last executing test programs: 1m6.249645877s ago: executing program 3 (id=1354): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bridge0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000040)=ANY=[@ANYBLOB="44000000100003052bbd7000249d020000000000", @ANYRES32=0x0, @ANYBLOB="15010000ad190800140012800b0001006d61637365630000ff00028008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n'], 0x44}}, 0x0) 1m5.894454246s ago: executing program 3 (id=1359): syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x82000, 0x0, 0xfe, 0x0, &(0x7f0000000000)) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000400), 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) r0 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_INIT(r0, 0x29, 0xc8, &(0x7f0000000000), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000780)={'veth1_to_bridge\x00', 0x0}) setsockopt$MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x0, r2}, 0xc) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000140)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x8, '\x00', r2, r3, 0x5, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 1m5.776691696s ago: executing program 3 (id=1363): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4a0, 0x340, 0x11, 0x148, 0x340, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x88000000, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0x98, 0xc8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) 1m5.752918066s ago: executing program 3 (id=1364): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) timerfd_create(0x9, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0, 0x0, 0xffffffffffffffff}, 0x13) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) connect$pppl2tp(r1, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x8, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x32) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)='v', 0x180204}], 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000780)={[{@errors_remount}, {@resuid}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@resgid}, {@block_validity}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$eJzs289rHFUcAPDvzCat/WViqT+aVo1WMfgjadJae/CiKHhQEPRQjzFJS+y2kSaCLUGjSD1Kwbt4FPwLPOlF1JPgVe9SKJJLq6eV2Z1Jdje7aZJustX9fGCS92be8t53Z97ue/N2AuhZw9mfJGJ/RPweEQO1bGOB4dq/W8uLU38vL04lUam89VdSLXdzeXGqKFq8bl+R6YtIP0viSIt65y9fOT9ZLs9cyvNjCxfeH5u/fOW52QuT52bOzVycOH365InxF05NPN+ROLO4bg59NHf08GvvXHtj6sy1d3/+Ninib4qjQ4bXO/hkpdLh6rrrQF066etiQ9iUUq2bRn+1/w9EKVZP3kC8+mlXGwdsq0qlUnmg/eGlCvA/lkS3WwB0R/FFn81/i22Hhh53hRsv1SZAWdy38q12pC/SvEx/0/y2k4Yj4szSP19lW2zPfQgAgAbfZ+OfZ1uN/9Kovy90b76GMhgR90XEwYg4FRGHIuL+iGrZByPioU3W37xIsnb8k17fUmAblI3/XszXthrHf8XoLwZLee5ANf7+5OxseeZ4/p6MRP/uLD++Th0/vPLbF+2O1Y//si2rvxgL5u243re78TXTkwuTdxJzvRufRAz1tYo/WVkJSCLicEQMbbGO2ae/Odru2O3jX0cH1pkqX0c8VTv/S9EUfyFZf31y7J4ozxwfK66KtX759eqb7eq/o/g7IDv/e1te/yvxDyb167Xzm6/j6h+ft53TbPX635W83bDvw8mFhUvjEbuS12uNrt8/0VRuYrV8Fv/Isdb9/2CsvhNHIiK7iB+OiEci4tG87Y9FxOMRcWyd+H96+Yn3th7/9srin97U+V9N7IrmPa0TpfM/ftdQ6eBm4s/O/8lqaiTfs5HPv420a2tXMwAAAPz3pBGxP5J0dCWdpqOjtd/wH4q9aXlufuGZs3MfXJyuPSMwGP1pcadroO5+6Hg+rS/yE035E/l94y9Le6r50am58nS3g4cet69N/8/8Wep264Bt53kt6F36P/Qu/R96l/4PvatF/9/TjXYAO6/V9//HXWgHsPOa+r9lP+gh5v/Qu/R/6F36P/Sk+T1x+4fkJSTWJCK9K5ohsU2Jbn8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMa/AQAA//9QOObV") lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000040)=ANY=[], 0xfe37, 0x0) unlink(&(0x7f0000000180)='./file1\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r3, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x14, r4, 0x8, 0x70bd28, 0x25dfdbff, {{}, {@void, @void}}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) creat(&(0x7f0000000040)='./bus\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r6}, 0x10) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000340)='./bus\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000140)={[{@nolazytime}, {@lazytime}, {@journal_path={'journal_path', 0x3d, './bus'}}, {@bsdgroups}, {@grpid}, {@noload}]}, 0x3, 0x45c, &(0x7f0000002400)="$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") 1m5.424409205s ago: executing program 3 (id=1368): unshare(0x6a040000) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) (async) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) (async) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000900)=@mangle={'mangle\x00', 0x44, 0x6, 0x510, 0x3a8, 0x210, 0x210, 0x0, 0x138, 0x478, 0x478, 0x478, 0x478, 0x478, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x0, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0xb0, 0xd8, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}]}, @unspec=@CHECKSUM={0x28}}, {{@ip={@loopback, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_team\x00'}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mac={{0x30}, {@multicast}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x570) r4 = socket$igmp(0x2, 0x3, 0x2) setsockopt$inet_mreq(r4, 0x0, 0x20, &(0x7f0000000000)={@dev={0xac, 0x14, 0x14, 0x31}, @dev={0xac, 0x14, 0x14, 0x15}}, 0x8) 1m4.943498193s ago: executing program 3 (id=1382): openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1817c1, 0x0) (async, rerun: 64) socketpair$unix(0x1, 0x2, 0x0, 0x0) (rerun: 64) r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000400)='./file0\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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", @ANYRES32], 0xfb, 0x2ae, &(0x7f0000000a40)="$eJzs3c9qY1UYAPDvpkka7SJZuBLBu5iFG8tkti7MIBXErpQs/AM6ODMwNGGggcCoGGblE7hw4Xu4cy+48Q0EH8CdgxSO3NzbJLZp2rSmlfr7bXo45/vu+U7uabO43NPPXxsePHw6evz869+i1cqi1otevMiiE7U4lioBANwKL1KKPy71/V6vbaomAGCzFr7/G2eEbJ/uenvTZQEAG/ThRx+/f39/f++DPG9FDL8d97Mof5bj9x/HkxjEo7gb7TiaPwtIqWy/+97+XtTzQifuDCfjfpE5/OyXxccGRX432tFZnt/NSwv5k3G/ES9HZFnEk15RyL1oxyun8ovxvXtL8qPfjDda1SKL+XejHb9+EU9jEA+nzzTm83/TzfN30nd/fvVJEVzkZ5Nxf3saN5e2rvveAAAAAAAAAAAAAAAAAAAAAABwe+3mM524Myy6qvN3to6m47v/GJ+er1Objpf5WURz2jhxPtAkxQ/H5+vczfM8ZWX8/Hyferxaj/qNLRwAAAAAAAAAAAAAAAAAAAD+Q0bPvjx4MBg8OvxXGtVL/rPX+i97nd5Cz+uxOnh7rbliqwovaj0Z0/350+Gsp1jEZYofN/KIVTU3TvW8VNRz/pX/SimlLIu42m1qXGSucxo7q2OKD/in73fePHiQnfcZto5v3I+LQ804HD07cU8jW6fCtNb2a66IaVY75kLX2bniL9Fbv5eTVT3ZGqtoVI04a/u11trP1/c3CAAAAAAAAAAAAAAAAAAAKM1f+l0y+Hxlam1jRQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADANZv///81GpMqeXlMSmky62nG4eiGlwgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMD/wN8BAAD//7DYbww=") (async) bpf$PROG_LOAD(0x5, &(0x7f0000001440)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, @void, @value}, 0x94) (async) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) (async, rerun: 64) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (rerun: 64) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) (async) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000340)='./file2\x00', 0x20c593, &(0x7f00000008c0)=ANY=[@ANYRES64=r3, @ANYRESDEC=r2, @ANYRES32=r1, @ANYRES8, @ANYRESDEC=r0, @ANYRES64=r4, @ANYRESDEC], 0x1, 0x1207, &(0x7f0000002dc0)="$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") (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r5 = open(&(0x7f0000000040)='./bus\x00', 0x44842, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) (async, rerun: 32) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYRESOCT=r3, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) (async, rerun: 32) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) (async, rerun: 32) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) (async, rerun: 64) munlock(&(0x7f0000cd6000/0x1000)=nil, 0x1000) (rerun: 64) ioctl$FS_IOC_GETFSUUID(r1, 0x80111500, &(0x7f00000000c0)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) (async) futex_waitv(&(0x7f0000001140)=[{0x8000, 0x0, 0x2}], 0x1, 0x0, 0x0, 0x1) ioperm(0x0, 0x5, 0xff000) pwritev2(r5, &(0x7f0000000240)=[{&(0x7f0000000000)='$', 0x100000}], 0x2, 0x1400, 0x0, 0x3) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) 1m4.896318213s ago: executing program 32 (id=1382): openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1817c1, 0x0) (async, rerun: 64) socketpair$unix(0x1, 0x2, 0x0, 0x0) (rerun: 64) r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000400)='./file0\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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", @ANYRES32], 0xfb, 0x2ae, &(0x7f0000000a40)="$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") (async) bpf$PROG_LOAD(0x5, &(0x7f0000001440)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, @void, @value}, 0x94) (async) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) (async, rerun: 64) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (rerun: 64) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) (async) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000340)='./file2\x00', 0x20c593, &(0x7f00000008c0)=ANY=[@ANYRES64=r3, @ANYRESDEC=r2, @ANYRES32=r1, @ANYRES8, @ANYRESDEC=r0, @ANYRES64=r4, @ANYRESDEC], 0x1, 0x1207, &(0x7f0000002dc0)="$eJzs3E+LG2UcB/Bf49Zut+4fa622B33Qi6ehuwdPgiyyBdmAUrtCKwhTd6IhYxIyYSEiVk9efR3i0ZsgvoG99DV424vHHsQRk61t2rS6h27E/Xwu8yPP75t5HkIGJsyTg7e++7zTqrJWPozGqVPR6EekuylSNOKeV7Ynxxs3tzebza1rKV3dvL7+Zkpp5dWfP/ryh9d+GZ778MeVn87E/trHB79t/Lp/cf/SwR/XP2tXqV2lbm+Y8nSr1xvmt8oi7barTpbS+2WRV0Vqd6tiMDXeKnv9/ijl3d3lpf6gqKqUd0epU4zSsJeGg1HKP83b3ZRlWVpeCh7r9D+37Hx/t67riLo+Hc9GXdf12ViKc/FcLMdKfB0Rz8f5eCEuxItxMV6Kl+PSuOs4pg8AAAAAAAAAAAAAAAAAAAAnx5P2/6/Gmv3/AAAAAAAAAAAAAAAAAAAAcAw+uHFze7PZ3LqW0mJE+e3ezt7O5DgZ32xFO8oo4kqsxu8x3v0/MamvvtvcupLG1uKb8vZh/vbezjPT+fXx3wkc5hfGY/fy65N8ms6fiaUH8xuxGhdmn39jZn4x3nj9gXwWq3Hnk+hFGbvjc9/Pf7We0jvvNR/KXx73AQAAwP9Blv428/49yx43Pskf4feBh+6vF+LywnzXTkQ1+qKTl2UxmC4WH3lF8e+LxlN650b8RxZ4Qouzh1+aI8b/uszNf/KPFHfOP7FnzhcmjsX9D33eMwEAAAAAAAAAAOAonvKThgsx48myt+ezVAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIA/2YFjAQAAAABh/tZpdGwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADBUAAP//i0XIUQ==") (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r5 = open(&(0x7f0000000040)='./bus\x00', 0x44842, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) (async, rerun: 32) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYRESOCT=r3, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) (rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) (async, rerun: 32) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) (async, rerun: 32) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) (async, rerun: 64) munlock(&(0x7f0000cd6000/0x1000)=nil, 0x1000) (rerun: 64) ioctl$FS_IOC_GETFSUUID(r1, 0x80111500, &(0x7f00000000c0)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) (async) futex_waitv(&(0x7f0000001140)=[{0x8000, 0x0, 0x2}], 0x1, 0x0, 0x0, 0x1) ioperm(0x0, 0x5, 0xff000) pwritev2(r5, &(0x7f0000000240)=[{&(0x7f0000000000)='$', 0x100000}], 0x2, 0x1400, 0x0, 0x3) (async) creat(&(0x7f0000000040)='./bus\x00', 0x0) 12.654563008s ago: executing program 1 (id=2733): timer_create(0x0, 0x0, &(0x7f00000003c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x12, 0x0, "f3f2d90b7a5ab468afaba6eca1c57704e2ce8fdf4b9f4b74d747859e464d470e975b96e6f2d62a0807e5999a775165b2097e752de8357aa244979e65778ae6752009427ed3e25aa6cdf92704de229116"}, 0xd8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000001780)={0x0, "60d09914a2f2a56c5bff6226da97cb93"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000b00)={r2, 0x2, 0x0, 0x1}) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x4f, 0x10}, 0x1c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_NEWRULE={0x54, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x28, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @meta={{0x9}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_META_DREG={0x8}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x2}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x7c}}, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r4, 0x0, &(0x7f0000001700)=""/53}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000001c0)={0x0, 0x0}, 0x8) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="010000000000000000000300000058000180440004001f0001000a000000000090040000000000000000000000000000000100000000100002000a00000000000000fe8000000000000000000000000000bb000000000d0001007564703a73"], 0x6c}, 0x1, 0x0, 0x0, 0x851}, 0x0) 12.653665838s ago: executing program 1 (id=2734): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'geneve1\x00', 0x0}) socket$inet6_icmp(0xa, 0x2, 0x3a) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r2, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) sendto$inet6(r0, &(0x7f0000000280)="0503092c8f0b480301020d00c52cf7c25975e010b02f0800eb2b2ff0dac8897c6b118777faffffff3066100cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) 12.623858038s ago: executing program 1 (id=2736): r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'batadv_slave_1\x00', 0x0}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) init_module(&(0x7f0000000b00)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x5, 0x4, 0x1, 0xf, 0x3, 0x3e, 0x7, 0x76, 0x40, 0xb4, 0x4, 0x9, 0x38, 0x1, 0x5, 0x4, 0x4}, [{0x6474e551, 0x6, 0x1000, 0xffffffffffffff81, 0x2, 0x2, 0xce1afc2, 0x4ad0}]}, 0x78, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) fsopen(0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=@newqdisc={0x38, 0x24, 0xd0f, 0x470bd2d, 0xfffffffd, {0x60, 0x0, 0x0, r2, {0x0, 0xfff2}, {0xfff1, 0xffff}, {0x0, 0xfff1}}, [@qdisc_kind_options=@q_ingress={0xc}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x6}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x44080) r8 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r8, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet(r8, &(0x7f0000000380)={0x2, 0x4e24, @local}, 0x10) 9.458923278s ago: executing program 1 (id=2821): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000004b6fffec850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={&(0x7f00000001c0)=""/72, 0x48, 0x0, &(0x7f00000003c0)=""/217, 0xd9}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x13, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="851000000700000018150000", @ANYRES32, @ANYBLOB="000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000002de00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085b3d900820000001800000002000000000000000680000002000300010001008500000085000000"], &(0x7f0000000440)='GPL\x00', 0x5, 0x89, &(0x7f0000000480)=""/137, 0x41100, 0x10, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x1, 0x1, 0x2000009, 0x80000000}, 0x10, r0, 0xffffffffffffffff, 0x0, &(0x7f0000000940)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x3, @void, @value}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r2}, &(0x7f0000000a00), &(0x7f0000000a40)=r1}, 0x20) 9.433649399s ago: executing program 1 (id=2822): openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f00000000c0)=""/132) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$getregset(0x4204, 0x0, 0x1, &(0x7f0000000280)={0x0}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000380)={0x1, &(0x7f0000000080)=[{0x3, 0x0, 0x0, 0x7ffc0002}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x2c41, 0x0) flock(r0, 0x5) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) gettid() mq_notify(r0, &(0x7f0000000200)={0x0, 0x31, 0x4, @thr={&(0x7f00000005c0)="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", &(0x7f00000002c0)="b6bddd9603156cab534d540d9353b78429751be5aecc09e457394152b0398cefceba4cf0d9cf42148e4435c9392e82e684516379d0977fc097f82686722275abeab59bde1c7319a7d17205b361176fb52c9795481d09494aad5f6fc9d43f0d2ac58829001ed9481036cea5ccdba05bf40ae8e948ba84bf0e1367d809bac3f4bd2af712047ebef3fe181a600507f9ada0f474fdc4b79fe4667b7868b8896c545e356e99d7270f7bca20"}}) 9.395416178s ago: executing program 1 (id=2824): r0 = socket(0x11, 0x3, 0x1) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000400)={'ip6gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000240)=0xe9, 0x4) sendmsg$netlink(r0, 0x0, 0x0) 5.970808248s ago: executing program 2 (id=2845): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) accept4$bt_l2cap(r1, &(0x7f0000000180), &(0x7f00000001c0)=0xe, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) creat(&(0x7f0000000340)='./file0\x00', 0x28) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000080)={r2}) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x1) setsockopt(r1, 0x800084, 0x80, &(0x7f0000000000)="1400001909000000", 0x8) r3 = dup(r0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000dd0000000000003b810000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_load(r8, &(0x7f0000000280)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757818"], 0x65) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) sendmsg$nl_route_sched(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000011c0)=@newtaction={0xe6c, 0x30, 0x25, 0x0, 0x0, {}, [{0xe58, 0x1, [@m_pedit={0xe54, 0x1, 0x0, 0x0, {{0xa}, {0xe28, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x4}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0x2}, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x10000}, {}, {}, {}, {}, {}, {}, {0xffffffff, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x6}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {}, {}, {0x0, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x0, 0x10000}, {}, {}, {0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x28000}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xffffffff}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x2}, {}, {}, {}, {}, {}, {}, {}, {0x3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x5}, {}, {}, {}, {}, {0x3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x5}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe6c}}, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000780)={0x0, @in6={{0xa, 0x4e21, 0x6, @private0={0xfc, 0x0, '\x00', 0xfc}, 0x3b}}}, 0x84) socket$phonet_pipe(0x23, 0x5, 0x2) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000400)='mm_page_free\x00', r9, 0x0, 0x800000000000}, 0x18) creat(&(0x7f00000000c0)='./file0\x00', 0xc9028ba210c11e88) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) 5.970446408s ago: executing program 5 (id=2846): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x7e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = syz_io_uring_setup(0x239, 0x0, 0x0, &(0x7f00000001c0)) io_uring_enter(r2, 0x2def, 0x3, 0x0, 0x0, 0x0) fgetxattr(r1, &(0x7f00000000c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000400)=""/95, 0x5f) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x48040) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r4 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=@ipv6_newaddr={0x50, 0x14, 0x1, 0xffffffff, 0x25dfdbff, {0xa, 0x0, 0xa1, 0x0, r6}, [@IFA_ADDRESS={0x14, 0x1, @loopback}, @IFA_FLAGS={0x8, 0x8, 0x602}, @IFA_FLAGS={0x8}, @IFA_CACHEINFO={0x14, 0x6, {0x1, 0x9, 0x3, 0xc78}}]}, 0x50}}, 0x24005040) writev(r3, &(0x7f0000000300)=[{&(0x7f00000001c0)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f93132", 0x39}], 0x1) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000005c00)={&(0x7f0000000000)=@newtaction={0xa0, 0x30, 0x9, 0x0, 0x0, {}, [{0x8c, 0x1, [@m_bpf={0x88, 0x1, 0x0, 0x0, {{0x8}, {0x60, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x7}, @TCA_ACT_BPF_OPS={0x3c, 0x4, [{}, {}, {0x3, 0x0, 0x0, 0x1000000}, {}, {}, {}, {0x6}]}, @TCA_ACT_BPF_PARMS={0x18}]}, {}, {0xc}, {0xc}}}]}]}, 0xa0}}, 0x0) 5.969760798s ago: executing program 4 (id=2847): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r2) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000002c0)={0x0, 0x20, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) writev(r0, &(0x7f0000000d00)=[{&(0x7f0000000100)="89e7ee2c7cdad9b4b47380c988cafbe882cac5050093517d176c709a6db96cb03276db1bb7c9f6ca6878744421b3197464cdb25e", 0x34}], 0x1) 4.985310845s ago: executing program 0 (id=2848): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000ac0), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000b40)={'wpan4\x00', 0x0}) sendmsg$IEEE802154_SET_MACPARAMS(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000b80)={0x1c, r1, 0x1, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x240008c1}, 0x20000010) 4.983693065s ago: executing program 2 (id=2849): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a44000000120a09000000000000000000020000000900020073797a300000000008000440000000000900010073797a3000000000080003b0260000010800084000000000140000001100010000000000000000000000000a"], 0x6c}}, 0x0) openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffff"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="e80000006c00010029bd7000fcdbdf2500000000", @ANYBLOB="001000008000000008000f002000000014003500726f7365300000000000000000000000a40034801400350070696d36"], 0xe8}}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000"], 0x48) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3d, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffdbd}]}) sigaltstack(0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r5 = bpf$PROG_LOAD(0x5, &(0x7f00000193c0)={0x11, 0x13, &(0x7f0000019300)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000206a932500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000100000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000010000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xa, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000000)='sys_enter\x00', r5, 0x0, 0x91}, 0x18) readahead(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r6, 0x0, 0x8000}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x275a, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x28, r11, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8a}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8001}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x26000010}, 0x0) sendmsg$TIPC_NL_KEY_SET(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x60, r11, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0x4c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "e3de3d7b4cd07ec3ee777de774fc7987cca41989"}}, @TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0xffffffff}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x4000004) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000280)={0x34, r8, 0x1, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'team0\x00'}}}}}, 0x34}}, 0x0) 4.978233605s ago: executing program 5 (id=2850): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340), r2) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000002c0)={0x0, 0x20, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) writev(r0, &(0x7f0000000d00)=[{&(0x7f0000000100)="89e7ee2c7cdad9b4b47380c988cafbe882cac5050093517d176c709a6db96cb03276db1bb7c9f6ca6878744421b3197464cdb25e", 0x34}], 0x1) 4.977411025s ago: executing program 4 (id=2851): r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw\x00') r1 = socket$kcm(0xa, 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000380)={&(0x7f0000000040)={0xa, 0xa, @local}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000080)="a2", 0xff0e}], 0x4, 0x0, 0x0, 0xa6820000}, 0xafe6) preadv(r0, &(0x7f00000026c0)=[{&(0x7f0000000240)=""/4088, 0xff8}], 0x1, 0x46, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000006c0)='./file0\x00', 0x19f, &(0x7f0000000100), 0x80, 0x550, &(0x7f0000000700)="$eJzs3c9rJFkdAPBvddKz8yOznVUPuuC4uiszi073ZOPuBg/rCKKnBXG9jzHpCWE66ZDu7E7CoJm/QBBRwZNevAj+AYIMePEowoLiRVBYUUQzehBcp6SqK5mmpzvp2e3tziSfD9TUq1dV7/teTb9KV9ejKoBT67mIuB4RD9I0fTEiKkV+qZhitzNl293fu7OUTUmk6Rv/SCIp8vbLSor5hWK3sxHxta9EfDN5NG5re+fWYqNR3yyWa+21jVpre+fq6triSn2lvj4/P/fKwqsLLy9cG0k7L0bEa1/6y/e/89Mvv/bLz7715xt/u/KtrFozxfrudjyG7BBNH7ZBp+nlzrEsZDtsvodgx9V03sLCuX5bpGmaPkgrXTl3x1IzAAB6Zd9LPxQRn4qIF6MSU4d/nQUAAACeQOkXZuLdJL9DE3/8w6W0x5neDAAAAODJU8rHwCalajEWYCZKpWq1M4b3I3G+1Gi22p+52dxaX+6MlZ2NcunmaqN+rRgrPBvlJFuey9MPl1/qWZ6PiGci4nuVc/lydanZWJ70jx8AAABwSlzouf7/d6Vz/Q8AAACcMLOPZpUmUQ8AAADgg9Pn+h8AAAA4YVz/AwAAwIn21ddfz6Z0//3Xy29ub91qvnl1ud66VV3bWqouNTc3qivN5kr+zL61o8prNJsbn4v1rdu1dr3VrrW2d26sNbfW2zdW89eBAwAAABPwzCfu/T6JiN3Pn8unzJlJVwoYi+mDVFLM+/T+Pz3dmb8zpkoBYzE1xDbvPDWGigBjNz3pCgATU550BYCJS45YP3Dwzm+K+SdHWx8AAGD0Ln9s8P3/w98BsOsVAfCEe8+d+KgfDIBjr+f+f1qZVEWAscvv/w874Nc3fjhRykONAAROsvd9//9IafpYFQIAAEZuJp+SUrX4eW8mSqVqNeJi/lqAcnJztVG/FhFPR8TvKuWnsuW5fM/ELUAAAAAAAAAAAAAAAAAAAAAAAAAAGFKaJpEe5vqhawEAAIAnQETpr8mvOs/yv1x5Yab394EzyX/yVwKfiYi3fvTGD24vttubc1n+Pw/y2z8s8l/q2vHd/fIBAACAcdu/Tt+/jgcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAUbq/d2fp/t6d9L97d5bGGffvX4yI2YP4+dRZMx1n8/nZKEfE+X8lMd21XxIRUyOIv3s3Ij7aL36SVesgZL/45z74+DFbHIV+8S+MID6cZvey88/1vP9FbERX/yvFc/m8q/8lRceLzolhegTxB5//4uD8NzWg/18cMsazb/+8NjD+3Yhnp/uff/bjJwPiPx+loeJ/4+s7O4PWpT+OuBz943fHqrXXNmqt7Z2rq2uLK/WV+vr8/NwrC68uvLxwrXZztVEv/u0b47sf/8WDw9p/fkD82SPa/0JvYQM+EP97+/behzvJcr/4V57vE//XPym2eDR+qfjb9+kina2/vJ/e7aS7XfrZby8d1v7lh+0vP87//5VBhQ55XACAyWht79xabDTqmyc2kV2lv+9ypi6muck3ZySJ3eNRjYknvj3SArMPSNan+qy6FxHDlJPEcTgseWLSZyYAAGDUHn7pn3RNAAAAAAAAAAAAAAAAAAAA4PQax+PEemPuHqQSTwYGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAI6N/wcAAP//eOHkIw==") r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000b8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) r3 = fspick(0xffffffffffffff9c, &(0x7f0000001c00)='./file0\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000001240)={{0xcc, 0xc, 0x10, 0x38, 0x263, 0xd547, 0x17e, 0x7f}, "cd8254e81ad907866557864c6060155c05796f4437be5bbcb4651c45544d54e853990dfb1072c42421762f8e2160a5be1d6795fee51a52c1f783246e74ade5701f20685521ae4afb3c444d264ab9a89237b359c8297c4615f125bdeaf22251b40e05e81dbef794e31c574f607faf29934090108502757c58b5458ca658ba8c68ea74a737", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9a4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r5, &(0x7f0000001640)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/250, 0xfa}], 0x2}}], 0x1, 0x0, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) sendmsg$NFT_BATCH(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f6873720000000058000000160a0101000b000000000000010000000900020073797a32000000000900010073797a30000000002c000380180003801400010076657468305f746f5f687372000000000800024000440000080001"], 0xf8}, 0x1, 0x0, 0x0, 0xc000}, 0x40) sendmsg$ETHTOOL_MSG_TSINFO_GET(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000001c40)={0x34, r4, 0xfaac4106a1b87a7, 0x0, 0x0, {0xb}, [@HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x34}}, 0x0) getpid() r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000030000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r9}, 0x4) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r10}, 0x10) r11 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000000314010000000000000000000900020073797a2f000000000800410072786500140033007465616d5f736c6176655f30"], 0x38}}, 0x0) 4.957422615s ago: executing program 0 (id=2852): socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)) r4 = socket(0x10, 0x80000, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="7fff0000000000002800128009000100766c616e000000001800028006000100340200000c0002001f0000001e00000008000500", @ANYRES32=r3], 0x50}, 0x1, 0x0, 0x0, 0x40000c4}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="500000001000210400000000fedbdf2500000000", @ANYRES32=0x0, @ANYBLOB="adffa888e16000002800128009000100766c616e00000000180002800c0002000e0000000a000000060001000000000008000500", @ANYRES32=r7], 0x50}}, 0x2) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'veth1_to_hsr\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x74, r8, {0xffff}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) 3.880906151s ago: executing program 0 (id=2853): socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@newtfilter={0x24, 0x11, 0x1, 0x74bd2b, 0x0, {0x0, 0x0, 0x74, r3, {0x6, 0x4}, {0x0, 0x4}, {0xa}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)=@newlinkprop={0x168, 0x6c, 0x520, 0x70bd2a, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, 0x72000, 0x402a0}, [@IFLA_VFINFO_LIST={0x134, 0x16, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, [@IFLA_VF_LINK_STATE={0xc, 0x5, {0x6, 0x6}}, @IFLA_VF_RATE={0x10, 0x6, {0x6, 0x2, 0x1}}]}, {0xc4, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xc}}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x8, 0x8000000000000000}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x0, 0x9}}, @IFLA_VF_MAC={0x28, 0x1, {0x5, @broadcast}}, @IFLA_VF_VLAN_LIST={0x18, 0xc, 0x0, 0x1, [{0x14, 0x1, {0x1ff, 0xb5c, 0x4, 0x88a8}}]}, @IFLA_VF_VLAN={0x10, 0x2, {0x4, 0x50b}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x6, 0x7fffffff}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x1, 0x9}}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_VF_RATE={0x10, 0x6, {0x0, 0x2, 0x5}}, @IFLA_VF_RATE={0x10, 0x6, {0x3a71, 0x0, 0x97}}, @IFLA_VF_MAC={0x28, 0x1, {0x40}}]}]}, @IFLA_IFNAME={0x14, 0x3, 'gre0\x00'}]}, 0x168}}, 0x801) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = syz_io_uring_setup(0x10d, &(0x7f0000000140)={0x0, 0x3, 0x0, 0x1}, &(0x7f0000001200)=0x0, &(0x7f0000001040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x23, 0x6000, @fd_index=0x6, 0x75a5, 0x0, 0x0, 0xa, 0x1}) io_uring_enter(r5, 0x47f9, 0x0, 0x0, 0x0, 0x0) socket$tipc(0x1e, 0x5, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r8}, 0x10) r9 = socket$rds(0x15, 0x5, 0x0) bind$rds(r9, &(0x7f0000000040)={0x2, 0x4e01, @local}, 0x10) sendmsg$rds(r9, &(0x7f0000000680)={&(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet_tcp_int(r4, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r10 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000c80)={'lo\x00'}) 3.879640582s ago: executing program 2 (id=2854): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB], 0x48) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x161042, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000188500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000004c0)='kmem_cache_free\x00', r2}, 0x10) pipe2(0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000140)) write$ppp(r0, &(0x7f0000000280)="0148", 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r3, 0x6, 0x23, &(0x7f0000000040)=""/32, &(0x7f0000000080)=0x3b) bpf$MAP_CREATE(0x0, 0x0, 0x50) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r5 = open(&(0x7f00009e1000)='./file0\x00', 0x48141, 0x0) fcntl$setlease(r5, 0x400, 0x1) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) ptrace(0x10, r4) r6 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR(r6, 0x114, 0x2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0xc, [@var={0x10, 0x0, 0x0, 0xe, 0x1}, @ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @type_tag={0x2, 0x0, 0x0, 0x12, 0x4}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, 0x7a, 0x7}]}, {0x0, [0x30, 0x5f, 0x0, 0x2e, 0x5f, 0x5f, 0x30, 0x30, 0xfc, 0x30]}}, &(0x7f0000000000)=""/62, 0x5c, 0x3e, 0x0, 0xa5, 0x0, @void, @value}, 0x28) ptrace$getregset(0x4204, r4, 0x2, &(0x7f0000000740)={0x0}) 3.878620342s ago: executing program 5 (id=2855): timer_create(0x0, 0x0, &(0x7f00000003c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x12, 0x0, "f3f2d90b7a5ab468afaba6eca1c57704e2ce8fdf4b9f4b74d747859e464d470e975b96e6f2d62a0807e5999a775165b2097e752de8357aa244979e65778ae6752009427ed3e25aa6cdf92704de229116"}, 0xd8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000001780)={0x0, "60d09914a2f2a56c5bff6226da97cb93"}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000b00)={r2, 0x2, 0x0, 0x1}) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x4f, 0x10}, 0x1c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_NEWRULE={0x54, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x28, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @meta={{0x9}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_META_DREG={0x8}, @NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0x2}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x7c}}, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r4, 0x0, &(0x7f0000001700)=""/53}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000007500)={@local, @random="e10000000030", @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "6410a6", 0x0, 0x32, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, @mcast2}}}}, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000001c0)={0x0, 0x0}, 0x8) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="010000000000000000000300000058000180440004001f0001000a000000000090040000000000000000000000000000000100000000100002000a00000000000000fe8000000000000000000000000000bb000000000d0001007564703a73"], 0x6c}, 0x1, 0x0, 0x0, 0x851}, 0x0) 3.877726612s ago: executing program 4 (id=2856): r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x0, 0x3, 0x1, 0x4, {0xa, 0x4e21, 0x409, @remote}}}, 0x3a) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0xffffff47, &(0x7f0000000100)={0x0}}, 0x4) getsockname$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="a040856807091a7440c361820900000000000003000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = signalfd4(r0, &(0x7f0000000400), 0x8, 0x180c00) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) mkdir(&(0x7f0000000140)='./file0\x00', 0x170) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r6, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) 2.695459138s ago: executing program 0 (id=2857): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'geneve1\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) mq_open(0x0, 0x40, 0x1c, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1e0000000000000005000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) sendto$inet6(r0, &(0x7f0000000280)="0503092c8f0b480301020d00c52cf7c25975e010b02f0800eb2b2ff0dac8897c6b118777faffffff3066100cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) 2.694415298s ago: executing program 2 (id=2858): bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000000000000100000007"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r1}, 0x10) timer_create(0x2, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x1, &(0x7f00000006c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) 2.693605198s ago: executing program 5 (id=2859): r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000040)={0x3a, 0x6, 0x2, 0xe, 0x0, [@remote, @private2, @ipv4={'\x00', '\xff\xff', @loopback}]}, 0x38) 2.692628858s ago: executing program 4 (id=2860): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x100000, 0x4, 0x0, 0x6, 0x3, 0x9, 0x4}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000020000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x0, &(0x7f0000000280), 0x1, 0x787, &(0x7f0000001000)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.throttle.io_service_bytes\x00', 0x275a, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) r3 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r3) syz_usb_connect(0x0, 0x36, &(0x7f0000000040)=ANY=[], 0x0) ioctl$EVIOCGBITSW(r3, 0x40095505, 0x0) r4 = socket(0x10, 0x3, 0x0) bpf$MAP_GET_NEXT_KEY(0x15, 0x0, 0x0) write(r4, 0x0, 0x0) gettid() prctl$PR_SET_SECUREBITS(0x1c, 0x2c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) msgsnd(0x0, &(0x7f0000000340)={0x3}, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000340)='kfree\x00'}, 0x10) msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/245}, 0xfd, 0x0, 0x0) 1.402934674s ago: executing program 2 (id=2861): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000ac0), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000b40)={'wpan4\x00', 0x0}) sendmsg$IEEE802154_SET_MACPARAMS(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000b80)={0x1c, r1, 0x1, 0x70bd25, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x240008c1}, 0x20000010) 1.402400814s ago: executing program 5 (id=2862): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) sendto$inet(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x40800, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x3a) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) shutdown(0xffffffffffffffff, 0x1) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree\x00', r4, 0x0, 0xa8}, 0x18) r5 = syz_io_uring_setup(0x24f5, &(0x7f0000000780)={0x0, 0xfffffffd, 0x10100, 0x3}, &(0x7f0000000100)=0x0, &(0x7f0000000800)=0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) syz_io_uring_submit(r6, r7, &(0x7f00000001c0)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)={&(0x7f0000000340)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0, 0x80840, 0x1}) io_uring_enter(r5, 0x1d2d, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000240)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)='%+9llu \x00'}, 0x20) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000100)={'netdevsim0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000003000000610200000200000000000000", @ANYRES32, @ANYBLOB="fc6d0f14bb731fcc15000000f5000000d907b779", @ANYRES32=r10], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x7f, 0x0, 0x8000, 0x0, r8, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 1.401699965s ago: executing program 4 (id=2863): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a44000000120a09000000000000000000020000000900020073797a300000000008000440000000000900010073797a3000000000080003b0260000010800084000000000140000001100010000000000000000000000000a"], 0x6c}}, 0x0) openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffff"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="e80000006c00010029bd7000fcdbdf2500000000", @ANYBLOB="001000008000000008000f002000000014003500726f7365300000000000000000000000a40034801400350070696d36"], 0xe8}}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000"], 0x48) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3d, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffdbd}]}) sigaltstack(0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r5 = bpf$PROG_LOAD(0x5, &(0x7f00000193c0)={0x11, 0x13, &(0x7f0000019300)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000206a932500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000100000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000010000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xa, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000000)='sys_enter\x00', r5, 0x0, 0x91}, 0x18) readahead(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r6, 0x0, 0x8000}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x275a, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x28, r11, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8a}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8001}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x26000010}, 0x0) sendmsg$TIPC_NL_KEY_SET(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x60, r11, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0x4c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "e3de3d7b4cd07ec3ee777de774fc7987cca41989"}}, @TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0xffffffff}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x4000004) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000280)={0x34, r8, 0x1, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'team0\x00'}}}}}, 0x34}}, 0x0) 1.401316514s ago: executing program 0 (id=2864): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000600)='sys_enter\x00', r1}, 0x10) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) write$cgroup_pid(r2, &(0x7f00000031c0), 0x12) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000004000001d8500000007000000440000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r3}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x20, 0x0, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) readv(r5, &(0x7f0000000840)=[{&(0x7f0000000080)=""/41, 0x29}], 0x1) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r7, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r7, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) syz_usb_control_io$uac1(0xffffffffffffffff, 0x0, &(0x7f0000000300)={0x24, &(0x7f0000000100)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYRES8, @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000280)={{0x1, 0x1, 0x18}, './file0\x00'}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) writev(r8, &(0x7f00000002c0)=[{&(0x7f0000002280)="2e9b3d0007e03dd65193dfb6c575963f86dd", 0x12}, {0x0}], 0x2) process_mrelease(0xffffffffffffffff, 0x0) 3.137661ms ago: executing program 0 (id=2865): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000005c0)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x3) unshare(0x6040400) r3 = socket$nl_route(0x10, 0x3, 0x0) vmsplice(r3, &(0x7f0000002e80)=[{&(0x7f0000000580)="774bde122e5c", 0x6}], 0x1, 0x0) 2.402051ms ago: executing program 2 (id=2866): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb, 0x4008032, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) r0 = syz_clone(0x0, 0x0, 0x21a9964e16e9c816, 0x0, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0x503, 0x0, 0x0, {0x0, 0xcf, 0x0, 0x0, 0x43}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x8, 0x7, @multicast1=0xe000030a}]}}}]}, 0x38}}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r6) ptrace$pokeuser(0x6, r6, 0x358, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYRES8=r2, @ANYRES16=r4, @ANYRES8=r1, @ANYRES64=r4, @ANYRESDEC=r0, @ANYRES32=r1], 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r7}, &(0x7f0000000800), &(0x7f0000000840)=r8}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) r9 = socket$inet(0xa, 0x80003, 0xd) setsockopt$IPT_SO_SET_REPLACE(r9, 0x0, 0x40, &(0x7f00000002c0)=@mangle={'mangle\x00', 0x44, 0x6, 0x410, 0x2d8, 0x98, 0x2d8, 0x98, 0x138, 0x378, 0x378, 0x378, 0x378, 0x378, 0x6, 0x0, {[{{@ip={@loopback, @multicast1=0xe0007600, 0x0, 0x0, 'gre0\x00', 'ip6gre0\x00', {}, {}, 0x0, 0x0, 0x11}, 0x7a00, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@multicast1, @local, 0x0, 0x0, 'wg1\x00', 'nicvf0\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0xb8, 0x100, 0x0, {}, [@common=@unspec=@limit={{0x48}, {0x0, 0x28, 0x0, 0x0, 0x0, 0x1}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@private2, 'veth0_virt_wifi\x00', {0x7}}}}, {{@ip={@rand_addr, @private, 0xffffffff, 0xff, 'syzkaller0\x00', 'veth1_to_team\x00', {}, {0xff}}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @empty}}}, {{@ip={@empty, @empty, 0xff000000, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x1fb, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x470) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x40, &(0x7f0000000080)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2c}}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2a}}, @in={0x2, 0x4e21, @private=0xa010102}]}, &(0x7f0000000140)=0x10) listen(r5, 0x6) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f00000008c0)={[{@bsdgroups}, {@nodiscard}, {@noblock_validity}, {@grpjquota}, {@grpjquota}, {@noquota}, {@abort}, {@noload}, {@noload}]}, 0x64, 0x50a, &(0x7f0000000200)="$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") syz_mount_image$msdos(&(0x7f0000000f40), &(0x7f0000000140)='.\x00', 0x1a4a438, &(0x7f00000008c0)=ANY=[], 0xb, 0x0, &(0x7f0000000000)) sendto$inet6(r1, &(0x7f0000000500)="a4", 0x34000, 0x2000c851, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback, 0xffffffff}, 0x1c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x8) 1.488011ms ago: executing program 5 (id=2867): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000780)=@raw={'raw\x00', 0x3c1, 0x3, 0x288, 0x0, 0x178, 0xc, 0x0, 0x178, 0x2c8, 0x258, 0x258, 0x2c8, 0x258, 0x3, 0x0, {[{{@ipv6={@loopback={0x1f0}, @mcast2, [], [], 'team_slave_0\x00', 'netpci0\x00'}, 0x0, 0xa8, 0xd8}, @common=@inet=@SET2={0x30}}, {{@ipv6={@private1, @mcast1, [], [], 'wg2\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x2e8) setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000100)=0x4004d, 0x4) recvmmsg(r0, &(0x7f0000000480)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=""/11, 0x17}}], 0x400000000000179, 0x0, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_int(r1, 0x6, 0x24, &(0x7f0000000000)=0x1, 0x4) socket$nl_route(0x10, 0x3, 0x0) futex_waitv(&(0x7f0000001440)=[{0x7, 0x0, 0x2}, {0x1, 0x0, 0x2}, {0x3, 0x0, 0x82}, {0x8, 0x0, 0xf5b45df725b889ba}, {0x9, 0x0, 0x82}, {0x7, 0x0, 0x2}, {0x1000, 0x0, 0x2}, {0x7fff, 0x0, 0x82}, {0x84, 0x0, 0x2}, {0x9, 0x0, 0x2}, {0x4, 0x0, 0x2}, {0x10005, 0x0, 0x82}, {0x200, 0x0, 0x82}, {0x6380000, 0x0, 0x82}, {0x9, 0x0, 0x82}, {0x4, 0x0, 0x2}, {0x5, 0x0, 0x2}, {0x100000001, 0x0, 0x82}, {0x3, 0x0, 0x82}, {0x9, 0x0, 0x2}, {0x0, 0x0, 0x2}, {0x3, 0x0, 0x82}, {0x3, 0x0}, {0xa544, 0x0, 0x82}, {0x4, 0x0, 0x82}, {0x54bc, 0x0, 0x2}, {0xfffffffffffffffc, 0x0, 0x2}, {0x6, 0x0, 0x2}, {0x3, 0x0, 0x2}, {0x0, 0x0, 0x2}, {0x3, 0x0, 0x2}, {0x8, 0x0, 0x82}, {0x0, 0x0, 0x2}, {0x2, 0x0, 0x2}, {0xeb, 0x0, 0x82}, {0x8, 0x0, 0x82}, {0x12, 0x0, 0x2}, {0x800, 0x0, 0x2}, {0x2, 0x0, 0x2}, {0x5, 0x0, 0x82}, {0xffffffff, 0x0, 0x2}, {0x6, 0x0, 0x82}, {0x1, 0x0, 0x82}, {0x6, 0x0, 0x2}, {0x9, 0x0, 0x82}, {0x10000, 0x0, 0x82}, {0xffffffff00000001, 0x0, 0x82}], 0x2f, 0x0, 0x0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1e00000007000000fc080000", @ANYRES32, @ANYBLOB="9200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0500000001000000030000000700"/28], 0x50) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000001c0)={r2, &(0x7f0000000000)="d9028d8dc7262e41b76695faad1558fa09c1a498a9ff68e52f13703ebff68a1d6e342ef5952e5b7fce76ea531344c9053924ace7550ac6b65ba8eb266219598a7f7fc2ed0dee645420ee9739b48b72a3f923839b746fcd9c7b0eda156b07175caf7b660481389e171e8062c7774edeb747b8ee471030f0b92ec53a47029e", &(0x7f0000000080)=""/255, 0x4}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x20000035, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2c, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) listen(0xffffffffffffffff, 0x7) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x800001d, 0xf00) 0s ago: executing program 4 (id=2868): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a44000000120a09000000000000000000020000000900020073797a300000000008000440000000000900010073797a3000000000080003b0260000010800084000000000140000001100010000000000000000000000000a"], 0x6c}}, 0x0) openat$selinux_relabel(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffff"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="e80000006c00010029bd7000fcdbdf2500000000", @ANYBLOB="001000008000000008000f002000000014003500726f7365300000000000000000000000a40034801400350070696d36"], 0xe8}}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000"], 0x48) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3d, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffdbd}]}) sigaltstack(0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r5 = bpf$PROG_LOAD(0x5, &(0x7f00000193c0)={0x11, 0x13, &(0x7f0000019300)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000206a932500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000100000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000010000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xa, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000000)='sys_enter\x00', r5, 0x0, 0x91}, 0x18) readahead(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r6, 0x0, 0x8000}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x275a, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x28, r11, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8a}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8001}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x26000010}, 0x0) sendmsg$TIPC_NL_KEY_SET(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x60, r11, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0x4c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "e3de3d7b4cd07ec3ee777de774fc7987cca41989"}}, @TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0xffffffff}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x4000004) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000280)={0x34, r8, 0x1, 0x0, 0x0, {{}, {}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'team0\x00'}}}}}, 0x34}}, 0x0) kernel console output (not intermixed with test programs): v_slave_0 [ 99.374894][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 99.383570][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 99.391186][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 99.400461][ T11] veth1_macvtap: left promiscuous mode [ 99.406104][ T11] veth0_macvtap: left promiscuous mode [ 99.411646][ T11] veth1_vlan: left promiscuous mode [ 99.417126][ T11] veth0_vlan: left promiscuous mode [ 99.519902][ T11] team0 (unregistering): Port device team_slave_1 removed [ 99.530164][ T11] team0 (unregistering): Port device team_slave_0 removed [ 99.588703][ T7015] tipc: Enabling of bearer rejected, already enabled [ 99.608422][ T6956] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 99.619595][ T6956] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 99.636201][ T7030] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1408'. [ 99.670790][ T7032] netlink: 'syz.4.1409': attribute type 30 has an invalid length. [ 99.682222][ T29] kauditd_printk_skb: 170 callbacks suppressed [ 99.682240][ T29] audit: type=1400 audit(1737269215.093:5081): avc: denied { create } for pid=7031 comm="syz.4.1409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 99.693022][ T6956] team0: Port device team_slave_0 added [ 99.711398][ T29] audit: type=1400 audit(1737269215.093:5082): avc: denied { write } for pid=7031 comm="syz.4.1409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 99.716394][ T6956] team0: Port device team_slave_1 added [ 99.734968][ T29] audit: type=1400 audit(1737269215.093:5083): avc: denied { nlmsg_read } for pid=7031 comm="syz.4.1409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 99.761413][ T29] audit: type=1400 audit(1737269215.103:5084): avc: denied { ioctl } for pid=7031 comm="syz.4.1409" path="socket:[16927]" dev="sockfs" ino=16927 ioctlcmd=0x89f8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 99.787413][ T29] audit: type=1400 audit(1737269215.183:5085): avc: denied { setopt } for pid=7031 comm="syz.4.1409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 99.833492][ T6956] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 99.840535][ T6956] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 99.866596][ T6956] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 99.881679][ T6956] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 99.888899][ T6956] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 99.903163][ T7040] bpf_get_probe_write_proto: 7 callbacks suppressed [ 99.903182][ T7040] syz.1.1412[7040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.915178][ T6956] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 99.945928][ T7040] syz.1.1412[7040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.946163][ T7040] syz.1.1412[7040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 99.973900][ T7036] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 99.992867][ T7036] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 100.014524][ T7036] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 100.022339][ T7036] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 100.067427][ T6956] hsr_slave_0: entered promiscuous mode [ 100.074103][ T6956] hsr_slave_1: entered promiscuous mode [ 100.082586][ T6956] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 100.092068][ T6956] Cannot create hsr debugfs directory [ 100.098777][ T7046] tipc: Enabled bearer , priority 0 [ 100.106789][ T7043] tipc: Resetting bearer [ 100.120260][ T7043] tipc: Disabling bearer [ 100.138138][ T7053] loop2: detected capacity change from 0 to 512 [ 100.144833][ T7053] journal_path: Non-blockdev passed as './bus' [ 100.151210][ T7053] EXT4-fs: error: could not find journal device path [ 100.161222][ T7043] team0 (unregistering): Port device team_slave_0 removed [ 100.191481][ T7043] team0 (unregistering): Port device team_slave_1 removed [ 100.242957][ T7041] tipc: Disabling bearer [ 100.249153][ T7036] netlink: 'syz.2.1410': attribute type 10 has an invalid length. [ 100.310587][ T7053] netlink: 132 bytes leftover after parsing attributes in process `syz.2.1410'. [ 100.376458][ T7036] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 100.434434][ T7060] loop4: detected capacity change from 0 to 512 [ 100.447320][ T7060] EXT4-fs: Ignoring removed nobh option [ 100.489329][ T7060] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 100.503201][ T7060] ext4 filesystem being mounted at /281/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 100.521482][ T7060] FAULT_INJECTION: forcing a failure. [ 100.521482][ T7060] name failslab, interval 1, probability 0, space 0, times 0 [ 100.534175][ T7060] CPU: 0 UID: 0 PID: 7060 Comm: syz.4.1419 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 100.544876][ T7060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 100.555049][ T7060] Call Trace: [ 100.558346][ T7060] [ 100.561310][ T7060] dump_stack_lvl+0xf2/0x150 [ 100.566117][ T7060] dump_stack+0x15/0x1a [ 100.570433][ T7060] should_fail_ex+0x223/0x230 [ 100.575134][ T7060] should_failslab+0x8f/0xb0 [ 100.579817][ T7060] kmem_cache_alloc_noprof+0x52/0x320 [ 100.582114][ T6956] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 100.585272][ T7060] ? alloc_empty_file+0xd0/0x200 [ 100.585304][ T7060] alloc_empty_file+0xd0/0x200 [ 100.585343][ T7060] path_openat+0x6a/0x1fa0 [ 100.585374][ T7060] ? _parse_integer_limit+0x167/0x180 [ 100.585403][ T7060] ? _parse_integer+0x27/0x30 [ 100.616370][ T7060] ? kstrtoull+0x110/0x140 [ 100.620813][ T7060] ? kstrtouint+0x77/0xc0 [ 100.625159][ T7060] ? kstrtouint_from_user+0xb0/0xe0 [ 100.630428][ T7060] do_filp_open+0x107/0x230 [ 100.634979][ T7060] do_sys_openat2+0xab/0x120 [ 100.639648][ T7060] __x64_sys_creat+0x66/0x90 [ 100.644244][ T7060] x64_sys_call+0x1084/0x2dc0 [ 100.648991][ T7060] do_syscall_64+0xc9/0x1c0 [ 100.653542][ T7060] ? clear_bhb_loop+0x55/0xb0 [ 100.658306][ T7060] ? clear_bhb_loop+0x55/0xb0 [ 100.663007][ T7060] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 100.668959][ T7060] RIP: 0033:0x7f6758605d29 [ 100.673371][ T7060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 100.693068][ T7060] RSP: 002b:00007f6756c77038 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 100.701548][ T7060] RAX: ffffffffffffffda RBX: 00007f67587f5fa0 RCX: 00007f6758605d29 [ 100.709625][ T7060] RDX: 0000000000000000 RSI: 0000000000000016 RDI: 0000000020000000 [ 100.717615][ T7060] RBP: 00007f6756c77090 R08: 0000000000000000 R09: 0000000000000000 [ 100.725606][ T7060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.733584][ T7060] R13: 0000000000000000 R14: 00007f67587f5fa0 R15: 00007ffdb1caac38 [ 100.741627][ T7060] [ 100.763000][ T7066] tipc: Enabling of bearer rejected, failed to enable media [ 100.771543][ T6956] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 100.783281][ T3300] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 100.783808][ T6956] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 100.810815][ T6956] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 100.918695][ T6956] 8021q: adding VLAN 0 to HW filter on device bond0 [ 100.945074][ T6956] 8021q: adding VLAN 0 to HW filter on device team0 [ 100.957628][ T7084] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1427'. [ 100.976370][ T1980] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.983457][ T1980] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.010238][ T11] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.017410][ T11] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.042781][ T7094] loop4: detected capacity change from 0 to 1024 [ 101.068241][ T7094] ext4: Unknown parameter 'subj_user' [ 101.089747][ T6956] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 101.103041][ T7097] loop1: detected capacity change from 0 to 1024 [ 101.117844][ T29] audit: type=1326 audit(1737269216.533:5086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7091 comm="syz.4.1432" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6758605d29 code=0x7ffc0000 [ 101.141450][ T29] audit: type=1326 audit(1737269216.533:5087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7091 comm="syz.4.1432" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6758605d29 code=0x7ffc0000 [ 101.164938][ T29] audit: type=1326 audit(1737269216.533:5088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7091 comm="syz.4.1432" exe="/root/syz-executor" sig=0 arch=c000003e syscall=141 compat=0 ip=0x7f6758605d29 code=0x7ffc0000 [ 101.188454][ T29] audit: type=1326 audit(1737269216.533:5089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7091 comm="syz.4.1432" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6758605d29 code=0x7ffc0000 [ 101.212043][ T29] audit: type=1326 audit(1737269216.533:5090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7091 comm="syz.4.1432" exe="/root/syz-executor" sig=0 arch=c000003e syscall=101 compat=0 ip=0x7f6758605d29 code=0x7ffc0000 [ 101.214967][ T6956] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 101.244962][ T7097] EXT4-fs (loop1): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 101.298094][ T7097] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 101.314813][ T7097] EXT4-fs (loop1): orphan cleanup on readonly fs [ 101.322098][ T7109] tipc: Enabling of bearer rejected, failed to enable media [ 101.330690][ T7097] EXT4-fs error (device loop1): ext4_free_blocks:6589: comm syz.1.1434: Freeing blocks not in datazone - block = 0, count = 4096 [ 101.355350][ T7097] EXT4-fs (loop1): 1 orphan inode deleted [ 101.366200][ T7097] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 101.457828][ T7097] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1434'. [ 101.504895][ T7097] netlink: 36 bytes leftover after parsing attributes in process `syz.1.1434'. [ 101.514002][ T7097] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1434'. [ 101.523081][ T7097] netlink: 36 bytes leftover after parsing attributes in process `syz.1.1434'. [ 101.544139][ T6956] veth0_vlan: entered promiscuous mode [ 101.566959][ T6956] veth1_vlan: entered promiscuous mode [ 101.609483][ T6956] veth0_macvtap: entered promiscuous mode [ 101.615379][ T7097] netlink: 36 bytes leftover after parsing attributes in process `syz.1.1434'. [ 101.630859][ T6956] veth1_macvtap: entered promiscuous mode [ 101.648245][ T6956] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 101.658758][ T6956] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 101.668596][ T6956] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 101.679099][ T6956] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 101.690292][ T7131] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1440'. [ 101.701318][ T3310] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 101.701679][ T6956] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 101.754429][ T7134] tipc: Enabling of bearer rejected, failed to enable media [ 101.766871][ T6956] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 101.777488][ T6956] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 101.787450][ T6956] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 101.798129][ T6956] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 101.830217][ T6956] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 101.841677][ T6956] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.850749][ T6956] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.859604][ T6956] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.868467][ T6956] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.893818][ T7142] loop4: detected capacity change from 0 to 1024 [ 101.901075][ T7142] ext4: Unknown parameter 'subj_user' [ 102.171326][ T7159] syz.5.1452[7159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.171484][ T7159] syz.5.1452[7159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.234161][ T7111] syz.2.1436 invoked oom-killer: gfp_mask=0x402dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_NOWARN|__GFP_ZERO), order=0, oom_score_adj=1000 [ 102.259308][ T7159] syz.5.1452[7159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.259763][ T7111] CPU: 0 UID: 0 PID: 7111 Comm: syz.2.1436 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 102.281921][ T7111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 102.283385][ T7167] syz.1.1455[7167] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.291987][ T7111] Call Trace: [ 102.291999][ T7111] [ 102.292009][ T7111] dump_stack_lvl+0xf2/0x150 [ 102.292058][ T7111] dump_stack+0x15/0x1a [ 102.318459][ T7111] dump_header+0x83/0x2d0 [ 102.322846][ T7111] oom_kill_process+0x341/0x4c0 [ 102.327747][ T7111] out_of_memory+0x9af/0xbe0 [ 102.332490][ T7111] ? css_next_descendant_pre+0x11c/0x140 [ 102.338236][ T7111] mem_cgroup_out_of_memory+0x13e/0x190 [ 102.343904][ T7111] try_charge_memcg+0x508/0x7f0 [ 102.344802][ T7167] syz.1.1455[7167] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.348780][ T7111] obj_cgroup_charge_pages+0xbd/0x1a0 [ 102.348817][ T7111] __memcg_kmem_charge_page+0x9d/0x170 [ 102.370980][ T7111] __alloc_pages_noprof+0x1bc/0x340 [ 102.376284][ T7111] alloc_pages_mpol_noprof+0xb8/0x260 [ 102.381684][ T7111] alloc_pages_noprof+0xe1/0x100 [ 102.386762][ T7111] __vmalloc_node_range_noprof+0x6eb/0xe80 [ 102.392710][ T7111] __kvmalloc_node_noprof+0x121/0x170 [ 102.393198][ T7171] loop4: detected capacity change from 0 to 1024 [ 102.398102][ T7111] ? ip_set_alloc+0x1f/0x30 [ 102.408996][ T7111] ip_set_alloc+0x1f/0x30 [ 102.413350][ T7111] hash_netiface_create+0x273/0x730 [ 102.418586][ T7111] ? __nla_parse+0x40/0x60 [ 102.423109][ T7111] ? __pfx_hash_netiface_create+0x10/0x10 [ 102.428948][ T7111] ip_set_create+0x359/0x8a0 [ 102.430776][ T7167] syz.1.1455[7167] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.433642][ T7111] ? strnstr+0xe1/0x100 [ 102.433759][ T7111] ? __nla_parse+0x40/0x60 [ 102.446572][ T7171] EXT4-fs: Ignoring removed orlov option [ 102.449110][ T7111] nfnetlink_rcv_msg+0x4a9/0x570 [ 102.464132][ T7111] netlink_rcv_skb+0x12c/0x230 [ 102.469044][ T7111] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 102.474565][ T7111] nfnetlink_rcv+0x16c/0x15d0 [ 102.479312][ T7111] ? kmem_cache_free+0xdc/0x2d0 [ 102.484224][ T7111] ? nlmon_xmit+0x51/0x60 [ 102.488663][ T7111] ? __kfree_skb+0x102/0x150 [ 102.493280][ T7111] ? consume_skb+0x49/0x160 [ 102.497809][ T7111] ? nlmon_xmit+0x51/0x60 [ 102.502396][ T7111] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 102.507712][ T7111] ? __dev_queue_xmit+0xb6e/0x2090 [ 102.512861][ T7111] ? ref_tracker_free+0x3a5/0x410 [ 102.517929][ T7111] ? __dev_queue_xmit+0x186/0x2090 [ 102.523087][ T7111] ? __netlink_deliver_tap+0x4c6/0x4f0 [ 102.528645][ T7111] netlink_unicast+0x599/0x670 [ 102.533515][ T7111] netlink_sendmsg+0x5cc/0x6e0 [ 102.538328][ T7111] ? __pfx_netlink_sendmsg+0x10/0x10 [ 102.538616][ T7171] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 102.543640][ T7111] __sock_sendmsg+0x140/0x180 [ 102.543686][ T7111] ____sys_sendmsg+0x312/0x410 [ 102.565555][ T7111] __sys_sendmsg+0x19d/0x230 [ 102.570238][ T7111] __x64_sys_sendmsg+0x46/0x50 [ 102.575116][ T7111] x64_sys_call+0x2734/0x2dc0 [ 102.579827][ T7111] do_syscall_64+0xc9/0x1c0 [ 102.584380][ T7111] ? clear_bhb_loop+0x55/0xb0 [ 102.589101][ T7111] ? clear_bhb_loop+0x55/0xb0 [ 102.593805][ T7111] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 102.599731][ T7111] RIP: 0033:0x7f51f49e5d29 [ 102.604247][ T7111] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 102.623893][ T7111] RSP: 002b:00007f51f3057038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 102.632418][ T7111] RAX: ffffffffffffffda RBX: 00007f51f4bd5fa0 RCX: 00007f51f49e5d29 [ 102.640444][ T7111] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000009 [ 102.648451][ T7111] RBP: 00007f51f4a61b08 R08: 0000000000000000 R09: 0000000000000000 [ 102.656517][ T7111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 102.664520][ T7111] R13: 0000000000000000 R14: 00007f51f4bd5fa0 R15: 00007ffdf12a7418 [ 102.672530][ T7111] [ 102.675662][ T7111] memory: usage 307200kB, limit 307200kB, failcnt 924 [ 102.682476][ T7111] memory+swap: usage 307928kB, limit 9007199254740988kB, failcnt 0 [ 102.690439][ T7111] kmem: usage 307200kB, limit 9007199254740988kB, failcnt 0 [ 102.697844][ T7111] Memory cgroup stats for /syz2: [ 102.698589][ T7178] EXT4-fs (loop4): shut down requested (0) [ 102.704935][ T7111] cache 0 [ 102.712674][ T7111] rss 0 [ 102.715467][ T7111] shmem 0 [ 102.718648][ T7111] mapped_file 0 [ 102.722124][ T7111] dirty 0 [ 102.725111][ T7111] writeback 0 [ 102.728471][ T7111] workingset_refault_anon 451 [ 102.733159][ T7111] workingset_refault_file 1215 [ 102.737956][ T7111] swap 745472 [ 102.741258][ T7111] swapcached 0 [ 102.744675][ T7111] pgpgin 54312 [ 102.748134][ T7111] pgpgout 54312 [ 102.751650][ T7111] pgfault 99868 [ 102.755175][ T7111] pgmajfault 290 [ 102.758817][ T7111] inactive_anon 0 [ 102.762466][ T7111] active_anon 0 [ 102.766021][ T7111] inactive_file 0 [ 102.769669][ T7111] active_file 0 [ 102.773161][ T7111] unevictable 0 [ 102.776695][ T7111] hierarchical_memory_limit 314572800 [ 102.782158][ T7111] hierarchical_memsw_limit 9223372036854771712 [ 102.788673][ T7111] total_cache 0 [ 102.792229][ T7111] total_rss 0 [ 102.795542][ T7111] total_shmem 0 [ 102.799027][ T7111] total_mapped_file 0 [ 102.803007][ T7111] total_dirty 0 [ 102.806508][ T7111] total_writeback 0 [ 102.810325][ T7111] total_workingset_refault_anon 451 [ 102.815564][ T7111] total_workingset_refault_file 1215 [ 102.821014][ T7111] total_swap 745472 [ 102.824853][ T7111] total_swapcached 0 [ 102.828788][ T7111] total_pgpgin 54312 [ 102.832723][ T7111] total_pgpgout 54312 [ 102.836727][ T7111] total_pgfault 99868 [ 102.840773][ T7111] total_pgmajfault 290 [ 102.844847][ T7111] total_inactive_anon 0 [ 102.849039][ T7111] total_active_anon 0 [ 102.853170][ T7111] total_inactive_file 0 [ 102.857455][ T7111] total_active_file 0 [ 102.861504][ T7111] total_unevictable 0 [ 102.865521][ T7111] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.1436,pid=7110,uid=0 [ 102.880225][ T7111] Memory cgroup out of memory: Killed process 7110 (syz.2.1436) total-vm:93384kB, anon-rss:788kB, file-rss:22216kB, shmem-rss:0kB, UID:0 pgtables:120kB oom_score_adj:1000 [ 102.957118][ T7187] netlink: 'syz.0.1459': attribute type 2 has an invalid length. [ 102.964984][ T7187] __nla_validate_parse: 1 callbacks suppressed [ 102.964999][ T7187] netlink: 212852 bytes leftover after parsing attributes in process `syz.0.1459'. [ 102.994482][ T3300] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 103.192870][ T7195] FAULT_INJECTION: forcing a failure. [ 103.192870][ T7195] name failslab, interval 1, probability 0, space 0, times 0 [ 103.205861][ T7195] CPU: 0 UID: 0 PID: 7195 Comm: syz.2.1463 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 103.216579][ T7195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 103.226701][ T7195] Call Trace: [ 103.230177][ T7195] [ 103.233139][ T7195] dump_stack_lvl+0xf2/0x150 [ 103.237808][ T7195] dump_stack+0x15/0x1a [ 103.242053][ T7195] should_fail_ex+0x223/0x230 [ 103.246763][ T7195] should_failslab+0x8f/0xb0 [ 103.251382][ T7195] kmem_cache_alloc_noprof+0x52/0x320 [ 103.256830][ T7195] ? vm_area_alloc+0x2c/0x130 [ 103.261652][ T7195] vm_area_alloc+0x2c/0x130 [ 103.262217][ T7197] loop4: detected capacity change from 0 to 512 [ 103.266178][ T7195] __mmap_region+0x6b5/0x1400 [ 103.277192][ T7195] mmap_region+0x164/0x1e0 [ 103.281781][ T7195] do_mmap+0x732/0xbb0 [ 103.285888][ T7195] vm_mmap_pgoff+0x133/0x290 [ 103.290549][ T7195] ksys_mmap_pgoff+0x286/0x330 [ 103.295428][ T7195] x64_sys_call+0x1940/0x2dc0 [ 103.300246][ T7195] do_syscall_64+0xc9/0x1c0 [ 103.304769][ T7195] ? clear_bhb_loop+0x55/0xb0 [ 103.309474][ T7195] ? clear_bhb_loop+0x55/0xb0 [ 103.314192][ T7195] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 103.320116][ T7195] RIP: 0033:0x7f51f49e5d29 [ 103.324546][ T7195] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 103.344228][ T7195] RSP: 002b:00007f51f3057038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 103.352674][ T7195] RAX: ffffffffffffffda RBX: 00007f51f4bd5fa0 RCX: 00007f51f49e5d29 [ 103.360667][ T7195] RDX: 0000000001000002 RSI: 0000000000400000 RDI: 0000000020000000 [ 103.368725][ T7195] RBP: 00007f51f3057090 R08: 0000000000000003 R09: 0000000000000000 [ 103.376726][ T7195] R10: 0000000000011012 R11: 0000000000000246 R12: 0000000000000001 [ 103.385130][ T7195] R13: 0000000000000000 R14: 00007f51f4bd5fa0 R15: 00007ffdf12a7418 [ 103.393145][ T7195] [ 106.391917][ T7232] tipc: Started in network mode [ 106.396875][ T7232] tipc: Node identity aaaaaaaaaa1a, cluster identity 4711 [ 106.404020][ T7232] tipc: Enabled bearer , priority 0 [ 106.433294][ T7241] tipc: Enabling of bearer rejected, failed to enable media [ 106.452765][ T7243] tipc: Enabling of bearer rejected, failed to enable media [ 106.516641][ T29] kauditd_printk_skb: 299 callbacks suppressed [ 106.516660][ T29] audit: type=1400 audit(1737269221.903:5390): avc: denied { write } for pid=7250 comm="syz.0.1487" name="loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 106.562626][ T7255] netlink: 'syz.4.1488': attribute type 10 has an invalid length. [ 106.571466][ T29] audit: type=1400 audit(1737269221.973:5391): avc: denied { setopt } for pid=7250 comm="syz.0.1487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 106.642337][ T7268] loop1: detected capacity change from 0 to 512 [ 106.659665][ T7268] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 106.670101][ T7268] EXT4-fs (loop1): orphan cleanup on readonly fs [ 106.690060][ T7268] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm syz.1.1494: bg 0: block 248: padding at end of block bitmap is not set [ 106.706498][ T7276] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 106.713484][ T7268] Quota error (device loop1): write_blk: dquota write failed [ 106.722600][ T7268] Quota error (device loop1): qtree_write_dquot: Error -117 occurred while creating quota [ 106.732620][ T7268] EXT4-fs error (device loop1): ext4_acquire_dquot:6938: comm syz.1.1494: Failed to acquire dquot type 1 [ 106.735137][ T7275] bond_slave_1: entered promiscuous mode [ 106.744197][ T7276] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 106.749564][ T7275] bond_slave_1: entered allmulticast mode [ 106.769862][ T7268] EXT4-fs (loop1): 1 truncate cleaned up [ 106.787037][ T7268] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 106.804869][ T7273] tipc: Enabling of bearer rejected, failed to enable media [ 106.849311][ T3310] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 107.009193][ T7291] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1504'. [ 107.034556][ T29] audit: type=1326 audit(1737269222.443:5392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7286 comm="syz.1.1502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0f93e05d29 code=0x7ffc0000 [ 107.058519][ T29] audit: type=1326 audit(1737269222.443:5393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7286 comm="syz.1.1502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0f93e05d29 code=0x7ffc0000 [ 107.082170][ T29] audit: type=1326 audit(1737269222.443:5394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7286 comm="syz.1.1502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0f93e05d29 code=0x7ffc0000 [ 107.105950][ T29] audit: type=1326 audit(1737269222.443:5395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7286 comm="syz.1.1502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0f93e05d29 code=0x7ffc0000 [ 107.152616][ T29] audit: type=1400 audit(1737269222.523:5396): avc: denied { connect } for pid=7288 comm="syz.5.1503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 107.164771][ T7296] syz.5.1506[7296] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.172355][ T29] audit: type=1326 audit(1737269222.543:5397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7286 comm="syz.1.1502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0f93e05d29 code=0x7ffc0000 [ 107.172561][ T7296] syz.5.1506[7296] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.211723][ T7296] syz.5.1506[7296] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.228244][ T7297] loop1: detected capacity change from 0 to 512 [ 107.248116][ T7300] syz.5.1506[7300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.248215][ T7300] syz.5.1506[7300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.260208][ T7297] ext4: Unknown parameter 'obj_role' [ 107.264648][ T7300] syz.5.1506[7300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.286584][ T7296] Illegal XDP return value 4186206020 on prog (id 1028) dev N/A, expect packet loss! [ 107.309200][ T7296] syz.5.1506[7296] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.309354][ T7296] syz.5.1506[7296] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.321460][ T7296] syz.5.1506[7296] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.363752][ T7304] loop5: detected capacity change from 0 to 512 [ 107.383137][ T7304] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended [ 107.398145][ T7304] EXT4-fs error (device loop5): ext4_orphan_get:1389: inode #15: comm syz.5.1509: iget: bad extended attribute block 19 [ 107.411356][ T7304] EXT4-fs error (device loop5): ext4_orphan_get:1394: comm syz.5.1509: couldn't read orphan inode 15 (err -117) [ 107.426069][ T7304] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 107.444187][ T7309] loop2: detected capacity change from 0 to 1024 [ 107.445363][ T7304] EXT4-fs error (device loop5): ext4_validate_block_bitmap:441: comm syz.5.1509: bg 0: block 65: padding at end of block bitmap is not set [ 107.451089][ T7309] ext4: Unknown parameter 'subj_user' [ 107.466040][ T7304] EXT4-fs error (device loop5): ext4_acquire_dquot:6938: comm syz.5.1509: Failed to acquire dquot type 0 [ 107.497883][ T6956] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 107.520802][ T7314] netlink: 8 bytes leftover after parsing attributes in process `syz.5.1511'. [ 107.525546][ T3374] tipc: Node number set to 11578026 [ 107.595837][ T7322] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1516'. [ 107.648920][ T7330] netlink: 'syz.2.1519': attribute type 10 has an invalid length. [ 107.701623][ T7333] tipc: Enabling of bearer rejected, already enabled [ 107.876116][ T7346] netlink: 'syz.4.1526': attribute type 10 has an invalid length. [ 107.883920][ T7344] loop5: detected capacity change from 0 to 1024 [ 107.884403][ T7344] EXT4-fs: Ignoring removed orlov option [ 107.912375][ T7352] netlink: 36 bytes leftover after parsing attributes in process `syz.0.1528'. [ 107.935773][ T7344] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 107.982444][ T7361] loop1: detected capacity change from 0 to 1024 [ 107.990939][ T7361] ext4: Unknown parameter 'subj_user' [ 108.053003][ T7365] EXT4-fs (loop5): shut down requested (0) [ 108.084787][ T7355] bridge0: port 3(syz_tun) entered blocking state [ 108.091374][ T7355] bridge0: port 3(syz_tun) entered disabled state [ 108.121712][ T6956] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 108.134275][ T7355] syz_tun: entered allmulticast mode [ 108.161938][ T7355] syz_tun: entered promiscuous mode [ 108.170776][ T7371] loop1: detected capacity change from 0 to 1024 [ 108.179468][ T7376] syz.5.1535[7376] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.186438][ T7371] EXT4-fs: Ignoring removed nobh option [ 108.198346][ T7370] loop4: detected capacity change from 0 to 512 [ 108.205265][ T7355] bridge0: port 3(syz_tun) entered blocking state [ 108.216214][ T7355] bridge0: port 3(syz_tun) entered forwarding state [ 108.227624][ T7371] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 108.240218][ T7371] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 108.254675][ T7370] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -13 [ 108.267810][ T7370] EXT4-fs error (device loop4): ext4_free_branches:1023: inode #13: comm syz.4.1533: invalid indirect mapped block 2683928664 (level 1) [ 108.296895][ T3310] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 108.314848][ T7370] EXT4-fs (loop4): 1 truncate cleaned up [ 108.330759][ T7370] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 108.441105][ T3300] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 108.486948][ T7386] loop1: detected capacity change from 0 to 164 [ 108.746575][ T7395] loop4: detected capacity change from 0 to 512 [ 108.768210][ T7395] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 108.788234][ T7395] EXT4-fs (loop4): orphan cleanup on readonly fs [ 108.816593][ T7395] EXT4-fs error (device loop4): ext4_validate_block_bitmap:441: comm syz.4.1541: bg 0: block 248: padding at end of block bitmap is not set [ 108.849637][ T7395] EXT4-fs error (device loop4): ext4_acquire_dquot:6938: comm syz.4.1541: Failed to acquire dquot type 1 [ 108.882118][ T7395] EXT4-fs (loop4): 1 truncate cleaned up [ 108.916296][ T7395] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 108.998900][ T3300] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 109.244184][ T7402] loop2: detected capacity change from 0 to 1024 [ 109.258761][ T7402] ext4: Unknown parameter 'subj_user' [ 109.336311][ T7409] loop1: detected capacity change from 0 to 512 [ 109.365639][ T7409] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 109.389997][ T7409] EXT4-fs (loop1): 1 truncate cleaned up [ 109.432426][ T7409] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 109.501430][ T7409] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 110.369432][ T7490] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 110.748302][ T7520] lo speed is unknown, defaulting to 1000 [ 110.824738][ T7521] lo speed is unknown, defaulting to 1000 [ 111.535678][ T29] kauditd_printk_skb: 548 callbacks suppressed [ 111.535694][ T29] audit: type=1400 audit(1737269226.943:5942): avc: denied { prog_load } for pid=7564 comm="syz.4.1613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 111.561191][ T29] audit: type=1400 audit(1737269226.943:5943): avc: denied { prog_load } for pid=7563 comm="syz.1.1612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 111.580249][ T29] audit: type=1400 audit(1737269226.943:5944): avc: denied { map_create } for pid=7563 comm="syz.1.1612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 111.639591][ T29] audit: type=1400 audit(1737269226.953:5945): avc: denied { create } for pid=7566 comm="syz.0.1614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 111.660247][ T29] audit: type=1400 audit(1737269226.953:5946): avc: denied { create } for pid=7566 comm="syz.0.1614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 111.680826][ T29] audit: type=1400 audit(1737269226.973:5947): avc: denied { read write } for pid=3301 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 111.705215][ T29] audit: type=1400 audit(1737269227.023:5948): avc: denied { read write } for pid=7564 comm="syz.4.1613" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 111.729541][ T29] audit: type=1400 audit(1737269227.023:5949): avc: denied { prog_load } for pid=7564 comm="syz.4.1613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 111.748643][ T29] audit: type=1400 audit(1737269227.023:5950): avc: denied { map_create } for pid=7569 comm="syz.2.1615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 111.767862][ T29] audit: type=1400 audit(1737269227.023:5951): avc: denied { prog_load } for pid=7569 comm="syz.2.1615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 112.170225][ T7604] FAULT_INJECTION: forcing a failure. [ 112.170225][ T7604] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 112.183715][ T7604] CPU: 1 UID: 0 PID: 7604 Comm: syz.4.1631 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 112.194425][ T7604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 112.204506][ T7604] Call Trace: [ 112.207802][ T7604] [ 112.210757][ T7604] dump_stack_lvl+0xf2/0x150 [ 112.215621][ T7604] dump_stack+0x15/0x1a [ 112.219806][ T7604] should_fail_ex+0x223/0x230 [ 112.224581][ T7604] should_fail_alloc_page+0xfd/0x110 [ 112.229935][ T7604] __alloc_pages_noprof+0x109/0x340 [ 112.235161][ T7604] alloc_pages_mpol_noprof+0xb8/0x260 [ 112.240564][ T7604] alloc_pages_noprof+0xe1/0x100 [ 112.245541][ T7604] pte_alloc_one+0x31/0x110 [ 112.250172][ T7604] __pte_alloc+0x33/0x2a0 [ 112.254546][ T7604] handle_mm_fault+0x1b4a/0x2ac0 [ 112.259539][ T7604] exc_page_fault+0x3b9/0x650 [ 112.264278][ T7604] asm_exc_page_fault+0x26/0x30 [ 112.269227][ T7604] RIP: 0033:0x7f67584c8c46 [ 112.273676][ T7604] Code: f0 72 6e 48 63 cd 48 01 c1 49 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 <47> 0f b6 0c 08 45 84 c9 74 08 45 88 0c 00 49 8b 47 10 48 83 c0 01 [ 112.293400][ T7604] RSP: 002b:00007f6756c764a0 EFLAGS: 00010246 [ 112.299506][ T7604] RAX: 0000000000000001 RBX: 00007f6756c76540 RCX: 0000000000000101 [ 112.307492][ T7604] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00007f6756c765e0 [ 112.315487][ T7604] RBP: 0000000000000102 R08: 00007f674e857000 R09: 0000000000000000 [ 112.323479][ T7604] R10: 0000000000000000 R11: 00007f6756c76550 R12: 0000000000000001 [ 112.331609][ T7604] R13: 00007f6758699040 R14: 0000000000000000 R15: 00007f6756c765e0 [ 112.339614][ T7604] [ 112.342912][ T7604] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 114.105382][ T7713] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 114.606895][ T7750] FAULT_INJECTION: forcing a failure. [ 114.606895][ T7750] name failslab, interval 1, probability 0, space 0, times 0 [ 114.619570][ T7750] CPU: 0 UID: 0 PID: 7750 Comm: syz.4.1696 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 114.630399][ T7750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 114.640462][ T7750] Call Trace: [ 114.643742][ T7750] [ 114.646834][ T7750] dump_stack_lvl+0xf2/0x150 [ 114.651543][ T7750] dump_stack+0x15/0x1a [ 114.655766][ T7750] should_fail_ex+0x223/0x230 [ 114.660555][ T7750] should_failslab+0x8f/0xb0 [ 114.665239][ T7750] kmem_cache_alloc_node_noprof+0x59/0x320 [ 114.671078][ T7750] ? __alloc_skb+0x10b/0x310 [ 114.675684][ T7750] __alloc_skb+0x10b/0x310 [ 114.680113][ T7750] netlink_alloc_large_skb+0xad/0xe0 [ 114.685498][ T7750] netlink_sendmsg+0x3b4/0x6e0 [ 114.690378][ T7750] ? __pfx_netlink_sendmsg+0x10/0x10 [ 114.695730][ T7750] __sock_sendmsg+0x140/0x180 [ 114.700451][ T7750] ____sys_sendmsg+0x312/0x410 [ 114.705275][ T7750] __sys_sendmsg+0x19d/0x230 [ 114.709911][ T7750] __x64_sys_sendmsg+0x46/0x50 [ 114.714702][ T7750] x64_sys_call+0x2734/0x2dc0 [ 114.719406][ T7750] do_syscall_64+0xc9/0x1c0 [ 114.723933][ T7750] ? clear_bhb_loop+0x55/0xb0 [ 114.728723][ T7750] ? clear_bhb_loop+0x55/0xb0 [ 114.733472][ T7750] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 114.739385][ T7750] RIP: 0033:0x7f6758605d29 [ 114.743818][ T7750] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 114.763524][ T7750] RSP: 002b:00007f6756c77038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 114.772052][ T7750] RAX: ffffffffffffffda RBX: 00007f67587f5fa0 RCX: 00007f6758605d29 [ 114.780051][ T7750] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 114.788043][ T7750] RBP: 00007f6756c77090 R08: 0000000000000000 R09: 0000000000000000 [ 114.796031][ T7750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 114.804044][ T7750] R13: 0000000000000000 R14: 00007f67587f5fa0 R15: 00007ffdb1caac38 [ 114.812036][ T7750] [ 114.826309][ T7753] FAULT_INJECTION: forcing a failure. [ 114.826309][ T7753] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 114.834605][ T7762] FAULT_INJECTION: forcing a failure. [ 114.834605][ T7762] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 114.839442][ T7753] CPU: 0 UID: 0 PID: 7753 Comm: syz.5.1698 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 114.863169][ T7753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 114.873281][ T7753] Call Trace: [ 114.876607][ T7753] [ 114.879542][ T7753] dump_stack_lvl+0xf2/0x150 [ 114.884171][ T7753] dump_stack+0x15/0x1a [ 114.888345][ T7753] should_fail_ex+0x223/0x230 [ 114.893036][ T7753] should_fail+0xb/0x10 [ 114.897208][ T7753] should_fail_usercopy+0x1a/0x20 [ 114.902337][ T7753] _copy_from_user+0x1e/0xb0 [ 114.907121][ T7753] kstrtouint_from_user+0x76/0xe0 [ 114.912167][ T7753] ? 0xffffffff81000000 [ 114.916323][ T7753] ? selinux_file_permission+0x22a/0x360 [ 114.922041][ T7753] proc_fail_nth_write+0x4f/0x150 [ 114.927083][ T7753] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 114.932774][ T7753] vfs_write+0x281/0x920 [ 114.937448][ T7753] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 114.943044][ T7753] ? __fget_files+0x17c/0x1c0 [ 114.947826][ T7753] ksys_write+0xe8/0x1b0 [ 114.952097][ T7753] __x64_sys_write+0x42/0x50 [ 114.956788][ T7753] x64_sys_call+0x287e/0x2dc0 [ 114.961504][ T7753] do_syscall_64+0xc9/0x1c0 [ 114.966016][ T7753] ? clear_bhb_loop+0x55/0xb0 [ 114.970725][ T7753] ? clear_bhb_loop+0x55/0xb0 [ 114.975521][ T7753] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 114.981429][ T7753] RIP: 0033:0x7f316ce747df [ 114.985943][ T7753] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 115.005610][ T7753] RSP: 002b:00007f316b4e7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 115.014143][ T7753] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f316ce747df [ 115.022146][ T7753] RDX: 0000000000000001 RSI: 00007f316b4e70a0 RDI: 0000000000000004 [ 115.030138][ T7753] RBP: 00007f316b4e7090 R08: 0000000000000000 R09: 0000000000000000 [ 115.038116][ T7753] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 115.046091][ T7753] R13: 0000000000000000 R14: 00007f316d065fa0 R15: 00007ffecc0c1ae8 [ 115.054075][ T7753] [ 115.057099][ T7762] CPU: 1 UID: 0 PID: 7762 Comm: syz.1.1701 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 115.067853][ T7762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 115.077931][ T7762] Call Trace: [ 115.081252][ T7762] [ 115.084236][ T7762] dump_stack_lvl+0xf2/0x150 [ 115.088879][ T7762] dump_stack+0x15/0x1a [ 115.093162][ T7762] should_fail_ex+0x223/0x230 [ 115.097908][ T7762] should_fail+0xb/0x10 [ 115.102121][ T7762] should_fail_usercopy+0x1a/0x20 [ 115.107314][ T7762] _copy_from_user+0x1e/0xb0 [ 115.112020][ T7762] copy_msghdr_from_user+0x54/0x2a0 [ 115.117473][ T7762] ? __fget_files+0x17c/0x1c0 [ 115.122201][ T7762] __sys_sendmsg+0x13e/0x230 [ 115.126835][ T7762] __x64_sys_sendmsg+0x46/0x50 [ 115.131670][ T7762] x64_sys_call+0x2734/0x2dc0 [ 115.136450][ T7762] do_syscall_64+0xc9/0x1c0 [ 115.141058][ T7762] ? clear_bhb_loop+0x55/0xb0 [ 115.145881][ T7762] ? clear_bhb_loop+0x55/0xb0 [ 115.150651][ T7762] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.156574][ T7762] RIP: 0033:0x7f0f93e05d29 [ 115.161119][ T7762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 115.180768][ T7762] RSP: 002b:00007f0f92471038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 115.189403][ T7762] RAX: ffffffffffffffda RBX: 00007f0f93ff5fa0 RCX: 00007f0f93e05d29 [ 115.197392][ T7762] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000003 [ 115.205377][ T7762] RBP: 00007f0f92471090 R08: 0000000000000000 R09: 0000000000000000 [ 115.213664][ T7762] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.221648][ T7762] R13: 0000000000000000 R14: 00007f0f93ff5fa0 R15: 00007ffc4917d4a8 [ 115.229649][ T7762] [ 116.619984][ T29] kauditd_printk_skb: 971 callbacks suppressed [ 116.620001][ T29] audit: type=1400 audit(1737269232.033:6923): avc: denied { map_create } for pid=7863 comm="syz.0.1746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 116.676200][ T29] audit: type=1400 audit(1737269232.073:6924): avc: denied { prog_load } for pid=7863 comm="syz.0.1746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 116.695373][ T29] audit: type=1400 audit(1737269232.073:6925): avc: denied { prog_load } for pid=7863 comm="syz.0.1746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 116.759144][ T29] audit: type=1400 audit(1737269232.163:6926): avc: denied { create } for pid=7865 comm="syz.0.1747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=0 [ 116.778771][ T29] audit: type=1400 audit(1737269232.163:6927): avc: denied { create } for pid=7865 comm="syz.0.1747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=0 [ 116.798343][ T29] audit: type=1400 audit(1737269232.163:6928): avc: denied { create } for pid=7865 comm="syz.0.1747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 116.817832][ T29] audit: type=1400 audit(1737269232.163:6929): avc: denied { prog_load } for pid=7865 comm="syz.0.1747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 116.836923][ T29] audit: type=1400 audit(1737269232.163:6930): avc: denied { map_create } for pid=7865 comm="syz.0.1747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 116.856135][ T29] audit: type=1400 audit(1737269232.163:6931): avc: denied { prog_load } for pid=7865 comm="syz.0.1747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 116.875231][ T29] audit: type=1400 audit(1737269232.163:6932): avc: denied { prog_load } for pid=7865 comm="syz.0.1747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 117.321704][ T7885] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 117.689246][ T7901] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65308 sclass=netlink_audit_socket pid=7901 comm=+}[@ [ 118.593914][ T7954] FAULT_INJECTION: forcing a failure. [ 118.593914][ T7954] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 118.607089][ T7954] CPU: 1 UID: 0 PID: 7954 Comm: syz.0.1785 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 118.617783][ T7954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 118.627933][ T7954] Call Trace: [ 118.631292][ T7954] [ 118.634295][ T7954] dump_stack_lvl+0xf2/0x150 [ 118.639040][ T7954] dump_stack+0x15/0x1a [ 118.643296][ T7954] should_fail_ex+0x223/0x230 [ 118.648040][ T7954] should_fail+0xb/0x10 [ 118.652244][ T7954] should_fail_usercopy+0x1a/0x20 [ 118.657309][ T7954] _copy_from_user+0x1e/0xb0 [ 118.661996][ T7954] vmemdup_user+0x12e/0x1b0 [ 118.666540][ T7954] path_setxattrat+0x1c9/0x310 [ 118.671415][ T7954] __x64_sys_setxattr+0x6e/0x90 [ 118.676359][ T7954] x64_sys_call+0x2247/0x2dc0 [ 118.681078][ T7954] do_syscall_64+0xc9/0x1c0 [ 118.685603][ T7954] ? clear_bhb_loop+0x55/0xb0 [ 118.690438][ T7954] ? clear_bhb_loop+0x55/0xb0 [ 118.695138][ T7954] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 118.701053][ T7954] RIP: 0033:0x7fafddb15d29 [ 118.705511][ T7954] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 118.725191][ T7954] RSP: 002b:00007fafdc187038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 118.733756][ T7954] RAX: ffffffffffffffda RBX: 00007fafddd05fa0 RCX: 00007fafddb15d29 [ 118.741756][ T7954] RDX: 0000000020000200 RSI: 00000000200001c0 RDI: 0000000020000000 [ 118.749745][ T7954] RBP: 00007fafdc187090 R08: 0000000000000000 R09: 0000000000000000 [ 118.757763][ T7954] R10: 0000000000000841 R11: 0000000000000246 R12: 0000000000000001 [ 118.765745][ T7954] R13: 0000000000000000 R14: 00007fafddd05fa0 R15: 00007fff43bbfe18 [ 118.773752][ T7954] [ 118.883317][ T7964] can0: slcan on ptm0. [ 118.908186][ T7968] xt_TPROXY: Can be used only with -p tcp or -p udp [ 118.935789][ T7963] can0 (unregistered): slcan off ptm0. [ 120.387438][ T8110] futex_wake_op: syz.4.1858 tries to shift op by -1; fix this program [ 121.213284][ T8205] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 121.309568][ T8208] lo speed is unknown, defaulting to 1000 [ 121.638995][ T29] kauditd_printk_skb: 1410 callbacks suppressed [ 121.639008][ T29] audit: type=1326 audit(1737269237.053:8341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8250 comm="syz.5.1920" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f316ce75d29 code=0x7ffc0000 [ 121.695185][ T29] audit: type=1400 audit(1737269237.073:8342): avc: denied { read write } for pid=3300 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 121.719523][ T29] audit: type=1326 audit(1737269237.083:8343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8250 comm="syz.5.1920" exe="/root/syz-executor" sig=0 arch=c000003e syscall=114 compat=0 ip=0x7f316ce75d29 code=0x7ffc0000 [ 121.742974][ T29] audit: type=1326 audit(1737269237.083:8344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8250 comm="syz.5.1920" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f316ce75d29 code=0x7ffc0000 [ 121.766746][ T29] audit: type=1326 audit(1737269237.083:8345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8250 comm="syz.5.1920" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f316ce75d29 code=0x7ffc0000 [ 121.790605][ T29] audit: type=1326 audit(1737269237.083:8346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8250 comm="syz.5.1920" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f316ce75d29 code=0x7ffc0000 [ 121.814132][ T29] audit: type=1326 audit(1737269237.083:8347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8250 comm="syz.5.1920" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f316ce75d29 code=0x7ffc0000 [ 121.837993][ T29] audit: type=1326 audit(1737269237.083:8348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8250 comm="syz.5.1920" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f316ce75d29 code=0x7ffc0000 [ 121.861461][ T29] audit: type=1400 audit(1737269237.083:8349): avc: denied { create } for pid=8250 comm="syz.5.1920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 121.881291][ T29] audit: type=1326 audit(1737269237.083:8350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8250 comm="syz.5.1920" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f316ce75d29 code=0x7ffc0000 [ 122.463387][ T8327] lo speed is unknown, defaulting to 1000 [ 122.481902][ T8337] FAULT_INJECTION: forcing a failure. [ 122.481902][ T8337] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 122.495063][ T8337] CPU: 0 UID: 0 PID: 8337 Comm: syz.0.1957 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 122.505837][ T8337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 122.515912][ T8337] Call Trace: [ 122.519204][ T8337] [ 122.522150][ T8337] dump_stack_lvl+0xf2/0x150 [ 122.526821][ T8337] dump_stack+0x15/0x1a [ 122.531051][ T8337] should_fail_ex+0x223/0x230 [ 122.535773][ T8337] should_fail+0xb/0x10 [ 122.539961][ T8337] should_fail_usercopy+0x1a/0x20 [ 122.545047][ T8337] _copy_from_user+0x1e/0xb0 [ 122.549676][ T8337] kstrtouint_from_user+0x76/0xe0 [ 122.554763][ T8337] ? 0xffffffff81000000 [ 122.558925][ T8337] ? selinux_file_permission+0x22a/0x360 [ 122.564619][ T8337] proc_fail_nth_write+0x4f/0x150 [ 122.569812][ T8337] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 122.575501][ T8337] vfs_write+0x281/0x920 [ 122.579828][ T8337] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 122.585419][ T8337] ? __fget_files+0x17c/0x1c0 [ 122.590162][ T8337] ksys_write+0xe8/0x1b0 [ 122.594520][ T8337] __x64_sys_write+0x42/0x50 [ 122.599182][ T8337] x64_sys_call+0x287e/0x2dc0 [ 122.603882][ T8337] do_syscall_64+0xc9/0x1c0 [ 122.608434][ T8337] ? clear_bhb_loop+0x55/0xb0 [ 122.613188][ T8337] ? clear_bhb_loop+0x55/0xb0 [ 122.617923][ T8337] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 122.623830][ T8337] RIP: 0033:0x7fafddb147df [ 122.628261][ T8337] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 122.647899][ T8337] RSP: 002b:00007fafdc187030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 122.655190][ T8333] capability: warning: `syz.4.1958' uses 32-bit capabilities (legacy support in use) [ 122.656323][ T8337] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fafddb147df [ 122.673817][ T8337] RDX: 0000000000000001 RSI: 00007fafdc1870a0 RDI: 0000000000000003 [ 122.681825][ T8337] RBP: 00007fafdc187090 R08: 0000000000000000 R09: 0000000000000000 [ 122.689854][ T8337] R10: 0000000020000300 R11: 0000000000000293 R12: 0000000000000001 [ 122.697844][ T8337] R13: 0000000000000000 R14: 00007fafddd05fa0 R15: 00007fff43bbfe18 [ 122.705928][ T8337] [ 124.526644][ T8499] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 124.941560][ T8548] FAULT_INJECTION: forcing a failure. [ 124.941560][ T8548] name failslab, interval 1, probability 0, space 0, times 0 [ 124.954277][ T8548] CPU: 1 UID: 0 PID: 8548 Comm: syz.5.2050 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 124.965007][ T8548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 124.975193][ T8548] Call Trace: [ 124.978550][ T8548] [ 124.981490][ T8548] dump_stack_lvl+0xf2/0x150 [ 124.986156][ T8548] dump_stack+0x15/0x1a [ 124.990482][ T8548] should_fail_ex+0x223/0x230 [ 124.995175][ T8548] should_failslab+0x8f/0xb0 [ 124.999811][ T8548] kmem_cache_alloc_node_noprof+0x59/0x320 [ 125.005778][ T8548] ? __alloc_skb+0x10b/0x310 [ 125.010394][ T8548] __alloc_skb+0x10b/0x310 [ 125.014852][ T8548] ? audit_log_start+0x34c/0x6b0 [ 125.019849][ T8548] audit_log_start+0x368/0x6b0 [ 125.024648][ T8548] audit_seccomp+0x4b/0x130 [ 125.029189][ T8548] __seccomp_filter+0x6fa/0x1180 [ 125.034174][ T8548] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 125.039834][ T8548] ? vfs_write+0x596/0x920 [ 125.044301][ T8548] ? __schedule+0x6fa/0x930 [ 125.048860][ T8548] __secure_computing+0x9f/0x1c0 [ 125.053833][ T8548] syscall_trace_enter+0xd1/0x1f0 [ 125.058941][ T8548] do_syscall_64+0xaa/0x1c0 [ 125.063587][ T8548] ? clear_bhb_loop+0x55/0xb0 [ 125.068387][ T8548] ? clear_bhb_loop+0x55/0xb0 [ 125.073077][ T8548] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 125.078987][ T8548] RIP: 0033:0x7f316ce75d29 [ 125.083473][ T8548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 125.103142][ T8548] RSP: 002b:00007f316b4e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 125.111581][ T8548] RAX: ffffffffffffffda RBX: 00007f316d065fa0 RCX: 00007f316ce75d29 [ 125.119573][ T8548] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 125.127596][ T8548] RBP: 00007f316b4e7090 R08: 0000000000000000 R09: 0000000000000000 [ 125.135646][ T8548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 125.143635][ T8548] R13: 0000000000000000 R14: 00007f316d065fa0 R15: 00007ffecc0c1ae8 [ 125.151684][ T8548] [ 126.051216][ T8603] FAULT_INJECTION: forcing a failure. [ 126.051216][ T8603] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 126.064654][ T8603] CPU: 1 UID: 0 PID: 8603 Comm: syz.1.2075 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 126.075368][ T8603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 126.085551][ T8603] Call Trace: [ 126.088845][ T8603] [ 126.091875][ T8603] dump_stack_lvl+0xf2/0x150 [ 126.096584][ T8603] dump_stack+0x15/0x1a [ 126.100781][ T8603] should_fail_ex+0x223/0x230 [ 126.105483][ T8603] should_fail+0xb/0x10 [ 126.109720][ T8603] should_fail_usercopy+0x1a/0x20 [ 126.114872][ T8603] _copy_from_user+0x1e/0xb0 [ 126.119518][ T8603] do_ip6t_set_ctl+0x42c/0x8c0 [ 126.124308][ T8603] ? kstrtouint+0x77/0xc0 [ 126.128668][ T8603] ? __rcu_read_unlock+0x4e/0x70 [ 126.133745][ T8603] nf_setsockopt+0x195/0x1b0 [ 126.138372][ T8603] ipv6_setsockopt+0x10f/0x130 [ 126.143226][ T8603] udpv6_setsockopt+0x95/0xb0 [ 126.147935][ T8603] sock_common_setsockopt+0x64/0x80 [ 126.153201][ T8603] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 126.159212][ T8603] __sys_setsockopt+0x187/0x200 [ 126.164167][ T8603] __x64_sys_setsockopt+0x66/0x80 [ 126.169289][ T8603] x64_sys_call+0x282e/0x2dc0 [ 126.174086][ T8603] do_syscall_64+0xc9/0x1c0 [ 126.178616][ T8603] ? clear_bhb_loop+0x55/0xb0 [ 126.183321][ T8603] ? clear_bhb_loop+0x55/0xb0 [ 126.188123][ T8603] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 126.194028][ T8603] RIP: 0033:0x7f0f93e05d29 [ 126.198460][ T8603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 126.218104][ T8603] RSP: 002b:00007f0f92471038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 126.226547][ T8603] RAX: ffffffffffffffda RBX: 00007f0f93ff5fa0 RCX: 00007f0f93e05d29 [ 126.234619][ T8603] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 126.242605][ T8603] RBP: 00007f0f92471090 R08: 00000000000003e8 R09: 0000000000000000 [ 126.250663][ T8603] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 126.258650][ T8603] R13: 0000000000000000 R14: 00007f0f93ff5fa0 R15: 00007ffc4917d4a8 [ 126.266739][ T8603] [ 126.415346][ T8611] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 126.645921][ T29] kauditd_printk_skb: 1394 callbacks suppressed [ 126.645981][ T29] audit: type=1400 audit(1737269242.063:9734): avc: denied { read write } for pid=3300 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 126.677822][ T29] audit: type=1326 audit(1737269242.063:9735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8622 comm="syz.5.2085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f316ce6cce7 code=0x7ffc0000 [ 126.701219][ T29] audit: type=1326 audit(1737269242.063:9736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8622 comm="syz.5.2085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f316ce11f29 code=0x7ffc0000 [ 126.724977][ T29] audit: type=1326 audit(1737269242.063:9737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8622 comm="syz.5.2085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=73 compat=0 ip=0x7f316ce75d29 code=0x7ffc0000 [ 126.748654][ T29] audit: type=1400 audit(1737269242.063:9738): avc: denied { map_create } for pid=8629 comm="syz.4.2088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 126.768180][ T29] audit: type=1400 audit(1737269242.063:9739): avc: denied { prog_load } for pid=8629 comm="syz.4.2088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 126.787306][ T29] audit: type=1400 audit(1737269242.063:9740): avc: denied { prog_load } for pid=8629 comm="syz.4.2088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 126.806401][ T29] audit: type=1400 audit(1737269242.063:9741): avc: denied { prog_load } for pid=8629 comm="syz.4.2088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 126.825518][ T29] audit: type=1400 audit(1737269242.063:9742): avc: denied { mounton } for pid=8629 comm="syz.4.2088" path="/437/file0" dev="tmpfs" ino=2367 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 126.848252][ T29] audit: type=1400 audit(1737269242.063:9743): avc: denied { map_create } for pid=8629 comm="syz.4.2088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 127.109344][ T8641] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=8641 comm=syz.1.2093 [ 128.071056][ T8736] lo speed is unknown, defaulting to 1000 [ 128.347317][ T8766] FAULT_INJECTION: forcing a failure. [ 128.347317][ T8766] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 128.360664][ T8766] CPU: 0 UID: 0 PID: 8766 Comm: syz.4.2145 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 128.371451][ T8766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 128.381589][ T8766] Call Trace: [ 128.384876][ T8766] [ 128.387850][ T8766] dump_stack_lvl+0xf2/0x150 [ 128.392533][ T8766] dump_stack+0x15/0x1a [ 128.396765][ T8766] should_fail_ex+0x223/0x230 [ 128.401475][ T8766] should_fail_alloc_page+0xfd/0x110 [ 128.406796][ T8766] __alloc_pages_noprof+0x109/0x340 [ 128.412036][ T8766] alloc_pages_mpol_noprof+0xb8/0x260 [ 128.417452][ T8766] vma_alloc_folio_noprof+0x1a0/0x2f0 [ 128.422850][ T8766] handle_mm_fault+0xdd7/0x2ac0 [ 128.427720][ T8766] exc_page_fault+0x3b9/0x650 [ 128.432577][ T8766] asm_exc_page_fault+0x26/0x30 [ 128.437454][ T8766] RIP: 0033:0x7f67585b335b [ 128.441938][ T8766] Code: c0 8b 87 c0 00 00 00 66 0f 6c c0 85 c0 0f 85 44 01 00 00 c7 87 c0 00 00 00 ff ff ff ff 48 8d 84 24 20 21 00 00 48 8d 7c 24 20 <0f> 29 44 24 40 49 89 e4 48 89 44 24 50 8b 43 74 48 89 9c 24 00 01 [ 128.461600][ T8766] RSP: 002b:00007f6756c74e10 EFLAGS: 00010246 [ 128.467807][ T8766] RAX: 00007f6756c76f30 RBX: 00007f67587cb620 RCX: 0000000000000000 [ 128.475839][ T8766] RDX: 00007f6756c76f78 RSI: 00007f6758665bd8 RDI: 00007f6756c74e30 [ 128.483898][ T8766] RBP: 0000000000000009 R08: 0000000000000000 R09: 0000000000000000 [ 128.491883][ T8766] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 128.499879][ T8766] R13: 0000000000000000 R14: 00007f67587f5fa0 R15: 00007ffdb1caac38 [ 128.507957][ T8766] [ 128.511437][ T8766] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 128.602230][ T8781] lo speed is unknown, defaulting to 1000 [ 128.733849][ T8811] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8811 comm=syz.4.2165 [ 128.879703][ T8824] IPVS: set_ctl: invalid protocol: 29 172.30.4.1:20001 [ 128.899443][ T8825] netlink: 'syz.0.2170': attribute type 29 has an invalid length. [ 128.941545][ T8828] FAULT_INJECTION: forcing a failure. [ 128.941545][ T8828] name failslab, interval 1, probability 0, space 0, times 0 [ 128.954643][ T8828] CPU: 0 UID: 0 PID: 8828 Comm: syz.4.2171 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 128.965476][ T8828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 128.975593][ T8828] Call Trace: [ 128.978892][ T8828] [ 128.981922][ T8828] dump_stack_lvl+0xf2/0x150 [ 128.986576][ T8828] dump_stack+0x15/0x1a [ 128.990850][ T8828] should_fail_ex+0x223/0x230 [ 128.995614][ T8828] should_failslab+0x8f/0xb0 [ 129.000271][ T8828] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 129.006127][ T8828] ? __d_alloc+0x3d/0x340 [ 129.010501][ T8828] ? selinux_inode_permission+0x341/0x410 [ 129.016253][ T8828] __d_alloc+0x3d/0x340 [ 129.020504][ T8828] d_alloc_parallel+0x54/0xc60 [ 129.025299][ T8828] ? __rcu_read_unlock+0x4e/0x70 [ 129.030291][ T8828] ? __d_lookup+0x342/0x370 [ 129.034865][ T8828] ? try_to_unlazy+0x279/0x3b0 [ 129.039655][ T8828] path_openat+0x6c8/0x1fa0 [ 129.044247][ T8828] ? _parse_integer_limit+0x167/0x180 [ 129.049732][ T8828] do_filp_open+0x107/0x230 [ 129.054411][ T8828] do_sys_openat2+0xab/0x120 [ 129.059033][ T8828] __x64_sys_openat+0xf3/0x120 [ 129.063812][ T8828] x64_sys_call+0x2b30/0x2dc0 [ 129.068574][ T8828] do_syscall_64+0xc9/0x1c0 [ 129.073104][ T8828] ? clear_bhb_loop+0x55/0xb0 [ 129.077860][ T8828] ? clear_bhb_loop+0x55/0xb0 [ 129.082602][ T8828] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 129.088591][ T8828] RIP: 0033:0x7f6758605d29 [ 129.093024][ T8828] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 129.112662][ T8828] RSP: 002b:00007f6756c77038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 129.121143][ T8828] RAX: ffffffffffffffda RBX: 00007f67587f5fa0 RCX: 00007f6758605d29 [ 129.129206][ T8828] RDX: 000000000000275a RSI: 00000000200001c0 RDI: ffffffffffffff9c [ 129.137256][ T8828] RBP: 00007f6756c77090 R08: 0000000000000000 R09: 0000000000000000 [ 129.145270][ T8828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 129.153315][ T8828] R13: 0000000000000000 R14: 00007f67587f5fa0 R15: 00007ffdb1caac38 [ 129.161344][ T8828] [ 129.271718][ T8835] FAULT_INJECTION: forcing a failure. [ 129.271718][ T8835] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 129.284860][ T8835] CPU: 0 UID: 0 PID: 8835 Comm: Ÿy^[É¥ V,ÚYºþ Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 129.296048][ T8835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 129.306135][ T8835] Call Trace: [ 129.309449][ T8835] [ 129.312387][ T8835] dump_stack_lvl+0xf2/0x150 [ 129.317017][ T8835] dump_stack+0x15/0x1a [ 129.321208][ T8835] should_fail_ex+0x223/0x230 [ 129.325977][ T8835] should_fail+0xb/0x10 [ 129.330248][ T8835] should_fail_usercopy+0x1a/0x20 [ 129.335285][ T8835] _copy_from_user+0x1e/0xb0 [ 129.339898][ T8835] kstrtouint_from_user+0x76/0xe0 [ 129.344937][ T8835] ? 0xffffffff81000000 [ 129.349130][ T8835] ? selinux_file_permission+0x22a/0x360 [ 129.354907][ T8835] proc_fail_nth_write+0x4f/0x150 [ 129.360055][ T8835] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 129.365719][ T8835] vfs_write+0x281/0x920 [ 129.370068][ T8835] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 129.375726][ T8835] ? __fget_files+0x17c/0x1c0 [ 129.380543][ T8835] ksys_write+0xe8/0x1b0 [ 129.384868][ T8835] __x64_sys_write+0x42/0x50 [ 129.389516][ T8835] x64_sys_call+0x287e/0x2dc0 [ 129.394220][ T8835] do_syscall_64+0xc9/0x1c0 [ 129.398745][ T8835] ? clear_bhb_loop+0x55/0xb0 [ 129.403516][ T8835] ? clear_bhb_loop+0x55/0xb0 [ 129.408225][ T8835] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 129.414172][ T8835] RIP: 0033:0x7f316ce747df [ 129.418670][ T8835] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 129.438304][ T8835] RSP: 002b:00007f316b4e7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 129.446816][ T8835] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f316ce747df [ 129.454890][ T8835] RDX: 0000000000000001 RSI: 00007f316b4e70a0 RDI: 0000000000000005 [ 129.462891][ T8835] RBP: 00007f316b4e7090 R08: 0000000000000000 R09: 0000000000000000 [ 129.470882][ T8835] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 129.478950][ T8835] R13: 0000000000000000 R14: 00007f316d065fa0 R15: 00007ffecc0c1ae8 [ 129.487019][ T8835] [ 129.968846][ T8884] FAULT_INJECTION: forcing a failure. [ 129.968846][ T8884] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 129.982003][ T8884] CPU: 0 UID: 0 PID: 8884 Comm: syz.4.2196 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 129.992707][ T8884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 130.002783][ T8884] Call Trace: [ 130.006111][ T8884] [ 130.009057][ T8884] dump_stack_lvl+0xf2/0x150 [ 130.013716][ T8884] dump_stack+0x15/0x1a [ 130.017900][ T8884] should_fail_ex+0x223/0x230 [ 130.022602][ T8884] should_fail+0xb/0x10 [ 130.026847][ T8884] should_fail_usercopy+0x1a/0x20 [ 130.031907][ T8884] _copy_to_user+0x20/0xa0 [ 130.036375][ T8884] simple_read_from_buffer+0xa0/0x110 [ 130.041841][ T8884] proc_fail_nth_read+0xf9/0x140 [ 130.046818][ T8884] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 130.052451][ T8884] vfs_read+0x1a2/0x700 [ 130.056665][ T8884] ? __rcu_read_unlock+0x4e/0x70 [ 130.061667][ T8884] ? __fget_files+0x17c/0x1c0 [ 130.066445][ T8884] ksys_read+0xe8/0x1b0 [ 130.070638][ T8884] __x64_sys_read+0x42/0x50 [ 130.075176][ T8884] x64_sys_call+0x2874/0x2dc0 [ 130.079923][ T8884] do_syscall_64+0xc9/0x1c0 [ 130.084457][ T8884] ? clear_bhb_loop+0x55/0xb0 [ 130.089204][ T8884] ? clear_bhb_loop+0x55/0xb0 [ 130.093922][ T8884] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 130.099833][ T8884] RIP: 0033:0x7f675860473c [ 130.104264][ T8884] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 130.123950][ T8884] RSP: 002b:00007f6756c77030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 130.132399][ T8884] RAX: ffffffffffffffda RBX: 00007f67587f5fa0 RCX: 00007f675860473c [ 130.140394][ T8884] RDX: 000000000000000f RSI: 00007f6756c770a0 RDI: 0000000000000004 [ 130.148394][ T8884] RBP: 00007f6756c77090 R08: 0000000000000000 R09: 0000000000000000 [ 130.156598][ T8884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 130.164682][ T8884] R13: 0000000000000000 R14: 00007f67587f5fa0 R15: 00007ffdb1caac38 [ 130.172681][ T8884] [ 130.449105][ T8920] FAULT_INJECTION: forcing a failure. [ 130.449105][ T8920] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 130.462702][ T8920] CPU: 1 UID: 0 PID: 8920 Comm: syz.4.2212 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 130.473512][ T8920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 130.483637][ T8920] Call Trace: [ 130.487002][ T8920] [ 130.489939][ T8920] dump_stack_lvl+0xf2/0x150 [ 130.494568][ T8920] dump_stack+0x15/0x1a [ 130.498768][ T8920] should_fail_ex+0x223/0x230 [ 130.503477][ T8920] should_fail+0xb/0x10 [ 130.507679][ T8920] should_fail_usercopy+0x1a/0x20 [ 130.512773][ T8920] _copy_to_user+0x20/0xa0 [ 130.517287][ T8920] simple_read_from_buffer+0xa0/0x110 [ 130.522784][ T8920] proc_fail_nth_read+0xf9/0x140 [ 130.527813][ T8920] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 130.533418][ T8920] vfs_read+0x1a2/0x700 [ 130.537636][ T8920] ? __rcu_read_unlock+0x4e/0x70 [ 130.542605][ T8920] ? __fget_files+0x17c/0x1c0 [ 130.547444][ T8920] ksys_read+0xe8/0x1b0 [ 130.551650][ T8920] __x64_sys_read+0x42/0x50 [ 130.556230][ T8920] x64_sys_call+0x2874/0x2dc0 [ 130.561023][ T8920] do_syscall_64+0xc9/0x1c0 [ 130.565554][ T8920] ? clear_bhb_loop+0x55/0xb0 [ 130.570276][ T8920] ? clear_bhb_loop+0x55/0xb0 [ 130.574985][ T8920] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 130.580940][ T8920] RIP: 0033:0x7f675860473c [ 130.585371][ T8920] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 130.605108][ T8920] RSP: 002b:00007f6756c77030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 130.609296][ T8931] FAULT_INJECTION: forcing a failure. [ 130.609296][ T8931] name failslab, interval 1, probability 0, space 0, times 0 [ 130.613547][ T8920] RAX: ffffffffffffffda RBX: 00007f67587f5fa0 RCX: 00007f675860473c [ 130.613567][ T8920] RDX: 000000000000000f RSI: 00007f6756c770a0 RDI: 0000000000000004 [ 130.642232][ T8920] RBP: 00007f6756c77090 R08: 0000000000000000 R09: 0000000000000000 [ 130.650217][ T8920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 130.658274][ T8920] R13: 0000000000000000 R14: 00007f67587f5fa0 R15: 00007ffdb1caac38 [ 130.666349][ T8920] [ 130.669370][ T8931] CPU: 0 UID: 0 PID: 8931 Comm: syz.0.2218 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 130.680099][ T8931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 130.690182][ T8931] Call Trace: [ 130.693485][ T8931] [ 130.696434][ T8931] dump_stack_lvl+0xf2/0x150 [ 130.701070][ T8931] dump_stack+0x15/0x1a [ 130.705264][ T8931] should_fail_ex+0x223/0x230 [ 130.710054][ T8931] should_failslab+0x8f/0xb0 [ 130.714705][ T8931] kmem_cache_alloc_noprof+0x52/0x320 [ 130.720190][ T8931] ? getname_flags+0x81/0x3b0 [ 130.724888][ T8931] getname_flags+0x81/0x3b0 [ 130.729514][ T8931] getname+0x17/0x20 [ 130.733462][ T8931] __se_sys_quotactl+0x15b/0x660 [ 130.738435][ T8931] __x64_sys_quotactl+0x55/0x70 [ 130.743361][ T8931] x64_sys_call+0x826/0x2dc0 [ 130.748018][ T8931] do_syscall_64+0xc9/0x1c0 [ 130.752717][ T8931] ? clear_bhb_loop+0x55/0xb0 [ 130.757516][ T8931] ? clear_bhb_loop+0x55/0xb0 [ 130.762267][ T8931] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 130.768179][ T8931] RIP: 0033:0x7fafddb15d29 [ 130.772692][ T8931] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 130.792329][ T8931] RSP: 002b:00007fafdc187038 EFLAGS: 00000246 ORIG_RAX: 00000000000000b3 [ 130.800880][ T8931] RAX: ffffffffffffffda RBX: 00007fafddd05fa0 RCX: 00007fafddb15d29 [ 130.809021][ T8931] RDX: 0000000000000000 RSI: 0000000020002040 RDI: 0000000000000000 [ 130.817033][ T8931] RBP: 00007fafdc187090 R08: 0000000000000000 R09: 0000000000000000 [ 130.825031][ T8931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 130.833030][ T8931] R13: 0000000000000000 R14: 00007fafddd05fa0 R15: 00007fff43bbfe18 [ 130.841110][ T8931] [ 130.858758][ T8944] FAULT_INJECTION: forcing a failure. [ 130.858758][ T8944] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 130.871910][ T8944] CPU: 0 UID: 0 PID: 8944 Comm: syz.2.2222 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 130.882633][ T8944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 130.892703][ T8944] Call Trace: [ 130.896083][ T8944] [ 130.899032][ T8944] dump_stack_lvl+0xf2/0x150 [ 130.903763][ T8944] dump_stack+0x15/0x1a [ 130.907987][ T8944] should_fail_ex+0x223/0x230 [ 130.912818][ T8944] should_fail+0xb/0x10 [ 130.917020][ T8944] should_fail_usercopy+0x1a/0x20 [ 130.922099][ T8944] _copy_from_user+0x1e/0xb0 [ 130.926767][ T8944] do_tcp_setsockopt+0x205/0x1550 [ 130.931899][ T8944] ? selinux_socket_setsockopt+0x1c9/0x200 [ 130.937799][ T8944] tcp_setsockopt+0x50/0xb0 [ 130.942358][ T8944] sock_common_setsockopt+0x64/0x80 [ 130.947589][ T8944] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 130.953523][ T8944] __sys_setsockopt+0x187/0x200 [ 130.958403][ T8944] __x64_sys_setsockopt+0x66/0x80 [ 130.963610][ T8944] x64_sys_call+0x282e/0x2dc0 [ 130.968314][ T8944] do_syscall_64+0xc9/0x1c0 [ 130.972833][ T8944] ? clear_bhb_loop+0x55/0xb0 [ 130.977545][ T8944] ? clear_bhb_loop+0x55/0xb0 [ 130.982284][ T8944] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 130.988227][ T8944] RIP: 0033:0x7f51f49e5d29 [ 130.992729][ T8944] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 131.012406][ T8944] RSP: 002b:00007f51f3057038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 131.020848][ T8944] RAX: ffffffffffffffda RBX: 00007f51f4bd5fa0 RCX: 00007f51f49e5d29 [ 131.028943][ T8944] RDX: 2000000000000020 RSI: 0000000000000006 RDI: 0000000000000003 [ 131.036935][ T8944] RBP: 00007f51f3057090 R08: 000000001959cc36 R09: 0000000000000000 [ 131.044928][ T8944] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 131.053082][ T8944] R13: 0000000000000000 R14: 00007f51f4bd5fa0 R15: 00007ffdf12a7418 [ 131.061113][ T8944] [ 131.171641][ T8956] FAULT_INJECTION: forcing a failure. [ 131.171641][ T8956] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 131.184869][ T8956] CPU: 1 UID: 0 PID: 8956 Comm: syz.2.2228 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 131.195634][ T8956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 131.205731][ T8956] Call Trace: [ 131.209030][ T8956] [ 131.212084][ T8956] dump_stack_lvl+0xf2/0x150 [ 131.216803][ T8956] dump_stack+0x15/0x1a [ 131.221001][ T8956] should_fail_ex+0x223/0x230 [ 131.225725][ T8956] should_fail+0xb/0x10 [ 131.229928][ T8956] should_fail_usercopy+0x1a/0x20 [ 131.234999][ T8956] _copy_to_user+0x20/0xa0 [ 131.239524][ T8956] simple_read_from_buffer+0xa0/0x110 [ 131.244999][ T8956] proc_fail_nth_read+0xf9/0x140 [ 131.250064][ T8956] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 131.255753][ T8956] vfs_read+0x1a2/0x700 [ 131.259949][ T8956] ? __rcu_read_unlock+0x4e/0x70 [ 131.264981][ T8956] ? __fget_files+0x17c/0x1c0 [ 131.269694][ T8956] ksys_read+0xe8/0x1b0 [ 131.273886][ T8956] __x64_sys_read+0x42/0x50 [ 131.278423][ T8956] x64_sys_call+0x2874/0x2dc0 [ 131.283177][ T8956] do_syscall_64+0xc9/0x1c0 [ 131.287709][ T8956] ? clear_bhb_loop+0x55/0xb0 [ 131.292439][ T8956] ? clear_bhb_loop+0x55/0xb0 [ 131.297138][ T8956] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 131.303061][ T8956] RIP: 0033:0x7f51f49e473c [ 131.307492][ T8956] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 131.327134][ T8956] RSP: 002b:00007f51f3057030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 131.335577][ T8956] RAX: ffffffffffffffda RBX: 00007f51f4bd5fa0 RCX: 00007f51f49e473c [ 131.343579][ T8956] RDX: 000000000000000f RSI: 00007f51f30570a0 RDI: 0000000000000003 [ 131.351572][ T8956] RBP: 00007f51f3057090 R08: 0000000000000000 R09: 0000000000000000 [ 131.359568][ T8956] R10: 0000000020000240 R11: 0000000000000246 R12: 0000000000000001 [ 131.367618][ T8956] R13: 0000000000000000 R14: 00007f51f4bd5fa0 R15: 00007ffdf12a7418 [ 131.375680][ T8956] [ 131.677274][ T29] kauditd_printk_skb: 1489 callbacks suppressed [ 131.677292][ T29] audit: type=1400 audit(1737269247.093:11206): avc: denied { read write } for pid=6956 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 131.744920][ T29] audit: type=1400 audit(1737269247.113:11207): avc: denied { create } for pid=8978 comm="syz.5.2239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 131.765746][ T29] audit: type=1400 audit(1737269247.113:11208): avc: denied { map_create } for pid=8978 comm="syz.5.2239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 131.785102][ T29] audit: type=1400 audit(1737269247.113:11209): avc: denied { prog_load } for pid=8978 comm="syz.5.2239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 131.804302][ T29] audit: type=1400 audit(1737269247.133:11210): avc: denied { map_create } for pid=8978 comm="syz.5.2239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 131.823637][ T29] audit: type=1400 audit(1737269247.133:11211): avc: denied { prog_load } for pid=8978 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 131.842375][ T29] audit: type=1400 audit(1737269247.133:11212): avc: denied { prog_load } for pid=8978 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 131.861141][ T29] audit: type=1400 audit(1737269247.133:11213): avc: denied { prog_load } for pid=8978 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 131.879833][ T29] audit: type=1400 audit(1737269247.133:11214): avc: denied { create } for pid=8978 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 131.899925][ T29] audit: type=1400 audit(1737269247.143:11215): avc: denied { create } for pid=8978 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 132.127596][ T8995] FAULT_INJECTION: forcing a failure. [ 132.127596][ T8995] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 132.140733][ T8995] CPU: 1 UID: 0 PID: 8995 Comm: syz.2.2246 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 132.151499][ T8995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 132.161609][ T8995] Call Trace: [ 132.164919][ T8995] [ 132.167892][ T8995] dump_stack_lvl+0xf2/0x150 [ 132.172523][ T8995] dump_stack+0x15/0x1a [ 132.176719][ T8995] should_fail_ex+0x223/0x230 [ 132.181422][ T8995] should_fail+0xb/0x10 [ 132.185615][ T8995] should_fail_usercopy+0x1a/0x20 [ 132.190699][ T8995] _copy_to_user+0x20/0xa0 [ 132.195233][ T8995] simple_read_from_buffer+0xa0/0x110 [ 132.200707][ T8995] proc_fail_nth_read+0xf9/0x140 [ 132.205680][ T8995] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 132.211263][ T8995] vfs_read+0x1a2/0x700 [ 132.215469][ T8995] ? __rcu_read_unlock+0x4e/0x70 [ 132.220511][ T8995] ? __fget_files+0x17c/0x1c0 [ 132.225296][ T8995] ksys_read+0xe8/0x1b0 [ 132.229552][ T8995] __x64_sys_read+0x42/0x50 [ 132.234106][ T8995] x64_sys_call+0x2874/0x2dc0 [ 132.238808][ T8995] do_syscall_64+0xc9/0x1c0 [ 132.243333][ T8995] ? clear_bhb_loop+0x55/0xb0 [ 132.248074][ T8995] ? clear_bhb_loop+0x55/0xb0 [ 132.252823][ T8995] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 132.258736][ T8995] RIP: 0033:0x7f51f49e473c [ 132.263160][ T8995] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 132.282785][ T8995] RSP: 002b:00007f51f3057030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 132.291214][ T8995] RAX: ffffffffffffffda RBX: 00007f51f4bd5fa0 RCX: 00007f51f49e473c [ 132.299194][ T8995] RDX: 000000000000000f RSI: 00007f51f30570a0 RDI: 0000000000000003 [ 132.307212][ T8995] RBP: 00007f51f3057090 R08: 0000000000000000 R09: 0000000000000000 [ 132.315186][ T8995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 132.323163][ T8995] R13: 0000000000000000 R14: 00007f51f4bd5fa0 R15: 00007ffdf12a7418 [ 132.331150][ T8995] [ 132.507939][ T9025] FAULT_INJECTION: forcing a failure. [ 132.507939][ T9025] name failslab, interval 1, probability 0, space 0, times 0 [ 132.520690][ T9025] CPU: 0 UID: 0 PID: 9025 Comm: syz.5.2259 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 132.531481][ T9025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 132.541564][ T9025] Call Trace: [ 132.544866][ T9025] [ 132.547830][ T9025] dump_stack_lvl+0xf2/0x150 [ 132.552583][ T9025] dump_stack+0x15/0x1a [ 132.556838][ T9025] should_fail_ex+0x223/0x230 [ 132.561580][ T9025] should_failslab+0x8f/0xb0 [ 132.566216][ T9025] kmem_cache_alloc_noprof+0x52/0x320 [ 132.571668][ T9025] ? security_file_alloc+0x32/0x100 [ 132.576907][ T9025] security_file_alloc+0x32/0x100 [ 132.581995][ T9025] init_file+0x5b/0x1b0 [ 132.586192][ T9025] alloc_empty_file+0xea/0x200 [ 132.591045][ T9025] path_openat+0x6a/0x1fa0 [ 132.595556][ T9025] ? _parse_integer_limit+0x167/0x180 [ 132.601035][ T9025] ? _parse_integer+0x27/0x30 [ 132.605864][ T9025] ? kstrtoull+0x110/0x140 [ 132.610306][ T9025] ? kstrtouint+0x77/0xc0 [ 132.614732][ T9025] ? kstrtouint_from_user+0xb0/0xe0 [ 132.620011][ T9025] do_filp_open+0x107/0x230 [ 132.624610][ T9025] do_sys_openat2+0xab/0x120 [ 132.629327][ T9025] __x64_sys_creat+0x66/0x90 [ 132.633952][ T9025] x64_sys_call+0x1084/0x2dc0 [ 132.638741][ T9025] do_syscall_64+0xc9/0x1c0 [ 132.643512][ T9025] ? clear_bhb_loop+0x55/0xb0 [ 132.648229][ T9025] ? clear_bhb_loop+0x55/0xb0 [ 132.652938][ T9025] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 132.658857][ T9025] RIP: 0033:0x7f316ce75d29 [ 132.663361][ T9025] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 132.683079][ T9025] RSP: 002b:00007f316b4e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 132.691551][ T9025] RAX: ffffffffffffffda RBX: 00007f316d065fa0 RCX: 00007f316ce75d29 [ 132.699556][ T9025] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 0000000020000380 [ 132.707638][ T9025] RBP: 00007f316b4e7090 R08: 0000000000000000 R09: 0000000000000000 [ 132.715699][ T9025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 132.723695][ T9025] R13: 0000000000000000 R14: 00007f316d065fa0 R15: 00007ffecc0c1ae8 [ 132.731735][ T9025] Jan 19 06:47:28 syzkaller daemon.err dhcpcd[3038]: ps_sendpsmmsg: Connection refused Jan 19 06:47:28 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsgcb: failed to send message to pid 5387: Connection refused [ 132.839521][ T9048] FAULT_INJECTION: forcing a failure. [ 132.839521][ T9048] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 132.852625][ T9048] CPU: 0 UID: 0 PID: 9048 Comm: syz.0.2266 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 132.863329][ T9048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 132.873410][ T9048] Call Trace: [ 132.876712][ T9048] [ 132.879664][ T9048] dump_stack_lvl+0xf2/0x150 [ 132.884339][ T9048] dump_stack+0x15/0x1a [ 132.888559][ T9048] should_fail_ex+0x223/0x230 [ 132.893308][ T9048] should_fail+0xb/0x10 [ 132.897486][ T9048] should_fail_usercopy+0x1a/0x20 [ 132.902542][ T9048] _copy_to_user+0x20/0xa0 [ 132.907026][ T9048] simple_read_from_buffer+0xa0/0x110 [ 132.912483][ T9048] proc_fail_nth_read+0xf9/0x140 [ 132.917470][ T9048] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 132.923192][ T9048] vfs_read+0x1a2/0x700 [ 132.927385][ T9048] ? __rcu_read_unlock+0x4e/0x70 [ 132.932432][ T9048] ? __fget_files+0x17c/0x1c0 [ 132.937316][ T9048] ksys_read+0xe8/0x1b0 [ 132.941509][ T9048] __x64_sys_read+0x42/0x50 [ 132.946126][ T9048] x64_sys_call+0x2874/0x2dc0 [ 132.950831][ T9048] do_syscall_64+0xc9/0x1c0 [ 132.955475][ T9048] ? clear_bhb_loop+0x55/0xb0 [ 132.960240][ T9048] ? clear_bhb_loop+0x55/0xb0 [ 132.964960][ T9048] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 132.970886][ T9048] RIP: 0033:0x7fafddb1473c [ 132.975352][ T9048] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 132.995000][ T9048] RSP: 002b:00007fafdc187030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 133.003436][ T9048] RAX: ffffffffffffffda RBX: 00007fafddd05fa0 RCX: 00007fafddb1473c [ 133.011453][ T9048] RDX: 000000000000000f RSI: 00007fafdc1870a0 RDI: 0000000000000003 [ 133.019600][ T9048] RBP: 00007fafdc187090 R08: 0000000000000000 R09: 0000000000000000 [ 133.027609][ T9048] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 133.035605][ T9048] R13: 0000000000000000 R14: 00007fafddd05fa0 R15: 00007fff43bbfe18 [ 133.043649][ T9048] [ 133.237419][ T9065] FAULT_INJECTION: forcing a failure. [ 133.237419][ T9065] name failslab, interval 1, probability 0, space 0, times 0 [ 133.250133][ T9065] CPU: 0 UID: 0 PID: 9065 Comm: syz.1.2276 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 133.260836][ T9065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 133.270964][ T9065] Call Trace: [ 133.274254][ T9065] [ 133.277203][ T9065] dump_stack_lvl+0xf2/0x150 [ 133.281838][ T9065] dump_stack+0x15/0x1a [ 133.286135][ T9065] should_fail_ex+0x223/0x230 [ 133.290841][ T9065] should_failslab+0x8f/0xb0 [ 133.295471][ T9065] kmem_cache_alloc_noprof+0x52/0x320 [ 133.300929][ T9065] ? getname_flags+0x81/0x3b0 [ 133.305695][ T9065] getname_flags+0x81/0x3b0 [ 133.310230][ T9065] do_readlinkat+0x71/0x210 [ 133.314864][ T9065] __x64_sys_readlinkat+0x53/0x60 [ 133.320015][ T9065] x64_sys_call+0x86c/0x2dc0 [ 133.324683][ T9065] do_syscall_64+0xc9/0x1c0 [ 133.329237][ T9065] ? clear_bhb_loop+0x55/0xb0 [ 133.334005][ T9065] ? clear_bhb_loop+0x55/0xb0 [ 133.338783][ T9065] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 133.344772][ T9065] RIP: 0033:0x7f0f93e05d29 [ 133.349204][ T9065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 133.368922][ T9065] RSP: 002b:00007f0f92471038 EFLAGS: 00000246 ORIG_RAX: 000000000000010b [ 133.377427][ T9065] RAX: ffffffffffffffda RBX: 00007f0f93ff5fa0 RCX: 00007f0f93e05d29 [ 133.385431][ T9065] RDX: 00000000200012c0 RSI: 0000000020000080 RDI: ffffffffffffff9c [ 133.393421][ T9065] RBP: 00007f0f92471090 R08: 0000000000000000 R09: 0000000000000000 [ 133.401412][ T9065] R10: 00000000000000a8 R11: 0000000000000246 R12: 0000000000000001 [ 133.409451][ T9065] R13: 0000000000000000 R14: 00007f0f93ff5fa0 R15: 00007ffc4917d4a8 [ 133.417459][ T9065] [ 133.519027][ T9077] FAULT_INJECTION: forcing a failure. [ 133.519027][ T9077] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 133.532157][ T9077] CPU: 1 UID: 0 PID: 9077 Comm: syz.1.2280 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 133.543011][ T9077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 133.553106][ T9077] Call Trace: [ 133.556470][ T9077] [ 133.559429][ T9077] dump_stack_lvl+0xf2/0x150 [ 133.564164][ T9077] dump_stack+0x15/0x1a [ 133.568441][ T9077] should_fail_ex+0x223/0x230 [ 133.573145][ T9077] should_fail+0xb/0x10 [ 133.577412][ T9077] should_fail_usercopy+0x1a/0x20 [ 133.582485][ T9077] _copy_to_user+0x20/0xa0 [ 133.586954][ T9077] simple_read_from_buffer+0xa0/0x110 [ 133.592440][ T9077] proc_fail_nth_read+0xf9/0x140 [ 133.597482][ T9077] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 133.603152][ T9077] vfs_read+0x1a2/0x700 [ 133.607394][ T9077] ? __rcu_read_unlock+0x4e/0x70 [ 133.612368][ T9077] ? __fget_files+0x17c/0x1c0 [ 133.617211][ T9077] ksys_read+0xe8/0x1b0 [ 133.621392][ T9077] __x64_sys_read+0x42/0x50 [ 133.625959][ T9077] x64_sys_call+0x2874/0x2dc0 [ 133.630662][ T9077] do_syscall_64+0xc9/0x1c0 [ 133.635294][ T9077] ? clear_bhb_loop+0x55/0xb0 [ 133.640009][ T9077] ? clear_bhb_loop+0x55/0xb0 [ 133.644717][ T9077] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 133.650638][ T9077] RIP: 0033:0x7f0f93e0473c [ 133.655168][ T9077] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 133.674874][ T9077] RSP: 002b:00007f0f92471030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 133.683311][ T9077] RAX: ffffffffffffffda RBX: 00007f0f93ff5fa0 RCX: 00007f0f93e0473c [ 133.691308][ T9077] RDX: 000000000000000f RSI: 00007f0f924710a0 RDI: 0000000000000003 [ 133.699300][ T9077] RBP: 00007f0f92471090 R08: 0000000000000000 R09: 0000000000000000 [ 133.707367][ T9077] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 133.715414][ T9077] R13: 0000000000000000 R14: 00007f0f93ff5fa0 R15: 00007ffc4917d4a8 [ 133.723417][ T9077] Jan 19 06:47:29 syzkaller daemon.err dhcpcd[3038]: ps_sendpsmmsg: Connection refused Jan 19 06:47:29 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsgcb: failed to send message to pid 5422: Connection refused [ 134.432494][ T9151] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 135.489609][ T9245] FAULT_INJECTION: forcing a failure. [ 135.489609][ T9245] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 135.502748][ T9245] CPU: 0 UID: 0 PID: 9245 Comm: syz.2.2350 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 135.513517][ T9245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 135.523712][ T9245] Call Trace: [ 135.527005][ T9245] [ 135.529954][ T9245] dump_stack_lvl+0xf2/0x150 [ 135.534653][ T9245] dump_stack+0x15/0x1a [ 135.538922][ T9245] should_fail_ex+0x223/0x230 [ 135.543673][ T9245] should_fail+0xb/0x10 [ 135.547882][ T9245] should_fail_usercopy+0x1a/0x20 [ 135.552983][ T9245] _copy_from_user+0x1e/0xb0 [ 135.557721][ T9245] copy_msghdr_from_user+0x54/0x2a0 [ 135.562984][ T9245] ? __fget_files+0x17c/0x1c0 [ 135.567735][ T9245] __sys_sendmsg+0x13e/0x230 [ 135.572371][ T9245] __x64_sys_sendmsg+0x46/0x50 [ 135.577154][ T9245] x64_sys_call+0x2734/0x2dc0 [ 135.581858][ T9245] do_syscall_64+0xc9/0x1c0 [ 135.586496][ T9245] ? clear_bhb_loop+0x55/0xb0 [ 135.591209][ T9245] ? clear_bhb_loop+0x55/0xb0 [ 135.595950][ T9245] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 135.601882][ T9245] RIP: 0033:0x7f51f49e5d29 [ 135.606342][ T9245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 135.626071][ T9245] RSP: 002b:00007f51f3057038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 135.634516][ T9245] RAX: ffffffffffffffda RBX: 00007f51f4bd5fa0 RCX: 00007f51f49e5d29 [ 135.642509][ T9245] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 135.650528][ T9245] RBP: 00007f51f3057090 R08: 0000000000000000 R09: 0000000000000000 [ 135.658572][ T9245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 135.666573][ T9245] R13: 0000000000000000 R14: 00007f51f4bd5fa0 R15: 00007ffdf12a7418 [ 135.674578][ T9245] [ 136.414527][ T9263] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=9263 comm=syz.2.2357 [ 136.466686][ T9305] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 136.474896][ T9305] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 136.577344][ T9311] FAULT_INJECTION: forcing a failure. [ 136.577344][ T9311] name failslab, interval 1, probability 0, space 0, times 0 [ 136.590082][ T9311] CPU: 1 UID: 0 PID: 9311 Comm: syz.1.2379 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 136.600808][ T9311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 136.610890][ T9311] Call Trace: [ 136.614178][ T9311] [ 136.617119][ T9311] dump_stack_lvl+0xf2/0x150 [ 136.621749][ T9311] dump_stack+0x15/0x1a [ 136.625959][ T9311] should_fail_ex+0x223/0x230 [ 136.630663][ T9311] should_failslab+0x8f/0xb0 [ 136.635293][ T9311] kmem_cache_alloc_node_noprof+0x59/0x320 [ 136.641193][ T9311] ? __alloc_skb+0x10b/0x310 [ 136.645879][ T9311] __alloc_skb+0x10b/0x310 [ 136.650365][ T9311] netlink_alloc_large_skb+0xad/0xe0 [ 136.655749][ T9311] netlink_sendmsg+0x3b4/0x6e0 [ 136.660549][ T9311] ? __pfx_netlink_sendmsg+0x10/0x10 [ 136.665865][ T9311] __sock_sendmsg+0x140/0x180 [ 136.670634][ T9311] ____sys_sendmsg+0x312/0x410 [ 136.675425][ T9311] __sys_sendmsg+0x19d/0x230 [ 136.680063][ T9311] __x64_sys_sendmsg+0x46/0x50 [ 136.684926][ T9311] x64_sys_call+0x2734/0x2dc0 [ 136.689626][ T9311] do_syscall_64+0xc9/0x1c0 [ 136.694151][ T9311] ? clear_bhb_loop+0x55/0xb0 [ 136.698853][ T9311] ? clear_bhb_loop+0x55/0xb0 [ 136.703645][ T9311] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 136.709564][ T9311] RIP: 0033:0x7f0f93e05d29 [ 136.713994][ T9311] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 136.733651][ T9311] RSP: 002b:00007f0f92471038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 136.742091][ T9311] RAX: ffffffffffffffda RBX: 00007f0f93ff5fa0 RCX: 00007f0f93e05d29 [ 136.750138][ T9311] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 136.758140][ T9311] RBP: 00007f0f92471090 R08: 0000000000000000 R09: 0000000000000000 [ 136.766126][ T9311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 136.774115][ T9311] R13: 0000000000000000 R14: 00007f0f93ff5fa0 R15: 00007ffc4917d4a8 [ 136.782125][ T9311] Jan 19 06:47:32 syzkaller daemon.err dhcpcd[3038]: ps_sendpsmmsg: Connection refused Jan 19 06:47:32 syzkaller [ 136.971047][ T29] kauditd_printk_skb: 1216 callbacks suppressed daemon.err dhcpc[ 136.971073][ T29] audit: type=1400 audit(1737269252.303:12432): avc: denied { create } for pid=9262 comm="syz.2.2357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 d[3038]: ps_root[ 137.000320][ T29] audit: type=1400 audit(1737269252.353:12433): avc: denied { prog_load } for pid=9309 comm="syz.5.2378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 _recvmsgcb: fail[ 137.021098][ T29] audit: type=1400 audit(1737269252.353:12434): avc: denied { prog_load } for pid=9309 comm="syz.5.2378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 ed to send messa[ 137.041711][ T29] audit: type=1400 audit(1737269252.353:12435): avc: denied { read } for pid=9309 comm="syz.5.2378" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=0 ge to pid 5620: [ 137.066484][ T29] audit: type=1400 audit(1737269252.353:12436): avc: denied { prog_load } for pid=9309 comm="syz.5.2378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Connection refus[ 137.086826][ T29] audit: type=1400 audit(1737269252.353:12437): avc: denied { prog_load } for pid=9309 comm="syz.5.2378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 ed [ 137.107355][ T29] audit: type=1400 audit(1737269252.373:12438): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 137.129672][ T29] audit: type=1400 audit(1737269252.373:12439): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 137.151820][ T29] audit: type=1400 audit(1737269252.383:12440): avc: denied { create } for pid=9262 comm="syz.2.2357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 137.172487][ T29] audit: type=1400 audit(1737269252.383:12441): avc: denied { create } for pid=9262 comm="syz.2.2357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 137.472206][ T9328] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9328 comm=syz.2.2386 [ 138.232993][ T9358] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9358 comm=syz.2.2399 Jan 19 06:47:33 syzkaller daemon.err dhcpcd[3038]: ps_sendpsmmsg: Connection refused Jan 19 06:47:33 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsgcb: failed to send message to pid 5655: Connection refused [ 138.653155][ T9379] x_tables: ip6_tables: socket match: used from hooks OUTPUT, but only valid from PREROUTING/INPUT [ 139.797113][ T9427] x_tables: ip6_tables: socket match: used from hooks OUTPUT, but only valid from PREROUTING/INPUT [ 139.818651][ T9427] FAULT_INJECTION: forcing a failure. [ 139.818651][ T9427] name failslab, interval 1, probability 0, space 0, times 0 [ 139.831595][ T9427] CPU: 1 UID: 0 PID: 9427 Comm: syz.0.2428 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 139.842387][ T9427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 139.852545][ T9427] Call Trace: [ 139.855842][ T9427] [ 139.858797][ T9427] dump_stack_lvl+0xf2/0x150 [ 139.863495][ T9427] dump_stack+0x15/0x1a [ 139.867744][ T9427] should_fail_ex+0x223/0x230 [ 139.872525][ T9427] should_failslab+0x8f/0xb0 [ 139.877204][ T9427] kmem_cache_alloc_noprof+0x52/0x320 [ 139.882644][ T9427] ? alloc_empty_file+0xd0/0x200 [ 139.887603][ T9427] alloc_empty_file+0xd0/0x200 [ 139.892399][ T9427] path_openat+0x6a/0x1fa0 [ 139.896849][ T9427] ? _parse_integer_limit+0x167/0x180 [ 139.902246][ T9427] ? _parse_integer+0x27/0x30 [ 139.906946][ T9427] ? kstrtoull+0x110/0x140 [ 139.911390][ T9427] ? kstrtouint+0x77/0xc0 [ 139.915765][ T9427] ? kstrtouint_from_user+0xb0/0xe0 [ 139.920981][ T9427] do_filp_open+0x107/0x230 [ 139.925645][ T9427] do_sys_openat2+0xab/0x120 [ 139.930266][ T9427] __x64_sys_openat+0xf3/0x120 [ 139.935064][ T9427] x64_sys_call+0x2b30/0x2dc0 [ 139.939769][ T9427] do_syscall_64+0xc9/0x1c0 [ 139.944298][ T9427] ? clear_bhb_loop+0x55/0xb0 [ 139.949005][ T9427] ? clear_bhb_loop+0x55/0xb0 [ 139.953730][ T9427] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 139.959654][ T9427] RIP: 0033:0x7fafddb15d29 [ 139.964170][ T9427] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 139.983832][ T9427] RSP: 002b:00007fafdc187038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 139.992279][ T9427] RAX: ffffffffffffffda RBX: 00007fafddd05fa0 RCX: 00007fafddb15d29 [ 140.000245][ T9427] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: ffffffffffffff9c [ 140.008267][ T9427] RBP: 00007fafdc187090 R08: 0000000000000000 R09: 0000000000000000 [ 140.016377][ T9427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 140.024393][ T9427] R13: 0000000000000000 R14: 00007fafddd05fa0 R15: 00007fff43bbfe18 [ 140.032370][ T9427] [ 140.205099][ T9458] x_tables: ip6_tables: socket match: used from hooks OUTPUT, but only valid from PREROUTING/INPUT [ 140.703587][ T9504] lo speed is unknown, defaulting to 1000 [ 140.729263][ T9507] FAULT_INJECTION: forcing a failure. [ 140.729263][ T9507] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 140.742365][ T9507] CPU: 0 UID: 0 PID: 9507 Comm: +}[@ Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 140.752653][ T9507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 140.762727][ T9507] Call Trace: [ 140.766074][ T9507] [ 140.769016][ T9507] dump_stack_lvl+0xf2/0x150 [ 140.773704][ T9507] dump_stack+0x15/0x1a [ 140.778054][ T9507] should_fail_ex+0x223/0x230 [ 140.782767][ T9507] should_fail+0xb/0x10 [ 140.787014][ T9507] should_fail_usercopy+0x1a/0x20 [ 140.792078][ T9507] _copy_from_user+0x1e/0xb0 [ 140.796804][ T9507] memdup_user+0x64/0xc0 [ 140.801085][ T9507] strndup_user+0x68/0xa0 [ 140.805514][ T9507] __se_sys_mount+0x4e/0x2d0 [ 140.810237][ T9507] ? fput+0x1c4/0x200 [ 140.814337][ T9507] ? ksys_write+0x176/0x1b0 [ 140.818877][ T9507] __x64_sys_mount+0x67/0x80 [ 140.823576][ T9507] x64_sys_call+0x2c84/0x2dc0 [ 140.828315][ T9507] do_syscall_64+0xc9/0x1c0 [ 140.832844][ T9507] ? clear_bhb_loop+0x55/0xb0 [ 140.837570][ T9507] ? clear_bhb_loop+0x55/0xb0 [ 140.842275][ T9507] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 140.848268][ T9507] RIP: 0033:0x7f0f93e05d29 [ 140.852707][ T9507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 140.872347][ T9507] RSP: 002b:00007f0f92471038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 140.880791][ T9507] RAX: ffffffffffffffda RBX: 00007f0f93ff5fa0 RCX: 00007f0f93e05d29 [ 140.888790][ T9507] RDX: 0000000020001440 RSI: 0000000020001400 RDI: 00000000200013c0 [ 140.896774][ T9507] RBP: 00007f0f92471090 R08: 0000000020000080 R09: 0000000000000000 [ 140.904774][ T9507] R10: 0000000000000800 R11: 0000000000000246 R12: 0000000000000001 [ 140.912758][ T9507] R13: 0000000000000000 R14: 00007f0f93ff5fa0 R15: 00007ffc4917d4a8 [ 140.920886][ T9507] [ 142.026802][ T29] kauditd_printk_skb: 1245 callbacks suppressed [ 142.026818][ T29] audit: type=1326 audit(1737269257.389:13687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9645 comm="syz.2.2529" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f51f49e5d29 code=0x7ffc0000 [ 142.075739][ T29] audit: type=1400 audit(1737269257.389:13688): avc: denied { map_create } for pid=9651 comm="syz.5.2532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 142.095119][ T29] audit: type=1400 audit(1737269257.408:13689): avc: denied { prog_load } for pid=9651 comm="syz.5.2532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 142.114288][ T29] audit: type=1400 audit(1737269257.408:13690): avc: denied { prog_load } for pid=9651 comm="syz.5.2532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 142.133613][ T29] audit: type=1400 audit(1737269257.408:13691): avc: denied { prog_load } for pid=9651 comm="syz.5.2532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 142.153282][ T29] audit: type=1400 audit(1737269257.408:13692): avc: denied { prog_load } for pid=9651 comm="syz.5.2532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 142.172485][ T29] audit: type=1400 audit(1737269257.408:13693): avc: denied { write } for pid=9651 comm="syz.5.2532" name="001" dev="devtmpfs" ino=171 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 142.195501][ T29] audit: type=1400 audit(1737269257.408:13694): avc: denied { prog_load } for pid=9651 comm="syz.5.2532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 142.214862][ T29] audit: type=1326 audit(1737269257.408:13695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9651 comm="syz.5.2532" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f316ce75d29 code=0x7ffc0000 [ 142.238474][ T29] audit: type=1326 audit(1737269257.408:13696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9651 comm="syz.5.2532" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f316ce75d29 code=0x7ffc0000 [ 143.136506][ T9701] lo speed is unknown, defaulting to 1000 [ 143.443518][ T9719] netlink: 44 bytes leftover after parsing attributes in process `syz.5.2562'. [ 143.896596][ T9752] FAULT_INJECTION: forcing a failure. [ 143.896596][ T9752] name failslab, interval 1, probability 0, space 0, times 0 [ 143.909333][ T9752] CPU: 0 UID: 0 PID: 9752 Comm: syz.1.2576 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 143.920068][ T9752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 143.930235][ T9752] Call Trace: [ 143.933603][ T9752] [ 143.936597][ T9752] dump_stack_lvl+0xf2/0x150 [ 143.941585][ T9752] dump_stack+0x15/0x1a [ 143.945914][ T9752] should_fail_ex+0x223/0x230 [ 143.950625][ T9752] should_failslab+0x8f/0xb0 [ 143.955286][ T9752] kmem_cache_alloc_noprof+0x52/0x320 [ 143.960895][ T9752] ? audit_log_start+0x34c/0x6b0 [ 143.965865][ T9752] audit_log_start+0x34c/0x6b0 [ 143.970686][ T9752] audit_seccomp+0x4b/0x130 [ 143.975278][ T9752] __seccomp_filter+0x6fa/0x1180 [ 143.980440][ T9752] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 143.986083][ T9752] ? vfs_write+0x596/0x920 [ 143.990526][ T9752] __secure_computing+0x9f/0x1c0 [ 143.995502][ T9752] syscall_trace_enter+0xd1/0x1f0 [ 144.000630][ T9752] ? fpregs_assert_state_consistent+0x83/0xa0 [ 144.006788][ T9752] do_syscall_64+0xaa/0x1c0 [ 144.011317][ T9752] ? clear_bhb_loop+0x55/0xb0 [ 144.016019][ T9752] ? clear_bhb_loop+0x55/0xb0 [ 144.020794][ T9752] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 144.026713][ T9752] RIP: 0033:0x7f0f93e05d29 [ 144.031137][ T9752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 144.050773][ T9752] RSP: 002b:00007f0f92471038 EFLAGS: 00000246 ORIG_RAX: 0000000000000077 [ 144.059311][ T9752] RAX: ffffffffffffffda RBX: 00007f0f93ff5fa0 RCX: 00007f0f93e05d29 [ 144.067298][ T9752] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffffff [ 144.075310][ T9752] RBP: 00007f0f92471090 R08: 0000000000000000 R09: 0000000000000000 [ 144.083304][ T9752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 144.091385][ T9752] R13: 0000000000000000 R14: 00007f0f93ff5fa0 R15: 00007ffc4917d4a8 [ 144.099470][ T9752] [ 144.375851][ T9790] FAULT_INJECTION: forcing a failure. [ 144.375851][ T9790] name failslab, interval 1, probability 0, space 0, times 0 [ 144.388655][ T9790] CPU: 1 UID: 0 PID: 9790 Comm: syz.1.2592 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 144.399362][ T9790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 144.409487][ T9790] Call Trace: [ 144.412838][ T9790] [ 144.415785][ T9790] dump_stack_lvl+0xf2/0x150 [ 144.420485][ T9790] dump_stack+0x15/0x1a [ 144.424740][ T9790] should_fail_ex+0x223/0x230 [ 144.429468][ T9790] should_failslab+0x8f/0xb0 [ 144.434189][ T9790] kmem_cache_alloc_node_noprof+0x59/0x320 [ 144.440122][ T9790] ? __alloc_skb+0x10b/0x310 [ 144.444788][ T9790] __alloc_skb+0x10b/0x310 [ 144.449304][ T9790] netlink_alloc_large_skb+0xad/0xe0 [ 144.454668][ T9790] netlink_sendmsg+0x3b4/0x6e0 [ 144.459484][ T9790] ? __pfx_netlink_sendmsg+0x10/0x10 [ 144.464807][ T9790] __sock_sendmsg+0x140/0x180 [ 144.469529][ T9790] ____sys_sendmsg+0x312/0x410 [ 144.474315][ T9790] __sys_sendmsg+0x19d/0x230 [ 144.479014][ T9790] __x64_sys_sendmsg+0x46/0x50 [ 144.483809][ T9790] x64_sys_call+0x2734/0x2dc0 [ 144.488546][ T9790] do_syscall_64+0xc9/0x1c0 [ 144.493074][ T9790] ? clear_bhb_loop+0x55/0xb0 [ 144.498005][ T9790] ? clear_bhb_loop+0x55/0xb0 [ 144.502729][ T9790] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 144.508654][ T9790] RIP: 0033:0x7f0f93e05d29 [ 144.513089][ T9790] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 144.532784][ T9790] RSP: 002b:00007f0f92471038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 144.541221][ T9790] RAX: ffffffffffffffda RBX: 00007f0f93ff5fa0 RCX: 00007f0f93e05d29 [ 144.549267][ T9790] RDX: 0000000000040044 RSI: 0000000020000200 RDI: 0000000000000003 [ 144.557288][ T9790] RBP: 00007f0f92471090 R08: 0000000000000000 R09: 0000000000000000 [ 144.565283][ T9790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 144.573392][ T9790] R13: 0000000000000000 R14: 00007f0f93ff5fa0 R15: 00007ffc4917d4a8 [ 144.581454][ T9790] [ 145.013753][ T9798] lo speed is unknown, defaulting to 1000 [ 145.811347][ T9858] lo speed is unknown, defaulting to 1000 [ 147.068289][ T9908] xt_TPROXY: Can be used only with -p tcp or -p udp [ 147.376827][ T29] kauditd_printk_skb: 957 callbacks suppressed [ 147.376844][ T29] audit: type=1400 audit(1737269262.403:14652): avc: denied { map_create } for pid=9936 comm="syz.1.2652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 147.422194][ T29] audit: type=1400 audit(1737269262.421:14653): avc: denied { prog_load } for pid=9936 comm="syz.1.2652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 147.441399][ T29] audit: type=1400 audit(1737269262.421:14654): avc: denied { prog_load } for pid=9936 comm="syz.1.2652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 147.460560][ T29] audit: type=1400 audit(1737269262.421:14655): avc: denied { bpf } for pid=9936 comm="syz.1.2652" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 147.481253][ T29] audit: type=1400 audit(1737269262.421:14656): avc: denied { prog_load } for pid=9936 comm="syz.1.2652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 147.500486][ T29] audit: type=1400 audit(1737269262.421:14657): avc: denied { create } for pid=9936 comm="syz.1.2652" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 147.522031][ T29] audit: type=1400 audit(1737269262.421:14658): avc: denied { execute } for pid=9936 comm="syz.1.2652" path="/553/blkio.bfq.dequeue" dev="tmpfs" ino=2979 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 147.546185][ T29] audit: type=1400 audit(1737269262.421:14659): avc: denied { execute } for pid=9936 comm="syz.1.2652" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=26525 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=0 [ 147.572461][ T29] audit: type=1400 audit(1737269262.440:14660): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 147.628026][ T29] audit: type=1400 audit(1737269262.459:14661): avc: denied { open } for pid=9938 comm="syz.1.2653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 147.700988][ T9947] ebtables: ebtables: counters copy to user failed while replacing table [ 147.917146][ T9962] lo speed is unknown, defaulting to 1000 [ 148.760251][T10022] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=10022 comm=syz.5.2691 [ 148.926934][T10039] FAULT_INJECTION: forcing a failure. [ 148.926934][T10039] name failslab, interval 1, probability 0, space 0, times 0 [ 148.939711][T10039] CPU: 0 UID: 0 PID: 10039 Comm: syz.1.2696 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 148.950627][T10039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 148.960705][T10039] Call Trace: [ 148.964002][T10039] [ 148.966958][T10039] dump_stack_lvl+0xf2/0x150 [ 148.971583][T10039] dump_stack+0x15/0x1a [ 148.975798][T10039] should_fail_ex+0x223/0x230 [ 148.980505][T10039] should_failslab+0x8f/0xb0 [ 148.985133][T10039] kmem_cache_alloc_noprof+0x52/0x320 [ 148.990557][T10039] ? fcntl_setlease+0x88/0x300 [ 148.995360][T10039] fcntl_setlease+0x88/0x300 [ 148.999995][T10039] do_fcntl+0x4c7/0xe10 [ 149.004330][T10039] __se_sys_fcntl+0xbd/0x1b0 [ 149.008993][T10039] __x64_sys_fcntl+0x43/0x50 [ 149.013609][T10039] x64_sys_call+0x2129/0x2dc0 [ 149.018309][T10039] do_syscall_64+0xc9/0x1c0 [ 149.022915][T10039] ? clear_bhb_loop+0x55/0xb0 [ 149.027702][T10039] ? clear_bhb_loop+0x55/0xb0 [ 149.032420][T10039] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 149.038362][T10039] RIP: 0033:0x7f0f93e05d29 [ 149.042787][T10039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 149.062728][T10039] RSP: 002b:00007f0f92471038 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 149.071167][T10039] RAX: ffffffffffffffda RBX: 00007f0f93ff5fa0 RCX: 00007f0f93e05d29 [ 149.079263][T10039] RDX: 0000000000000001 RSI: 0000000000000400 RDI: 0000000000000004 [ 149.087315][T10039] RBP: 00007f0f92471090 R08: 0000000000000000 R09: 0000000000000000 [ 149.095308][T10039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 149.103303][T10039] R13: 0000000000000000 R14: 00007f0f93ff5fa0 R15: 00007ffc4917d4a8 [ 149.111378][T10039] [ 149.353072][T10055] lo speed is unknown, defaulting to 1000 [ 151.445881][T10175] FAULT_INJECTION: forcing a failure. [ 151.445881][T10175] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 151.459020][T10175] CPU: 0 UID: 0 PID: 10175 Comm: syz.5.2757 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 151.469874][T10175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 151.480005][T10175] Call Trace: [ 151.483374][T10175] [ 151.486324][T10175] dump_stack_lvl+0xf2/0x150 [ 151.490957][T10175] dump_stack+0x15/0x1a [ 151.495184][T10175] should_fail_ex+0x223/0x230 [ 151.499907][T10175] should_fail+0xb/0x10 [ 151.504087][T10175] should_fail_usercopy+0x1a/0x20 [ 151.509143][T10175] _copy_to_user+0x20/0xa0 [ 151.513598][T10175] simple_read_from_buffer+0xa0/0x110 [ 151.519025][T10175] proc_fail_nth_read+0xf9/0x140 [ 151.524040][T10175] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 151.529651][T10175] vfs_read+0x1a2/0x700 [ 151.533907][T10175] ? __rcu_read_unlock+0x4e/0x70 [ 151.539138][T10175] ? __fget_files+0x17c/0x1c0 [ 151.544040][T10175] ksys_read+0xe8/0x1b0 [ 151.548225][T10175] __x64_sys_read+0x42/0x50 [ 151.552765][T10175] x64_sys_call+0x2874/0x2dc0 [ 151.557595][T10175] do_syscall_64+0xc9/0x1c0 [ 151.562142][T10175] ? clear_bhb_loop+0x55/0xb0 [ 151.566866][T10175] ? clear_bhb_loop+0x55/0xb0 [ 151.571664][T10175] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 151.577580][T10175] RIP: 0033:0x7f316ce7473c [ 151.582020][T10175] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 151.601664][T10175] RSP: 002b:00007f316b4e7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 151.610210][T10175] RAX: ffffffffffffffda RBX: 00007f316d065fa0 RCX: 00007f316ce7473c [ 151.618250][T10175] RDX: 000000000000000f RSI: 00007f316b4e70a0 RDI: 0000000000000004 [ 151.626294][T10175] RBP: 00007f316b4e7090 R08: 0000000000000000 R09: 0000000000000000 [ 151.634285][T10175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 151.642404][T10175] R13: 0000000000000000 R14: 00007f316d065fa0 R15: 00007ffecc0c1ae8 [ 151.650403][T10175] [ 152.744260][ T29] kauditd_printk_skb: 1360 callbacks suppressed [ 152.744279][ T29] audit: type=1400 audit(1737269267.426:16022): avc: denied { map_create } for pid=10260 comm="syz.2.2797" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 152.790109][ T29] audit: type=1400 audit(1737269267.444:16023): avc: denied { prog_load } for pid=10260 comm="syz.2.2797" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 152.809553][ T29] audit: type=1400 audit(1737269267.454:16024): avc: denied { prog_load } for pid=10260 comm="syz.2.2797" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 152.828845][ T29] audit: type=1400 audit(1737269267.454:16025): avc: denied { prog_load } for pid=10260 comm="syz.2.2797" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 152.848126][ T29] audit: type=1400 audit(1737269267.454:16026): avc: denied { mounton } for pid=10260 comm="syz.2.2797" path="/521/file0" dev="tmpfs" ino=2785 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 152.871041][ T29] audit: type=1400 audit(1737269267.454:16027): avc: denied { map_create } for pid=10260 comm="syz.2.2797" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 152.890378][ T29] audit: type=1400 audit(1737269267.454:16028): avc: denied { prog_load } for pid=10260 comm="syz.2.2797" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 152.909759][ T29] audit: type=1400 audit(1737269267.454:16029): avc: denied { prog_load } for pid=10260 comm="syz.2.2797" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 152.929023][ T29] audit: type=1400 audit(1737269267.454:16030): avc: denied { read } for pid=10260 comm="syz.2.2797" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=0 [ 152.957745][ T29] audit: type=1400 audit(1737269267.463:16031): avc: denied { read write } for pid=3301 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 153.191479][T10281] FAULT_INJECTION: forcing a failure. [ 153.191479][T10281] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 153.204682][T10281] CPU: 0 UID: 0 PID: 10281 Comm: syz.2.2806 Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 153.215577][T10281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 153.225669][T10281] Call Trace: [ 153.228983][T10281] [ 153.231990][T10281] dump_stack_lvl+0xf2/0x150 [ 153.236677][T10281] dump_stack+0x15/0x1a [ 153.241088][T10281] should_fail_ex+0x223/0x230 [ 153.245808][T10281] should_fail+0xb/0x10 [ 153.249992][T10281] should_fail_usercopy+0x1a/0x20 [ 153.255107][T10281] _copy_from_user+0x1e/0xb0 [ 153.259763][T10281] __se_sys_memfd_create+0x26b/0x5c0 [ 153.265191][T10281] __x64_sys_memfd_create+0x31/0x40 [ 153.270514][T10281] x64_sys_call+0x2d4c/0x2dc0 [ 153.275365][T10281] do_syscall_64+0xc9/0x1c0 [ 153.279907][T10281] ? clear_bhb_loop+0x55/0xb0 [ 153.284689][T10281] ? clear_bhb_loop+0x55/0xb0 [ 153.289480][T10281] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 153.295439][T10281] RIP: 0033:0x7f51f49e5d29 [ 153.299907][T10281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 153.319547][T10281] RSP: 002b:00007f51f3056e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 153.328062][T10281] RAX: ffffffffffffffda RBX: 00000000000004dd RCX: 00007f51f49e5d29 [ 153.336053][T10281] RDX: 00007f51f3056ef0 RSI: 0000000000000000 RDI: 00007f51f4a62469 [ 153.344048][T10281] RBP: 0000000020000c40 R08: 00007f51f3056bb7 R09: 00007f51f3056e40 [ 153.352051][T10281] R10: 000000000000000a R11: 0000000000000202 R12: 0000000020000080 [ 153.360106][T10281] R13: 00007f51f3056ef0 R14: 00007f51f3056eb0 R15: 00000000200000c0 [ 153.368208][T10281] [ 153.609953][T10294] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 157.321210][T10374] xt_CT: You must specify a L4 protocol and not use inversions on it [ 157.346653][T10374] binfmt_misc: register: failed to install interpreter file ./file0 [ 158.289156][ T29] kauditd_printk_skb: 340 callbacks suppressed [ 158.289174][ T29] audit: type=1400 audit(1737269272.608:16372): avc: denied { execmem } for pid=10375 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 158.347050][ T29] audit: type=1400 audit(1737269272.617:16373): avc: denied { read } for pid=10377 comm="syz.0.2848" dev="nsfs" ino=4026532395 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 158.368607][ T29] audit: type=1400 audit(1737269272.617:16374): avc: denied { create } for pid=10377 comm="syz.0.2848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 158.389304][ T29] audit: type=1400 audit(1737269272.636:16375): avc: denied { create } for pid=10376 comm="syz.2.2849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 158.410141][ T29] audit: type=1400 audit(1737269272.636:16376): avc: denied { write } for pid=10379 comm="syz.4.2851" name="raw" dev="proc" ino=4026532783 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 158.432962][ T29] audit: type=1400 audit(1737269272.645:16377): avc: denied { read write } for pid=10379 comm="syz.4.2851" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 158.457158][ T29] audit: type=1400 audit(1737269272.645:16378): avc: denied { map_create } for pid=10376 comm="syz.2.2849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 158.476567][ T29] audit: type=1400 audit(1737269272.645:16379): avc: denied { create } for pid=10382 comm="syz.0.2852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 158.496395][ T29] audit: type=1400 audit(1737269272.645:16380): avc: denied { prog_load } for pid=10376 comm="syz.2.2849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 158.515610][ T29] audit: type=1400 audit(1737269272.645:16381): avc: denied { prog_load } for pid=10379 comm="syz.4.2851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 163.540597][ T3301] ================================================================== [ 163.548756][ T3301] BUG: KCSAN: data-race in shmem_getattr / shmem_recalc_inode [ 163.556339][ T3301] [ 163.558715][ T3301] read-write to 0xffff888136c105e0 of 8 bytes by task 10424 on cpu 1: [ 163.566888][ T3301] shmem_recalc_inode+0x36/0x1b0 [ 163.571853][ T3301] shmem_get_folio_gfp+0x7ce/0xd90 [ 163.576990][ T3301] shmem_write_begin+0xa2/0x180 [ 163.581860][ T3301] generic_perform_write+0x1a8/0x4a0 [ 163.587183][ T3301] shmem_file_write_iter+0xc2/0xe0 [ 163.592326][ T3301] __kernel_write_iter+0x24b/0x4e0 [ 163.597460][ T3301] dump_user_range+0x3ac/0x550 [ 163.602262][ T3301] elf_core_dump+0x1bdc/0x1ce0 [ 163.607233][ T3301] do_coredump+0x1898/0x1f40 [ 163.611849][ T3301] get_signal+0xd4f/0x1000 [ 163.616310][ T3301] arch_do_signal_or_restart+0x95/0x4b0 [ 163.621907][ T3301] irqentry_exit_to_user_mode+0xa7/0x120 [ 163.627574][ T3301] irqentry_exit+0x12/0x50 [ 163.632026][ T3301] asm_exc_stack_segment+0x26/0x30 [ 163.637175][ T3301] [ 163.639516][ T3301] read to 0xffff888136c105e0 of 8 bytes by task 3301 on cpu 0: [ 163.647074][ T3301] shmem_getattr+0x42/0x200 [ 163.651611][ T3301] vfs_statx_path+0x171/0x2d0 [ 163.656314][ T3301] vfs_statx+0xe1/0x170 [ 163.660490][ T3301] __se_sys_newfstatat+0xdc/0x300 [ 163.665541][ T3301] __x64_sys_newfstatat+0x55/0x70 [ 163.670580][ T3301] x64_sys_call+0x236d/0x2dc0 [ 163.675311][ T3301] do_syscall_64+0xc9/0x1c0 [ 163.679841][ T3301] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 163.685785][ T3301] [ 163.688119][ T3301] value changed: 0x0000000000000a5d -> 0x0000000000000a62 [ 163.695237][ T3301] [ 163.697561][ T3301] Reported by Kernel Concurrency Sanitizer on: [ 163.703728][ T3301] CPU: 0 UID: 0 PID: 3301 Comm: syz-executor Not tainted 6.13.0-rc7-syzkaller-00191-gfda5e3f28400 #0 [ 163.714598][ T3301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 163.724678][ T3301] ================================================================== [ 163.735249][ T29] kauditd_printk_skb: 152 callbacks suppressed [ 163.735266][ T29] audit: type=1400 audit(1737269277.706:16534): avc: denied { read write } for pid=3301 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 164.775903][ T29] audit: type=1400 audit(1737269278.669:16535): avc: denied { write } for pid=3288 comm="syz-executor" path="pipe:[868]" dev="pipefs" ino=868 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 164.799057][ T29] audit: type=1400 audit(1737269278.669:16536): avc: denied { execmem } for pid=10426 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 164.818697][ T29] audit: type=1400 audit(1737269278.688:16537): avc: denied { write } for pid=3288 comm="syz-executor" path="pipe:[868]" dev="pipefs" ino=868 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 164.841938][ T29] audit: type=1400 audit(1737269278.688:16538): avc: denied { write } for pid=3288 comm="syz-executor" path="pipe:[868]" dev="pipefs" ino=868 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 Jan 19 06:47:58 syzkaller auth.info sshd[3286]: Received disconnect from 10.128.0.163 port 33478[ 164.985380][ T29] audit: type=1400 audit(1737269278.866:16539): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 :11: disconnecte[ 165.008341][ T29] audit: type=1400 audit(1737269278.866:16540): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 d by user Jan 19 06:47:58 syzkaller auth.info sshd[3286]: Disconnected from user root 10.128.0.163 port 33478 [ 165.169252][ T7310] syz_tun: left promiscuous mode [ 165.203655][ T6118] bridge0: port 3(syz_tun) entered disabled state [ 165.212125][ T6118] syz_tun (unregistering): left allmulticast mode [ 165.218586][ T6118] syz_tun (unregistering): left promiscuous mode [ 165.225007][ T6118] bridge0: port 3(syz_tun) entered disabled state [ 165.418754][ T1980] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 165.479003][ T1980] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 165.532426][ T1980] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 165.584652][ T1980] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 165.659743][ T1980] bridge_slave_1: left allmulticast mode [ 165.665446][ T1980] bridge_slave_1: left promiscuous mode [ 165.671176][ T1980] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.679061][ T1980] bridge_slave_0: left allmulticast mode [ 165.684836][ T1980] bridge_slave_0: left promiscuous mode [ 165.690641][ T1980] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.788067][ T1980] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 165.798380][ T1980] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 165.808236][ T1980] bond0 (unregistering): Released all slaves [ 165.872428][ T1980] tipc: Disabling bearer [ 165.877938][ T1980] tipc: Left network mode [ 165.885692][ T1980] hsr_slave_0: left promiscuous mode [ 165.891457][ T1980] hsr_slave_1: left promiscuous mode [ 165.897197][ T1980] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 165.904708][ T1980] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 165.912156][ T1980] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 165.919653][ T1980] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 165.929035][ T1980] veth1_macvtap: left promiscuous mode [ 165.934581][ T1980] veth0_macvtap: left promiscuous mode [ 165.940117][ T1980] veth1_vlan: left promiscuous mode [ 165.945429][ T1980] veth0_vlan: left promiscuous mode [ 166.007043][ T1980] team0 (unregistering): Port device team_slave_1 removed [ 166.018032][ T1980] team0 (unregistering): Port device team_slave_0 removed [ 166.388121][ T50] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 166.440657][ T50] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 166.515322][ T50] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 166.568765][ T50] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 166.622797][ T50] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 166.674459][ T50] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 166.749078][ T50] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 166.824169][ T50] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 166.888996][ T50] bridge_slave_1: left allmulticast mode [ 166.894734][ T50] bridge_slave_1: left promiscuous mode [ 166.900409][ T50] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.908187][ T50] bridge_slave_0: left allmulticast mode [ 166.914034][ T50] bridge_slave_0: left promiscuous mode [ 166.919755][ T50] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.927961][ T50] bridge_slave_1: left allmulticast mode [ 166.933677][ T50] bridge_slave_1: left promiscuous mode [ 166.939267][ T50] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.947059][ T50] bridge_slave_0: left allmulticast mode [ 166.952747][ T50] bridge_slave_0: left promiscuous mode [ 166.958414][ T50] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.103101][ T50] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 167.112834][ T50] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 167.122355][ T50] bond0 (unregistering): Released all slaves [ 167.131277][ T50] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 167.141100][ T50] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 167.150669][ T50] bond0 (unregistering): Released all slaves [ 167.159157][ T50] bond1 (unregistering): Released all slaves [ 167.209744][ T50] tipc: Left network mode [ 167.214539][ T50] tipc: Disabling bearer [ 167.220039][ T50] tipc: Left network mode [ 167.228568][ T50] hsr_slave_0: left promiscuous mode [ 167.234149][ T50] hsr_slave_1: left promiscuous mode [ 167.241700][ T50] hsr_slave_0: left promiscuous mode [ 167.247448][ T50] hsr_slave_1: left promiscuous mode [ 167.253295][ T50] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 167.260731][ T50] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 167.268762][ T50] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 167.276157][ T50] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 167.286017][ T50] veth1_macvtap: left promiscuous mode [ 167.291481][ T50] veth0_macvtap: left promiscuous mode [ 167.297141][ T50] veth1_vlan: left promiscuous mode [ 167.302357][ T50] veth0_vlan: left promiscuous mode [ 167.308102][ T50] veth1_macvtap: left promiscuous mode [ 167.313571][ T50] veth0_macvtap: left promiscuous mode [ 167.319164][ T50] veth1_vlan: left promiscuous mode [ 167.324377][ T50] veth0_vlan: left promiscuous mode [ 167.454577][ T50] team0 (unregistering): Port device team_slave_1 removed [ 167.463897][ T50] team0 (unregistering): Port device team_slave_0 removed [ 167.494153][ T9] lo speed is unknown, defaulting to 1000 [ 167.499919][ T9] infiniband syz0: ib_query_port failed (-19)