last executing test programs: 21m12.377524004s ago: executing program 32 (id=446): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000202300800000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000020000000000000000018110000", @ANYRES32=r1, @ANYRES32], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) time(0x0) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000002540), 0x2, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0f000000040000000400000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000200000000000000000818110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xffffffffffffff18) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0xc2208, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0}, 0x10c18a, 0x0, 0x0, 0x6, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mmap(&(0x7f0000568000/0x2000)=nil, 0x2000, 0x0, 0x11, r5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000240)=ANY=[], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000003, @void, @value}, 0x94) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r7, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x4}, 0x8) sendto$inet6(r7, &(0x7f00000001c0)="85", 0x1, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) setsockopt(r6, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00'}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x40006, 0x510, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0xfffffffffffffefe, 0xa5d7}, 0x4c58, 0x0, 0xfffffffd, 0x0, 0x8, 0xffffffff, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg(r8, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) 20m46.680498709s ago: executing program 33 (id=693): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000180)='./file1\x00', 0x8c48, &(0x7f0000000240)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES32], 0x1, 0x5b9, &(0x7f0000000340)="$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") (fail_nth: 5) 20m38.477131872s ago: executing program 34 (id=622): r0 = perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0xb, 0x8, 0x9, 0x9, 0x0, 0x4, 0x0, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xff, 0x4}, 0x4080, 0x2, 0x7, 0x7, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xa2}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x90000, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x3}, 0xee, 0x0, 0x0, 0x0, 0x2, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x57, 0x1, 0x0, 0x0, 0x0, 0xffff, 0x43128, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x1, @perf_bp={0x0, 0x2}, 0x1606c, 0x80, 0x3b, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffbfffffffffffff, r0, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000d40)) quotactl_fd$Q_GETINFO(r1, 0xffffffff80000500, 0x0, &(0x7f0000000300)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000000400000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r3}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000040)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r4}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r9, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) sendmsg$BATADV_CMD_GET_NEIGHBORS(r6, &(0x7f0000004340)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="310301000000000000000900000008000300", @ANYRES32=r8, @ANYBLOB="08000600", @ANYRES32=r10], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r5, &(0x7f0000000640)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000540)={&(0x7f00000005c0)={0x44, r7, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x3}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7fffffff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x2}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1000}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x20040480}, 0x14) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r11, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r12, @ANYBLOB="0100000000000000000001000000000000000141000000180017f9"], 0x34}}, 0x0) unshare(0x2a020480) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000200)={'veth1\x00', 0x0}) sendmsg$nl_route_sched(r14, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000280)=@newqdisc={0x28c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r15, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8}, {0x250, 0x2, [@TCA_RED_MARK_BLOCK={0x8, 0x6, 0x1}, @TCA_RED_MAX_P={0x8}, @TCA_RED_FLAGS={0xc, 0x4, {0x7, 0x7}}, @TCA_RED_PARMS={0x14, 0x1, {0x6, 0x8, 0x6, 0x13, 0x1b, 0x19, 0x6}}, @TCA_RED_MARK_BLOCK={0x8}, @TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_FLAGS={0xc, 0x4, {0xf, 0x7}}]}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x8}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x8}]}, 0x28c}}, 0x0) 20m37.398777419s ago: executing program 35 (id=757): bind$inet6(0xffffffffffffffff, &(0x7f0000000880)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast1}, 0x1c) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RSTATFS(r0, &(0x7f00000000c0)={0x43, 0x9, 0x0, {0x0, 0xfffffffd, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x3, 0x4a}}, 0x43) 15m23.774837456s ago: executing program 36 (id=3569): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r0], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000e40)={0x3, 0x4, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x64}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f00001d8000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f00000000c0)=""/132) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$getregset(0x4204, 0x0, 0x1, &(0x7f0000000280)={0x0}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x2c41, 0x0) flock(r3, 0x5) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) setsockopt$packet_int(r2, 0x107, 0x3, &(0x7f0000000200)=0x2d185c7c, 0x4) r5 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) flock(r5, 0x2) 15m4.724323465s ago: executing program 37 (id=3703): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000240)='./bus\x00', 0x12000023) 14m59.734010045s ago: executing program 38 (id=3728): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) r3 = socket$can_j1939(0x1d, 0x2, 0x7) r4 = syz_clone(0x308000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000940)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000001280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x836, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) close(r7) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0xfd, 0x7ffc1ffb}]}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="170000000000000004000000ff00000072ded400000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000100)='kmem_cache_free\x00', r9, 0x0, 0x1}, 0x18) ptrace(0x10, r4) bind$can_j1939(r3, &(0x7f0000000100)={0x1d, r2, 0xfffffffffffffffc, {0x0, 0xf0, 0x2}, 0x1}, 0x21) setsockopt$sock_int(r1, 0x1, 0x6, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) socket$can_j1939(0x1d, 0x2, 0x7) r10 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r10, 0x8933, &(0x7f0000000380)={'vcan0\x00', 0x0}) r12 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r12, &(0x7f0000000080)={0x1d, r11, 0x0, {0x0, 0x0, 0x4}}, 0x18) sendmsg$can_j1939(r12, &(0x7f00000001c0)={&(0x7f0000000040), 0x18, &(0x7f0000000180)={&(0x7f00000000c0)="92", 0x1a000}}, 0xee) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=@newtfilter={0x24, 0x11, 0x1, 0x74bd2b, 0x0, {0x0, 0x0, 0x74, r2, {0xffff, 0x4}, {0x0, 0x4}, {0xa}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) 14m17.839756085s ago: executing program 39 (id=4379): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xe, 0x4, 0x4, 0x9, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000fc007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000000)=0x0, &(0x7f0000000080)=0x4) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000000c0)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x7, '\x00', r1, 0xffffffffffffffff, 0x1, 0x4, 0x3, 0x0, @void, @value, @void, @value}, 0x50) r2 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r2, &(0x7f0000001780)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000001740)=ANY=[@ANYBLOB="280000001114010029bd7000fbdbdf25080001"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x4040090) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8042, 0x0) bpf$MAP_UPDATE_CONST_STR(0x4, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) fcntl$setlease(r3, 0x400, 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0) 10m24.860911344s ago: executing program 2 (id=8341): r0 = socket$tipc(0x1e, 0x5, 0x0) listen(r0, 0x0) r1 = syz_io_uring_setup(0x239, &(0x7f0000000200)={0x0, 0x0, 0x10100}, 0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x1206}}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) 10m24.792333374s ago: executing program 2 (id=8342): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="160000000000000004000000010000000000000008c7a6eed42042a386a07e2536ebaea76a87fd9c296d5d9a1515dc70b2cb1b7c87c80ba3d389de375fed8d8f7678bd72cda8625058350fabd669617a0c15f42660c170d9dd602f0590789ca9ef1d20", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x3000003, 0x8c4b815a5465c2b1, 0xffffffffffffffff, 0x0) r2 = io_uring_setup(0x1694, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xed}) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r2, 0x10, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000003740)=""/4096, 0x1900}], 0x0, 0x11a}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000080b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r5 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) r6 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x101082) r7 = fcntl$dupfd(r6, 0x0, r6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000b8ffffffb702000008000000b703000000000083850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) ioctl$SCSI_IOCTL_STOP_UNIT(r7, 0x6) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r10, 0xc0f85403, &(0x7f00000003c0)={{0xffffffffffffffff, 0x3, 0xfffffffc, 0x3, 0x101}, 0x4, 0x40, 'id0\x00', 'timer0\x00', 0x0, 0x100000000, 0xbd68, 0x9e0c, 0x6}) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) r11 = fsmount(r5, 0x0, 0x0) fchdir(r11) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) close_range(r4, 0xffffffffffffffff, 0x0) 10m24.623849233s ago: executing program 2 (id=8344): r0 = syz_io_uring_setup(0x239, &(0x7f0000000200)={0x0, 0x0, 0x10100}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x1206}}) io_uring_enter(r0, 0x2def, 0x0, 0x0, 0x0, 0x0) 10m24.346990992s ago: executing program 2 (id=8345): gettid() prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r0 = getpid() bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r2}, 0x18) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000b00), r3) sendmsg$IEEE802154_LIST_PHY(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14, r4, 0x30b}, 0x14}, 0x1, 0x0, 0x0, 0x4008801}, 0x40000) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x65, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000056, &(0x7f00000005c0)={[{@usrjquota}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@init_itable_val={'init_itable', 0x3d, 0xc}}, {@init_itable}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@data_err_ignore}, {@i_version}, {}, {@user_xattr}, {@bh}, {@dioread_nolock}], [{@hash}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, 'j'}}, {@dont_appraise}]}, 0x1, 0x54f, &(0x7f0000000b00)="$eJzs3d9rW1UcAPDvTdv91nUwhopIYQ9O5tK19ccEH+aj6HCg7zO0d2U0WUaTjrUO3B7ciy8yBBEH4ru++zj8B/wrBjoYMoo++BK56U2XrUmbZdnamc8HbnvOvTc995t7v6fn5iQkgKE1kf0oRLwcEd8kEQfbto1GvnFibb/V+1dnsyWJRuPTv5JI8nWt/ZP89/688lJE/PZVxPHCxnZryysLpXI5Xczrk/XKpcna8sqJC5XSfDqfXpyemTn19sz0e+++M7BY3zj7z/ef3P7w1NdHV7/75e6hm0mcjgP5tvY4nsC19spETOTPyVicfmTHqQE0tpMk230A9GUkz/OxyPqAgzGSZz3w//dlRDSAIZXIfxhSrXFA695+QPfBz417H6zdAG2Mf3TttZHY07w32reaPHRnlN3vjg+g/ayNX/+8dTNbYnCvQwBs6dr1iDg5Orqx/0vy/q9/J3vY59E29H/w7NzOxj9vdhr/FNbHP9Fh/LO/Q+72Y+v8L9wdQDNdZeO/9zuOf9cnrcZH8toLzTHfWHL+QjnN+rYXI+JYjO3O6pvN55xavdPotq19/JctWfutsWB+HHdHdz/8mLlSvfQkMbe7dz3ilY7j32T9/Ccdzn/2fJztsY0j6a3Xum3bOv6nq/FTxOsdz/+DGa1k8/nJyeb1MNm6Kjb6+8aR37u1v93xZ+d/3+bxjyft87W1x2/jxz3/pt229Xv970o+a5Z35euulOr1xamIXcnHG9dPP3hsq97aP4v/2NHN+79O1//eiPi8x/hvHP751f7jf7qy+Oce6/w/fuHOR1/80K393s7/W83SsXxNL/1frwf4JM8dAAAAAAAA7DSFiDgQSaG4Xi4UisW193ccjn2FcrVWP36+unRxLpqflR2PsUJrpvtg2/shpvL3w7bq04/UZyLiUER8O7K3WS/OVstz2x08AAAAAAAAAAAAAAAAAAAA7BD7u3z+P/PHyHYfHfDU+cpvGF5b5v8gvukJ2JH8/4fhJf9heMl/GF7yH4aX/IfhJf9heMl/GF7yHwAAAAAAAAAAAAAAAAAAAAAAAAAAAAbq7Jkz2dJYvX91NqvPXV5eWqhePjGX1haKlaXZ4mx18VJxvlqdL6fF2Wplq79XrlYvTU3H0pXJelqrT9aWV85VqksX6+cuVErz6bl07JlEBQAAAAAAAAAAAAAAAAAAAM+X2vLKQqlcThcVFPoqjO6Mw1AYcGG7eyYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeOC/AAAA///ktDiZ") sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) unshare(0x64000600) socket$netlink(0x10, 0x3, 0x0) r8 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x62181) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r8, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r8, &(0x7f0000000440)=[{0x84, 0x77, 0x0, 0x0, @time={0x5, 0xf}, {0xfd}, {0x7}, @raw32={[0x2, 0x0, 0x8000000]}}, {0x6, 0x3, 0x9, 0x3, @time={0x4, 0x200}, {0x10, 0x5}, {0xc, 0x2}, @control={0x3, 0x7, 0x7fff}}, {0x8, 0x3, 0x6, 0x4, @time={0x1, 0xd93}, {0xbb, 0x3}, {0xdb}, @note={0xfc, 0x10, 0x7, 0x6, 0x73ec}}], 0x54) openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0xa8c01) 10m23.378426621s ago: executing program 2 (id=8350): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000fcfff050aa00"/23], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x140, 0x1, 0x3, 0x5, 0x0, 0x8, 0x5d, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_mount_image$ext4(&(0x7f0000000300)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x20081e, &(0x7f0000000080)={[{@nomblk_io_submit}]}, 0x1, 0x4ef, &(0x7f0000000a00)="$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") llistxattr(&(0x7f00000000c0)='./file1\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000b0000008a1b0feb78000d000000000000000000000100000000f6eacbd2e51214587d4f217d587277"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000800)={&(0x7f0000000840)='inet_sk_error_report\x00', r0}, 0x18) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x3000003, 0x4031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="00ecfffffffffffffe0500ffffffffff00000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="1805000000008837a51a1ee1a06244efdb08a4000000002d3226438ac55fed3d2e308806bab49e000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000000230000", @ANYRES8=r0, @ANYBLOB="0000000000000000b70400000800000085000000950000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r3}, 0x10) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000880)=@nat={'nat\x00', 0x19, 0x2, 0x348, [0x20000280, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x2, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}, 0x3c0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x62, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) brk(0x80000000007) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES16=r2], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r6, @ANYRES16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x200, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) 10m22.775841799s ago: executing program 2 (id=8356): bpf$MAP_CREATE(0x0, 0x0, 0x39) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={0x0}, 0x18) syz_clone3(&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x2}, 0xa0) 10m7.612537787s ago: executing program 40 (id=8356): bpf$MAP_CREATE(0x0, 0x0, 0x39) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={0x0}, 0x18) syz_clone3(&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x2}, 0xa0) 5m49.443016641s ago: executing program 9 (id=12144): r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000440)=ANY=[@ANYBLOB="12011f00abbe6740e9174e8b089c000000010902120001000000000904000000ff"], 0x0) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) fremovexattr(r1, &(0x7f0000000100)=@random={'btrfs.', '-:\x00'}) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0, 0x0}, 0x0) 5m48.86505732s ago: executing program 9 (id=12158): unshare(0x400) r0 = open(&(0x7f0000000a40)='.\x00', 0x0, 0x0) utimensat(r0, 0x0, &(0x7f0000000300)={{}, {0x0, 0xffffffffffffffff}}, 0x0) 5m48.80977286s ago: executing program 9 (id=12161): bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x10, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 5m48.74866157s ago: executing program 9 (id=12162): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x891018, 0x0) mount$bind(0x0, &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='./file0/../file0\x00', 0x0, 0x1adc51, 0x0) mount$bind(0x0, &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x12f451, 0x0) mount$bind(&(0x7f00000000c0)='.\x00', &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x80700a, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000300)='./file0\x00', 0xa00008, &(0x7f0000000100), 0x1, 0x7c8, &(0x7f0000001280)="$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") 5m48.69140212s ago: executing program 9 (id=12165): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0), 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x13, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000300)={0x0, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32}], 0xffc8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x32b, @tick=0x20000180, 0x0, {}, 0x80, 0x0, 0xfe}) 5m48.456461989s ago: executing program 9 (id=12174): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x14, 0x2, 0x2, 0x201, 0x70bd29, 0x25dfdbfd, {0xa, 0x0, 0x9}}, 0x14}, 0x1, 0x0, 0x0, 0xc4fd90beade4d27e}, 0x2004c800) 5m48.45238023s ago: executing program 41 (id=12174): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x14, 0x2, 0x2, 0x201, 0x70bd29, 0x25dfdbfd, {0xa, 0x0, 0x9}}, 0x14}, 0x1, 0x0, 0x0, 0xc4fd90beade4d27e}, 0x2004c800) 5m47.280487767s ago: executing program 4 (id=12208): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x18, r1, 0x6a98047402e98331, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 5m47.197072817s ago: executing program 4 (id=12209): syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000640)='./file1\x00', 0x3014850, &(0x7f00000001c0)={[{@quota}, {@barrier_val={'barrier', 0x3d, 0x1000}}, {@lazytime}, {@norecovery}, {@dioread_lock}]}, 0x3, 0x4d1, &(0x7f0000000b80)="$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") llistxattr(&(0x7f00000000c0)='./file1\x00', 0x0, 0xf) 5m47.175297066s ago: executing program 4 (id=12210): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x1200000, &(0x7f0000000940)={[{@noblock_validity}, {}, {@sysvgroups}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@noquota}, {@nogrpid}, {@noauto_da_alloc}, {@nomblk_io_submit}]}, 0x1, 0x57e, &(0x7f0000001b40)="$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") setxattr$security_ima(&(0x7f00000010c0)='./file1\x00', &(0x7f00000014c0), &(0x7f0000001500)=@ng={0x4, 0x13}, 0x500, 0x1) 5m47.100664507s ago: executing program 4 (id=12211): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='proc\x00', 0x1000000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x26) setns(r2, 0x8020000) mount_setattr(0xffffffffffffff9c, &(0x7f0000000180)='.\x00', 0x8000, &(0x7f0000001dc0)={0xf, 0x0, 0x100000}, 0x20) 5m47.100494027s ago: executing program 4 (id=12212): r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000080)={0x91, 0x1, {0x27, 0x24, 0xc, 0x7, 0xa, 0x1ff, 0x6, 0x8}}) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040)={0x24, 0x26, 0x0, 0x1c, 0x0, 0x400004f, 0x100010, 0x2c, 0xffffffffffffffff}) 5m46.848174276s ago: executing program 4 (id=12219): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @loopback}, 0x10) recvmmsg(r0, &(0x7f0000008b80)=[{{0x0, 0x0, &(0x7f00000004c0)}, 0x6}], 0x1, 0x82, 0x0) sendmmsg$inet(r0, 0x0, 0x0, 0x4c891) 5m46.810970566s ago: executing program 42 (id=12219): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @loopback}, 0x10) recvmmsg(r0, &(0x7f0000008b80)=[{{0x0, 0x0, &(0x7f00000004c0)}, 0x6}], 0x1, 0x82, 0x0) sendmmsg$inet(r0, 0x0, 0x0, 0x4c891) 5m15.560729679s ago: executing program 8 (id=12669): socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/power/wakeup_count', 0x0, 0x80) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x394, 0x2, @perf_bp={0x0, 0x9}, 0x280, 0x0, 0xfffffffe, 0x4, 0x3, 0x0, 0x100}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a"], 0xa8}, 0x1, 0x0, 0x0, 0x200000d0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c3000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) sched_setaffinity(r4, 0x8, &(0x7f0000000280)=0x996e) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000008000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r8, 0x0, 0xfffffffffffffffc}, 0x18) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000080)='./file1\x00', 0x1808004, &(0x7f0000000000)=ANY=[@ANYRES16=0x0, @ANYRES64], 0x4, 0x7c1, &(0x7f0000001a00)="$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") openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000008c0)='page_pool_state_hold\x00', r6}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000002c00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r9, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="070000000400000000070000000746002c"], 0x50) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x108002, 0x182) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0xe000001a}) read$char_usb(r1, &(0x7f0000001980)=""/179, 0xb3) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)={0x2000000}) syz_io_uring_setup(0x2fb1, &(0x7f00000003c0)={0x0, 0xa52d, 0x1, 0x2, 0x310, 0x0, r1}, &(0x7f00000000c0), &(0x7f0000000440)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) 5m14.984656128s ago: executing program 8 (id=12686): socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/power/wakeup_count', 0x0, 0x80) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200000d0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000280)=0x996e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000008000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r7, 0x0, 0xfffffffffffffffc}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000008c0)='page_pool_state_hold\x00', r5}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000002c00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r8, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="070000000400000000070000000746002c"], 0x50) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x108002, 0x182) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0xe000001a}) read$char_usb(r1, &(0x7f0000001980)=""/179, 0xb3) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)={0x2000000}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) 5m14.728650677s ago: executing program 8 (id=12691): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf090000000000005509010000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000002c0)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/24, 0x18) 5m14.706900747s ago: executing program 8 (id=12693): syz_mount_image$msdos(&(0x7f0000002280), &(0x7f0000000200)='./file0\x00', 0x8, &(0x7f00000022c0)=ANY=[], 0x1, 0x206, &(0x7f0000002040)="$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") r0 = socket$inet6_udp(0xa, 0x2, 0x0) (async, rerun: 64) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x50) (rerun: 64) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000002340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRES16=r0, @ANYRESDEC=r3, @ANYBLOB="0c0d6c9c3aed5a9b7d6fbe3444c2436116410caecd5d6da893b4194b51a77949716a5aee545e0182d5c6dcd2b86de5dfde6e56d1de5db480f66aedc11e1d55b4887559e8f462f0864eb892326ca2695c8f7eb1fcbee184325489d01ce0177f302523b6f81cdc584d", @ANYRESDEC, @ANYRES32=r3, @ANYRESOCT], 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x13, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) unshare(0x24040000) (async) unshare(0x2c020400) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f00000002c0)='target_cmd_complete\x00', 