cbad4bc1f [ 212.309334][T13385] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 212.309353][T13385] RSP: 002b:00007f7cb93b7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 212.309371][T13385] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7cbad4bc1f [ 212.309384][T13385] RDX: 0000000000000001 RSI: 00007f7cb93b70a0 RDI: 0000000000000006 [ 212.309398][T13385] RBP: 00007f7cb93b7090 R08: 0000000000000000 R09: 0000000000000000 [ 212.309413][T13385] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 212.309427][T13385] R13: 0000000000000000 R14: 00007f7cbaf65fa0 R15: 00007ffe0bf7c318 [ 212.309498][T13385] [ 212.543917][ T29] kauditd_printk_skb: 1055 callbacks suppressed [ 212.543936][ T29] audit: type=1400 audit(1744442587.270:22034): avc: denied { map_create } for pid=13387 comm="syz.3.3713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 212.575378][ T29] audit: type=1400 audit(1744442587.270:22035): avc: denied { prog_load } for pid=13387 comm="syz.3.3713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 212.594854][ T29] audit: type=1400 audit(1744442587.270:22036): avc: denied { prog_load } for pid=13387 comm="syz.3.3713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 212.614297][ T29] audit: type=1400 audit(1744442587.270:22037): avc: denied { prog_load } for pid=13387 comm="syz.3.3713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 212.633618][ T29] audit: type=1400 audit(1744442587.270:22038): avc: denied { prog_load } for pid=13387 comm="syz.3.3713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 212.663423][ T29] audit: type=1400 audit(1744442587.370:22039): avc: denied { watch watch_reads } for pid=13389 comm="syz.5.3715" path="/244" dev="tmpfs" ino=1300 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 212.686654][ T29] audit: type=1400 audit(1744442587.370:22040): avc: denied { prog_load } for pid=13389 comm="syz.5.3715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 212.705968][ T29] audit: type=1400 audit(1744442587.370:22041): avc: denied { map_create } for pid=13391 comm="syz.0.3714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 212.725599][ T29] audit: type=1400 audit(1744442587.390:22042): avc: denied { map_create } for pid=13390 comm="syz.3.3716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 212.745019][ T29] audit: type=1400 audit(1744442587.390:22043): avc: denied { prog_load } for pid=13390 comm="syz.3.3716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 213.194500][T13447] xt_hashlimit: max too large, truncated to 1048576 [ 213.202301][T13447] xt_limit: Overflow, try lower: 0/0 [ 213.255697][T13444] FAULT_INJECTION: forcing a failure. [ 213.255697][T13444] name failslab, interval 1, probability 0, space 0, times 0 [ 213.268520][T13444] CPU: 1 UID: 0 PID: 13444 Comm: syz.1.3739 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 213.268622][T13444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 213.268635][T13444] Call Trace: [ 213.268641][T13444] [ 213.268648][T13444] dump_stack_lvl+0xf6/0x150 [ 213.268677][T13444] dump_stack+0x15/0x1a [ 213.268694][T13444] should_fail_ex+0x261/0x270 [ 213.268749][T13444] should_failslab+0x8f/0xb0 [ 213.268785][T13444] __kmalloc_noprof+0xad/0x410 [ 213.268814][T13444] ? copy_splice_read+0xb8/0x5d0 [ 213.268848][T13444] copy_splice_read+0xb8/0x5d0 [ 213.268958][T13444] ? __kmalloc_noprof+0x287/0x410 [ 213.268981][T13444] ? alloc_pipe_info+0x1cb/0x360 [ 213.269022][T13444] ? __pfx_shmem_file_splice_read+0x10/0x10 [ 213.269045][T13444] splice_direct_to_actor+0x28e/0x680 [ 213.269089][T13444] ? __pfx_direct_splice_actor+0x10/0x10 [ 213.269131][T13444] do_splice_direct+0xd9/0x150 [ 213.269162][T13444] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 213.269262][T13444] do_sendfile+0x40a/0x690 [ 213.269288][T13444] __x64_sys_sendfile64+0x113/0x160 [ 213.269310][T13444] x64_sys_call+0xfc3/0x2e10 [ 213.269333][T13444] do_syscall_64+0xc9/0x1c0 [ 213.269368][T13444] ? clear_bhb_loop+0x25/0x80 [ 213.269477][T13444] ? clear_bhb_loop+0x25/0x80 [ 213.269581][T13444] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 213.269606][T13444] RIP: 0033:0x7f08b67dd169 [ 213.269625][T13444] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 213.269643][T13444] RSP: 002b:00007f08b4e3f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 213.269661][T13444] RAX: ffffffffffffffda