0xffffffffffffffff, 0x0, 0x7}, 0x18) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x8040) (async) r5 = socket(0x29, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000180)={0xffffff}, 0x10) write(r5, &(0x7f0000000000)="240000001a005f0214f9f407000904000a000000fe0000000000000008000f00fd000000", 0x24) (async) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000002300)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000000)={'#! ', '', [{0x20, '#! '}, {0x20, '+'}, {0x20, 'msdos\x00'}, {0x20, '{-%%$'}, {0x20, '}]'}, {0x20, 'msdos\x00'}, {0x20, 'memory.events\x00'}, {0x20, 'msdos\x00'}]}, 0x37) (async) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, 0x0, 0x2000c000) (async) r7 = syz_open_dev$sg(&(0x7f0000001600), 0x0, 0x32c80) setreuid(0x0, 0xee00) (async, rerun: 32) ioctl$SCSI_IOCTL_SEND_COMMAND(r7, 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) (async, rerun: 32) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) 5m14.651284587s ago: executing program 8 (id=12694): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0}, 0x18) set_mempolicy(0x8006, 0x0, 0x5) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x7, &(0x7f0000001600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000040002850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r1}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) (fail_nth: 7) 5m14.352577976s ago: executing program 8 (id=12697): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="fc0000001900674c0000000000000000e0000001000000000000000000000000e000000200000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000400000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000044000500000000000000000000000000000000000000000033"], 0xfc}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 5m14.337546916s ago: executing program 43 (id=12697): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="fc0000001900674c0000000000000000e0000001000000000000000000000000e000000200000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000400000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000044000500000000000000000000000000000000000000000033"], 0xfc}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x2) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000140)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0200", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 3m7.889012434s ago: executing program 5 (id=14563): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x0, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001cc0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000002c0)=0x1) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000140)=0x2) 3m7.515019214s ago: executing program 5 (id=14567): r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x67, 0x0, 0x0, 0x9, 0x0, 0x0, 0x8591, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0}, 0x900, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xfffffffffffffe00, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000500)=ANY=[@ANYRES32=r0, @ANYRES64=0x0, @ANYBLOB="020000002c", @ANYRES32=r0, @ANYRESHEX=r0, @ANYRES16=r0], &(0x7f0000000700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xffffffdf, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1c, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r2}, 0x10) faccessat(0xffffffffffffff9c, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') unshare(0x68060200) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001780)={&(0x7f0000000500)=ANY=[], 0x2cc}}, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000400)={0x0, 0xe29, 0x30, 0x5, 0xfffffffffffffffc}, &(0x7f0000000440)=0x18) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000480)={r4, 0x7}, 0x8) r5 = socket(0x10, 0x3, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000f40), r6) sendmsg$IEEE802154_ADD_IFACE(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r7, @ANYBLOB="0000fcff7fbdd123676aad16d6000003000021000000"], 0x14}}, 0x0) r8 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(r6, &(0x7f00000003c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES16=r8, @ANYBLOB="020026bd7000fbdbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x94}, 0x20008080) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', 0xffffffffffffffff, 0x0, 0x80000000000000}, 0x18) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019f00000000000000000a000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmmsg(r5, &(0x7f0000000000), 0x4000000000001f2, 0x0) 3m7.374203523s ago: executing program 5 (id=14569): r0 = socket$kcm(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000200), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000180)=0x800, 0x4) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2, 0xffffffffffffffff}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), r1) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @dev, 0x5}, 0x80, 0x0}, 0x24004059) close(r0) 3m7.273475973s ago: executing program 5 (id=14571): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = dup(0xffffffffffffffff) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000380)='./file0\x00', 0x10, &(0x7f00000000c0)={[{@grpjquota, 0x4a}, {@debug}, {@jqfmt_vfsold}, {@noquota}, {@nodiscard}, {@usrjquota, 0x22}], [], 0x2c}, 0x84, 0x4c2, &(0x7f0000000980)="$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") r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x100) getdents(r4, 0x0, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000800000000000070000000900010073797a30000000007c000000090a010400000000000000000700000008000a40000000000900020073797a30000000000900010073797a3000000000080005400000000d38001280140001800c000100636f756e7465720004000280200001800e000100636f6e6e6c696d69740000000c0002800800014000000008080003400000011014"], 0xc4}}, 0x20050800) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0d886605eba6d22d8649002fbeac7300000000000000000000008000000000000000000000000000000000b2"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYRES32=r6, @ANYBLOB="0000000000000000b702000014870000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000002c0)='hrtimer_init\x00', r7}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000140)='hrtimer_init\x00', r5}, 0x10) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_START_P2P_DEVICE(r8, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16, @ANYBLOB="000499cc511bfbdbdf25590000000c009900070000007b000000"], 0x20}, 0x1, 0x0, 0x0, 0x4048004}, 0x8804) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x292, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe5d25348bb78232, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000000280)={0xa, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) listen(r9, 0x2) r10 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r10, &(0x7f0000000040)={0x2, 0x2, @local}, 0x10) close_range(r9, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) 3m7.112319783s ago: executing program 5 (id=14574): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20, 0x4, @loopback}, 0x1c) listen(r1, 0x20000005) accept4(r1, 0x0, 0x0, 0x0) r2 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r1}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000300)={'erspan0\x00', &(0x7f0000000380)={'erspan0\x00', 0x0, 0x40, 0x10, 0xa9, 0x8, {{0xd, 0x4, 0x1, 0x8, 0x34, 0x66, 0x0, 0x1, 0x2f, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@cipso={0x86, 0x20, 0x3, [{0x2, 0xb, "9e660971b2f90ae983"}, {0x5, 0x7, "2a7de1ce5f"}, {0x1, 0x8, "c01e08ce8ca1"}]}]}}}}}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r5}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r5, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x7, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe6, &(0x7f0000000580)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x57, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x7, 0xc, &(0x7f0000000400)=ANY=[@ANYRESOCT=r3, @ANYRES64=r5], &(0x7f0000000880)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', r4, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0xffffffffffffffff, 0x10, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = epoll_create(0x8) r9 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r9, &(0x7f00000002c0)={0x1}) r10 = syz_io_uring_setup(0xe83, &(0x7f0000000140)={0x0, 0xaee2, 0x0, 0xffffffff, 0x1da}, &(0x7f0000000000)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r11, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r11, r12, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r10, 0x47f6, 0x0, 0x0, 0x0, 0x0) r13 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r13, 0x40086602, &(0x7f00000001c0)=0x10) openat$incfs(r13, &(0x7f00000003c0)='.log\x00', 0x140, 0x24) ioctl$SIOCX25SDTEFACILITIES(r13, 0x89eb, &(0x7f0000000740)={0x1000, 0x0, 0x5, 0x8, 0x1, 0x13, 0x7, "483ef132219f7d8faf628b6b4d30ec4cdbee3453", "fbd983a444fcb3b23a92fe5152c3d17e32a7216d"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) r14 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0xe0002, 0x0) ioctl$AUTOFS_IOC_FAIL(r14, 0x4c81, 0xffffffffffffffbb) r15 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3c, '\x00', r4, @fallback=0x18, r13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r15}, 0x10) syz_usbip_server_init(0x5) 3m6.264324821s ago: executing program 5 (id=14586): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2, 0x0, 0x80000000000}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, &(0x7f0000000180)=0x10) 2m51.113126068s ago: executing program 44 (id=14586): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2, 0x0, 0x80000000000}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, &(0x7f0000000180)=0x10) 5.781529973s ago: executing program 7 (id=17304): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfdef, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffde4, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x14, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='GPL\x00', 0x3ff, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @lirc_mode2=0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x2}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xfffffddd) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r3, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$unix(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/139, 0x8b}], 0x1}, 0x406) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000001080)="3e26cca5654ec15949e45af8b1159d592e49690b9f6c637472b128e2b445f281f35b794162cb429c47dca66837d2a9544b07d3f068c0072dde7325a5386fe8c27b83e9e41c7b7bc6060c4fed7f9ae8a4870cfccbc862ebfce7794091afccee06954ce44ea262ff002aba2b247865327723ddb0e09419a4ae239bf3c4b31f9211e49d6954645c885b9bd37b06", 0x8c}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xe, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f00000004c0)={'batadv0\x00', 0x0}) sendmmsg$inet6(r6, &(0x7f0000000740)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000680)="36c61c269e5130cae757243052ef45c60191f010f83429e1341493e79188c0618ed5bde63fb657206390d971e4fe71d2c6cbd00aefe2826f1cbe5afa5b1796d942afa573e2305aa17c3a7a55f1d7d9ed733844dfc0b948e584149a928399dee5b215e46af8ca5e6f51f62387e609ffec638f4c5bfb82c1f8a4f63dfed3b91f4c5a5ff1f0a270e9b2145380b98c", 0x8d}, {&(0x7f0000001780)="fdbc1b4d52db663a72fcad36bf9ea0a0312d1ecdf8510934c533ffc6d71325050385be08b3e253dbc52f1ab2faa96144ca6921ad1b677a80d4af2fea8cf6fab30f3ebcfb6ed7af98b48f09a0c169911fb5248a9bb550453199f04d7c6502ceb2cc805aa392f473500d90a0e3b136285e378ad824f0a419e3e711cf8aff3cc98535b7ce1bb1b55ff3ee2052394223488156a7b40a7c0a38c36ebdd213008de8d7425a239211d0e0f82538a021f1add25777d1272229a092b8effc8cf8dff2ae3b6b486d1a1c294f39ae0f8395577a42aa6f2104c1d5a64020e3004c4acc9667d62ed6fc4b272eb59b2b33475c498a6fd6839c2e3fa47a51c8169233c8700ba3400472edb3bf5f1570b285c6680df7a1f9a06bc21463aaa7d78968a31984d342641bc89eb26ffe34dbf521c76f2e1edc3c1d48c234775842c170e30d062328e7a0083c13fc6173f544e43f2e7c169274da7a3b989f627d050fbe017cac07fa660052b6d0c8c0c90e802ff70d22c071b843924dfb080970deed1868836c5f0c0ef9e0bf81e13990f391545aada54b46c0e463822d6221615019fd3cb36fa47d12164a5179850adecca40ef0eadd903c4e16f452e29d53e7b1ecc78d6954fbe7823292ad571d64fb46188ebfb7c539e880e502886f0c6b4cf33691d340d6859c41433b5f31fcf5ff88743576e8ddd38cf7f6abecbd3c027e4f182b04a52c5aba5d35a253a61d2127ea6e87718c8edf07e4e5efa9e6cfe31a0092aa2cdbb83fe6e51432e54a83cdac8f2cec24fb27b363b8f47a0032977ccd6e86d118a8ae782d0b3fcc6aa4bdb63850e7b7ade2e0c0437542fffa2db66c4a250a9864f9bacd116e72979688eb7ac8b7770c6c383b4ba79a972d7083c819c9fdd3b42ebde436e577bcc85056afeb5d4ba41d331a7e15c151d962016c9c48b411c8418345399c46facf23207e9c3ad0f905a806dc75d9359cc73bd5ed2ed5500f65945b6c4fe05fef1b974ff67591c737be7c67701a8a2445b9bd6ad247c17ddf2e2a5e4ab602036db59cd1a321c1ca40e257e30d82f9ce1d98eaf06aad062ec3f632088ae96bbc633a51ce7ece0ce2777450cc2697d92d11d507c976d0bdb4dfd96b14696c818e42502e5dc302f93353afa22ec132328291543536a720290ecc732d386fc7bd1b39e7cb774b59c6326999b91975f138e8048fdcfaaa493708016779ea7652ec638479b5ecaded1582bbd88f5ecc06b26e0b0fdd59abec9522a041e0b086bd0f8d0cb660cb23f3c74ea5f2f47c9deb03122295048a85cd072e1ebc882a3a3ea6fd615a1576fecd0f3ef8f5076f005bcc1020750abcbfe11940e0b80725b3e36f3f36ee7e0b9dadf7e3d13e5da27e2dc198a281699358ffe570b54f2600d3d027991d25783e4c0bd8b50f3389d70496fdc2e7d138c933c58312e43d1e0b53b2ff0be468e96375758cd3d3d1e61ce51a25b9d3588c346cd2b6bdce3e02ba21227e5b60a4825ee7dbcb04cd6e9922d9a355017345d89e692f4fed6ae483e20447ce74c5cdb467329c1fb18202ea15164353b512e5d389b34ed8154b949d5f45d0ac951da7e28218cb70217689d806795659d14974239bbc9107161565046b170ced97823df428dd7898254f8d65dbd73921c78286b79363a0c135d4770b9c2a16190f52ef00a8483c055815d66a6a0bfa821b406054432c6a17354890590129cd6d3a82b80b93a73aaad0b8ed244060fe8b0ad6635f02d4b777f5b7856d1a87b41339556ad2bf42435c3114d283417ee99179728027e4da94c0e97d51b7ce10a0dcf8910bf1b6656e957d188d44fb802ce79cd31f3ed6924bc59b39682d526cc57915d56aa782aafd99ed7b4aa673d4ab46c4151d0f55a6a859aa32f7cce3d9dca6c3b60f167cbf2afa90cfc1c89064fd15ec0cb0bd1e1538cbe3a7b40a74fe82ffb7ef64b45257c0304f8a9c61c4f61efebe6a24705952d67f4ffae29d4273fae49c2177d1e79eb6c45ac5b794c59d4a8e7eebb8739b48068665987cc6d5a395555baf4efd03ec29d22acf8e90808e63fe1e9e2eeaaaf17f4407bf8fc1e0bcf75e0695f54d013041edd30dd8ef2608db3b79496012b67f3d5d4b12999daafe6f8c97c0372f83f59b061ce8ac020b068bc735ce59f5578d49717aed9cfcbd7f25e7f2d388f625b2ead3b8de85c0b72adcb1fd6d9cc7b1977fae76351fb2f7def06b1e8a512bdc838a2e96da960aab7f2e5e1b963efd00818f6e4f3da24b7943fb4464ea8d5b5b617e5e68debbced07ad69e8e94eed94941423cdecdeecc1b426409f955f5143293a10c9eb48ed1ef8e243bd30f7c9820240e7dff8e8c5682e675795e62ed8357341eda4dbd940477e5c8fb57e1fa153a16eea32f3f4999990d6bbe534b9f20a63868b809678291dd18f64b674082d7b151c53e1dbf6deed5513af91cc581b1037562a0bb9097963a3616c8a77bb8910a933757023811430632f572beb63e88ef2f1862acd8787475e31f370f1d77ca9223b6d1da93f3492d211f9a1925ce023d9493a18751580707b80241275327cb228fca201c493887ea84981633b678306fec41506663596012f56afa4281ea53ff93fa80e61c48b192609267b38669fd3f43dec18321c0e3ca63d574b7e5117236f02168dbba958ade7056cf309986a53fb7d7bf546c11e94d482a00dc1993cca67d583d4507e1e03db50739113db7fe421ebefbf94a34ff2a2e2c398e7b72432a008ec90c448977dd538c8bb267f776d565117e73f108d9fe962258ca0408be35de044b60bd71f6905f18ad3bcbf4d42f718115c8ba2031e4f34ff9634036db04d9f5b19b9d2dda09341bb3e91f4c9f30c058921dbacdd7e150c0735e762adad0f6b67efb299f4d170b397ae65d1b7ab7bbf6e1a0692374d790203e38480f78f3bdd89a61161238c3ff1708d61da129fb647d9d2ef5385e8fc6c0116093c82fb0ac498c62ff00035e828201bb79b06d499a991768921e53b71d27c8350d7cc08a89b458af201d7e63ef4ac8483fdb362420c4d947617a4db4ba21543ccc61373dbf664ef4741e09c83db3488b2e456f4f31acef18db128c606b1423d04f3ab780d28c0d399b95ae43267390241cd6cea4a95ef6a8c81259f2b4f11a20a14141b817a2ef4c61be241c62a01cadc0183b51d7eba200ee8f6185b49bebbdb76414f93def81a35510a3175a6dad5b51c48e1022b3426e2fa2a4bfd2307294e43587b61e6487d2665366e44c0f14bffd97d01339afbfe57dbb7c660e56a0bb6935cdcc7dfa14a00d57f9c612893c03baf912ee555d942af9ac4c6fdac7bf848faeacbc33bb80d640393f9184397ec89f1cb85ec80ef665db7476e77db9911f33444391006c74aa5cdb4b75d7b841ed040fb9551e2a3caa072725376530721b700bfec6ef41e0237fe865d14dd1550ab5fcd0247f0fcdb14dd531ff3237f6ca758144034ab1930b608ca4ecf3d3c8a9394c7afa5e930f2ef97f5f11189b2a75358f0cbec5113ab13d52f0ca498321b4a74680f98fd7f75c5e4b0b6c46637c36408cbfb9aa1430aae2cfcc178deeac2974b6a733b739e8cbd8553ad14394fc29ce94ee8e9eecc087f8a77ff74b5ee2da8c5a0aedc79dd778da4052fd07a5da18c8bbccaf17850f7d57744bdb7fbc916caf3e643f4e92c3cec03e3cec150bed7d3995fdece407f93257d3b6818a8db1ded12fdf6d14c5d93aa3181a9052f897f5f379ecae1547092004288c8120f8a0ef3baefbff87e10cddced1b3dc9615f189fd7d03772db88c52bc3feb244e6e078fbd990763438c6fd65cde772b915e32e9d3e4ac7c6e0c72cdb25133b48134f3707be3cadf9d611a2529b444c214bc09d525fad703afb7422f4c78e24f5ce0e36a516bb42d829f589b2b8a07abeb9dbfee15df843f5fddcc6c7a671348208eefab7bb0dcf066992d0bbc6e30382bb0bffb642c3779bfc472836086986144d4b818ff9c3897ec95948899519933e9667f841bcd13228fb7e93936ff5cb59d23529a31030da49aba85fe0cb8fa00776b7949d1c437a22ecf3618de6455965ac3673f41c7a5209f277529d4fc9388b1fd22951458e5fdd19c98408e0afc679f67b8958cc48c265dd52c87db818f9bd7c1b30924087a78fa9c811935c797c566d219ab83106c59d5c2e285ff09afc5ec0df2973e6a563a1ec462b00f9b70fc641027d2058b43758b64714d412838b16e135426b4be74cb4b110c7700752a1c7a55aa0de4df4ff52eeb614a5772b04780cefc53755032a36e63c2d883905c547d40a874ebe603034f2d8f1a41ac6646801659642cc0b327a2f9a48e98605b230bf35af948df26950dcff36c02c097b0fc6e4aeda80c5bfea92746d2da8a1be2b70b1a26ca9cc7a2fa86134784416ba2181a599327f0bdb8b8cb6467ced9cf87ef2395ed0078f7efdb169a0e6e1935992a57ec35d43056430d5fae6dd054f3dee794d8aef01e45ac9ba9147280e107030c798080515974a4ab6d5284fc265c0f57692e62488947c80bbd6a425771b4add15450524181fc5160cef53a58b58a3a539eecc3c61dd76b00f8ff06c8292bc2f5fb051b4cf23a58bc95847676ceaa59a90e028fd5b0befcac57efda49b352c1316bdfa78be7577daeba3e1e894296feb5875ebaed7cb3762fde391eb7fbbceeb3b02a7c599863710fc1fa426b7460e87b7386d448f79f5189bc1ece43dd2270df15c880f420e2d64d4fff3fe4e50ff491e0d99b595c3add9e02c2715de236078077fa30054fdc2780c6f28daf988a8b3107c5d44304e02352e6d720d6fe12fb37ae1ff91937f1b7b44d9afb94067a7a6de270ecd20cc843d8a2e747bf6a88dd446618f47c0341d56484e24b71dc96a5275f14b1835efd0f5e316c5f3df627d47ad0b3ff277f2b759841d649a6ad070e703894911ae6a29c78d6f7c936eb3e3c377534001cab1ba90898388d10c590cb29ad9192dfd918982de91d60f7066a811a5c1826974f28b8982d7125a2e079b9934a1763b8f7412c4090403d273908830ca71f9c2443b6d23a928e48ba27f720ffda822f079c0eeed6810f3c6ba426cefbcf9a3a92bcc2eb6295341f446df99dc68923ad60431511c2af9956b1942c8fc28d334eeb8bffa94160da4602b936b34829ebe51608522b5410e0343a16de0aa18a6cf294f72b831cf6746f8132221dee92a767d840cdfe86a7ba9dbb2cb777e9b7d018f82d0b716a1e74c2d2db4d3fe85f8ce39043a63b5c77cc678ddd7faebf80f23ba14017b6dac2993b390d7d16f70fbeb3771f6f068c324f4462dc4632655c6e68c27029b0fb2644c81e29ca25d00f23251f6258b6521c0bb86e18c99d44aa2de2eb537dc406806e19865415c1eb48bf60afdf1834750270c996568e4a0de49d58e4b448a1fa35ca98f3b1735b21f86be5bafbafb7ca39985772e6e9ec1c04f5ce2141f5cb845bf7850a15fdcfdcfd5e6fea50b96f4352707dd2962f2a09a631ae95b7c1c4cc01cd23984893e117204721ca9f012f877a7f9141bea8ea6472a5457e797a61ed4e524ca99afe597e285eb5ea3448b4403bc5b74ca3a30233b7129b87bb171b4e85e69e82ca204857c2532a74330ba9732c90d2a408e3ceb6e28f92326c6a27024f057cff1768b1b6855536408264699cb1e270394b08b5c41609d8eb68d62354262de44bdd56b415d54940758ab30252e36e0332a6070f8be903a0296037bc3b35687c9505bdf0fc595bb140e962dbf672e0ab10ae288f919e48e7e0da55b0754c4b16769e65fe82a175b73f87", 0x1000}, {&(0x7f00000003c0)="f2ff008431edabd056f88790d5a4b74f03c7a91c02b1139aad97d5a73ad923b5a1bbef8b7497182cf524f6bf1309519cb477125e4c4fc2752009e9a6d6e301540c3ff45da0cc9f8936bd6c6581713cc216c33ab939dfa7c5e6a2ade28d6850e3fc8abdf0cf68fa281963f172ad1fab4a745a0925454169", 0x77}], 0x3, &(0x7f0000000900)=[@dontfrag={{0x14}}, @hopopts_2292={{0x78, 0x29, 0x36, {0x16, 0xb, '\x00', [@ra={0x5, 0x2, 0x5}, @calipso={0x7, 0x18, {0x2, 0x4, 0x9, 0x2, [0x8000000000000001, 0x706]}}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x1}, @calipso={0x7, 0x28, {0x0, 0x8, 0xb, 0x5, [0xae, 0x7fffffff, 0x1, 0x82]}}, @enc_lim={0x4, 0x1, 0xc}, @jumbo={0xc2, 0x4, 0x4}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, r7}}}, @hopopts={{0x220, 0x29, 0x36, {0x3c, 0x40, '\x00', [@pad1, @hao={0xc9, 0x10, @rand_addr=' \x01\x00'}, @generic={0x1, 0x28, "69374ce8bbba1d2a4f57bebaf47b18e9e98cf7d45abb36c1e59ff6bec78f822824ffdfa423bb4243"}, @generic={0x6, 0xd3, "d6d8477f540d7d0e69ec965da71379ee9eef77dd371ea532a6d0fbee98f41b776714393b765b6d3620a226fbacbab5c3eed758edabda8195d3ee9e45f787884d422b1c62febbf12d9f54704a0fbd05fa29a16198db970c74e1c79071031eacdbdeb7a464c789e0b45134c5209e9de7472015e7850d8a2f2cd99137a1339ad8621e762045bc25c86d07465e9cae5a08059d30d3b6e3b1ad46b4314aab01bf0f627478296f49b1994a48c24e9cd2feaa00014ef79ee239849b0dc2c66b03c625d58056c13cee8000e765c0438936a8283d28dd72"}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x37}}, @generic={0xf0, 0x57, "bfedc3315ee2a8be94a47821a5c72d3cd7513b7ed59b4f1978d06c8b00f55285cecbf06c30c820a9d236ae2b88bdcba024f4acceeb18ff1ccbb876efb1efd0361f2964947bcc44917cac4d0ccc893e3d048a38d1b6c0a9"}, @ra={0x5, 0x2, 0xa94}, @enc_lim={0x4, 0x1, 0x2}, @enc_lim, @generic={0x6, 0x76, "cd5079ef17e66b19a7abd10ca3b6a51a8c6915ad6719a8c08a115d50f3677a8bc399ed30dc8a07404acad48866ca8297481ffb428b60ba968c4a0f3e226aba172eedb349afeaf214cce8a3690a9e9ebf49e1f50e14213712fec5d751c433bebc44252604ee453e9ba44586990d2f806678167930cd02"}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x8}}, @dstopts={{0x20, 0x29, 0x37, {0x11, 0x0, '\x00', [@ra={0x5, 0x2, 0x40}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0xb7}}], 0x328}}], 0x1, 0x4c085) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) creat(0x0, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='mm_page_alloc\x00', r11}, 0x10) unshare(0x66000080) sendmsg$nl_route(r9, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000f40)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000400028008000a00bc"], 0x40}}, 0x0) 5.145093481s ago: executing program 7 (id=17315): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$kcm(0x29, 0x5, 0x0) sendmmsg$inet(r1, &(0x7f0000004e80)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000440)="e1", 0x1}], 0x1}}], 0x1, 0x4000005) close(r1) r2 = add_key$keyring(&(0x7f0000000300), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, r2) add_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000280)="86015466e6b9ac7b8c0c554056edd29dab93469105e5087ca8639444867af7064f608b9ae7fcac2e10bd3d4da451d954f261144828ab7ad2e1a37a976162a5b4960b453334ae6c06a7c0acbe4e232ba44e8f1fcb4cf52a305622969779404dcb48f7df9d0fec64c82364a41f40096803778e12fef92467f07bc4e3c19cc1d898d26b11dbc68af6a575bd6a96b5ad547e2439675e477c2f94b85aa6d14d52ae969b50086d50449ba90ffbc967786fd295a7cd4485a9068fcf3f4cfcab137a329218a6ee6191b243792f9c38aa63bbc0cbe64389", 0xd3, r2) r3 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000780)={'vxcan1\x00', 0x0}) getpeername$packet(r3, &(0x7f0000000500), &(0x7f0000000540)=0x14) bind$can_j1939(r3, &(0x7f0000000040)={0x1d, r4, 0x3}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) syz_usb_connect$cdc_ncm(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000140), r3) sendmsg$nl_route_sched(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)=@newqdisc={0x34, 0x24, 0xb8b800e75dbfe67d, 0x70bd27, 0x25dfdbfe, {0x0, 0x0, 0x0, r4, {0x3, 0xffe0}, {0xc, 0xb}, {0x7, 0x3}}, [@qdisc_kind_options=@q_atm={0x8}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0xc69}]}, 0x34}, 0x1, 0x0, 0x0, 0x8040}, 0x20000010) r5 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)={0x0, 0x20, 0x20}, 0x18) r6 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000740), 0x1, r7}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mount_setattr(r5, &(0x7f0000000480)='./file0\x00', 0x1000, &(0x7f00000004c0)={0x100070, 0x3, 0x140000, {r6}}, 0x20) socket$nl_generic(0x10, 0x3, 0x10) 4.087028369s ago: executing program 1 (id=17330): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000014c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r2, 0xfeffff, 0xe80, 0x3f000002, &(0x7f0000000700)="c45c57ce395de5b289f07d637a223920f181c2e57d71483cfb2d075a3ff07258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1b6f969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aad4b0a103c589f676b6c4e85eb3950c533b6e62c39ccf9ae9bfe54ee5887358d44f46337fbe090d7c7e55847edee8130ffd3d1e719e01a68b0e691c0d35b0b56e0b514036342fd56f08ac0083f3c2fe41a1295a3d23cf3d160d4fd90f66beba68860456ed41272e1e68d16c2564c85f5556e18784113c493d13253e14d6eb891707fba3c30d07d5ee8619e4426cafec4cf6a3723c455d09b586b248", 0x0, 0xf0, 0x0, 0xfffffffffffffda0, 0xffffff5a}, 0x40) 4.054223439s ago: executing program 1 (id=17331): r0 = socket(0x10, 0x803, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, 0x0, &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10000, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) io_uring_setup(0x60f7, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00"/49], 0xfdef) r3 = socket$inet6(0xa, 0x3, 0x8000000003c) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000014c0)=@raw={'raw\x00', 0x8, 0x3, 0x528, 0x0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x458, 0xffffffff, 0xffffffff, 0x458, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00', {}, {}, 0x62}, 0x0, 0x358, 0x388, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'veth0_to_hsr\x00', {0x4, 0x8, 0x20, 0x5e1b2d47, 0xf91, 0x5, 0x4, 0x9f7, 0x18}, {0x8}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x588) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x5, 0xb68, 0x1300, &(0x7f0000000000)='%', 0x0, 0xd01, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bind$rxrpc(r2, &(0x7f0000000000)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) listen(r2, 0x4) bind$xdp(r0, &(0x7f0000000180)={0x2c, 0x0, 0x0, 0x3d, r0}, 0x10) socket$inet_dccp(0x2, 0x6, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) 3.044432267s ago: executing program 6 (id=17337): bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1e, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000100010081120e000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @sk_lookup=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x400, @void, @value}, 0x94) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0x8004587d, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2, 0x7}) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0, 0x1c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) futex(0x0, 0xd, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000)=0x2000000, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000007100)={0x0, 0x0, &(0x7f00000070c0)={&(0x7f0000004e00)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a18000000120a00040000000000000000000000000400048020000000000a01040000000000000000030000000900010073797a300000000030000000160a0101000000000000000003000000040003800900020073797a31000000000900010073797a30"], 0x90}}, 0x40840) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) fcntl$notify(r0, 0x402, 0x17) r5 = open(&(0x7f0000000280)='.\x00', 0x0, 0x10) fcntl$notify(r5, 0x402, 0x3) r6 = open(&(0x7f00000000c0)='.\x00', 0x50080, 0x0) getdents(r6, &(0x7f0000001fc0)=""/184, 0x20002078) 3.016841047s ago: executing program 1 (id=17339): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x18) utimes(&(0x7f0000000000)='./file0\x00', 0x0) r3 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) mq_timedsend(r3, 0x0, 0x0, 0x7fff, 0x0) 2.985590947s ago: executing program 6 (id=17340): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050000000850000000800000095"], &(0x7f00000002c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', 0x0) 2.920554536s ago: executing program 6 (id=17341): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$kcm(0x29, 0x5, 0x0) sendmmsg$inet(r1, &(0x7f0000004e80)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000440)="e1", 0x1}], 0x1}}], 0x1, 0x4000005) close(r1) add_key$keyring(&(0x7f0000000300), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r2 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000780)={'vxcan1\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000040)={0x1d, r3, 0x3}, 0x18) syz_usb_connect$cdc_ncm(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000140), r2) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x8040}, 0x20000010) 2.727112996s ago: executing program 0 (id=17346): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$kcm(0x29, 0x5, 0x0) sendmmsg$inet(r1, &(0x7f0000004e80)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000440)="e1", 0x1}], 0x1}}], 0x1, 0x4000005) close(r1) r2 = add_key$keyring(&(0x7f0000000300), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, 0x0, r2) add_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000280)="86015466e6b9ac7b8c0c554056edd29dab93469105e5087ca8639444867af7064f608b9ae7fcac2e10bd3d4da451d954f261144828ab7ad2e1a37a976162a5b4960b453334ae6c06a7c0acbe4e232ba44e8f1fcb4cf52a305622969779404dcb48f7df9d0fec64c82364a41f40096803778e12fef92467f07bc4e3c19cc1d898d26b11dbc68af6a575bd6a96b5ad547e2439675e477c2f94b85aa6d14d52ae969b50086d50449ba90ffbc967786fd295a7cd4485a9068fcf3f4cfcab137a329218a6ee6191b243792f9c38aa63bbc0cbe64389", 0xd3, r2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000780)={'vxcan1\x00', 0x0}) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000040)={0x1d, r3, 0x3}, 0x18) syz_usb_connect$cdc_ncm(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x8040}, 0x20000010) 2.726036986s ago: executing program 3 (id=17347): r0 = socket(0x10, 0x803, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, 0x0, &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10000, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) io_uring_setup(0x60f7, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac14"], 0xfdef) r3 = socket$inet6(0xa, 0x3, 0x8000000003c) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000014c0)=@raw={'raw\x00', 0x8, 0x3, 0x528, 0x0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x458, 0xffffffff, 0xffffffff, 0x458, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00', {}, {}, 0x62}, 0x0, 0x358, 0x388, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'veth0_to_hsr\x00', {0x4, 0x8, 0x20, 0x5e1b2d47, 0xf91, 0x5, 0x4, 0x9f7, 0x18}, {0x8}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x588) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x5, 0xb68, 0x1300, &(0x7f0000000000)='%', 0x0, 0xd01, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bind$rxrpc(r2, &(0x7f0000000000)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) listen(r2, 0x4) bind$xdp(r0, &(0x7f0000000180)={0x2c, 0x0, 0x0, 0x3d, r0}, 0x10) socket$inet_dccp(0x2, 0x6, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) 2.460626135s ago: executing program 7 (id=17348): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r1, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000080)='kfree\x00', r6, 0x0, 0x4}, 0x18) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) syz_open_dev$usbfs(&(0x7f0000000080), 0x70, 0x101301) (fail_nth: 4) 2.416027656s ago: executing program 3 (id=17349): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000780)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x18) syz_genetlink_get_family_id$mptcp(&(0x7f0000000280), r0) 2.009605045s ago: executing program 1 (id=17350): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180200000020702500000000002020207b1af8ff00000000bfa100000000000007010000dbffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = open(0x0, 0x0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc, 0x4, 0x0, 0x5}, 0x10) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) sendmmsg(r3, &(0x7f00000030c0)=[{{0x0, 0xa9cc7003, &(0x7f0000000400)=[{&(0x7f00000000c0)="ee", 0x101d0}], 0x1}}], 0x400000000000181, 0x9200000000000000) close_range(r1, 0xffffffffffffffff, 0x0) 1.914188575s ago: executing program 0 (id=17351): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050000000850000000800000095"], &(0x7f00000002c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', 0x0) 1.828416254s ago: executing program 0 (id=17352): socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/power/wakeup_count', 0x0, 0x80) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x394, 0x2, @perf_bp={0x0, 0x9}, 0x280, 0x0, 0xfffffffe, 0x4, 0x3, 0x0, 0x100}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a"], 0xa8}, 0x1, 0x0, 0x0, 0x200000d0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) sched_setaffinity(r4, 0x8, &(0x7f0000000280)=0x996e) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f00000700000000000000", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000008000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r8, 0x0, 0xfffffffffffffffc}, 0x18) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000080)='./file1\x00', 0x1808004, &(0x7f0000000000)=ANY=[@ANYRES16=0x0, @ANYRES64], 0x4, 0x7c1, &(0x7f0000001a00)="$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") openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000008c0)='page_pool_state_hold\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="070000000400000000070000000746002c"], 0x50) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x108002, 0x182) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0xe000001a}) read$char_usb(r1, &(0x7f0000001980)=""/179, 0xb3) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)={0x2000000}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) 1.586877664s ago: executing program 7 (id=17353): r0 = socket(0x10, 0x803, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[], &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10000, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) io_uring_setup(0x60f7, &(0x7f0000000a40)={0x0, 0x0, 0x2, 0xfffffffe, 0x3bd}) socket$rxrpc(0x21, 0x2, 0xa) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001e80)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94) r2 = socket$inet6(0xa, 0x3, 0x8000000003c) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000014c0)=@raw={'raw\x00', 0x8, 0x3, 0x528, 0x0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x458, 0xffffffff, 0xffffffff, 0x458, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00', {}, {}, 0x62}, 0x0, 0x358, 0x388, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'veth0_to_hsr\x00', {0x4, 0x8, 0x20, 0x5e1b2d47, 0xf91, 0x5, 0x4, 0x9f7, 0x18}, {0x8}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x588) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xb68, 0x1300, &(0x7f0000000000)='%', 0x0, 0xd01, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) bind$xdp(r0, &(0x7f0000000180)={0x2c, 0x0, r4, 0x3d, r0}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f00000000c0)="010001000000000000001000015b097ead85847817353d2dbad05dd5", 0x1c, 0xfffffffffffffffd) 1.556832864s ago: executing program 3 (id=17354): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x444, &(0x7f0000000ac0)=ANY=[@ANYBLOB="75746638006d61703d6f983c756661703d6e6f726d616c2c6909000000f2ff00003dda5de4d586f0df206d65656b416d6f64653d3078303030303010303071303030303030302c73657373696f6e3d307830faffffff30303030303030f4e4b4f82c6d61736b3d4d4159574b50be30c8486470722677b93165cfe6f62127553b2017754598752d977369672c7063723d303030303030303030303030303030303030332c64566e745f6d6561737572652c00000000000000006bbf4d6406b59dbc529c00000000000000fada265ab14119997600a2299d2c35a2efc1bf037787a0d801f26d335ef2ba9ac2423a358ccbb776b21e1d3b", @ANYRES64, @ANYRESHEX], 0xfe, 0x667, &(0x7f0000000d40)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)='%pS \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='kfree\x00', r1}, 0x10) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000002ec0)=""/4092, 0x691) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x10) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000200), 0x4000, 0x0) 1.502650803s ago: executing program 3 (id=17355): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0xfe, 0x0, 0x7ffc9ffe}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x0) 1.482672273s ago: executing program 3 (id=17356): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000014c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r2, 0xfeffff, 0xe80, 0x3f000002, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0xfffffffffffffda0, 0xffffff5a}, 0x40) 1.469369233s ago: executing program 0 (id=17357): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) lsetxattr$security_capability(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300), 0x0, 0x0, 0x2) r2 = eventfd(0x800a6) write$eventfd(r2, &(0x7f0000000300)=0xfffffffffffffffb, 0x8) r3 = dup(r2) read$eventfd(r3, &(0x7f0000000040), 0x8) ioctl$USBDEVFS_DISCSIGNAL(r3, 0x8010550e, &(0x7f0000000040)={0xb, &(0x7f0000000000)="323c306dca6333e551d093d15d33be5b7994f46d2f8a5c0624ad6a1b62bb8f81712cda108ed37977ae67c9e613a8ebd16e934ad532"}) r4 = socket$inet_smc(0x2b, 0x1, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, r4, {0x2, 0x4e23, @multicast1}, 0x1, 0x1, 0x1, 0x3}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000480)="9b90ef574d781c659be65c9a4b8a8b8dfba1cc6df009bc5cf68a9368d2477a8c89de3d27b2e10a26b59505a0e5095b67455472caf9aeb8d0d2db4432658a23acf246db757199e949514640cbac779419212963d1b6c6d533eed49850b6300369a3805fd675c73741b3fbf41b68320889e144f24b0e93ddbe606c1f7f4a90a7a8519accfec11cd9871ea693c68ea4", 0x8e}, {&(0x7f0000000580)="39bd372b69213e695797fe5f43a2776091b28da7d1c08a0ac23513d9359ab9f2589abe42c40a97d64e943ccade82d7c522b061c8b9b2008536861c88eda005a6eca493b8e3c33b274681273fa6a50d028621fc9604de6bb3edc1b98efa5255d84ae9b81ede290d22cb1b7aef4f0ec9d9ae21fd758ff266aa5c4dff0fc838801ea3dad1f47a1e4ead086693946795461fb8a6f753ca15cb6a8e8c12c6a9edc2b3075c57d72e1bf46e4ae56dfa53409aa0f9b1ff3a5f4f06", 0xb7}, {&(0x7f0000000640)="f30f8e9408902d05fe0dc9ee37a0dcfd8c996490c07335e951cb6d584d84ca20f699129cadfaba4e2d25514166ffddab05dccaa3489d67937e4d7f2b3bb928ebc49da6989e8b1de1b99f2720e153d21f964a94579f8b6ae3d397db4e12636affbb3932cf1cd084d128833a0b230e3711ad7ee153f6ed51c7c4e9acf6bddc059f5f757503c70d9528c7ebe6c16cf51d21eaaae8f0241e3058c1401911437e1d1a82c534dcd74932f4eb5fcaea2f3b46bf1eed4d55cbeacdb718427be54eba8de77d357ed080f5b3beafd1ee06a0cd744261a7fb9aa61468780cc9ef58c15b339b0da68cf3ae9de317f9e7e9", 0xeb}, {&(0x7f0000000140)="8cef7c1dc184f01d3f", 0x9}, {&(0x7f0000000740)="478a24b7fd00a308abb1589c5ea285a6cdd13b7c5d9df1f8bb1c30997f855377292e891dfd77481724f28b623fa3da5a87ca4fd71833f33d149f268b37e1010f2f77f6fc047d910e3732e89c10328d2d064ffe17fd5a514fc1528be56692535289717128939ecc0ddfad78c8ee3b9a996c0f3de7fcbab6eb3c9c729d2f5b46f0bb7cbf1e035279e0876b343be09dd5", 0x8f}], 0x5, &(0x7f0000000800)=[@timestamping={{0x14, 0x1, 0x25, 0x80000000}}, @mark={{0x14, 0x1, 0x24, 0x200}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @mark={{0x14, 0x1, 0x24, 0xfffffffc}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x364b}}], 0xa8}, 0x4004000) 1.411967823s ago: executing program 3 (id=17358): r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x88002, 0x0) pwritev(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)="99a61d9d66", 0x5}], 0x1, 0x3fc, 0xfffffff7) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x0, 0x0, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r1 = socket(0x28, 0x5, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r4}, 0x18) process_vm_writev(0x0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2b, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000003000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r7}, 0x0, &(0x7f00000002c0)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) unshare(0x64000600) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone3(&(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x5c) listen(r1, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0x0) 1.367652323s ago: executing program 6 (id=17359): r0 = socket(0x10, 0x803, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, 0x0, &(0x7f0000000740)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10000, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r1, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) io_uring_setup(0x60f7, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac14"], 0xfdef) r3 = socket$inet6(0xa, 0x3, 0x8000000003c) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000014c0)=@raw={'raw\x00', 0x8, 0x3, 0x528, 0x0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x458, 0xffffffff, 0xffffffff, 0x458, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00', {}, {}, 0x62}, 0x0, 0x358, 0x388, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'veth0_to_hsr\x00', {0x4, 0x8, 0x20, 0x5e1b2d47, 0xf91, 0x5, 0x4, 0x9f7, 0x18}, {0x8}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x588) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x5, 0xb68, 0x1300, &(0x7f0000000000)='%', 0x0, 0xd01, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bind$rxrpc(r2, &(0x7f0000000000)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) listen(r2, 0x4) bind$xdp(r0, &(0x7f0000000180)={0x2c, 0x0, 0x0, 0x3d, r0}, 0x10) socket$inet_dccp(0x2, 0x6, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) 916.701342ms ago: executing program 1 (id=17360): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) utimes(&(0x7f0000000000)='./file0\x00', 0x0) r2 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) mq_timedsend(r2, 0x0, 0x0, 0x7fff, 0x0) 228.666141ms ago: executing program 0 (id=17361): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)={0x110, 0x26, 0x1, 0x0, 0x0, "", [@nested={0x100, 0x3ffd, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@loopback}, @generic="50bb2d6f67d29d6fabadb107d0def49c88ea04abde1d5e8d3fb22a1b5046778bdafefc46b0449ade68bf84b36ec72dd71265fc2e882348c26c2126237dd5b37f5ae655b1086cda40e00aec58754734be31d750351dc076eb43d9621dc08c029d1608a487f26fbe816b89f7cb81bff81a8b9482565856555ee923c65973deb0a99b962bc0fe94a3fcae3697bd7b85b3a682167c43dbf137115a40ebddcad74875ec58e9a3ddb9ad02a078cf0d972df9e99f079767734f69ce475f55ac64337803f5eb4e5842f4d98fe3fa370d47eb640dc5061dc35817c8a66c29be82"]}]}, 0x110}], 0x1}, 0x0) (fail_nth: 6) 181.045131ms ago: executing program 0 (id=17362): r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x9d22f000) (async, rerun: 64) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYRES64=r1, @ANYRES32=r0, @ANYRES8=0x0, @ANYRES8=r3, @ANYRES64=r4, @ANYRESDEC=r2, @ANYRES64=r4, @ANYRES64=r2, @ANYRES8=r4, @ANYRES32=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket(0x28, 0x4, 0x8000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) (async) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3, 0x0, 0x1623}) (async, rerun: 32) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x20040841) (rerun: 32) r6 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r6, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) (async) r7 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r7, 0x10f, 0x87, &(0x7f0000000080)={0x43, 0x0, 0x3, 0x3}, 0x10) (async, rerun: 32) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) (rerun: 32) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000850000000800000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r8}, 0x18) (async) pipe2$9p(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r11 = dup(r10) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r11}, 0x2c, {[], [], 0x6b}}) (async) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) sendmsg$tipc(r6, &(0x7f0000000280)={&(0x7f0000000040), 0x10, 0x0}, 0x0) (async) r12 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) (async, rerun: 64) r13 = socket$nl_route(0x10, 0x3, 0x0) (async, rerun: 64) r14 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r14, &(0x7f0000003080)=[{{&(0x7f0000002e40)={0xa, 0x0, 0x6, @mcast2, 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="14000000000000002900000008"], 0x18}}], 0x1, 0x0) (async, rerun: 64) sendmsg$nl_route(r13, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="240000001800090000000000000000001c140000fe00000100000000080013"], 0x24}}, 0x0) (async, rerun: 64) ioctl$LOOP_SET_BLOCK_SIZE(r12, 0x4c09, 0x2) ioctl$RTC_UIE_ON(r0, 0x7003) (async) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040)={0x0, 0x10, 0x0, 0x17, 0x7, 0xa9}) 152.549511ms ago: executing program 6 (id=17363): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x16, 0x0, 0x5, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x6}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x40100000, 0x0, 0x0, 0x0, 0x0, 0x0) 103.98278ms ago: executing program 7 (id=17364): r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x67, 0x0, 0x0, 0x9, 0x0, 0x0, 0x8591, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={0x0}, 0x900, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xfffffffffffffe00, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000500)=ANY=[@ANYRES32=r0, @ANYRES64=0x0, @ANYBLOB, @ANYRES32=r0, @ANYRESHEX=r0, @ANYRES16=r0], &(0x7f0000000700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xffffffdf, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1c, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r3}, 0x10) faccessat(0xffffffffffffff9c, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') unshare(0x68060200) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001780)={&(0x7f0000000500)=ANY=[], 0x2cc}}, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000400)={0x0, 0xe29, 0x30, 0x5, 0xfffffffffffffffc}, &(0x7f0000000440)=0x18) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000480)={r5, 0x7}, 0x8) r6 = socket(0x10, 0x3, 0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ieee802154(0x0, r7) sendmsg$IEEE802154_ADD_IFACE(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r8, @ANYBLOB="0000fcff7fbdd123676aad16d6000003000021000000"], 0x14}}, 0x0) r9 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(r7, &(0x7f00000003c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES16=r9, @ANYBLOB="020026bd7000fbdbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x94}, 0x20008080) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', 0xffffffffffffffff, 0x0, 0x80000000000000}, 0x18) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019f00000000000000000a000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmmsg(r6, &(0x7f0000000000), 0x4000000000001f2, 0x0) 63.614111ms ago: executing program 1 (id=17365): bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[], 0x50) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000ffff0c63b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 6.84048ms ago: executing program 6 (id=17366): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f00000003c0)={[{@noblock_validity}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9}}, {@sysvgroups}, {@norecovery}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@orlov}, {@debug}, {@noauto_da_alloc}, {@nomblk_io_submit}]}, 0x3, 0x585, &(0x7f0000000c00)="$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") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c00)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40000, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x62, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0x439, 0x70fd2c, 0xffffffea, {0x0, 0x0, 0xe403, 0x0, 0x22c, 0x610c3}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x8, 0x3, @dev}, @IFLA_IPTUN_6RD_RELAY_PREFIXLEN={0x6, 0xe, 0xc2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000}, [@call={0x85, 0x0, 0x0, 0xad}]}, &(0x7f0000000300)='GPL\x00', 0xc, 0xff8, &(0x7f0000001e00)=""/4088, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r3}, 0x10) ioctl$FS_IOC_RESVSP(r2, 0x40305839, &(0x7f0000000080)={0x0, 0x0, 0xbd9, 0x400000004}) (fail_nth: 1) 0s ago: executing program 7 (id=17367): socket$nl_generic(0x10, 0x3, 0x10) r0 = epoll_create1(0x80000) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/power/wakeup_count', 0x0, 0x80) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x394, 0x2, @perf_bp={0x0, 0x9}, 0x280, 0x0, 0xfffffffe, 0x4, 0x3, 0x0, 0x100}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a"], 0xa8}, 0x1, 0x0, 0x0, 0x200000d0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) sched_setaffinity(r4, 0x8, &(0x7f0000000280)=0x996e) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f00000700000000000000", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000008000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r8, 0x0, 0xfffffffffffffffc}, 0x18) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000080)='./file1\x00', 0x1808004, &(0x7f0000000000)=ANY=[@ANYRES16=0x0, @ANYRES64], 0x4, 0x7c1, &(0x7f0000001a00)="$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") openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000008c0)='page_pool_state_hold\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="070000000400000000070000000746002c"], 0x50) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x108002, 0x182) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0xe000001a}) read$char_usb(r1, &(0x7f0000001980)=""/179, 0xb3) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)={0x2000000}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) kernel console output (not intermixed with test programs): 00000. [ 1304.059072][T24051] rock: directory entry would overflow storage [ 1304.065329][T24051] rock: sig=0x4f50, size=4, remaining=3 [ 1304.071073][T24051] iso9660: Corrupted directory entry in block 6 of inode 1792 [ 1304.165921][T24064] syz.0.16503[24064] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1304.166061][T24064] syz.0.16503[24064] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1304.192957][T24064] syz.0.16503[24064] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1304.419215][T24085] loop3: detected capacity change from 0 to 764 [ 1304.442166][T24085] Symlink component flag not implemented [ 1304.449766][T24085] Symlink component flag not implemented (129) [ 1304.459148][T24085] rock: directory entry would overflow storage [ 1304.465415][T24085] rock: sig=0x4f50, size=4, remaining=3 [ 1304.470989][T24085] iso9660: Corrupted directory entry in block 6 of inode 1792 [ 1304.746015][T24103] tipc: Cannot configure node identity twice [ 1304.786590][T24103] syz_tun: entered allmulticast mode [ 1304.833303][T24107] atomic_op ffff88812ab18528 conn xmit_atomic 0000000000000000 [ 1304.835199][T24102] syz_tun: left allmulticast mode [ 1304.908348][T24110] xt_TPROXY: Can be used only with -p tcp or -p udp [ 1305.162017][T24141] netlink: 'syz.7.16531': attribute type 1 has an invalid length. [ 1305.169969][T24141] netlink: 224 bytes leftover after parsing attributes in process `syz.7.16531'. [ 1305.186800][T24141] loop7: detected capacity change from 0 to 164 [ 1305.299430][T24151] loop7: detected capacity change from 0 to 512 [ 1305.317876][T24151] EXT4-fs error (device loop7): ext4_validate_block_bitmap:441: comm syz.7.16535: bg 0: block 248: padding at end of block bitmap is not set [ 1305.333244][T24151] EXT4-fs error (device loop7): ext4_acquire_dquot:6938: comm syz.7.16535: Failed to acquire dquot type 1 [ 1305.346427][T24151] EXT4-fs (loop7): 1 truncate cleaned up [ 1305.352365][T24151] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1305.365121][T24151] ext4 filesystem being mounted at /328/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 1305.386855][T18658] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1305.462302][T24163] loop7: detected capacity change from 0 to 512 [ 1305.495470][T24163] EXT4-fs (loop7): revision level too high, forcing read-only mode [ 1305.503555][T24163] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=2842c018, mo2=0002] [ 1305.511718][T24163] System zones: 0-2, 18-18, 34-35 [ 1305.517286][T24163] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 1305.530415][T24163] EXT4-fs (loop7): shut down requested (0) [ 1305.645862][T18658] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1305.695325][T24179] loop7: detected capacity change from 0 to 2048 [ 1305.707969][T24179] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1305.741788][T18658] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1305.759114][T24187] netlink: 10 bytes leftover after parsing attributes in process `syz.1.16546'. [ 1305.809387][T24187] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 1305.967835][T24207] loop7: detected capacity change from 0 to 512 [ 1305.987965][T24207] EXT4-fs (loop7): revision level too high, forcing read-only mode [ 1305.996234][T24207] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=2842c018, mo2=0002] [ 1306.006118][T24207] System zones: 0-2, 18-18, 34-35 [ 1306.011978][T24207] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 1306.028734][T24207] EXT4-fs (loop7): shut down requested (0) [ 1306.090142][T24206] netlink: 72 bytes leftover after parsing attributes in process `syz.3.16553'. [ 1306.101330][T24206] loop3: detected capacity change from 0 to 164 [ 1306.120061][T18658] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1306.160530][T24217] loop7: detected capacity change from 0 to 2048 [ 1306.160776][T24218] FAULT_INJECTION: forcing a failure. [ 1306.160776][T24218] name failslab, interval 1, probability 0, space 0, times 0 [ 1306.180324][T24218] CPU: 1 UID: 0 PID: 24218 Comm: syz.6.16555 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1306.191329][T24218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1306.201411][T24218] Call Trace: [ 1306.204699][T24218] [ 1306.207627][T24218] dump_stack_lvl+0xf2/0x150 [ 1306.212323][T24218] dump_stack+0x15/0x1a [ 1306.216491][T24218] should_fail_ex+0x223/0x230 [ 1306.221180][T24218] should_failslab+0x8f/0xb0 [ 1306.225777][T24218] kmem_cache_alloc_noprof+0x52/0x320 [ 1306.231162][T24218] ? getname_flags+0x81/0x3b0 [ 1306.235852][T24218] getname_flags+0x81/0x3b0 [ 1306.240374][T24218] user_path_at+0x26/0x120 [ 1306.244852][T24218] __se_sys_mount+0x248/0x2d0 [ 1306.249612][T24218] ? fput+0x1c4/0x200 [ 1306.250536][T24217] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1306.253606][T24218] __x64_sys_mount+0x67/0x80 [ 1306.270200][T24218] x64_sys_call+0x2c84/0x2dc0 [ 1306.274981][T24218] do_syscall_64+0xc9/0x1c0 [ 1306.279669][T24218] ? clear_bhb_loop+0x55/0xb0 [ 1306.284397][T24218] ? clear_bhb_loop+0x55/0xb0 [ 1306.289137][T24218] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1306.295162][T24218] RIP: 0033:0x7f1416635d29 [ 1306.299591][T24218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1306.319207][T24218] RSP: 002b:00007f1414c80038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1306.327623][T24218] RAX: ffffffffffffffda RBX: 00007f1416826080 RCX: 00007f1416635d29 [ 1306.335631][T24218] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000000000000 [ 1306.343622][T24218] RBP: 00007f1414c80090 R08: 0000000000000000 R09: 0000000000000000 [ 1306.351671][T24218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1306.359664][T24218] R13: 0000000000000001 R14: 00007f1416826080 R15: 00007ffd4e22f8a8 [ 1306.367673][T24218] [ 1306.372988][T18658] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1306.386990][T24218] netlink: 10 bytes leftover after parsing attributes in process `syz.6.16555'. [ 1306.398986][T24227] syz.0.16561[24227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1306.399056][T24227] syz.0.16561[24227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1306.411733][T24227] syz.0.16561[24227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1306.419487][T24218] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 1306.446103][T24227] lo: entered allmulticast mode [ 1306.446842][T24229] xt_hashlimit: size too large, truncated to 1048576 [ 1306.469824][T24227] lo: entered promiscuous mode [ 1306.474684][T24227] lo: left allmulticast mode [ 1306.998500][T24252] FAULT_INJECTION: forcing a failure. [ 1306.998500][T24252] name failslab, interval 1, probability 0, space 0, times 0 [ 1307.011958][T24252] CPU: 1 UID: 0 PID: 24252 Comm: syz.0.16570 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1307.022912][T24252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1307.033008][T24252] Call Trace: [ 1307.036379][T24252] [ 1307.039327][T24252] dump_stack_lvl+0xf2/0x150 [ 1307.043965][T24252] dump_stack+0x15/0x1a [ 1307.048161][T24252] should_fail_ex+0x223/0x230 [ 1307.053009][T24252] ? bpf_xdp_link_attach+0xbf/0x370 [ 1307.058346][T24252] should_failslab+0x8f/0xb0 [ 1307.063090][T24252] __kmalloc_cache_noprof+0x4e/0x320 [ 1307.068408][T24252] bpf_xdp_link_attach+0xbf/0x370 [ 1307.073454][T24252] link_create+0x3d9/0x660 [ 1307.077906][T24252] __sys_bpf+0x430/0x7a0 [ 1307.082230][T24252] __x64_sys_bpf+0x43/0x50 [ 1307.086686][T24252] x64_sys_call+0x2914/0x2dc0 [ 1307.091407][T24252] do_syscall_64+0xc9/0x1c0 [ 1307.096041][T24252] ? clear_bhb_loop+0x55/0xb0 [ 1307.100742][T24252] ? clear_bhb_loop+0x55/0xb0 [ 1307.105453][T24252] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1307.111628][T24252] RIP: 0033:0x7f55be615d29 [ 1307.116062][T24252] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1307.135778][T24252] RSP: 002b:00007f55bcc81038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1307.144298][T24252] RAX: ffffffffffffffda RBX: 00007f55be805fa0 RCX: 00007f55be615d29 [ 1307.152394][T24252] RDX: 0000000000000040 RSI: 0000000020000240 RDI: 000000000000001c [ 1307.160451][T24252] RBP: 00007f55bcc81090 R08: 0000000000000000 R09: 0000000000000000 [ 1307.168426][T24252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1307.176439][T24252] R13: 0000000000000000 R14: 00007f55be805fa0 R15: 00007ffd347a9e28 [ 1307.184508][T24252] [ 1307.259063][T24278] loop7: detected capacity change from 0 to 2048 [ 1307.276146][T24278] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1307.346136][T18658] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1307.381737][T24295] netdevsim netdevsim3: loading /lib/firmware/. failed with error -22 [ 1307.389990][T24295] netdevsim netdevsim3: Direct firmware load for . failed with error -22 [ 1307.401554][T24295] netlink: 10 bytes leftover after parsing attributes in process `syz.3.16584'. [ 1307.425617][T24294] netlink: 8 bytes leftover after parsing attributes in process `syz.7.16585'. [ 1307.435068][T24294] IPVS: Error joining to the multicast group [ 1307.636278][T24313] FAULT_INJECTION: forcing a failure. [ 1307.636278][T24313] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1307.649429][T24313] CPU: 0 UID: 0 PID: 24313 Comm: syz.1.16593 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1307.660321][T24313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1307.670384][T24313] Call Trace: [ 1307.673671][T24313] [ 1307.676661][T24313] dump_stack_lvl+0xf2/0x150 [ 1307.681299][T24313] dump_stack+0x15/0x1a [ 1307.685555][T24313] should_fail_ex+0x223/0x230 [ 1307.690359][T24313] should_fail+0xb/0x10 [ 1307.694608][T24313] should_fail_usercopy+0x1a/0x20 [ 1307.699728][T24313] _copy_to_user+0x20/0xa0 [ 1307.704178][T24313] simple_read_from_buffer+0xa0/0x110 [ 1307.709588][T24313] proc_fail_nth_read+0xf9/0x140 [ 1307.714560][T24313] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1307.720241][T24313] vfs_read+0x1a2/0x700 [ 1307.724436][T24313] ? __rcu_read_unlock+0x4e/0x70 [ 1307.729499][T24313] ? __fget_files+0x17c/0x1c0 [ 1307.734249][T24313] ksys_read+0xe8/0x1b0 [ 1307.738480][T24313] __x64_sys_read+0x42/0x50 [ 1307.743130][T24313] x64_sys_call+0x2874/0x2dc0 [ 1307.747896][T24313] do_syscall_64+0xc9/0x1c0 [ 1307.752448][T24313] ? clear_bhb_loop+0x55/0xb0 [ 1307.757140][T24313] ? clear_bhb_loop+0x55/0xb0 [ 1307.761831][T24313] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1307.767752][T24313] RIP: 0033:0x7f1ed8c5473c [ 1307.772231][T24313] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1307.791924][T24313] RSP: 002b:00007f1ed72c1030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1307.800368][T24313] RAX: ffffffffffffffda RBX: 00007f1ed8e45fa0 RCX: 00007f1ed8c5473c [ 1307.808344][T24313] RDX: 000000000000000f RSI: 00007f1ed72c10a0 RDI: 0000000000000004 [ 1307.816360][T24313] RBP: 00007f1ed72c1090 R08: 0000000000000000 R09: 0000000000000000 [ 1307.824392][T24313] R10: 0000000020000100 R11: 0000000000000246 R12: 0000000000000001 [ 1307.832368][T24313] R13: 0000000000000000 R14: 00007f1ed8e45fa0 R15: 00007ffe7f52c6d8 [ 1307.840351][T24313] [ 1307.872515][T24317] loop1: detected capacity change from 0 to 2048 [ 1307.886448][T24317] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1307.947159][T20334] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1308.041053][T24330] syz.1.16599[24330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1308.041164][T24330] syz.1.16599[24330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1308.052802][T24330] syz.1.16599[24330] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1308.269127][T24344] FAULT_INJECTION: forcing a failure. [ 1308.269127][T24344] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1308.293759][T24344] CPU: 0 UID: 0 PID: 24344 Comm: syz.3.16605 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1308.304673][T24344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1308.314755][T24344] Call Trace: [ 1308.318110][T24344] [ 1308.321052][T24344] dump_stack_lvl+0xf2/0x150 [ 1308.325669][T24344] dump_stack+0x15/0x1a [ 1308.329939][T24344] should_fail_ex+0x223/0x230 [ 1308.334659][T24344] should_fail+0xb/0x10 [ 1308.338827][T24344] should_fail_usercopy+0x1a/0x20 [ 1308.343933][T24344] _copy_from_user+0x1e/0xb0 [ 1308.348543][T24344] bpf_test_init+0x105/0x170 [ 1308.353169][T24344] bpf_prog_test_run_skb+0x153/0xc00 [ 1308.358472][T24344] ? __pfx_bpf_prog_test_run_skb+0x10/0x10 [ 1308.364357][T24344] bpf_prog_test_run+0x20f/0x3a0 [ 1308.369311][T24344] __sys_bpf+0x400/0x7a0 [ 1308.373586][T24344] __x64_sys_bpf+0x43/0x50 [ 1308.378041][T24344] x64_sys_call+0x2914/0x2dc0 [ 1308.382737][T24344] do_syscall_64+0xc9/0x1c0 [ 1308.387245][T24344] ? clear_bhb_loop+0x55/0xb0 [ 1308.391930][T24344] ? clear_bhb_loop+0x55/0xb0 [ 1308.396616][T24344] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1308.402591][T24344] RIP: 0033:0x7f241ddc5d29 [ 1308.407041][T24344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1308.426754][T24344] RSP: 002b:00007f241c437038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1308.435243][T24344] RAX: ffffffffffffffda RBX: 00007f241dfb5fa0 RCX: 00007f241ddc5d29 [ 1308.443242][T24344] RDX: 0000000000000040 RSI: 0000000020000280 RDI: 000000000000000a [ 1308.451219][T24344] RBP: 00007f241c437090 R08: 0000000000000000 R09: 0000000000000000 [ 1308.459221][T24344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1308.467201][T24344] R13: 0000000000000000 R14: 00007f241dfb5fa0 R15: 00007ffcdc3ebca8 [ 1308.475230][T24344] [ 1308.503760][T24348] tipc: Cannot configure node identity twice [ 1308.540585][ T29] kauditd_printk_skb: 616 callbacks suppressed [ 1308.540670][ T29] audit: type=1326 audit(1736898039.215:131354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24347 comm="syz.3.16607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1308.544603][T24348] syz_tun: entered allmulticast mode [ 1308.547351][ T29] audit: type=1326 audit(1736898039.215:131355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24347 comm="syz.3.16607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1308.601170][ T29] audit: type=1326 audit(1736898039.255:131356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24347 comm="syz.3.16607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1308.612395][T24348] loop3: detected capacity change from 0 to 512 [ 1308.625736][ T29] audit: type=1326 audit(1736898039.255:131357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24347 comm="syz.3.16607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1308.655678][ T29] audit: type=1326 audit(1736898039.255:131358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24347 comm="syz.3.16607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1308.679467][ T29] audit: type=1326 audit(1736898039.255:131359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24347 comm="syz.3.16607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1308.688388][T24348] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1308.704078][ T29] audit: type=1326 audit(1736898039.255:131360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24347 comm="syz.3.16607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1308.716107][T24348] ext4 filesystem being mounted at /205/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 1308.740550][ T29] audit: type=1326 audit(1736898039.255:131361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24347 comm="syz.3.16607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1308.750637][T24348] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1308.774681][ T29] audit: type=1326 audit(1736898039.275:131362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24347 comm="syz.3.16607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1308.807518][ T29] audit: type=1326 audit(1736898039.275:131363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24347 comm="syz.3.16607" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1308.845316][T24347] syz_tun: left allmulticast mode [ 1309.085500][T24394] tipc: Cannot configure node identity twice [ 1309.122965][T24394] syz_tun: entered allmulticast mode [ 1309.147506][T24393] syz_tun: left allmulticast mode [ 1309.820969][T24421] tipc: Cannot configure node identity twice [ 1309.865079][T24421] syz_tun: entered allmulticast mode [ 1309.878101][T24421] loop7: detected capacity change from 0 to 512 [ 1309.909930][T24421] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1309.924490][T24421] ext4 filesystem being mounted at /354/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 1309.935477][T24421] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1309.960520][T24418] syz_tun: left allmulticast mode [ 1309.995115][T24433] Cannot find add_set index 0 as target [ 1310.003303][T24433] netlink: 'syz.7.16639': attribute type 10 has an invalid length. [ 1310.380127][T24489] tipc: Started in network mode [ 1310.385214][T24489] tipc: Node identity -, cluster identity 4711 [ 1310.417983][T24489] syz_tun: entered allmulticast mode [ 1310.443881][T24488] syz_tun: left allmulticast mode [ 1310.724745][T24519] loop3: detected capacity change from 0 to 2048 [ 1310.762565][T24519] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1310.963864][T24540] loop1: detected capacity change from 0 to 2048 [ 1311.026242][T20963] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1311.036664][T24540] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1311.069301][T24540] Invalid ELF header len 10 [ 1311.117322][T24555] loop3: detected capacity change from 0 to 2048 [ 1311.210838][T20334] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1311.228080][T24555] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1311.276544][T24569] FAULT_INJECTION: forcing a failure. [ 1311.276544][T24569] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1311.289817][T24569] CPU: 1 UID: 0 PID: 24569 Comm: syz.7.16680 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1311.300695][T24569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1311.310911][T24569] Call Trace: [ 1311.314279][T24569] [ 1311.317250][T24569] dump_stack_lvl+0xf2/0x150 [ 1311.322090][T24569] dump_stack+0x15/0x1a [ 1311.326300][T24569] should_fail_ex+0x223/0x230 [ 1311.331032][T24569] should_fail+0xb/0x10 [ 1311.335239][T24569] should_fail_usercopy+0x1a/0x20 [ 1311.340330][T24569] _copy_to_user+0x20/0xa0 [ 1311.344891][T24569] simple_read_from_buffer+0xa0/0x110 [ 1311.350392][T24569] proc_fail_nth_read+0xf9/0x140 [ 1311.355445][T24569] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1311.361109][T24569] vfs_read+0x1a2/0x700 [ 1311.365319][T24569] ? kmem_cache_free+0xdc/0x2d0 [ 1311.370225][T24569] ? __rcu_read_unlock+0x4e/0x70 [ 1311.375294][T24569] ? __fget_files+0x17c/0x1c0 [ 1311.380033][T24569] ksys_read+0xe8/0x1b0 [ 1311.384230][T24569] __x64_sys_read+0x42/0x50 [ 1311.388761][T24569] x64_sys_call+0x2874/0x2dc0 [ 1311.393468][T24569] do_syscall_64+0xc9/0x1c0 [ 1311.397993][T24569] ? clear_bhb_loop+0x55/0xb0 [ 1311.402745][T24569] ? clear_bhb_loop+0x55/0xb0 [ 1311.407449][T24569] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1311.413477][T24569] RIP: 0033:0x7fa11ba2473c [ 1311.417922][T24569] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1311.437580][T24569] RSP: 002b:00007fa11a097030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1311.446088][T24569] RAX: ffffffffffffffda RBX: 00007fa11bc15fa0 RCX: 00007fa11ba2473c [ 1311.454073][T24569] RDX: 000000000000000f RSI: 00007fa11a0970a0 RDI: 0000000000000004 [ 1311.462090][T24569] RBP: 00007fa11a097090 R08: 0000000000000000 R09: 0000000000000000 [ 1311.470111][T24569] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1311.478167][T24569] R13: 0000000000000000 R14: 00007fa11bc15fa0 R15: 00007ffe6ef56278 [ 1311.486227][T24569] [ 1311.567688][T24577] loop7: detected capacity change from 0 to 2048 [ 1311.631154][T24577] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1312.086734][T20963] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1312.153142][T24593] loop7: detected capacity change from 0 to 764 [ 1312.180134][T24593] Symlink component flag not implemented [ 1312.206104][T24593] Symlink component flag not implemented (129) [ 1312.217310][T24599] FAULT_INJECTION: forcing a failure. [ 1312.217310][T24599] name failslab, interval 1, probability 0, space 0, times 0 [ 1312.230864][T24599] CPU: 1 UID: 0 PID: 24599 Comm: syz.3.16688 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1312.241740][T24599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1312.251999][T24599] Call Trace: [ 1312.255290][T24599] [ 1312.258250][T24599] dump_stack_lvl+0xf2/0x150 [ 1312.262884][T24599] dump_stack+0x15/0x1a [ 1312.267269][T24599] should_fail_ex+0x223/0x230 [ 1312.272008][T24599] should_failslab+0x8f/0xb0 [ 1312.276690][T24599] kmem_cache_alloc_noprof+0x52/0x320 [ 1312.282129][T24599] ? dst_alloc+0xc0/0x100 [ 1312.286498][T24599] dst_alloc+0xc0/0x100 [ 1312.290749][T24599] ? ip_vs_sh_schedule+0x142/0x5a0 [ 1312.295882][T24599] ip_route_output_key_hash_rcu+0xb90/0x12d0 [ 1312.301979][T24599] ip_route_output_key_hash+0x7b/0xb0 [ 1312.307545][T24599] tcp_v4_connect+0x3c4/0xad0 [ 1312.312309][T24599] __inet_stream_connect+0x162/0x790 [ 1312.317636][T24599] ? tcp_sendmsg_fastopen+0x163/0x4f0 [ 1312.323102][T24599] ? __kmalloc_cache_noprof+0x186/0x320 [ 1312.328711][T24599] tcp_sendmsg_fastopen+0x40e/0x4f0 [ 1312.333995][T24599] tcp_sendmsg_locked+0x2513/0x2710 [ 1312.339226][T24599] ? mntput_no_expire+0x70/0x3d0 [ 1312.344229][T24599] ? __rcu_read_unlock+0x4e/0x70 [ 1312.349245][T24599] ? avc_has_perm_noaudit+0x1cc/0x210 [ 1312.354734][T24599] ? avc_has_perm+0xd4/0x160 [ 1312.359371][T24599] ? _raw_spin_unlock_bh+0x36/0x40 [ 1312.364592][T24599] ? __pfx_tcp_sendmsg+0x10/0x10 [ 1312.369658][T24599] tcp_sendmsg+0x30/0x50 [ 1312.374077][T24599] inet_sendmsg+0x77/0xd0 [ 1312.378436][T24599] __sock_sendmsg+0x102/0x180 [ 1312.383140][T24599] __sys_sendto+0x1a8/0x230 [ 1312.387671][T24599] __x64_sys_sendto+0x78/0x90 [ 1312.392484][T24599] x64_sys_call+0x29fa/0x2dc0 [ 1312.397184][T24599] do_syscall_64+0xc9/0x1c0 [ 1312.401711][T24599] ? clear_bhb_loop+0x55/0xb0 [ 1312.406416][T24599] ? clear_bhb_loop+0x55/0xb0 [ 1312.411173][T24599] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1312.417117][T24599] RIP: 0033:0x7f241ddc5d29 [ 1312.421547][T24599] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1312.441240][T24599] RSP: 002b:00007f241c437038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1312.449684][T24599] RAX: ffffffffffffffda RBX: 00007f241dfb5fa0 RCX: 00007f241ddc5d29 [ 1312.457668][T24599] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1312.465649][T24599] RBP: 00007f241c437090 R08: 0000000020000040 R09: 0000000000000010 [ 1312.473648][T24599] R10: 00000000200007fd R11: 0000000000000246 R12: 0000000000000001 [ 1312.481630][T24599] R13: 0000000000000000 R14: 00007f241dfb5fa0 R15: 00007ffcdc3ebca8 [ 1312.489659][T24599] [ 1312.515947][T24593] rock: directory entry would overflow storage [ 1312.522146][T24593] rock: sig=0x4f50, size=4, remaining=3 [ 1312.527790][T24593] iso9660: Corrupted directory entry in block 6 of inode 1792 [ 1313.008423][T24643] loop3: detected capacity change from 0 to 512 [ 1313.029713][T24643] EXT4-fs (loop3): revision level too high, forcing read-only mode [ 1313.037881][T24643] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=2842c018, mo2=0002] [ 1313.046082][T24643] System zones: 0-2, 18-18, 34-35 [ 1313.054234][T24643] EXT4-fs (loop3): shut down requested (0) [ 1313.777511][ T29] kauditd_printk_skb: 560 callbacks suppressed [ 1313.777528][ T29] audit: type=1326 audit(1736898044.455:131924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24681 comm="syz.3.16716" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1313.822881][ T29] audit: type=1326 audit(1736898044.495:131925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24681 comm="syz.3.16716" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1313.846777][ T29] audit: type=1326 audit(1736898044.495:131926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24681 comm="syz.3.16716" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1313.870584][ T29] audit: type=1326 audit(1736898044.495:131927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24681 comm="syz.3.16716" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1313.894507][ T29] audit: type=1326 audit(1736898044.495:131928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24681 comm="syz.3.16716" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1313.918372][ T29] audit: type=1326 audit(1736898044.495:131929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24681 comm="syz.3.16716" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1313.942329][ T29] audit: type=1326 audit(1736898044.495:131930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24681 comm="syz.3.16716" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1313.966175][ T29] audit: type=1326 audit(1736898044.495:131931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24681 comm="syz.3.16716" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1313.990020][ T29] audit: type=1326 audit(1736898044.495:131932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24681 comm="syz.3.16716" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1314.013788][ T29] audit: type=1326 audit(1736898044.495:131933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24681 comm="syz.3.16716" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1314.097282][T17055] kernel read not supported for file bpf-prog (pid: 17055 comm: kworker/0:8) [ 1314.201404][T24697] xt_hashlimit: size too large, truncated to 1048576 [ 1314.542776][T24710] tipc: Cannot configure node identity twice [ 1314.632881][T24714] syz_tun: entered allmulticast mode [ 1314.676894][T24710] loop3: detected capacity change from 0 to 512 [ 1314.718961][T24710] ext4 filesystem being mounted at /229/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 1314.767491][T24723] netem: change failed [ 1314.788222][T24709] syz_tun: left allmulticast mode [ 1314.798558][T24723] futex_wake_op: syz.1.16728 tries to shift op by 32; fix this program [ 1314.888644][T24732] loop3: detected capacity change from 0 to 764 [ 1314.913577][T24735] xt_socket: unknown flags 0xc [ 1314.934650][T24735] SELinux: syz.0.16733 (24735) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1314.950642][T24732] Symlink component flag not implemented [ 1314.957237][T24732] Symlink component flag not implemented (129) [ 1314.975360][T24732] rock: directory entry would overflow storage [ 1314.981657][T24732] rock: sig=0x4f50, size=4, remaining=3 [ 1314.988161][T24732] iso9660: Corrupted directory entry in block 6 of inode 1792 [ 1315.244158][T24753] loop7: detected capacity change from 0 to 764 [ 1315.279685][T24753] Symlink component flag not implemented [ 1315.294568][T24753] Symlink component flag not implemented (129) [ 1315.304021][T24758] netlink: 'syz.3.16741': attribute type 1 has an invalid length. [ 1315.315967][T24753] rock: directory entry would overflow storage [ 1315.322145][T24753] rock: sig=0x4f50, size=4, remaining=3 [ 1315.327780][T24753] iso9660: Corrupted directory entry in block 6 of inode 1792 [ 1315.386191][T24758] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1315.472072][T24780] netlink: 4 bytes leftover after parsing attributes in process `syz.1.16748'. [ 1315.497275][T24780] netlink: 4 bytes leftover after parsing attributes in process `syz.1.16748'. [ 1316.008722][T24816] loop3: detected capacity change from 0 to 512 [ 1316.035420][T24816] EXT4-fs (loop3): revision level too high, forcing read-only mode [ 1316.043478][T24816] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=2842c018, mo2=0002] [ 1316.051574][T24816] System zones: 0-2, 18-18, 34-35 [ 1316.059339][T24816] EXT4-fs (loop3): shut down requested (0) [ 1316.210510][T24826] loop3: detected capacity change from 0 to 764 [ 1316.219480][T24826] Symlink component flag not implemented [ 1316.225432][T24826] Symlink component flag not implemented (129) [ 1316.233037][T24826] rock: directory entry would overflow storage [ 1316.239248][T24826] rock: sig=0x4f50, size=4, remaining=3 [ 1316.245699][T24826] iso9660: Corrupted directory entry in block 6 of inode 1792 [ 1316.677228][T24851] netlink: 'syz.1.16775': attribute type 3 has an invalid length. [ 1316.747403][T24870] Cannot find add_set index 0 as target [ 1316.757210][T24870] netlink: 'syz.7.16782': attribute type 10 has an invalid length. [ 1318.785173][ T29] kauditd_printk_skb: 447 callbacks suppressed [ 1318.785193][ T29] audit: type=1326 audit(1736898049.465:132381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24975 comm="syz.3.16821" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1318.815984][ T29] audit: type=1326 audit(1736898049.465:132382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24975 comm="syz.3.16821" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1318.927642][ T29] audit: type=1326 audit(1736898049.525:132383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24975 comm="syz.3.16821" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1318.952323][ T29] audit: type=1326 audit(1736898049.525:132384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24975 comm="syz.3.16821" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1318.976941][ T29] audit: type=1326 audit(1736898049.525:132385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24975 comm="syz.3.16821" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1319.000790][ T29] audit: type=1326 audit(1736898049.525:132386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24975 comm="syz.3.16821" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1319.025362][ T29] audit: type=1326 audit(1736898049.525:132387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24975 comm="syz.3.16821" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1319.049209][ T29] audit: type=1326 audit(1736898049.525:132388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24975 comm="syz.3.16821" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1319.073730][ T29] audit: type=1326 audit(1736898049.525:132389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24975 comm="syz.3.16821" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1319.098300][ T29] audit: type=1326 audit(1736898049.525:132390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24975 comm="syz.3.16821" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1319.660978][T24998] loop7: detected capacity change from 0 to 2048 [ 1320.038004][T25005] loop7: detected capacity change from 0 to 512 [ 1320.056211][T25007] FAULT_INJECTION: forcing a failure. [ 1320.056211][T25007] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1320.069421][T25007] CPU: 0 UID: 0 PID: 25007 Comm: syz.6.16833 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1320.080291][T25007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1320.090368][T25007] Call Trace: [ 1320.093665][T25007] [ 1320.096605][T25007] dump_stack_lvl+0xf2/0x150 [ 1320.101231][T25007] dump_stack+0x15/0x1a [ 1320.105455][T25007] should_fail_ex+0x223/0x230 [ 1320.110241][T25007] should_fail+0xb/0x10 [ 1320.114410][T25007] should_fail_usercopy+0x1a/0x20 [ 1320.119458][T25007] _copy_from_user+0x1e/0xb0 [ 1320.124132][T25007] set_selection_user+0x48/0xa0 [ 1320.129053][T25007] tioclinux+0x2b0/0x430 [ 1320.133378][T25007] vt_ioctl+0x84f/0x1810 [ 1320.137734][T25007] ? tty_jobctrl_ioctl+0x2ab/0x810 [ 1320.142881][T25007] tty_ioctl+0x815/0xbe0 [ 1320.147273][T25007] ? __pfx_tty_ioctl+0x10/0x10 [ 1320.152122][T25007] __se_sys_ioctl+0xc9/0x140 [ 1320.156803][T25007] __x64_sys_ioctl+0x43/0x50 [ 1320.161415][T25007] x64_sys_call+0x1690/0x2dc0 [ 1320.166101][T25007] do_syscall_64+0xc9/0x1c0 [ 1320.170617][T25007] ? clear_bhb_loop+0x55/0xb0 [ 1320.175352][T25007] ? clear_bhb_loop+0x55/0xb0 [ 1320.180044][T25007] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1320.185990][T25007] RIP: 0033:0x7f1416635d29 [ 1320.190420][T25007] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1320.210083][T25007] RSP: 002b:00007f1414ca1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1320.218557][T25007] RAX: ffffffffffffffda RBX: 00007f1416825fa0 RCX: 00007f1416635d29 [ 1320.226534][T25007] RDX: 0000000020001900 RSI: 000000000000541c RDI: 0000000000000004 [ 1320.234525][T25007] RBP: 00007f1414ca1090 R08: 0000000000000000 R09: 0000000000000000 [ 1320.242577][T25007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1320.250555][T25007] R13: 0000000000000000 R14: 00007f1416825fa0 R15: 00007ffd4e22f8a8 [ 1320.258537][T25007] [ 1320.312765][T25005] EXT4-fs (loop7): revision level too high, forcing read-only mode [ 1320.320819][T25005] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=2842c018, mo2=0002] [ 1320.342269][T25005] System zones: 0-2, 18-18, 34-35 [ 1320.356384][T25005] EXT4-fs mount: 7 callbacks suppressed [ 1320.356402][T25005] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 1320.385353][T25005] EXT4-fs (loop7): shut down requested (0) [ 1320.631929][T25020] FAULT_INJECTION: forcing a failure. [ 1320.631929][T25020] name fail_futex, interval 1, probability 0, space 0, times 0 [ 1320.644977][T25020] CPU: 1 UID: 0 PID: 25020 Comm: syz.0.16835 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1320.655853][T25020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1320.665943][T25020] Call Trace: [ 1320.669237][T25020] [ 1320.672215][T25020] dump_stack_lvl+0xf2/0x150 [ 1320.676853][T25020] dump_stack+0x15/0x1a [ 1320.681051][T25020] should_fail_ex+0x223/0x230 [ 1320.685755][T25020] should_fail+0xb/0x10 [ 1320.689938][T25020] get_futex_key+0x135/0x740 [ 1320.694570][T25020] futex_lock_pi+0xfd/0x6f0 [ 1320.699178][T25020] ? _parse_integer_limit+0x167/0x180 [ 1320.704574][T25020] ? __pfx_futex_wake_mark+0x10/0x10 [ 1320.709930][T25020] do_futex+0x211/0x370 [ 1320.714193][T25020] __se_sys_futex+0x25d/0x3a0 [ 1320.718928][T25020] ? fput+0x1c4/0x200 [ 1320.723034][T25020] __x64_sys_futex+0x78/0x90 [ 1320.727670][T25020] x64_sys_call+0x2d6a/0x2dc0 [ 1320.732380][T25020] do_syscall_64+0xc9/0x1c0 [ 1320.736905][T25020] ? clear_bhb_loop+0x55/0xb0 [ 1320.741607][T25020] ? clear_bhb_loop+0x55/0xb0 [ 1320.746344][T25020] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1320.752285][T25020] RIP: 0033:0x7f55be615d29 [ 1320.756713][T25020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1320.776432][T25020] RSP: 002b:00007f55bcc60038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1320.784858][T25020] RAX: ffffffffffffffda RBX: 00007f55be806080 RCX: 00007f55be615d29 [ 1320.792848][T25020] RDX: 0000000000000000 RSI: 000000000000000d RDI: 000000002000cffc [ 1320.800834][T25020] RBP: 00007f55bcc60090 R08: 0000000000000000 R09: 0000000000000000 [ 1320.808816][T25020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1320.816822][T25020] R13: 0000000000000000 R14: 00007f55be806080 R15: 00007ffd347a9e28 [ 1320.824871][T25020] [ 1320.874836][T18658] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1320.919312][T25029] tmpfs: Bad value for 'mpol' [ 1320.949028][T25029] netlink: 'syz.1.16838': attribute type 12 has an invalid length. [ 1320.957112][T25029] netlink: 'syz.1.16838': attribute type 29 has an invalid length. [ 1320.965075][T25029] netlink: 148 bytes leftover after parsing attributes in process `syz.1.16838'. [ 1320.974230][T25029] netlink: 51 bytes leftover after parsing attributes in process `syz.1.16838'. [ 1321.148315][T25041] tipc: Cannot configure node identity twice [ 1321.226725][T25042] syz_tun: entered allmulticast mode [ 1321.350109][T25040] syz_tun: left allmulticast mode [ 1322.137395][T25081] loop7: detected capacity change from 0 to 512 [ 1322.165262][T25081] EXT4-fs (loop7): revision level too high, forcing read-only mode [ 1322.173247][T25081] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=2842c018, mo2=0002] [ 1322.268105][T25081] System zones: 0-2, 18-18, 34-35 [ 1322.281390][T25093] syz.1.16861[25093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1322.281515][T25093] syz.1.16861[25093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1322.285378][T25081] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 1322.319436][T25081] EXT4-fs (loop7): shut down requested (0) [ 1322.325432][T25093] syz.1.16861[25093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1322.412638][T18658] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1323.364830][T25137] xt_connbytes: Forcing CT accounting to be enabled [ 1323.372705][T25137] Cannot find add_set index 0 as target [ 1323.472929][T25142] loop7: detected capacity change from 0 to 512 [ 1323.499608][T25142] EXT4-fs (loop7): revision level too high, forcing read-only mode [ 1323.507685][T25142] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=2842c018, mo2=0002] [ 1323.546051][T25142] System zones: 0-2, 18-18, 34-35 [ 1323.561300][T25142] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 1323.628145][T25142] EXT4-fs (loop7): shut down requested (0) [ 1323.760602][T18658] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1323.846060][ T29] kauditd_printk_skb: 418 callbacks suppressed [ 1323.846080][ T29] audit: type=1400 audit(1736898054.515:132809): avc: denied { ioctl } for pid=25153 comm="syz.6.16880" path="socket:[196147]" dev="sockfs" ino=196147 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 1324.699533][ T29] audit: type=1326 audit(1736898055.375:132810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25181 comm="syz.7.16888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1324.723613][ T29] audit: type=1326 audit(1736898055.375:132811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25181 comm="syz.7.16888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1324.748006][ T29] audit: type=1326 audit(1736898055.375:132812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25181 comm="syz.7.16888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1324.771876][ T29] audit: type=1326 audit(1736898055.375:132813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25181 comm="syz.7.16888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1324.795729][ T29] audit: type=1326 audit(1736898055.375:132814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25181 comm="syz.7.16888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1324.819489][ T29] audit: type=1326 audit(1736898055.425:132815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25181 comm="syz.7.16888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1324.843462][ T29] audit: type=1326 audit(1736898055.425:132816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25181 comm="syz.7.16888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1324.867413][ T29] audit: type=1326 audit(1736898055.425:132817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25181 comm="syz.7.16888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1324.914984][ T29] audit: type=1326 audit(1736898055.525:132818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25181 comm="syz.7.16888" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1324.982784][T25196] FAULT_INJECTION: forcing a failure. [ 1324.982784][T25196] name failslab, interval 1, probability 0, space 0, times 0 [ 1324.995513][T25196] CPU: 0 UID: 0 PID: 25196 Comm: syz.7.16894 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1325.006452][T25196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1325.016527][T25196] Call Trace: [ 1325.019818][T25196] [ 1325.022825][T25196] dump_stack_lvl+0xf2/0x150 [ 1325.027518][T25196] dump_stack+0x15/0x1a [ 1325.031700][T25196] should_fail_ex+0x223/0x230 [ 1325.036458][T25196] should_failslab+0x8f/0xb0 [ 1325.041114][T25196] __kmalloc_noprof+0xab/0x3f0 [ 1325.045956][T25196] ? sock_kmalloc+0x83/0xc0 [ 1325.050550][T25196] sock_kmalloc+0x83/0xc0 [ 1325.054934][T25196] ____sys_sendmsg+0x127/0x410 [ 1325.059754][T25196] __sys_sendmsg+0x19d/0x230 [ 1325.064440][T25196] __x64_sys_sendmsg+0x46/0x50 [ 1325.069221][T25196] x64_sys_call+0x2734/0x2dc0 [ 1325.073953][T25196] do_syscall_64+0xc9/0x1c0 [ 1325.078489][T25196] ? clear_bhb_loop+0x55/0xb0 [ 1325.083183][T25196] ? clear_bhb_loop+0x55/0xb0 [ 1325.087876][T25196] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1325.093800][T25196] RIP: 0033:0x7fa11ba25d29 [ 1325.098237][T25196] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1325.117862][T25196] RSP: 002b:00007fa11a097038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1325.126294][T25196] RAX: ffffffffffffffda RBX: 00007fa11bc15fa0 RCX: 00007fa11ba25d29 [ 1325.134330][T25196] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000006 [ 1325.142320][T25196] RBP: 00007fa11a097090 R08: 0000000000000000 R09: 0000000000000000 [ 1325.150319][T25196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1325.158298][T25196] R13: 0000000000000000 R14: 00007fa11bc15fa0 R15: 00007ffe6ef56278 [ 1325.166292][T25196] [ 1325.311949][T25205] loop7: detected capacity change from 0 to 764 [ 1325.336853][T25205] Symlink component flag not implemented [ 1325.342565][T25205] Symlink component flag not implemented (129) [ 1325.352785][T25205] rock: directory entry would overflow storage [ 1325.359871][T25205] rock: sig=0x4f50, size=4, remaining=3 [ 1325.365567][T25205] iso9660: Corrupted directory entry in block 6 of inode 1792 [ 1325.424742][T25215] syz.1.16901[25215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1325.424801][T25215] syz.1.16901[25215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1325.444443][T25215] syz.1.16901[25215] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1325.477438][T25217] loop3: detected capacity change from 0 to 2048 [ 1325.554775][T25217] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1325.901629][T20963] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1326.072014][T25237] xt_connbytes: Forcing CT accounting to be enabled [ 1326.085523][T25237] Cannot find add_set index 0 as target [ 1326.336449][T25251] syz.7.16911[25251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1326.336589][T25251] syz.7.16911[25251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1326.364447][T25251] syz.7.16911[25251] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1326.714235][T25269] loop3: detected capacity change from 0 to 764 [ 1326.735559][T25269] Symlink component flag not implemented [ 1326.741695][T25269] Symlink component flag not implemented (129) [ 1326.751874][T25269] rock: directory entry would overflow storage [ 1326.758118][T25269] rock: sig=0x4f50, size=4, remaining=3 [ 1326.763754][T25269] iso9660: Corrupted directory entry in block 6 of inode 1792 [ 1326.955092][T25288] loop7: detected capacity change from 0 to 512 [ 1326.978893][T25288] EXT4-fs (loop7): revision level too high, forcing read-only mode [ 1326.987116][T25288] EXT4-fs (loop7): orphan cleanup on readonly fs [ 1326.993667][T25288] EXT4-fs warning (device loop7): ext4_enable_quotas:7156: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 1327.010276][T25288] EXT4-fs (loop7): Cannot turn on quotas: error -117 [ 1327.017439][T25288] EXT4-fs error (device loop7): ext4_validate_block_bitmap:441: comm syz.7.16925: bg 0: block 40: padding at end of block bitmap is not set [ 1327.033889][T25288] EXT4-fs error (device loop7) in ext4_mb_clear_bb:6550: Corrupt filesystem [ 1327.042887][T25288] EXT4-fs (loop7): 1 truncate cleaned up [ 1327.050734][T25288] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 1327.072104][T25288] EXT4-fs error (device loop7): ext4_xattr_block_get:596: inode #16: comm syz.7.16925: corrupted xattr block 31: invalid header [ 1327.089369][T25288] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop7 ino=16 [ 1327.098382][T25288] EXT4-fs error (device loop7): ext4_xattr_block_get:596: inode #16: comm syz.7.16925: corrupted xattr block 31: invalid header [ 1327.113682][T25288] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop7 ino=16 [ 1327.122850][T25288] EXT4-fs error (device loop7): ext4_get_link:106: inode #16: comm syz.7.16925: bad symlink. [ 1327.152121][T18658] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1327.181521][T25292] loop7: detected capacity change from 0 to 764 [ 1327.192126][T25292] Symlink component flag not implemented [ 1327.198133][T25292] Symlink component flag not implemented (129) [ 1327.208947][T25292] rock: directory entry would overflow storage [ 1327.215910][T25292] rock: sig=0x4f50, size=4, remaining=3 [ 1327.221491][T25292] iso9660: Corrupted directory entry in block 6 of inode 1792 [ 1327.548213][T25304] loop3: detected capacity change from 0 to 764 [ 1327.599675][T25307] xt_hashlimit: size too large, truncated to 1048576 [ 1327.620230][T25299] Symlink component flag not implemented [ 1327.626074][T25299] Symlink component flag not implemented (129) [ 1327.633400][T25299] rock: directory entry would overflow storage [ 1327.639729][T25299] rock: sig=0x4f50, size=4, remaining=3 [ 1327.645554][T25299] iso9660: Corrupted directory entry in block 6 of inode 1792 [ 1327.801124][T25318] syz.7.16935[25318] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1327.801261][T25318] syz.7.16935[25318] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1327.814971][T25318] syz.7.16935[25318] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1328.069815][T25326] tmpfs: Bad value for 'mpol' [ 1328.389280][T25344] loop7: detected capacity change from 0 to 512 [ 1328.421130][T25344] EXT4-fs (loop7): revision level too high, forcing read-only mode [ 1328.432730][T25344] EXT4-fs (loop7): orphan cleanup on readonly fs [ 1328.452745][T25344] EXT4-fs warning (device loop7): ext4_enable_quotas:7156: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 1328.486823][T25344] EXT4-fs (loop7): Cannot turn on quotas: error -117 [ 1328.494154][T25344] EXT4-fs error (device loop7): ext4_validate_block_bitmap:441: comm syz.7.16945: bg 0: block 40: padding at end of block bitmap is not set [ 1328.515018][T25344] EXT4-fs error (device loop7) in ext4_mb_clear_bb:6550: Corrupt filesystem [ 1328.527890][T25350] xt_hashlimit: size too large, truncated to 1048576 [ 1328.574654][T25344] EXT4-fs (loop7): 1 truncate cleaned up [ 1328.588450][T25344] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 1328.602226][T25344] FAULT_INJECTION: forcing a failure. [ 1328.602226][T25344] name failslab, interval 1, probability 0, space 0, times 0 [ 1328.614942][T25344] CPU: 0 UID: 0 PID: 25344 Comm: syz.7.16945 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1328.625886][T25344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1328.635958][T25344] Call Trace: [ 1328.639249][T25344] [ 1328.642196][T25344] dump_stack_lvl+0xf2/0x150 [ 1328.646862][T25344] dump_stack+0x15/0x1a [ 1328.651125][T25344] should_fail_ex+0x223/0x230 [ 1328.655822][T25344] should_failslab+0x8f/0xb0 [ 1328.660439][T25344] kmem_cache_alloc_noprof+0x52/0x320 [ 1328.665823][T25344] ? __es_insert_extent+0x563/0xed0 [ 1328.671116][T25344] __es_insert_extent+0x563/0xed0 [ 1328.676268][T25344] ? bpf_trace_run2+0x123/0x1d0 [ 1328.681225][T25344] ext4_es_cache_extent+0x294/0x3a0 [ 1328.686623][T25344] ext4_find_extent+0x34f/0x7c0 [ 1328.691530][T25344] ext4_ext_map_blocks+0x11f/0x35c0 [ 1328.696764][T25344] ? __bpf_strtoull+0xcb/0x2d0 [ 1328.701600][T25344] ? down_read+0x171/0x4b0 [ 1328.706027][T25344] ext4_map_query_blocks+0x71/0x180 [ 1328.711348][T25344] ext4_map_blocks+0x23c/0xd20 [ 1328.716129][T25344] ? xas_load+0x3ae/0x3d0 [ 1328.720469][T25344] ? xa_load+0xb9/0xe0 [ 1328.724578][T25344] ext4_getblk+0x11f/0x530 [ 1328.729026][T25344] ext4_bread_batch+0x5b/0x360 [ 1328.733905][T25344] __ext4_find_entry+0xa1d/0x1090 [ 1328.738967][T25344] ? d_alloc_parallel+0xbf0/0xc60 [ 1328.744015][T25344] ext4_lookup+0xba/0x390 [ 1328.748364][T25344] __lookup_slow+0x184/0x250 [ 1328.752970][T25344] lookup_slow+0x3c/0x60 [ 1328.757259][T25344] walk_component+0x1f5/0x230 [ 1328.762014][T25344] ? path_lookupat+0xfd/0x2b0 [ 1328.766700][T25344] path_lookupat+0x10a/0x2b0 [ 1328.771377][T25344] filename_lookup+0x150/0x340 [ 1328.776199][T25344] __se_sys_newstat+0x76/0x320 [ 1328.780993][T25344] ? fput+0x1c4/0x200 [ 1328.784985][T25344] ? ksys_write+0x176/0x1b0 [ 1328.789506][T25344] __x64_sys_newstat+0x31/0x40 [ 1328.794277][T25344] x64_sys_call+0x6eb/0x2dc0 [ 1328.798909][T25344] do_syscall_64+0xc9/0x1c0 [ 1328.803420][T25344] ? clear_bhb_loop+0x55/0xb0 [ 1328.808185][T25344] ? clear_bhb_loop+0x55/0xb0 [ 1328.812926][T25344] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1328.818958][T25344] RIP: 0033:0x7fa11ba25d29 [ 1328.823376][T25344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1328.842991][T25344] RSP: 002b:00007fa11a097038 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 1328.851463][T25344] RAX: ffffffffffffffda RBX: 00007fa11bc15fa0 RCX: 00007fa11ba25d29 [ 1328.859438][T25344] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000640 [ 1328.867416][T25344] RBP: 00007fa11a097090 R08: 0000000000000000 R09: 0000000000000000 [ 1328.875391][T25344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1328.883402][T25344] R13: 0000000000000000 R14: 00007fa11bc15fa0 R15: 00007ffe6ef56278 [ 1328.891453][T25344] [ 1328.899992][T25344] EXT4-fs error (device loop7): ext4_xattr_block_get:596: inode #16: comm syz.7.16945: corrupted xattr block 31: invalid header [ 1328.939502][T25344] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop7 ino=16 [ 1328.970038][T25344] EXT4-fs error (device loop7): ext4_xattr_block_get:596: inode #16: comm syz.7.16945: corrupted xattr block 31: invalid header [ 1329.003641][T25344] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop7 ino=16 [ 1329.037922][T25356] syz.0.16947[25356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1329.037985][T25356] syz.0.16947[25356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1329.040951][T25344] EXT4-fs error (device loop7): ext4_get_link:106: inode #16: comm syz.7.16945: bad symlink. [ 1329.074557][T25356] syz.0.16947[25356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1329.173606][T18658] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1329.237305][ T29] kauditd_printk_skb: 169 callbacks suppressed [ 1329.237322][ T29] audit: type=1326 audit(1736898059.915:132986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25359 comm="syz.7.16948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1329.300408][ T29] audit: type=1326 audit(1736898059.955:132987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25359 comm="syz.7.16948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1329.313935][T25362] loop3: detected capacity change from 0 to 2048 [ 1329.325186][ T29] audit: type=1326 audit(1736898059.955:132988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25361 comm="syz.3.16949" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1329.355112][ T29] audit: type=1326 audit(1736898059.955:132989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25361 comm="syz.3.16949" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1329.378930][ T29] audit: type=1326 audit(1736898059.955:132990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25359 comm="syz.7.16948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1329.403409][ T29] audit: type=1326 audit(1736898059.955:132991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25359 comm="syz.7.16948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1329.427981][ T29] audit: type=1326 audit(1736898059.955:132992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25359 comm="syz.7.16948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1329.451763][ T29] audit: type=1326 audit(1736898059.955:132993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25359 comm="syz.7.16948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1329.476339][ T29] audit: type=1326 audit(1736898059.955:132994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25359 comm="syz.7.16948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1329.500241][ T29] audit: type=1326 audit(1736898059.955:132995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25359 comm="syz.7.16948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1329.801120][T25373] loop7: detected capacity change from 0 to 764 [ 1329.880712][T25373] Symlink component flag not implemented [ 1329.887201][T25373] Symlink component flag not implemented (129) [ 1329.896312][T25373] rock: directory entry would overflow storage [ 1329.902520][T25373] rock: sig=0x4f50, size=4, remaining=3 [ 1329.908202][T25373] iso9660: Corrupted directory entry in block 6 of inode 1792 [ 1330.246427][T25393] netlink: 12 bytes leftover after parsing attributes in process `syz.1.16960'. [ 1330.585190][T25406] loop3: detected capacity change from 0 to 2048 [ 1331.019066][T25429] syz.3.16971[25429] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1331.019143][T25429] syz.3.16971[25429] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1331.044471][T25429] syz.3.16971[25429] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1331.437809][T25451] netlink: 12 bytes leftover after parsing attributes in process `syz.1.16981'. [ 1331.973071][T25469] FAULT_INJECTION: forcing a failure. [ 1331.973071][T25469] name failslab, interval 1, probability 0, space 0, times 0 [ 1331.982228][T25470] FAULT_INJECTION: forcing a failure. [ 1331.982228][T25470] name failslab, interval 1, probability 0, space 0, times 0 [ 1331.985795][T25469] CPU: 0 UID: 0 PID: 25469 Comm: syz.3.16988 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1331.985832][T25469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1331.985848][T25469] Call Trace: [ 1331.985857][T25469] [ 1331.985867][T25469] dump_stack_lvl+0xf2/0x150 [ 1331.985992][T25469] dump_stack+0x15/0x1a [ 1331.986032][T25469] should_fail_ex+0x223/0x230 [ 1331.986143][T25469] should_failslab+0x8f/0xb0 [ 1331.986181][T25469] kmem_cache_alloc_noprof+0x52/0x320 [ 1331.986211][T25469] ? getname_flags+0x81/0x3b0 [ 1331.986298][T25469] getname_flags+0x81/0x3b0 [ 1331.986366][T25469] user_path_at+0x26/0x120 [ 1331.986397][T25469] __se_sys_mount+0x248/0x2d0 [ 1332.067648][T25469] __x64_sys_mount+0x67/0x80 [ 1332.072265][T25469] x64_sys_call+0x2c84/0x2dc0 [ 1332.076953][T25469] do_syscall_64+0xc9/0x1c0 [ 1332.081487][T25469] ? clear_bhb_loop+0x55/0xb0 [ 1332.086227][T25469] ? clear_bhb_loop+0x55/0xb0 [ 1332.090938][T25469] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1332.096913][T25469] RIP: 0033:0x7f241ddc5d29 [ 1332.101346][T25469] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1332.120972][T25469] RSP: 002b:00007f241c437038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1332.129391][T25469] RAX: ffffffffffffffda RBX: 00007f241dfb5fa0 RCX: 00007f241ddc5d29 [ 1332.137372][T25469] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 0000000000000000 [ 1332.145350][T25469] RBP: 00007f241c437090 R08: 0000000020000240 R09: 0000000000000000 [ 1332.153452][T25469] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000001 [ 1332.161537][T25469] R13: 0000000000000000 R14: 00007f241dfb5fa0 R15: 00007ffcdc3ebca8 [ 1332.169540][T25469] [ 1332.172613][T25470] CPU: 1 UID: 0 PID: 25470 Comm: syz.7.16987 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1332.183529][T25470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1332.193601][T25470] Call Trace: [ 1332.196939][T25470] [ 1332.199959][T25470] dump_stack_lvl+0xf2/0x150 [ 1332.204622][T25470] dump_stack+0x15/0x1a [ 1332.208815][T25470] should_fail_ex+0x223/0x230 [ 1332.213587][T25470] should_failslab+0x8f/0xb0 [ 1332.218296][T25470] kmem_cache_alloc_node_noprof+0x59/0x320 [ 1332.224185][T25470] ? __alloc_skb+0x10b/0x310 [ 1332.228860][T25470] __alloc_skb+0x10b/0x310 [ 1332.233296][T25470] ? audit_log_start+0x34c/0x6b0 [ 1332.238264][T25470] audit_log_start+0x368/0x6b0 [ 1332.243082][T25470] audit_seccomp+0x4b/0x130 [ 1332.247608][T25470] __seccomp_filter+0x6fa/0x1180 [ 1332.252737][T25470] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1332.258407][T25470] ? vfs_write+0x596/0x920 [ 1332.262865][T25470] __secure_computing+0x9f/0x1c0 [ 1332.267883][T25470] syscall_trace_enter+0xd1/0x1f0 [ 1332.273007][T25470] ? fpregs_assert_state_consistent+0x83/0xa0 [ 1332.279098][T25470] do_syscall_64+0xaa/0x1c0 [ 1332.283789][T25470] ? clear_bhb_loop+0x55/0xb0 [ 1332.288482][T25470] ? clear_bhb_loop+0x55/0xb0 [ 1332.293178][T25470] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1332.299177][T25470] RIP: 0033:0x7fa11ba25d29 [ 1332.303599][T25470] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1332.323255][T25470] RSP: 002b:00007fa11a096fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1332.331709][T25470] RAX: ffffffffffffffda RBX: 00007fa11bc15fa0 RCX: 00007fa11ba25d29 [ 1332.339711][T25470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1332.347736][T25470] RBP: 00007fa11a097090 R08: 0000000000000000 R09: 0000000000000000 [ 1332.355711][T25470] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1332.363705][T25470] R13: 0000000000000000 R14: 00007fa11bc15fa0 R15: 00007ffe6ef56278 [ 1332.371730][T25470] [ 1332.625149][T25495] SELinux: policydb table sizes (0,1028766253) do not match mine (5,6) [ 1332.655848][T25495] SELinux: failed to load policy [ 1333.744161][T25533] netlink: 256 bytes leftover after parsing attributes in process `syz.1.17011'. [ 1333.811129][T25533] netlink: 11 bytes leftover after parsing attributes in process `syz.1.17011'. [ 1333.847821][T25537] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1333.855436][T25537] batadv_slave_0: entered promiscuous mode [ 1334.007908][T25545] loop7: detected capacity change from 0 to 512 [ 1334.040092][T25545] EXT4-fs (loop7): revision level too high, forcing read-only mode [ 1334.048165][T25545] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=2842c018, mo2=0002] [ 1334.084895][T25545] System zones: 0-2, 18-18, 34-35 [ 1334.095127][T25545] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 1334.124641][T25545] EXT4-fs (loop7): shut down requested (0) [ 1334.524759][ T29] kauditd_printk_skb: 197 callbacks suppressed [ 1334.524792][ T29] audit: type=1326 audit(1736898065.205:133191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25572 comm="syz.6.17023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1334.576570][ T29] audit: type=1326 audit(1736898065.205:133192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25572 comm="syz.6.17023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1334.600477][ T29] audit: type=1326 audit(1736898065.235:133193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25572 comm="syz.6.17023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1334.624426][ T29] audit: type=1326 audit(1736898065.235:133194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25572 comm="syz.6.17023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1334.648226][ T29] audit: type=1326 audit(1736898065.235:133195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25572 comm="syz.6.17023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1334.672284][ T29] audit: type=1326 audit(1736898065.245:133196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25572 comm="syz.6.17023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1334.696316][ T29] audit: type=1326 audit(1736898065.245:133197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25572 comm="syz.6.17023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1334.720654][ T29] audit: type=1326 audit(1736898065.245:133198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25572 comm="syz.6.17023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1334.744488][ T29] audit: type=1326 audit(1736898065.245:133199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25572 comm="syz.6.17023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1334.768379][ T29] audit: type=1326 audit(1736898065.245:133200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25572 comm="syz.6.17023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1334.832778][T18658] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1334.870825][T25589] netlink: 4 bytes leftover after parsing attributes in process `syz.6.17029'. [ 1334.965814][T25589] netlink: 4 bytes leftover after parsing attributes in process `syz.6.17029'. [ 1335.009187][T25600] xt_hashlimit: size too large, truncated to 1048576 [ 1335.501293][T25622] loop3: detected capacity change from 0 to 764 [ 1335.537381][T25621] Symlink component flag not implemented [ 1335.569521][T25621] Symlink component flag not implemented (129) [ 1335.601743][T25621] rock: directory entry would overflow storage [ 1335.608729][T25621] rock: sig=0x4f50, size=4, remaining=3 [ 1335.614331][T25621] iso9660: Corrupted directory entry in block 6 of inode 1792 [ 1336.262383][T25665] loop7: detected capacity change from 0 to 128 [ 1336.279358][T25665] FAULT_INJECTION: forcing a failure. [ 1336.279358][T25665] name failslab, interval 1, probability 0, space 0, times 0 [ 1336.292110][T25665] CPU: 0 UID: 0 PID: 25665 Comm: syz.7.17054 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1336.302983][T25665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1336.313051][T25665] Call Trace: [ 1336.316335][T25665] [ 1336.319277][T25665] dump_stack_lvl+0xf2/0x150 [ 1336.323895][T25665] dump_stack+0x15/0x1a [ 1336.328080][T25665] should_fail_ex+0x223/0x230 [ 1336.332782][T25665] should_failslab+0x8f/0xb0 [ 1336.337403][T25665] __kmalloc_noprof+0xab/0x3f0 [ 1336.342249][T25665] ? sock_kmalloc+0x83/0xc0 [ 1336.346847][T25665] sock_kmalloc+0x83/0xc0 [ 1336.351197][T25665] ____sys_sendmsg+0x127/0x410 [ 1336.356068][T25665] __sys_sendmsg+0x19d/0x230 [ 1336.360688][T25665] __x64_sys_sendmsg+0x46/0x50 [ 1336.365574][T25665] x64_sys_call+0x2734/0x2dc0 [ 1336.370344][T25665] do_syscall_64+0xc9/0x1c0 [ 1336.374878][T25665] ? clear_bhb_loop+0x55/0xb0 [ 1336.379708][T25665] ? clear_bhb_loop+0x55/0xb0 [ 1336.384398][T25665] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1336.390331][T25665] RIP: 0033:0x7fa11ba25d29 [ 1336.394754][T25665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1336.414521][T25665] RSP: 002b:00007fa11a097038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1336.423037][T25665] RAX: ffffffffffffffda RBX: 00007fa11bc15fa0 RCX: 00007fa11ba25d29 [ 1336.431020][T25665] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000008 [ 1336.438997][T25665] RBP: 00007fa11a097090 R08: 0000000000000000 R09: 0000000000000000 [ 1336.447012][T25665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1336.455141][T25665] R13: 0000000000000000 R14: 00007fa11bc15fa0 R15: 00007ffe6ef56278 [ 1336.463135][T25665] [ 1336.559058][T25670] xt_hashlimit: size too large, truncated to 1048576 [ 1336.641122][T25668] netlink: 12 bytes leftover after parsing attributes in process `syz.1.17057'. [ 1336.862702][T25692] syz.3.17065[25692] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1336.862799][T25692] syz.3.17065[25692] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1336.900073][T25696] netlink: 132 bytes leftover after parsing attributes in process `syz.6.17067'. [ 1336.916679][T25692] syz.3.17065[25692] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1337.006572][T25700] loop3: detected capacity change from 0 to 1024 [ 1337.097926][T25700] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1337.120245][T25700] ext4 filesystem being mounted at /289/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 1337.311927][T20963] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1337.398732][T25723] FAULT_INJECTION: forcing a failure. [ 1337.398732][T25723] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1337.411936][T25723] CPU: 0 UID: 0 PID: 25723 Comm: syz.6.17077 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1337.422871][T25723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1337.432983][T25723] Call Trace: [ 1337.436322][T25723] [ 1337.439302][T25723] dump_stack_lvl+0xf2/0x150 [ 1337.443932][T25723] dump_stack+0x15/0x1a [ 1337.448164][T25723] should_fail_ex+0x223/0x230 [ 1337.452855][T25723] should_fail+0xb/0x10 [ 1337.457146][T25723] should_fail_usercopy+0x1a/0x20 [ 1337.462212][T25723] _copy_to_user+0x20/0xa0 [ 1337.466650][T25723] simple_read_from_buffer+0xa0/0x110 [ 1337.472112][T25723] proc_fail_nth_read+0xf9/0x140 [ 1337.477074][T25723] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1337.482632][T25723] vfs_read+0x1a2/0x700 [ 1337.486810][T25723] ? __rcu_read_unlock+0x4e/0x70 [ 1337.491866][T25723] ? __fget_files+0x17c/0x1c0 [ 1337.496630][T25723] ksys_read+0xe8/0x1b0 [ 1337.500895][T25723] __x64_sys_read+0x42/0x50 [ 1337.505481][T25723] x64_sys_call+0x2874/0x2dc0 [ 1337.510224][T25723] do_syscall_64+0xc9/0x1c0 [ 1337.514816][T25723] ? clear_bhb_loop+0x55/0xb0 [ 1337.519500][T25723] ? clear_bhb_loop+0x55/0xb0 [ 1337.524187][T25723] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1337.530107][T25723] RIP: 0033:0x7f141663473c [ 1337.534544][T25723] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1337.554292][T25723] RSP: 002b:00007f1414ca1030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1337.562712][T25723] RAX: ffffffffffffffda RBX: 00007f1416825fa0 RCX: 00007f141663473c [ 1337.570761][T25723] RDX: 000000000000000f RSI: 00007f1414ca10a0 RDI: 0000000000000009 [ 1337.578809][T25723] RBP: 00007f1414ca1090 R08: 0000000000000000 R09: 0000000000000000 [ 1337.586872][T25723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1337.594851][T25723] R13: 0000000000000000 R14: 00007f1416825fa0 R15: 00007ffd4e22f8a8 [ 1337.602936][T25723] [ 1338.091914][T25748] netlink: 3 bytes leftover after parsing attributes in process `syz.1.17086'. [ 1338.102504][T25748] 0ªX¹¦À: renamed from caif0 [ 1338.110645][T25748] 0ªX¹¦À: entered allmulticast mode [ 1338.116007][T25748] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 1338.412288][T25770] loop3: detected capacity change from 0 to 164 [ 1338.420169][T25770] Unable to read rock-ridge attributes [ 1338.428647][T25770] Unable to read rock-ridge attributes [ 1338.435048][T25770] iso9660: Corrupted directory entry in block 4 of inode 1792 [ 1339.315793][T25821] loop7: detected capacity change from 0 to 2048 [ 1339.421592][T25829] loop3: detected capacity change from 0 to 764 [ 1339.445460][T25826] Symlink component flag not implemented [ 1339.457885][T25826] Symlink component flag not implemented (129) [ 1339.478862][T25826] rock: directory entry would overflow storage [ 1339.485238][T25826] rock: sig=0x4f50, size=4, remaining=3 [ 1339.490896][T25826] iso9660: Corrupted directory entry in block 6 of inode 1792 [ 1339.563616][ T29] kauditd_printk_skb: 640 callbacks suppressed [ 1339.563679][ T29] audit: type=1326 audit(1736898070.235:133841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25834 comm="syz.7.17118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1339.604471][ T29] audit: type=1326 audit(1736898070.235:133842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25834 comm="syz.7.17118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1339.629193][ T29] audit: type=1326 audit(1736898070.245:133843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25834 comm="syz.7.17118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1339.652950][ T29] audit: type=1326 audit(1736898070.245:133844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25834 comm="syz.7.17118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1339.677544][ T29] audit: type=1326 audit(1736898070.245:133845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25834 comm="syz.7.17118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1339.701359][ T29] audit: type=1326 audit(1736898070.245:133846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25834 comm="syz.7.17118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1339.725886][ T29] audit: type=1326 audit(1736898070.245:133847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25834 comm="syz.7.17118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1339.749879][ T29] audit: type=1326 audit(1736898070.245:133848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25834 comm="syz.7.17118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1339.774467][ T29] audit: type=1326 audit(1736898070.245:133849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25834 comm="syz.7.17118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1339.798291][ T29] audit: type=1326 audit(1736898070.245:133850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25834 comm="syz.7.17118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa11ba25d29 code=0x7ffc0000 [ 1340.017013][T25854] random: crng reseeded on system resumption [ 1340.090778][T25847] syz.3.17121[25847] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1340.090920][T25847] syz.3.17121[25847] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1340.102829][T25847] syz.3.17121[25847] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1340.190854][T25847] loop3: detected capacity change from 0 to 512 [ 1340.215577][T25847] EXT4-fs: Ignoring removed bh option [ 1340.221156][T25847] EXT4-fs: Ignoring removed mblk_io_submit option [ 1340.236668][T25847] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1340.252675][T25847] EXT4-fs (loop3): revision level too high, forcing read-only mode [ 1340.260789][T25847] EXT4-fs (loop3): orphan cleanup on readonly fs [ 1340.273228][T25847] EXT4-fs warning (device loop3): ext4_enable_quotas:7156: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 1340.290993][T25847] EXT4-fs (loop3): Cannot turn on quotas: error -117 [ 1340.301786][T25847] EXT4-fs error (device loop3): ext4_read_block_bitmap_nowait:483: comm syz.3.17121: Invalid block bitmap block 0 in block_group 0 [ 1340.318020][T25847] EXT4-fs (loop3): Remounting filesystem read-only [ 1340.325364][T25847] EXT4-fs (loop3): 1 orphan inode deleted [ 1340.331455][T25847] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 1340.344416][T25847] SELinux: (dev loop3, type ext4) getxattr errno 5 [ 1340.353398][T25847] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1340.895515][T25895] loop3: detected capacity change from 0 to 512 [ 1340.918491][T25895] EXT4-fs: Ignoring removed i_version option [ 1340.924598][T25895] EXT4-fs: Ignoring removed mblk_io_submit option [ 1340.956607][T25895] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 1340.988006][T25895] EXT4-fs (loop3): 1 truncate cleaned up [ 1340.996180][T25895] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1341.024652][T25895] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 1341.039091][T25895] FAULT_INJECTION: forcing a failure. [ 1341.039091][T25895] name failslab, interval 1, probability 0, space 0, times 0 [ 1341.052419][T25895] CPU: 1 UID: 0 PID: 25895 Comm: syz.3.17141 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1341.063440][T25895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1341.073517][T25895] Call Trace: [ 1341.076817][T25895] [ 1341.079777][T25895] dump_stack_lvl+0xf2/0x150 [ 1341.084462][T25895] dump_stack+0x15/0x1a [ 1341.088729][T25895] should_fail_ex+0x223/0x230 [ 1341.093429][T25895] should_failslab+0x8f/0xb0 [ 1341.098050][T25895] kmem_cache_alloc_noprof+0x52/0x320 [ 1341.103515][T25895] ? __es_insert_extent+0x563/0xed0 [ 1341.108745][T25895] __es_insert_extent+0x563/0xed0 [ 1341.113866][T25895] ext4_es_insert_extent+0x45a/0x1c60 [ 1341.119385][T25895] ext4_map_query_blocks+0x107/0x180 [ 1341.124708][T25895] ext4_map_blocks+0x23c/0xd20 [ 1341.129612][T25895] ? avc_has_perm_noaudit+0x1cc/0x210 [ 1341.135100][T25895] ext4_getblk+0x11f/0x530 [ 1341.139580][T25895] ext4_bread_batch+0x5b/0x360 [ 1341.144474][T25895] __ext4_find_entry+0xa1d/0x1090 [ 1341.149569][T25895] ? mod_objcg_state+0x2ea/0x4f0 [ 1341.154611][T25895] ? kmem_cache_alloc_lru_noprof+0x230/0x320 [ 1341.160717][T25895] ? __d_alloc+0x3d/0x340 [ 1341.165081][T25895] ? d_set_d_op+0xa0/0x1f0 [ 1341.169550][T25895] ext4_lookup+0xba/0x390 [ 1341.173907][T25895] lookup_one_qstr_excl+0xc7/0x1a0 [ 1341.179121][T25895] do_renameat2+0x432/0xa70 [ 1341.183680][T25895] __x64_sys_renameat2+0x82/0xa0 [ 1341.188641][T25895] x64_sys_call+0x1bf1/0x2dc0 [ 1341.193353][T25895] do_syscall_64+0xc9/0x1c0 [ 1341.197920][T25895] ? clear_bhb_loop+0x55/0xb0 [ 1341.202635][T25895] ? clear_bhb_loop+0x55/0xb0 [ 1341.207331][T25895] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1341.213249][T25895] RIP: 0033:0x7f241ddc5d29 [ 1341.217679][T25895] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1341.237295][T25895] RSP: 002b:00007f241c437038 EFLAGS: 00000246 ORIG_RAX: 000000000000013c [ 1341.245714][T25895] RAX: ffffffffffffffda RBX: 00007f241dfb5fa0 RCX: 00007f241ddc5d29 [ 1341.253705][T25895] RDX: ffffffffffffff9c RSI: 0000000020000580 RDI: ffffffffffffff9c [ 1341.261686][T25895] RBP: 00007f241c437090 R08: 0000000000000004 R09: 0000000000000000 [ 1341.269661][T25895] R10: 00000000200005c0 R11: 0000000000000246 R12: 0000000000000001 [ 1341.277637][T25895] R13: 0000000000000000 R14: 00007f241dfb5fa0 R15: 00007ffcdc3ebca8 [ 1341.285635][T25895] [ 1341.292304][T25906] syz.1.17144[25906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1341.292398][T25906] syz.1.17144[25906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1341.308993][T25906] syz.1.17144[25906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1341.348345][T20963] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1341.476177][T25912] loop3: detected capacity change from 0 to 2048 [ 1341.486278][T25912] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1341.513879][T25912] netlink: 12 bytes leftover after parsing attributes in process `syz.3.17146'. [ 1341.606591][T25919] syz.6.17148[25919] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1341.626562][T25915] EXT4-fs error (device loop3): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 1341.657092][T25915] EXT4-fs (loop3): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 1341.669402][T25915] EXT4-fs (loop3): This should not happen!! Data will be lost [ 1341.669402][T25915] [ 1341.679126][T25915] EXT4-fs (loop3): Total free blocks count 0 [ 1341.685193][T25915] EXT4-fs (loop3): Free/Dirty block details [ 1341.691110][T25915] EXT4-fs (loop3): free_blocks=2415919104 [ 1341.696871][T25915] EXT4-fs (loop3): dirty_blocks=16 [ 1341.701998][T25915] EXT4-fs (loop3): Block reservation details [ 1341.708005][T25915] EXT4-fs (loop3): i_reserved_data_blocks=1 [ 1341.765266][T25925] netlink: 24 bytes leftover after parsing attributes in process `syz.0.17149'. [ 1341.928397][T25935] loop7: detected capacity change from 0 to 2048 [ 1342.239049][T25946] xt_hashlimit: size too large, truncated to 1048576 [ 1342.386207][T20963] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1342.386361][T25953] FAULT_INJECTION: forcing a failure. [ 1342.386361][T25953] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1342.408588][T25953] CPU: 0 UID: 0 PID: 25953 Comm: syz.7.17159 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1342.419454][T25953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1342.429569][T25953] Call Trace: [ 1342.432875][T25953] [ 1342.435825][T25953] dump_stack_lvl+0xf2/0x150 [ 1342.440476][T25953] dump_stack+0x15/0x1a [ 1342.444738][T25953] should_fail_ex+0x223/0x230 [ 1342.449516][T25953] should_fail_alloc_page+0xfd/0x110 [ 1342.454837][T25953] __alloc_pages_noprof+0x109/0x340 [ 1342.460065][T25953] ___kmalloc_large_node+0x7a/0x120 [ 1342.465342][T25953] __kmalloc_large_node_noprof+0x17/0xa0 [ 1342.471009][T25953] __kmalloc_noprof+0x2b8/0x3f0 [ 1342.475871][T25953] ? slhc_init+0xf8/0x380 [ 1342.480215][T25953] slhc_init+0xf8/0x380 [ 1342.484404][T25953] ppp_ioctl+0xe73/0x11b0 [ 1342.488828][T25953] ? __fget_files+0x17c/0x1c0 [ 1342.493527][T25953] ? __pfx_ppp_ioctl+0x10/0x10 [ 1342.498303][T25953] __se_sys_ioctl+0xc9/0x140 [ 1342.502906][T25953] __x64_sys_ioctl+0x43/0x50 [ 1342.507586][T25953] x64_sys_call+0x1690/0x2dc0 [ 1342.512294][T25953] do_syscall_64+0xc9/0x1c0 [ 1342.516823][T25953] ? clear_bhb_loop+0x55/0xb0 [ 1342.521591][T25953] ? clear_bhb_loop+0x55/0xb0 [ 1342.526276][T25953] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1342.532234][T25953] RIP: 0033:0x7fa11ba25d29 [ 1342.536732][T25953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1342.556358][T25953] RSP: 002b:00007fa11a097038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1342.564779][T25953] RAX: ffffffffffffffda RBX: 00007fa11bc15fa0 RCX: 00007fa11ba25d29 [ 1342.572859][T25953] RDX: 000000002000000c RSI: 0000000040047451 RDI: 0000000000000006 [ 1342.580841][T25953] RBP: 00007fa11a097090 R08: 0000000000000000 R09: 0000000000000000 [ 1342.588827][T25953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1342.596803][T25953] R13: 0000000000000000 R14: 00007fa11bc15fa0 R15: 00007ffe6ef56278 [ 1342.604862][T25953] [ 1342.656978][T25957] xt_hashlimit: size too large, truncated to 1048576 [ 1342.921437][T25969] xt_hashlimit: size too large, truncated to 1048576 [ 1344.576024][T26024] bpf_get_probe_write_proto: 8 callbacks suppressed [ 1344.576044][T26024] syz.1.17184[26024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1344.606127][T26024] syz.1.17184[26024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1344.663901][T26024] syz.1.17184[26024] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1344.737064][T26030] netlink: 44 bytes leftover after parsing attributes in process `syz.6.17179'. [ 1344.810071][ T29] kauditd_printk_skb: 266 callbacks suppressed [ 1344.810086][ T29] audit: type=1326 audit(1736898075.485:134116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26012 comm="syz.6.17179" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1344.840241][ T29] audit: type=1326 audit(1736898075.485:134117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26012 comm="syz.6.17179" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1344.864062][ T29] audit: type=1326 audit(1736898075.485:134118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26012 comm="syz.6.17179" exe="/root/syz-executor" sig=0 arch=c000003e syscall=66 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1344.887872][ T29] audit: type=1326 audit(1736898075.485:134119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26012 comm="syz.6.17179" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1344.911680][ T29] audit: type=1326 audit(1736898075.485:134120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26012 comm="syz.6.17179" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1344.935857][ T29] audit: type=1326 audit(1736898075.485:134121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26012 comm="syz.6.17179" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1344.959889][ T29] audit: type=1326 audit(1736898075.485:134122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26012 comm="syz.6.17179" exe="/root/syz-executor" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1344.988603][ T29] audit: type=1326 audit(1736898075.485:134123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26012 comm="syz.6.17179" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1345.013171][ T29] audit: type=1326 audit(1736898075.655:134124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26035 comm="syz.6.17179" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f14166685e5 code=0x7ffc0000 [ 1345.037714][ T29] audit: type=1326 audit(1736898075.655:134125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26012 comm="syz.6.17179" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1345.105895][T26039] FAULT_INJECTION: forcing a failure. [ 1345.105895][T26039] name failslab, interval 1, probability 0, space 0, times 0 [ 1345.118700][T26039] CPU: 0 UID: 0 PID: 26039 Comm: syz.3.17187 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1345.129637][T26039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1345.139713][T26039] Call Trace: [ 1345.143006][T26039] [ 1345.145959][T26039] dump_stack_lvl+0xf2/0x150 [ 1345.150622][T26039] dump_stack+0x15/0x1a [ 1345.154853][T26039] should_fail_ex+0x223/0x230 [ 1345.159565][T26039] should_failslab+0x8f/0xb0 [ 1345.164233][T26039] __kmalloc_noprof+0xab/0x3f0 [ 1345.169113][T26039] ? alloc_pipe_info+0x1cb/0x360 [ 1345.174091][T26039] alloc_pipe_info+0x1cb/0x360 [ 1345.178902][T26039] splice_direct_to_actor+0x60f/0x670 [ 1345.184305][T26039] ? __pfx_direct_splice_actor+0x10/0x10 [ 1345.186407][T26041] loop7: detected capacity change from 0 to 2048 [ 1345.189995][T26039] ? 0xffffffff81000000 [ 1345.190016][T26039] ? selinux_file_permission+0x22a/0x360 [ 1345.206343][T26039] ? __rcu_read_unlock+0x4e/0x70 [ 1345.211358][T26039] ? avc_policy_seqno+0x15/0x20 [ 1345.216356][T26039] ? selinux_file_permission+0x22a/0x360 [ 1345.222028][T26039] do_splice_direct+0xd7/0x150 [ 1345.226905][T26039] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 1345.232899][T26039] do_sendfile+0x398/0x660 [ 1345.237333][T26039] __x64_sys_sendfile64+0x110/0x150 [ 1345.242576][T26039] x64_sys_call+0xfbd/0x2dc0 [ 1345.247191][T26039] do_syscall_64+0xc9/0x1c0 [ 1345.251743][T26039] ? clear_bhb_loop+0x55/0xb0 [ 1345.256567][T26039] ? clear_bhb_loop+0x55/0xb0 [ 1345.261355][T26039] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1345.267330][T26039] RIP: 0033:0x7f241ddc5d29 [ 1345.271826][T26039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1345.291500][T26039] RSP: 002b:00007f241c437038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1345.299960][T26039] RAX: ffffffffffffffda RBX: 00007f241dfb5fa0 RCX: 00007f241ddc5d29 [ 1345.308001][T26039] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000007 [ 1345.315970][T26039] RBP: 00007f241c437090 R08: 0000000000000000 R09: 0000000000000000 [ 1345.324025][T26039] R10: 000000000000000d R11: 0000000000000246 R12: 0000000000000001 [ 1345.332001][T26039] R13: 0000000000000000 R14: 00007f241dfb5fa0 R15: 00007ffcdc3ebca8 [ 1345.339982][T26039] [ 1345.443119][T26041] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1345.678792][T26056] EXT4-fs error (device loop7): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 1345.724697][T26056] EXT4-fs (loop7): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 1345.737076][T26056] EXT4-fs (loop7): This should not happen!! Data will be lost [ 1345.737076][T26056] [ 1345.746797][T26056] EXT4-fs (loop7): Total free blocks count 0 [ 1345.752794][T26056] EXT4-fs (loop7): Free/Dirty block details [ 1345.758714][T26056] EXT4-fs (loop7): free_blocks=2415919104 [ 1345.764514][T26056] EXT4-fs (loop7): dirty_blocks=16 [ 1345.769628][T26056] EXT4-fs (loop7): Block reservation details [ 1345.775697][T26056] EXT4-fs (loop7): i_reserved_data_blocks=1 [ 1345.796341][T26049] netlink: 36 bytes leftover after parsing attributes in process `syz.6.17191'. [ 1345.805430][T26049] netlink: 36 bytes leftover after parsing attributes in process `syz.6.17191'. [ 1345.853389][T26049] netlink: 36 bytes leftover after parsing attributes in process `syz.6.17191'. [ 1345.884280][T26049] netlink: 36 bytes leftover after parsing attributes in process `syz.6.17191'. [ 1345.893458][T26049] netlink: 36 bytes leftover after parsing attributes in process `syz.6.17191'. [ 1345.905253][T26049] netlink: 36 bytes leftover after parsing attributes in process `syz.6.17191'. [ 1345.971991][T26072] loop3: detected capacity change from 0 to 512 [ 1345.979921][T26049] netlink: 36 bytes leftover after parsing attributes in process `syz.6.17191'. [ 1345.989082][T26049] netlink: 36 bytes leftover after parsing attributes in process `syz.6.17191'. [ 1346.016301][T26072] EXT4-fs (loop3): revision level too high, forcing read-only mode [ 1346.024260][T26072] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=2842c018, mo2=0002] [ 1346.032368][T26072] System zones: 0-2, 18-18, 34-35 [ 1346.037987][T26072] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 1346.053299][T26072] EXT4-fs (loop3): shut down requested (0) [ 1346.101045][T18658] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1346.165607][T20963] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1346.317837][T26094] loop3: detected capacity change from 0 to 164 [ 1346.326023][T26094] Unable to read rock-ridge attributes [ 1346.406833][T26102] loop3: detected capacity change from 0 to 2048 [ 1346.442674][T26102] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1346.757820][T26113] EXT4-fs error (device loop3): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 1346.784501][T26113] EXT4-fs (loop3): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 1346.796812][T26113] EXT4-fs (loop3): This should not happen!! Data will be lost [ 1346.796812][T26113] [ 1346.806511][T26113] EXT4-fs (loop3): Total free blocks count 0 [ 1346.812548][T26113] EXT4-fs (loop3): Free/Dirty block details [ 1346.818490][T26113] EXT4-fs (loop3): free_blocks=2415919104 [ 1346.824281][T26113] EXT4-fs (loop3): dirty_blocks=16 [ 1346.829498][T26113] EXT4-fs (loop3): Block reservation details [ 1346.835642][T26113] EXT4-fs (loop3): i_reserved_data_blocks=1 [ 1347.227400][T20963] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1347.354675][T26136] hub 1-0:1.0: USB hub found [ 1347.360079][T26136] hub 1-0:1.0: 8 ports detected [ 1347.681438][T26156] syz.0.17226[26156] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1347.681515][T26156] syz.0.17226[26156] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1347.701530][T26154] __nla_validate_parse: 1 callbacks suppressed [ 1347.701550][T26154] netlink: 12 bytes leftover after parsing attributes in process `syz.6.17225'. [ 1347.722019][T26156] syz.0.17226[26156] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1348.728341][T26179] loop7: detected capacity change from 0 to 764 [ 1348.765691][T26179] Symlink component flag not implemented [ 1348.765705][T26181] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1348.771418][T26179] Symlink component flag not implemented (129) [ 1348.801733][T26179] rock: directory entry would overflow storage [ 1348.807982][T26179] rock: sig=0x4f50, size=4, remaining=3 [ 1348.813704][T26179] iso9660: Corrupted directory entry in block 6 of inode 1792 [ 1348.862412][T26181] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1348.946795][T26181] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1349.007303][T26181] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1349.102103][T26181] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1349.114336][T26181] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1349.128293][T26190] loop7: detected capacity change from 0 to 764 [ 1349.136196][T26190] Symlink component flag not implemented [ 1349.141910][T26190] Symlink component flag not implemented (129) [ 1349.150837][T26181] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1349.161021][T26190] rock: directory entry would overflow storage [ 1349.167235][T26190] rock: sig=0x4f50, size=4, remaining=3 [ 1349.172798][T26190] iso9660: Corrupted directory entry in block 6 of inode 1792 [ 1349.186023][T26181] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1349.349847][T26196] netlink: 12 bytes leftover after parsing attributes in process `syz.6.17241'. [ 1349.889815][ T29] kauditd_printk_skb: 258 callbacks suppressed [ 1349.889833][ T29] audit: type=1326 audit(1736898080.565:134384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26186 comm="syz.7.17237" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7fc00000 [ 1349.935140][ T29] audit: type=1326 audit(1736898080.565:134385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26186 comm="syz.7.17237" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fa11ba25d29 code=0x7fc00000 [ 1349.958870][ T29] audit: type=1326 audit(1736898080.565:134386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26186 comm="syz.7.17237" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7fc00000 [ 1349.982931][ T29] audit: type=1326 audit(1736898080.565:134387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26186 comm="syz.7.17237" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7fc00000 [ 1350.006774][ T29] audit: type=1326 audit(1736898080.565:134388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26186 comm="syz.7.17237" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7fc00000 [ 1350.030629][ T29] audit: type=1326 audit(1736898080.565:134389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26186 comm="syz.7.17237" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7fc00000 [ 1350.054802][ T29] audit: type=1326 audit(1736898080.565:134390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26186 comm="syz.7.17237" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7fc00000 [ 1350.078990][ T29] audit: type=1326 audit(1736898080.565:134391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26186 comm="syz.7.17237" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7fc00000 [ 1350.102835][ T29] audit: type=1326 audit(1736898080.565:134392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26186 comm="syz.7.17237" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7fc00000 [ 1350.126600][ T29] audit: type=1326 audit(1736898080.565:134393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26186 comm="syz.7.17237" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa11ba25d29 code=0x7fc00000 [ 1350.297673][T26216] loop7: detected capacity change from 0 to 512 [ 1350.326474][T26216] EXT4-fs (loop7): revision level too high, forcing read-only mode [ 1350.334458][T26216] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=2842c018, mo2=0002] [ 1350.353624][T26216] System zones: 0-2, 18-18, 34-35 [ 1350.380156][T26216] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 1350.452572][T26216] EXT4-fs (loop7): shut down requested (0) [ 1350.560179][T18658] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1350.672113][T26238] bridge0: port 3(ipvlan2) entered blocking state [ 1350.679419][T26238] bridge0: port 3(ipvlan2) entered disabled state [ 1350.692338][T26238] ipvlan2: entered allmulticast mode [ 1350.697960][T26238] bridge0: entered allmulticast mode [ 1350.703969][T26238] ipvlan2: left allmulticast mode [ 1350.707788][T26241] loop7: detected capacity change from 0 to 2048 [ 1350.709887][T26238] bridge0: left allmulticast mode [ 1350.736679][T26241] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1350.765806][T26241] netlink: 12 bytes leftover after parsing attributes in process `syz.7.17256'. [ 1350.913796][T26256] EXT4-fs error (device loop7): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 1350.957542][T26256] EXT4-fs (loop7): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 1350.969783][T26256] EXT4-fs (loop7): This should not happen!! Data will be lost [ 1350.969783][T26256] [ 1350.980213][T26256] EXT4-fs (loop7): Total free blocks count 0 [ 1350.986318][T26256] EXT4-fs (loop7): Free/Dirty block details [ 1350.992294][T26256] EXT4-fs (loop7): free_blocks=2415919104 [ 1350.998082][T26256] EXT4-fs (loop7): dirty_blocks=16 [ 1351.003250][T26256] EXT4-fs (loop7): Block reservation details [ 1351.009985][T26256] EXT4-fs (loop7): i_reserved_data_blocks=1 [ 1351.016048][T26262] FAULT_INJECTION: forcing a failure. [ 1351.016048][T26262] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1351.029169][T26262] CPU: 1 UID: 0 PID: 26262 Comm: syz.6.17262 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1351.040182][T26262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1351.050260][T26262] Call Trace: [ 1351.053601][T26262] [ 1351.056545][T26262] dump_stack_lvl+0xf2/0x150 [ 1351.061201][T26262] dump_stack+0x15/0x1a [ 1351.065450][T26262] should_fail_ex+0x223/0x230 [ 1351.070159][T26262] should_fail+0xb/0x10 [ 1351.074379][T26262] should_fail_usercopy+0x1a/0x20 [ 1351.079442][T26262] _copy_from_user+0x1e/0xb0 [ 1351.084106][T26262] restore_altstack+0x48/0xd0 [ 1351.088810][T26262] __do_sys_rt_sigreturn+0xd7/0x160 [ 1351.094074][T26262] x64_sys_call+0x2982/0x2dc0 [ 1351.098763][T26262] do_syscall_64+0xc9/0x1c0 [ 1351.103278][T26262] ? clear_bhb_loop+0x55/0xb0 [ 1351.107970][T26262] ? clear_bhb_loop+0x55/0xb0 [ 1351.112685][T26262] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1351.118634][T26262] RIP: 0033:0x7f14165d1f29 [ 1351.123079][T26262] Code: 64 c7 00 16 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 90 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 c7 c0 0f 00 00 00 0f 05 <0f> 1f 80 00 00 00 00 48 81 ec 48 01 00 00 49 89 d0 64 48 8b 04 25 [ 1351.142797][T26262] RSP: 002b:00007f1414ca0a80 EFLAGS: 00000202 ORIG_RAX: 000000000000000f [ 1351.151214][T26262] RAX: ffffffffffffffda RBX: 00007f1416825fa0 RCX: 00007f14165d1f29 [ 1351.159192][T26262] RDX: 00007f1414ca0a80 RSI: 00007f1414ca0bb0 RDI: 0000000000000021 [ 1351.167182][T26262] RBP: 00007f1414ca1090 R08: 0000000000000000 R09: 0000000000000000 [ 1351.175167][T26262] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001 [ 1351.183351][T26262] R13: 0000000000000000 R14: 00007f1416825fa0 R15: 00007ffd4e22f8a8 [ 1351.191337][T26262] [ 1351.298854][T26272] loop3: detected capacity change from 0 to 1024 [ 1351.308731][T26272] SELinux: security_context_str_to_sid () failed with errno=-22 [ 1351.573164][T26287] Cannot find add_set index 0 as target [ 1351.600596][T26287] netlink: 'syz.3.17273': attribute type 10 has an invalid length. [ 1351.610937][T18658] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1351.685907][T26300] xt_TPROXY: Can be used only with -p tcp or -p udp [ 1352.076095][T26322] random: crng reseeded on system resumption [ 1352.267979][T26335] SELinux: syz.6.17288 (26335) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1352.628938][T26344] FAULT_INJECTION: forcing a failure. [ 1352.628938][T26344] name failslab, interval 1, probability 0, space 0, times 0 [ 1352.642453][T26344] CPU: 1 UID: 0 PID: 26344 Comm: syz.3.17292 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1352.653328][T26344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1352.663455][T26344] Call Trace: [ 1352.666737][T26344] [ 1352.669673][T26344] dump_stack_lvl+0xf2/0x150 [ 1352.674329][T26344] dump_stack+0x15/0x1a [ 1352.678510][T26344] should_fail_ex+0x223/0x230 [ 1352.683220][T26344] should_failslab+0x8f/0xb0 [ 1352.687937][T26344] __kmalloc_node_noprof+0xad/0x410 [ 1352.693217][T26344] ? __kvmalloc_node_noprof+0x72/0x170 [ 1352.698699][T26344] __kvmalloc_node_noprof+0x72/0x170 [ 1352.704029][T26344] xt_alloc_entry_offsets+0x47/0x50 [ 1352.709327][T26344] translate_table+0xa3/0x1040 [ 1352.714094][T26344] ? __memcg_slab_post_alloc_hook+0x510/0x660 [ 1352.720190][T26344] ? _copy_from_user+0x8d/0xb0 [ 1352.724974][T26344] do_ip6t_set_ctl+0x7cc/0x8c0 [ 1352.729743][T26344] ? __rcu_read_unlock+0x4e/0x70 [ 1352.734714][T26344] nf_setsockopt+0x195/0x1b0 [ 1352.739317][T26344] ipv6_setsockopt+0x10f/0x130 [ 1352.744101][T26344] rawv6_setsockopt+0x21e/0x410 [ 1352.748998][T26344] sock_common_setsockopt+0x64/0x80 [ 1352.754215][T26344] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 1352.760194][T26344] __sys_setsockopt+0x187/0x200 [ 1352.765054][T26344] __x64_sys_setsockopt+0x66/0x80 [ 1352.770098][T26344] x64_sys_call+0x282e/0x2dc0 [ 1352.774784][T26344] do_syscall_64+0xc9/0x1c0 [ 1352.779349][T26344] ? clear_bhb_loop+0x55/0xb0 [ 1352.784037][T26344] ? clear_bhb_loop+0x55/0xb0 [ 1352.788725][T26344] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1352.794713][T26344] RIP: 0033:0x7f241ddc5d29 [ 1352.799194][T26344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1352.818879][T26344] RSP: 002b:00007f241c3e4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1352.827297][T26344] RAX: ffffffffffffffda RBX: 00007f241dfb6160 RCX: 00007f241ddc5d29 [ 1352.835337][T26344] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 000000000000000a [ 1352.843308][T26344] RBP: 00007f241c3e4090 R08: 0000000000000488 R09: 0000000000000000 [ 1352.851337][T26344] R10: 0000000020000b00 R11: 0000000000000246 R12: 0000000000000001 [ 1352.859399][T26344] R13: 0000000000000000 R14: 00007f241dfb6160 R15: 00007ffcdc3ebca8 [ 1352.867424][T26344] [ 1352.991577][T26350] xt_hashlimit: size too large, truncated to 1048576 [ 1353.537008][T26318] syz.7.17286 (26318) used greatest stack depth: 5184 bytes left [ 1353.725213][T26372] FAULT_INJECTION: forcing a failure. [ 1353.725213][T26372] name failslab, interval 1, probability 0, space 0, times 0 [ 1353.738633][T26372] CPU: 1 UID: 0 PID: 26372 Comm: syz.3.17303 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1353.749494][T26372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1353.759588][T26372] Call Trace: [ 1353.762958][T26372] [ 1353.765894][T26372] dump_stack_lvl+0xf2/0x150 [ 1353.770534][T26372] dump_stack+0x15/0x1a [ 1353.774714][T26372] should_fail_ex+0x223/0x230 [ 1353.779567][T26372] ? audit_log_d_path+0x96/0x250 [ 1353.784527][T26372] should_failslab+0x8f/0xb0 [ 1353.789220][T26372] __kmalloc_cache_noprof+0x4e/0x320 [ 1353.794541][T26372] audit_log_d_path+0x96/0x250 [ 1353.799381][T26372] ? __rcu_read_unlock+0x4e/0x70 [ 1353.804462][T26372] audit_log_d_path_exe+0x42/0x70 [ 1353.809518][T26372] audit_log_task+0x192/0x1c0 [ 1353.814306][T26372] audit_seccomp+0x68/0x130 [ 1353.818831][T26372] __seccomp_filter+0x6fa/0x1180 [ 1353.823861][T26372] ? security_file_alloc+0x63/0x100 [ 1353.829179][T26372] ? percpu_counter_add_batch+0xc6/0x140 [ 1353.834835][T26372] ? errseq_sample+0x2f/0x40 [ 1353.839514][T26372] ? file_init_path+0x255/0x290 [ 1353.844500][T26372] __secure_computing+0x9f/0x1c0 [ 1353.849497][T26372] syscall_trace_enter+0xd1/0x1f0 [ 1353.854572][T26372] do_syscall_64+0xaa/0x1c0 [ 1353.859132][T26372] ? clear_bhb_loop+0x55/0xb0 [ 1353.863832][T26372] ? clear_bhb_loop+0x55/0xb0 [ 1353.868612][T26372] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1353.874611][T26372] RIP: 0033:0x7f241ddc473c [ 1353.879041][T26372] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1353.898701][T26372] RSP: 002b:00007f241c437030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1353.907149][T26372] RAX: ffffffffffffffda RBX: 00007f241dfb5fa0 RCX: 00007f241ddc473c [ 1353.915126][T26372] RDX: 000000000000000f RSI: 00007f241c4370a0 RDI: 0000000000000005 [ 1353.923121][T26372] RBP: 00007f241c437090 R08: 0000000000000000 R09: 0000000000000000 [ 1353.931103][T26372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1353.939101][T26372] R13: 0000000000000000 R14: 00007f241dfb5fa0 R15: 00007ffcdc3ebca8 [ 1353.947090][T26372] [ 1354.018283][T26376] loop3: detected capacity change from 0 to 512 [ 1354.034194][T26376] EXT4-fs: Ignoring removed i_version option [ 1354.040284][T26376] EXT4-fs: Ignoring removed mblk_io_submit option [ 1354.059574][T26376] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 1354.075032][T26377] wireguard0: entered promiscuous mode [ 1354.080544][T26377] wireguard0: entered allmulticast mode [ 1354.097767][T26376] EXT4-fs (loop3): 1 truncate cleaned up [ 1354.103819][T26376] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1354.120474][T26376] FAULT_INJECTION: forcing a failure. [ 1354.120474][T26376] name failslab, interval 1, probability 0, space 0, times 0 [ 1354.133160][T26376] CPU: 0 UID: 0 PID: 26376 Comm: syz.3.17305 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1354.144128][T26376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1354.154266][T26376] Call Trace: [ 1354.157547][T26376] [ 1354.160491][T26376] dump_stack_lvl+0xf2/0x150 [ 1354.165116][T26376] dump_stack+0x15/0x1a [ 1354.169289][T26376] should_fail_ex+0x223/0x230 [ 1354.174051][T26376] should_failslab+0x8f/0xb0 [ 1354.178659][T26376] kmem_cache_alloc_noprof+0x52/0x320 [ 1354.184100][T26376] ? audit_log_start+0x34c/0x6b0 [ 1354.189107][T26376] audit_log_start+0x34c/0x6b0 [ 1354.193908][T26376] ? __fget_files+0x17c/0x1c0 [ 1354.198608][T26376] audit_seccomp+0x4b/0x130 [ 1354.203119][T26376] ? vfs_fstat+0x63/0x200 [ 1354.207533][T26376] __seccomp_filter+0x6fa/0x1180 [ 1354.212546][T26376] __secure_computing+0x9f/0x1c0 [ 1354.217499][T26376] syscall_trace_enter+0xd1/0x1f0 [ 1354.222554][T26376] ? fpregs_assert_state_consistent+0x83/0xa0 [ 1354.228653][T26376] do_syscall_64+0xaa/0x1c0 [ 1354.233267][T26376] ? clear_bhb_loop+0x55/0xb0 [ 1354.237951][T26376] ? clear_bhb_loop+0x55/0xb0 [ 1354.242758][T26376] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1354.248852][T26376] RIP: 0033:0x7f241ddc473c [ 1354.253271][T26376] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1354.272964][T26376] RSP: 002b:00007f241c437030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1354.281434][T26376] RAX: ffffffffffffffda RBX: 00007f241dfb5fa0 RCX: 00007f241ddc473c [ 1354.289433][T26376] RDX: 000000000000000f RSI: 00007f241c4370a0 RDI: 0000000000000006 [ 1354.297424][T26376] RBP: 00007f241c437090 R08: 0000000000000000 R09: 0000000000000000 [ 1354.305419][T26376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1354.313393][T26376] R13: 0000000000000000 R14: 00007f241dfb5fa0 R15: 00007ffcdc3ebca8 [ 1354.321462][T26376] [ 1354.386963][T20963] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1354.429414][T26406] syz.7.17315[26406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1354.429537][T26406] syz.7.17315[26406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1354.467541][T26406] syz.7.17315[26406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1354.496380][T26412] xt_hashlimit: size too large, truncated to 1048576 [ 1354.739706][T26428] syz.3.17321[26428] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1354.739771][T26428] syz.3.17321[26428] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1354.781786][T26428] syz.3.17321[26428] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1354.917528][ T29] kauditd_printk_skb: 494 callbacks suppressed [ 1354.917544][ T29] audit: type=1326 audit(1736898085.595:134886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26432 comm="syz.3.17323" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1355.216286][ T29] audit: type=1326 audit(1736898085.895:134887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26442 comm="syz.6.17327" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1355.240149][ T29] audit: type=1326 audit(1736898085.895:134888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26442 comm="syz.6.17327" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1355.269254][ T29] audit: type=1326 audit(1736898085.915:134889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26442 comm="syz.6.17327" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1355.293171][ T29] audit: type=1326 audit(1736898085.915:134890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26442 comm="syz.6.17327" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1355.316968][ T29] audit: type=1326 audit(1736898085.915:134891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26442 comm="syz.6.17327" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1355.340805][ T29] audit: type=1326 audit(1736898085.925:134892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26442 comm="syz.6.17327" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1355.364663][ T29] audit: type=1326 audit(1736898085.925:134893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26442 comm="syz.6.17327" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1355.388474][ T29] audit: type=1326 audit(1736898085.925:134894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26442 comm="syz.6.17327" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1355.412281][ T29] audit: type=1326 audit(1736898085.925:134895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26442 comm="syz.6.17327" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1416635d29 code=0x7ffc0000 [ 1355.528815][T26452] xt_hashlimit: size too large, truncated to 1048576 [ 1355.662487][T26464] FAULT_INJECTION: forcing a failure. [ 1355.662487][T26464] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1355.675680][T26464] CPU: 1 UID: 0 PID: 26464 Comm: syz.3.17334 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1355.686603][T26464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1355.696787][T26464] Call Trace: [ 1355.700091][T26464] [ 1355.703029][T26464] dump_stack_lvl+0xf2/0x150 [ 1355.707734][T26464] dump_stack+0x15/0x1a [ 1355.711956][T26464] should_fail_ex+0x223/0x230 [ 1355.716714][T26464] should_fail+0xb/0x10 [ 1355.720891][T26464] should_fail_usercopy+0x1a/0x20 [ 1355.725965][T26464] _copy_from_iter+0xd5/0xd00 [ 1355.730740][T26464] ? kmalloc_reserve+0x16e/0x190 [ 1355.735770][T26464] ? __virt_addr_valid+0x1ed/0x250 [ 1355.740958][T26464] ? __check_object_size+0x364/0x520 [ 1355.746297][T26464] pfkey_sendmsg+0x16c/0x970 [ 1355.750916][T26464] ? selinux_socket_sendmsg+0x185/0x1c0 [ 1355.756548][T26464] ? __pfx_pfkey_sendmsg+0x10/0x10 [ 1355.761681][T26464] __sock_sendmsg+0x140/0x180 [ 1355.766492][T26464] ____sys_sendmsg+0x312/0x410 [ 1355.771291][T26464] __sys_sendmsg+0x19d/0x230 [ 1355.775921][T26464] __x64_sys_sendmsg+0x46/0x50 [ 1355.780703][T26464] x64_sys_call+0x2734/0x2dc0 [ 1355.785427][T26464] do_syscall_64+0xc9/0x1c0 [ 1355.790123][T26464] ? clear_bhb_loop+0x55/0xb0 [ 1355.794852][T26464] ? clear_bhb_loop+0x55/0xb0 [ 1355.799540][T26464] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1355.805459][T26464] RIP: 0033:0x7f241ddc5d29 [ 1355.809878][T26464] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1355.829557][T26464] RSP: 002b:00007f241c437038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1355.838037][T26464] RAX: ffffffffffffffda RBX: 00007f241dfb5fa0 RCX: 00007f241ddc5d29 [ 1355.846010][T26464] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000008 [ 1355.853982][T26464] RBP: 00007f241c437090 R08: 0000000000000000 R09: 0000000000000000 [ 1355.861958][T26464] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1355.869932][T26464] R13: 0000000000000000 R14: 00007f241dfb5fa0 R15: 00007ffcdc3ebca8 [ 1355.877947][T26464] [ 1355.926862][T26466] FAULT_INJECTION: forcing a failure. [ 1355.926862][T26466] name failslab, interval 1, probability 0, space 0, times 0 [ 1355.940444][T26466] CPU: 1 UID: 0 PID: 26466 Comm: syz.0.17335 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1355.951324][T26466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1355.961401][T26466] Call Trace: [ 1355.964739][T26466] [ 1355.967677][T26466] dump_stack_lvl+0xf2/0x150 [ 1355.972446][T26466] dump_stack+0x15/0x1a [ 1355.976637][T26466] should_fail_ex+0x223/0x230 [ 1355.981338][T26466] ? new_nbp+0x143/0x310 [ 1355.985624][T26466] should_failslab+0x8f/0xb0 [ 1355.990246][T26466] __kmalloc_cache_noprof+0x4e/0x320 [ 1355.995592][T26466] new_nbp+0x143/0x310 [ 1355.999682][T26466] br_add_if+0x1ef/0xa50 [ 1356.004042][T26466] ? security_capable+0x81/0x90 [ 1356.008913][T26466] br_dev_siocdevprivate+0x840/0xc10 [ 1356.014241][T26466] ? __pfx_br_dev_siocdevprivate+0x10/0x10 [ 1356.020066][T26466] dev_ifsioc+0x84e/0xa10 [ 1356.024408][T26466] dev_ioctl+0x8e9/0xab0 [ 1356.028698][T26466] sock_ioctl+0x57d/0x600 [ 1356.033063][T26466] ? __pfx_sock_ioctl+0x10/0x10 [ 1356.038002][T26466] __se_sys_ioctl+0xc9/0x140 [ 1356.042607][T26466] __x64_sys_ioctl+0x43/0x50 [ 1356.047251][T26466] x64_sys_call+0x1690/0x2dc0 [ 1356.051937][T26466] do_syscall_64+0xc9/0x1c0 [ 1356.056474][T26466] ? clear_bhb_loop+0x55/0xb0 [ 1356.061169][T26466] ? clear_bhb_loop+0x55/0xb0 [ 1356.065890][T26466] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1356.071861][T26466] RIP: 0033:0x7f55be615d29 [ 1356.076278][T26466] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1356.095939][T26466] RSP: 002b:00007f55bcc81038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1356.104374][T26466] RAX: ffffffffffffffda RBX: 00007f55be805fa0 RCX: 00007f55be615d29 [ 1356.112350][T26466] RDX: 0000000020001440 RSI: 00000000000089f0 RDI: 0000000000000007 [ 1356.120356][T26466] RBP: 00007f55bcc81090 R08: 0000000000000000 R09: 0000000000000000 [ 1356.128403][T26466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1356.136380][T26466] R13: 0000000000000000 R14: 00007f55be805fa0 R15: 00007ffd347a9e28 [ 1356.144452][T26466] [ 1356.185990][T26469] xt_hashlimit: size too large, truncated to 1048576 [ 1356.618541][T26485] syz.6.17341[26485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1356.618619][T26485] syz.6.17341[26485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1356.630378][T26485] syz.6.17341[26485] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1356.856571][T26499] syz.0.17346[26499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1356.860209][T26500] xt_hashlimit: size too large, truncated to 1048576 [ 1357.274313][T26509] FAULT_INJECTION: forcing a failure. [ 1357.274313][T26509] name failslab, interval 1, probability 0, space 0, times 0 [ 1357.287776][T26509] CPU: 1 UID: 0 PID: 26509 Comm: syz.7.17348 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1357.298651][T26509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1357.308724][T26509] Call Trace: [ 1357.312017][T26509] [ 1357.314996][T26509] dump_stack_lvl+0xf2/0x150 [ 1357.319683][T26509] dump_stack+0x15/0x1a [ 1357.323922][T26509] should_fail_ex+0x223/0x230 [ 1357.328643][T26509] should_failslab+0x8f/0xb0 [ 1357.333306][T26509] kmem_cache_alloc_noprof+0x52/0x320 [ 1357.338763][T26509] ? security_file_alloc+0x32/0x100 [ 1357.343988][T26509] security_file_alloc+0x32/0x100 [ 1357.349039][T26509] init_file+0x5b/0x1b0 [ 1357.353306][T26509] alloc_empty_file+0xea/0x200 [ 1357.358100][T26509] path_openat+0x6a/0x1fa0 [ 1357.362538][T26509] ? next_uptodate_folio+0x809/0x890 [ 1357.367856][T26509] ? _raw_spin_lock_irqsave+0x3c/0xb0 [ 1357.373262][T26509] ? _raw_spin_unlock_irqrestore+0x2b/0x60 [ 1357.379146][T26509] ? percpu_counter_add_batch+0x136/0x140 [ 1357.384949][T26509] ? __rcu_read_unlock+0x34/0x70 [ 1357.389901][T26509] ? filemap_map_pages+0x8c6/0xb30 [ 1357.395179][T26509] ? cgroup_rstat_updated+0x9f/0x570 [ 1357.400485][T26509] do_filp_open+0x107/0x230 [ 1357.405027][T26509] do_sys_openat2+0xab/0x120 [ 1357.409685][T26509] __x64_sys_openat+0xf3/0x120 [ 1357.414553][T26509] x64_sys_call+0x2b30/0x2dc0 [ 1357.419234][T26509] do_syscall_64+0xc9/0x1c0 [ 1357.423823][T26509] ? clear_bhb_loop+0x55/0xb0 [ 1357.428561][T26509] ? clear_bhb_loop+0x55/0xb0 [ 1357.433246][T26509] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1357.439210][T26509] RIP: 0033:0x7fa11ba24690 [ 1357.443635][T26509] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 1357.463354][T26509] RSP: 002b:00007fa11a054b70 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1357.471850][T26509] RAX: ffffffffffffffda RBX: 0000000000101301 RCX: 00007fa11ba24690 [ 1357.479875][T26509] RDX: 0000000000101301 RSI: 00007fa11a054c10 RDI: 00000000ffffff9c [ 1357.487857][T26509] RBP: 00007fa11a054c10 R08: 0000000000000000 R09: 0000000000000000 [ 1357.495835][T26509] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 1357.503817][T26509] R13: 0000000000000000 R14: 00007fa11bc16160 R15: 00007ffe6ef56278 [ 1357.511945][T26509] [ 1357.999293][T26521] xt_hashlimit: size too large, truncated to 1048576 [ 1358.026765][T26524] loop3: detected capacity change from 0 to 164 [ 1358.034300][T26524] Unable to read rock-ridge attributes [ 1358.043472][T26524] Unable to read rock-ridge attributes [ 1358.050488][T26524] iso9660: Corrupted directory entry in block 4 of inode 1792 [ 1358.220627][T26536] xt_hashlimit: size too large, truncated to 1048576 [ 1359.612412][T26562] loop7: detected capacity change from 0 to 764 [ 1359.655281][T26562] Symlink component flag not implemented [ 1359.661030][T26562] Symlink component flag not implemented (129) [ 1359.701529][T26566] FAULT_INJECTION: forcing a failure. [ 1359.701529][T26566] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1359.714771][T26566] CPU: 0 UID: 0 PID: 26566 Comm: syz.6.17366 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1359.725617][T26566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1359.725636][T26566] Call Trace: [ 1359.725644][T26566] [ 1359.725654][T26566] dump_stack_lvl+0xf2/0x150 [ 1359.739043][T26566] dump_stack+0x15/0x1a [ 1359.746684][T26566] ================================================================== [ 1359.758820][T26566] BUG: KCSAN: data-race in console_flush_all / console_flush_all [ 1359.758878][T26566] [ 1359.758886][T26566] write to 0xffffffff8681a0d8 of 8 bytes by task 26562 on cpu 1: [ 1359.768911][T26566] console_flush_all+0x395/0x770 [ 1359.781578][T26566] console_unlock+0xab/0x330 [ 1359.786204][T26566] vprintk_emit+0x3f4/0x680 [ 1359.790723][T26566] vprintk_default+0x26/0x30 [ 1359.795341][T26566] vprintk+0x75/0x80 [ 1359.799237][T26566] _printk+0x7a/0xa0 [ 1359.799264][T26566] __isofs_iget+0xe9d/0xf80 [ 1359.807625][T26566] isofs_get_blocks+0x18c/0x4a0 [ 1359.807660][T26566] isofs_bread+0x5b/0x100 [ 1359.807689][T26566] isofs_lookup+0x189/0x8c0 [ 1359.807713][T26566] __lookup_slow+0x184/0x250 [ 1359.807735][T26566] lookup_slow+0x3c/0x60 [ 1359.825962][T26566] link_path_walk+0x69e/0x820 [ 1359.825988][T26566] path_openat+0x1af/0x1fa0 [ 1359.826017][T26566] do_filp_open+0x107/0x230 [ 1359.826045][T26566] do_sys_openat2+0xab/0x120 [ 1359.826067][T26566] __x64_sys_openat+0xf3/0x120 [ 1359.826089][T26566] x64_sys_call+0x2b30/0x2dc0 [ 1359.826114][T26566] do_syscall_64+0xc9/0x1c0 [ 1359.826138][T26566] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1359.826185][T26566] [ 1359.826192][T26566] read to 0xffffffff8681a0d8 of 8 bytes by task 26566 on cpu 0: [ 1359.826213][T26566] console_flush_all+0x57e/0x770 [ 1359.826247][T26566] console_unlock+0xab/0x330 [ 1359.826274][T26566] vprintk_emit+0x3f4/0x680 [ 1359.826302][T26566] vprintk_default+0x26/0x30 [ 1359.826328][T26566] vprintk+0x75/0x80 [ 1359.826346][T26566] _printk+0x7a/0xa0 [ 1359.826367][T26566] show_trace_log_lvl+0x380/0x400 [ 1359.826389][T26566] dump_stack_lvl+0xf2/0x150 [ 1359.826426][T26566] dump_stack+0x15/0x1a [ 1359.826460][T26566] should_fail_ex+0x223/0x230 [ 1359.826485][T26566] should_fail+0xb/0x10 [ 1359.826511][T26566] should_fail_usercopy+0x1a/0x20 [ 1359.826542][T26566] _copy_from_user+0x1e/0xb0 [ 1359.826572][T26566] do_vfs_ioctl+0x113c/0x1530 [ 1359.826600][T26566] __se_sys_ioctl+0x80/0x140 [ 1359.826628][T26566] __x64_sys_ioctl+0x43/0x50 [ 1359.826653][T26566] x64_sys_call+0x1690/0x2dc0 [ 1359.826677][T26566] do_syscall_64+0xc9/0x1c0 [ 1359.826700][T26566] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1359.826740][T26566] [ 1359.826745][T26566] value changed: 0x00000000000088b1 -> 0x00000000000088b2 [ 1359.826758][T26566] [ 1359.826762][T26566] Reported by Kernel Concurrency Sanitizer on: [ 1359.826772][T26566] CPU: 0 UID: 0 PID: 26566 Comm: syz.6.17366 Not tainted 6.13.0-rc7-syzkaller-00039-gc3812b15000c #0 [ 1359.826803][T26566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1359.826818][T26566] ================================================================== [ 1359.826829][T26566] should_fail_ex+0x223/0x230 [ 1359.826863][T26566] should_fail+0xb/0x10 [ 1359.835902][T26566] should_fail_usercopy+0x1a/0x20 [ 1359.849584][T26566] _copy_from_user+0x1e/0xb0 [ 1359.849624][T26566] do_vfs_ioctl+0x113c/0x1530 [ 1359.859057][T26566] ? __fget_files+0x17c/0x1c0 [ 1359.877258][T26562] rock: directory entry would overflow storage [ 1359.879636][T26566] __se_sys_ioctl+0x80/0x140 [ 1359.885450][T26562] rock: sig=0x4f50, size=4, remaining=3 [ 1359.889167][T26566] __x64_sys_ioctl+0x43/0x50 [ 1359.893664][T26562] iso9660: Corrupted directory entry in block 6 of inode 1792 [ 1359.898233][T26566] x64_sys_call+0x1690/0x2dc0 [ 1359.961471][T26566] do_syscall_64+0xc9/0x1c0 [ 1359.969665][T26566] ? clear_bhb_loop+0x55/0xb0 [ 1359.996702][T26572] bpf_get_probe_write_proto: 2 callbacks suppressed [ 1359.996721][T26572] syz.0.17369[26572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1360.006209][T26566] ? clear_bhb_loop+0x55/0xb0 [ 1360.006245][T26566] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1360.006306][T26566] RIP: 0033:0x7f1416635d29 [ 1360.006325][T26566] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1360.006344][T26566] RSP: 002b:00007f1414c80038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1360.006366][T26566] RAX: ffffffffffffffda RBX: 00007f1416826080 RCX: 00007f1416635d29 [ 1360.006427][T26566] RDX: 0000000020000080 RSI: 0000000040305839 RDI: 0000000000000005 [ 1360.006442][T26566] RBP: 00007f1414c80090 R08: 0000000000000000 R09: 0000000000000000 [ 1360.006457][T26566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1360.006469][T26566] R13: 0000000000000000 R14: 00007f1416826080 R15: 00007ffd4e22f8a8 [ 1360.006509][T26566] [ 1360.050251][ T29] kauditd_printk_skb: 130 callbacks suppressed [ 1360.050268][ T29] audit: type=1326 audit(1736898090.695:135026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26568 comm="syz.3.17368" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1360.059629][T26572] syz.0.17369[26572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1360.060456][ T29] audit: type=1326 audit(1736898090.695:135027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26568 comm="syz.3.17368" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1360.065976][T26572] syz.0.17369[26572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1360.072521][ T29] audit: type=1326 audit(1736898090.695:135028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26568 comm="syz.3.17368" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1360.291938][ T29] audit: type=1326 audit(1736898090.695:135029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26568 comm="syz.3.17368" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1360.316471][ T29] audit: type=1326 audit(1736898090.695:135030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26568 comm="syz.3.17368" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1360.340929][ T29] audit: type=1326 audit(1736898090.695:135031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26568 comm="syz.3.17368" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1360.364711][ T29] audit: type=1326 audit(1736898090.695:135032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26568 comm="syz.3.17368" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1360.388745][ T29] audit: type=1326 audit(1736898090.695:135033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26568 comm="syz.3.17368" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1360.412572][ T29] audit: type=1326 audit(1736898090.695:135034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26568 comm="syz.3.17368" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000 [ 1360.436562][ T29] audit: type=1326 audit(1736898090.695:135035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26568 comm="syz.3.17368" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f241ddc5d29 code=0x7ffc0000