RBX: 00007f08b69f5fa0 RCX: 00007f08b67dd169 [ 213.269673][T13444] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 213.269729][T13444] RBP: 00007f08b4e3f090 R08: 0000000000000000 R09: 0000000000000000 [ 213.269743][T13444] R10: 0000000000fffe80 R11: 0000000000000246 R12: 0000000000000001 [ 213.269757][T13444] R13: 0000000000000000 R14: 00007f08b69f5fa0 R15: 00007fff0befaf28 [ 213.269780][T13444] [ 213.765432][T13497] FAULT_INJECTION: forcing a failure. [ 213.765432][T13497] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 213.778804][T13497] CPU: 0 UID: 0 PID: 13497 Comm: syz.3.3763 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 213.778833][T13497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 213.778846][T13497] Call Trace: [ 213.778853][T13497] [ 213.778861][T13497] dump_stack_lvl+0xf6/0x150 [ 213.778885][T13497] dump_stack+0x15/0x1a [ 213.778903][T13497] should_fail_ex+0x261/0x270 [ 213.779030][T13497] should_fail+0xb/0x10 [ 213.779058][T13497] should_fail_usercopy+0x1a/0x20 [ 213.779090][T13497] strncpy_from_user+0x25/0x230 [ 213.779116][T13497] ? getname_flags+0x81/0x3b0 [ 213.779158][T13497] getname_flags+0xb0/0x3b0 [ 213.779178][T13497] do_sys_openat2+0x65/0x110 [ 213.779206][T13497] __x64_sys_openat+0xf8/0x120 [ 213.779280][T13497] x64_sys_call+0x1ac/0x2e10 [ 213.779305][T13497] do_syscall_64+0xc9/0x1c0 [ 213.779350][T13497] ? clear_bhb_loop+0x25/0x80 [ 213.779375][T13497] ? clear_bhb_loop+0x25/0x80 [ 213.779448][T13497] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 213.779474][T13497] RIP: 0033:0x7f7cbad4bad0 [ 213.779492][T13497] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 213.779511][T13497] RSP: 002b:00007f7cb93b6f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 213.779529][T13497] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7cbad4bad0 [ 213.779541][T13497] RDX: 0000000000000000 RSI: 00007f7cb93b6fa0 RDI: 00000000ffffff9c [ 213.779553][T13497] RBP: 00007f7cb93b6fa0 R08: 0000000000000000 R09: 0000000000000000 [ 213.779577][T13497] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 213.779591][T13497] R13: 0000000000000000 R14: 00007f7cbaf65fa0 R15: 00007ffe0bf7c318 [ 213.779613][T13497] [ 214.041005][T13513] syz_tun: refused to change device tx_queue_len [ 214.057246][ T6087] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 214.448658][T13543] ================================================================== [ 214.456880][T13543] BUG: KCSAN: data-race in touch_atime / touch_atime [ 214.463762][T13543] [ 214.466104][T13543] write to 0xffff88811895d830 of 4 bytes by task 13527 on cpu 1: [ 214.473838][T13543] touch_atime+0x1f3/0x350 [ 214.478285][T13543] shmem_file_splice_read+0x584/0x5d0 [ 214.483681][T13543] splice_direct_to_actor+0x26c/0x680 [ 214.489091][T13543] do_splice_direct+0xd9/0x150 [ 214.493879][T13543] do_sendfile+0x40a/0x690 [ 214.498320][T13543] __x64_sys_sendfile64+0x113/0x160 [ 214.503551][T13543] x64_sys_call+0xfc3/0x2e10 [ 214.508178][T13543] do_syscall_64+0xc9/0x1c0 [ 214.512721][T13543] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 214.518638][T13543] [ 214.520962][T13543] read to 0xffff88811895d830 of 4 bytes by task 13543 on cpu 0: [ 214.528593][T13543] touch_atime+0x1a0/0x350 [ 214.533038][T13543] shmem_file_splice_read+0x584/0x5d0 [ 214.538419][T13543] splice_direct_to_actor+0x26c/0x680 [ 214.543844][T13543] do_splice_direct+0xd9/0x150 [ 214.548625][T13543] do_sendfile+0x40a/0x690 [ 214.553050][T13543] __x64_sys_sendfile64+0x113/0x160 [ 214.558256][T13543] x64_sys_call+0xfc3/0x2e10 [ 214.563031][T13543] do_syscall_64+0xc9/0x1c0 [ 214.567571][T13543] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 214.573470][T13543] [ 214.575794][T13543] value changed: 0x0a2af768 -> 0x0ac38de8 [ 214.581514][T13543] [ 214.583836][T13543] Reported by Kernel Concurrency Sanitizer on: [ 214.589989][T13543] CPU: 0 UID: 0 PID: 13543 Comm: syz.0.3786 Not tainted 6.15.0-rc1-syzkaller-00025-gbec7dcbc242c #0 PREEMPT(voluntary) [ 214.602499][T13543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 214.612564][T13543] ================================================================== [ 217.897371][ T6095] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 219.176964][ T6087] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 223.656586][ T6087] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration