last executing test programs: 4m11.932046443s ago: executing program 4 (id=2591): r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/igmp\x00') preadv(r0, &(0x7f0000000b00), 0x0, 0x80000001, 0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYRES64=r0], 0x50) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) sched_getparam(r2, &(0x7f0000000040)) r3 = syz_open_procfs(0x0, &(0x7f0000000380)='maps\x00') ioctl$EVIOCGBITSW(r3, 0x80404525, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0009}]}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x18) r6 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000001440), 0x0, 0x0) readv(r6, 0x0, 0x0) ioctl$IMADDTIMER(r6, 0x80044940, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000001000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1d, 0x31, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000007000006000000000200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000005528500012a32aa58520000003000000b7080000000000007b8af8ff00000000b7080000250000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a500000018250000", @ANYRES32, @ANYBLOB="00000000070000001837000002000000000000000000000018130000", @ANYRES32=r7, @ANYBLOB="0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300007e919824850000000600000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000183500000300000000000000000000002565f4ff01000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], 0x0, 0xfffffffb, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000440)='qgroup_update_reserve\x00', r8}, 0x18) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) r11 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000005a40)=ANY=[@ANYBLOB="b400000010000904000000000000000000002200", @ANYRES32=0x0, @ANYBLOB="fffffffed9526cfd8400128009000100766c616e000000007400028006000100000600000c000200367da1650e000000280003800c00010001800000002000000c000100a1000000c84200000c0001000800000008000000340004800c00010006000000ff0300000c00010004000000080000000c00010004000000020000000c000100050000000300000008000500", @ANYRES32=r10, @ANYBLOB='\b\x00\n\x00', @ANYRESOCT], 0xb4}}, 0x0) r12 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2440, 0x0) fcntl$setlease(r12, 0x400, 0x0) utime(&(0x7f0000000080)='./file0\x00', 0x0) 4m11.779088156s ago: executing program 4 (id=2594): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x2}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f00000003c0)=@known='user.incfs.id\x00', 0x0, 0x0, 0x3) (fail_nth: 1) 4m11.487669219s ago: executing program 4 (id=2596): r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x6, &(0x7f0000000040), 0x4) bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = socket$inet6(0xa, 0x2, 0x4) socket$inet_mptcp(0x2, 0x1, 0x106) r2 = syz_mount_image$ext4(&(0x7f00000007c0)='ext4\x00', &(0x7f00000006c0)='./file1\x00', 0x40, &(0x7f00000000c0)={[{@user_xattr}, {@nodioread_nolock}]}, 0x5, 0x576, &(0x7f0000000140)="$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") r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r3, &(0x7f00000005c0)='\"', 0x1, 0x4fed0) sendfile(r3, r3, 0x0, 0xe3aa6ea) renameat2(0xffffffffffffff9c, &(0x7f00000007c0)='./file1\x00', 0xffffffffffffff9c, 0x0, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27ffff7, 0x4012011, r4, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) preadv(0xffffffffffffffff, 0x0, 0x0, 0x4309, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[], 0x50) socket(0x3, 0x80000, 0x2ca) mmap(&(0x7f000002d000/0x4000)=nil, 0x4000, 0x2000001, 0x40010, r2, 0xd8a6e000) symlinkat(0x0, 0xffffffffffffff9c, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) umount2(&(0x7f0000000580)='./file1\x00', 0x3) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x800) lstat(&(0x7f0000001d40)='./file0\x00', 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) alarm(0x7f) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r1}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='mm_page_free\x00', 0xffffffffffffffff, 0x0, 0xffffffffffffffff}, 0x18) kexec_load(0x0, 0x1, &(0x7f0000000140)=[{0x0, 0x3e00, 0x116094000, 0x41000000}], 0x0) 4m11.108279519s ago: executing program 4 (id=2609): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000007000000060000000c"], 0x48) close(0x3) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f0000000140), 0x1, 0x4fa, &(0x7f0000000ac0)="$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") quotactl$Q_QUOTAON(0xffffffff80000200, &(0x7f0000000000)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) quotactl$Q_SETQUOTA(0xffffffff80000800, &(0x7f00000001c0)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000100)={0x7, 0x6, 0x7267, 0xb, 0x6, 0x1ffffffffff, 0x6, 0x9, 0x35}) bpf$TOKEN_CREATE(0x24, &(0x7f0000000340), 0x8) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x0, &(0x7f00000001c0), 0x1, 0x4bc, &(0x7f0000000a40)="$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") r0 = creat(&(0x7f0000000580)='./file2\x00', 0x182) syz_clone(0x80000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) fallocate(r0, 0x0, 0xbf5, 0x2000402) 4m11.000935638s ago: executing program 4 (id=2611): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) inotify_rm_watch(0xffffffffffffffff, 0x0) 4m9.956221361s ago: executing program 4 (id=2621): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f00000002c0)={'wg2\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000000340)={0x0, 0xa00, &(0x7f0000000300)={&(0x7f0000000840)=ANY=[@ANYBLOB="e0100000", @ANYRES16=r2, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="240003"], 0x10e0}}, 0x0) 4m9.955906631s ago: executing program 32 (id=2621): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f00000002c0)={'wg2\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f0000000340)={0x0, 0xa00, &(0x7f0000000300)={&(0x7f0000000840)=ANY=[@ANYBLOB="e0100000", @ANYRES16=r2, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="240003"], 0x10e0}}, 0x0) 4m6.228162591s ago: executing program 1 (id=2692): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc0004}]}) kexec_load(0x78, 0x0, 0x0, 0x3e0000) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket(0xa, 0x3, 0x3a) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)=0x0) timer_settime(r2, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) futex(0x0, 0x86, 0xfffffffe, 0x0, 0x0, 0xfffffffc) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r3, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 4m6.118438989s ago: executing program 1 (id=2693): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x207, &(0x7f0000000000), 0x1, 0x46f, &(0x7f0000001200)="$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") r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95, 0x3}, 0x100002, 0x0, 0xfffffffc, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0xe}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x515a02, 0x52abe154ad664fa4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x7fff}, 0x18) syz_mount_image$msdos(&(0x7f0000000f40), &(0x7f0000000f00)='.\x00', 0x1a4a438, &(0x7f00000008c0)=ANY=[], 0xc, 0x0, &(0x7f0000000000)) 4m6.017309727s ago: executing program 1 (id=2694): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x4, @tid=r0}, &(0x7f0000bbdffc)=0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc0004}]}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000004000000b705000008"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='kmem_cache_free\x00', r3, 0x0, 0x100000000}, 0x18) timer_settime(r1, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) 4m5.953702763s ago: executing program 1 (id=2695): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000007000000060000000c"], 0x48) close(0x3) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f0000000140), 0x1, 0x4fa, &(0x7f0000000ac0)="$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") quotactl$Q_QUOTAON(0xffffffff80000200, &(0x7f0000000000)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) quotactl$Q_SETQUOTA(0xffffffff80000800, &(0x7f00000001c0)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000100)={0x7, 0x6, 0x7267, 0xb, 0x6, 0x1ffffffffff, 0x6, 0x9, 0x35}) bpf$TOKEN_CREATE(0x24, &(0x7f0000000340), 0x8) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x0, &(0x7f00000001c0), 0x1, 0x4bc, &(0x7f0000000a40)="$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") r0 = creat(&(0x7f0000000580)='./file2\x00', 0x182) syz_clone(0x80000, 0x0, 0x0, 0x0, 0x0, 0x0) fallocate(r0, 0x0, 0xbf5, 0x2000402) 4m4.216303992s ago: executing program 1 (id=2700): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r1}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000380)="a1", 0x1}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r2, @ANYBLOB="0000000014"], 0x30, 0x40400d1}}], 0x1, 0x10) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0xa86, 0x0) 4m4.212635952s ago: executing program 1 (id=2705): r0 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x20) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f0000000140)='./file0\x00') r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0xe}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x515a02, 0x52abe154ad664fa4) 4m4.212250522s ago: executing program 33 (id=2705): r0 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x20) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f0000000140)='./file0\x00') r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0xe}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x515a02, 0x52abe154ad664fa4) 2m44.595909675s ago: executing program 3 (id=4173): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_tracing={0x1a, 0x1b, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x3}, [@generic={0x6, 0x3, 0x6, 0x5, 0x401}, @map_val={0x18, 0x6, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8a}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x4}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}, @ringbuf_query, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffb}]}, &(0x7f0000000040)='syzkaller\x00', 0x45, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x7, 0xfffffff8, 0x6}, 0x10, 0x66a2, 0xffffffffffffffff, 0x4, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff], &(0x7f00000001c0)=[{0x1, 0x3, 0xffffffff, 0x4}, {0x4, 0x3, 0xb, 0x5}, {0x4, 0x2, 0x0, 0x4}, {0x5, 0x1, 0xb, 0x3}], 0x10, 0x1}, 0x94) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000140)=[{}], 0x1, 0x2d516fb6, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000cb100)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') sendfile(r2, r2, 0x0, 0x80000000) 2m43.722128936s ago: executing program 3 (id=4184): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_tracing={0x1a, 0x1b, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x3}, [@generic={0x6, 0x3, 0x6, 0x5, 0x401}, @map_val={0x18, 0x6, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8a}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x4}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}}, @ringbuf_query, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffb}]}, &(0x7f0000000040)='syzkaller\x00', 0x45, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000080)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x7, 0xfffffff8, 0x6}, 0x10, 0x66a2, 0xffffffffffffffff, 0x4, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff], &(0x7f00000001c0)=[{0x1, 0x3, 0xffffffff, 0x4}, {0x4, 0x3, 0xb, 0x5}, {0x4, 0x2, 0x0, 0x4}, {0x5, 0x1, 0xb, 0x3}], 0x10, 0x1}, 0x94) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000140)=[{}], 0x1, 0x2d516fb6, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000cb100)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f00000cb300)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x5, "84dd4f56402210"}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00'}, 0x18) r4 = add_key$keyring(&(0x7f0000000100), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r4, r4) 2m42.815845328s ago: executing program 3 (id=4197): open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x0, 0x2, 0xfffffe81, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000400000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b7000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r1}, 0x18) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000600)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_9p2000}]}}) 2m42.814084598s ago: executing program 3 (id=4199): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001004900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x1000c16, &(0x7f0000000500), 0xff, 0x260, &(0x7f0000000980)="$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") r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002078316e00000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000800000008500000006000000850000000500000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r3}, 0x10) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000180)="4741846b53", 0x5}], 0x1, 0x0, 0x0, 0x11000000}, 0x0) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000540)) ptrace$cont(0x20, r4, 0x0, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000340), 0x9, 0x100) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f00000003c0)=@usbdevfs_driver={0x2, 0x57, &(0x7f0000000380)="33bbc9763b16e1ba"}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_queued_recursive\x00', 0x275a, 0x0) utimensat(r6, 0x0, &(0x7f0000000080)={{}, {0x77359400}}, 0x0) clock_adjtime(0x786c5fc79fd7c1d5, 0x0) 2m42.700633927s ago: executing program 3 (id=4201): r0 = perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x9, 0x6, 0xc, 0x85, 0x0, 0x1, 0x42050, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000340), 0x7}, 0x10000, 0x800, 0x4, 0x0, 0x5, 0x3, 0x4, 0x0, 0x9, 0x0, 0xe3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x2, 0x510, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x100, 0x3}, 0x2202, 0x10000, 0x5, 0x9, 0x28e, 0x1, 0x3, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, r0, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00'}, 0x10) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xb, 0x59032, 0xffffffffffffffff, 0x0) r1 = getpid() madvise(&(0x7f0000a5e000/0x1000)=nil, 0x1000, 0x17) process_vm_readv(r1, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) 2m42.271801162s ago: executing program 3 (id=4202): write$tun(0xffffffffffffffff, 0x0, 0xa2) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x18a}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) write$binfmt_misc(r0, &(0x7f0000000240), 0xfffffecc) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 2m42.271523362s ago: executing program 34 (id=4202): write$tun(0xffffffffffffffff, 0x0, 0xa2) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x18a}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) write$binfmt_misc(r0, &(0x7f0000000240), 0xfffffecc) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 1m52.674435118s ago: executing program 7 (id=5285): sendmsg$inet(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000040)="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", 0x1f5}], 0x1}, 0x0) socket$key(0xf, 0x3, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0xe, &(0x7f0000002300)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000040)={0x10000}, 0x10}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa10000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = creat(&(0x7f0000000240)='./file1\x00', 0x0) mmap(&(0x7f0000ff4000/0xc000)=nil, 0xc000, 0x1000003, 0x20031, 0xffffffffffffffff, 0xffffe000) mbind(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000000)=0x3, 0x9, 0x0) get_mempolicy(0x0, 0x0, 0x7fffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$xdp(0x2c, 0x3, 0x0) socket$phonet(0x23, 0x2, 0x1) close_range(r1, 0xffffffffffffffff, 0x0) 1m52.65767131s ago: executing program 7 (id=5286): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000780)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x20, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x81c00) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='writeback_bdi_register\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYRES8=r2, @ANYBLOB="543875b6f4e4943483cb9f19198c8e6a98db1b56f7bd28b659a3a6f33c7bfa0a7dae6d7eae3e8c492a9c208c59d20c45b48901b89a4691a64bfbf9f3909fdccaa90894774b4b9f610f0b293a9c841c6e186f2686dd01e67a7fe7f80d51d26909184e4694d453ec36f020d980fb52a8e31a45074e3838cb3bc30e2abcb42c1470ca9cc5e33352468270ad7058fc68591580e148bf15c7f605453686f0d4d2d9531861670924e6f179de3da75a735905e07df65a3fbd937f962b8b6d0c47e420421765fb7874e1f430a8128ab1659f8fca3c193ce99a47"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mremap(&(0x7f0000000000/0x9000)=nil, 0x600600, 0x200000, 0x3, &(0x7f0000a00000/0x600000)=nil) 1m52.634562941s ago: executing program 7 (id=5288): r0 = socket(0x1, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x5}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r1, 0x1}, &(0x7f0000000100)=0x8) close(0x3) openat$rtc(0xffffff9c, &(0x7f0000000040), 0x2a00, 0x0) r2 = epoll_create1(0x80000) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000300)={0xcf0, 0x6, 0x0, 0x5, 0x5, 0x2, 0x695b, 0x5, r1}, &(0x7f0000000340)=0x20) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = socket(0x1e, 0x4, 0x0) r5 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0xfffffffc}, 0x10) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2, 0x4}, 0x10) sendmmsg(r4, &(0x7f00000030c0)=[{{0x0, 0xa9cc7003, &(0x7f0000000400)=[{&(0x7f00000000c0)="ee", 0x3514}], 0x1}}], 0x400000000000181, 0x9200000000000000) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) close_range(r6, 0xffffffffffffffff, 0x0) 1m52.561415457s ago: executing program 7 (id=5291): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYRES32], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xc, 0x4, 0x4, 0x7, 0x0, r0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r1}, &(0x7f0000000080), &(0x7f00000002c0)=r0}, 0x20) bpf$BPF_GET_MAP_INFO(0x3, &(0x7f0000000140)={r1, 0x58, &(0x7f00000000c0)}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000008000000070000000900000001"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000ff0f00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r3}, 0x10) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x4000, &(0x7f00000001c0), 0x1, 0x4bc, &(0x7f0000000a40)="$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") r4 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(r4, 0x1, 0xb, &(0x7f0000000300)=0x4e3, 0x4) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x181242, 0x148) pwrite64(r5, &(0x7f0000000140)='2', 0xfdef, 0xfecc) write$cgroup_pressure(0xffffffffffffffff, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, 0x0, 0x0, 0x4) clock_settime(0xfffffff0, &(0x7f0000000340)={0x0, 0x3938700}) io_uring_enter(0xffffffffffffffff, 0x3516, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r5, &(0x7f0000000080)={0x0, 0xffffffffffffff86, 0x0, 0x1, 0x0, 0x0, 0x40804}, 0x10) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d0000008500000023"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000080)='kfree\x00', r6, 0x0, 0x7fffffff}, 0x18) r7 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="0000000000100000180012800e0001007769", @ANYRES32], 0x40}, 0x1, 0x0, 0x0, 0x800}, 0xc0b0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x256) close$binfmt(0xffffffffffffffff) gettid() timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r8 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) syz_pidfd_open(r8, 0x0) 1m52.379917181s ago: executing program 7 (id=5294): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000240), &(0x7f0000000280)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xb, 0x59032, 0xffffffffffffffff, 0x0) r2 = getpid() madvise(&(0x7f0000a5e000/0x1000)=nil, 0x1000, 0x17) process_vm_readv(r2, &(0x7f0000008400)=[{&(0x7f0000006180)=""/152, 0x98}], 0x1, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x5f}], 0x1, 0x0) 1m51.976236164s ago: executing program 7 (id=5296): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) sendmsg$nl_route(r0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', r2, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00', r3, 0x0, 0xfffffffffffffffc}, 0x18) r4 = getpid() r5 = syz_pidfd_open(r4, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0xffffdf004002, 0xffffdf004000, 0x0, &(0x7f0000ffc000/0x1000)=nil) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCCONS(r6, 0x541d) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setns(r5, 0x24020000) syz_clone(0xfdba2180, 0x0, 0x0, 0x0, 0x0, 0x0) 1m51.963557435s ago: executing program 35 (id=5296): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) sendmsg$nl_route(r0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', r2, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00', r3, 0x0, 0xfffffffffffffffc}, 0x18) r4 = getpid() r5 = syz_pidfd_open(r4, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0xffffdf004002, 0xffffdf004000, 0x0, &(0x7f0000ffc000/0x1000)=nil) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCCONS(r6, 0x541d) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setns(r5, 0x24020000) syz_clone(0xfdba2180, 0x0, 0x0, 0x0, 0x0, 0x0) 2.079486934s ago: executing program 6 (id=7450): r0 = syz_io_uring_setup(0xbc3, &(0x7f0000001480)={0x0, 0x40f5, 0x80, 0x0, 0x224}, &(0x7f0000000040)=0x0, &(0x7f0000000280)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000300)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x2, 0xa3d8, &(0x7f00000005c0)=[{&(0x7f0000000240)="5db5bd", 0x3}], 0x81, 0x8, 0x1, {0x2}}) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000400), 0x440) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) open(&(0x7f00000002c0)='./bus\x00', 0x0, 0x61) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) io_uring_enter(r0, 0x47f8, 0x0, 0x0, 0x0, 0x0) 2.041919176s ago: executing program 6 (id=7451): syz_open_dev$tty20(0xc, 0x4, 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@newqdisc={0x50, 0x24, 0x3fe3aa0262d8c583, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, r1, {0x0, 0xffe0}, {0xffff, 0xffff}, {0x10, 0xe}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x24, 0x2, [@TCA_FQ_FLOW_DEFAULT_RATE={0x8, 0x6, 0xffffffff}, @TCA_FQ_QUANTUM={0x8, 0x3, 0x9}, @TCA_FQ_RATE_ENABLE={0x8, 0x5, 0x1}, @TCA_FQ_FLOW_PLIMIT={0x8, 0x2, 0xba06}]}}]}, 0x50}}, 0x4048000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000500)={'veth1\x00', &(0x7f0000000200)=@ethtool_per_queue_op={0x4b, 0xf, [0xa, 0x1, 0x7fff, 0x1, 0x4, 0x9, 0xa4, 0xffb, 0x7, 0xb69, 0xc1, 0x4, 0x1, 0x3, 0x5, 0x101, 0x65d, 0x9, 0x3, 0x3, 0x1, 0xfffffffa, 0x0, 0x6, 0x9, 0x4, 0x7, 0x1000005, 0x100000, 0x75f, 0x3, 0xd, 0xe, 0x2b12, 0x100, 0x6, 0x1c00, 0xfffffff9, 0x8, 0xbed4, 0x8, 0x8000100, 0x61, 0x0, 0x11000, 0x1008, 0x1, 0x79b, 0x2, 0x1, 0x7f, 0x4, 0x400, 0x7, 0xf, 0x101, 0xd7, 0x1fa0860a, 0x7, 0xaa, 0x81, 0x2, 0x180000, 0x4007, 0x8b, 0x5, 0x2af, 0xf7, 0x5, 0x2, 0x6, 0xb, 0x4, 0x7, 0x4009, 0x0, 0x5, 0x100002, 0x8, 0x752, 0x0, 0x3, 0x0, 0x10001, 0x82, 0xd, 0x6, 0x6, 0xa, 0x80000000, 0xfdffffff, 0x2, 0x2, 0x84, 0x100, 0x5, 0x252, 0x81, 0xb, 0x5, 0x20006, 0x5, 0x2, 0x15f, 0x84ac, 0xd9a, 0x5, 0x82a2, 0xfff, 0x3, 0x2, 0x5, 0x8, 0x0, 0x4, 0x2, 0x40, 0x8, 0x7, 0x4, 0x401, 0x66cd, 0x8, 0x8, 0x1, 0x1fc, 0xc5c, 0xffffffff]}}) r2 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r2, &(0x7f0000000040)={0x2a, 0xffffffffffffffff, 0xfffffffe}, 0xc) r3 = syz_io_uring_setup(0x495, &(0x7f0000000a40)={0x0, 0x4661, 0x800, 0x0, 0x20e}, &(0x7f0000000540)=0x0, &(0x7f0000000680)=0x0) r6 = epoll_create(0xa) r7 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x88102) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r7, &(0x7f00000000c0)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r2, 0x0, 0x0, 0x0, 0x0, 0x1}) io_uring_enter(r3, 0x40f9, 0x217, 0xa5, 0x0, 0x97ff) unshare(0x22020600) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/vlan/vlan0\x00') socket$pppl2tp(0x18, 0x1, 0x1) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r8, 0x1}], 0x1, 0x0, 0x0, 0x0) 2.041468637s ago: executing program 6 (id=7452): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000003b00)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000006c0)='kfree\x00', r4}, 0x18) sendmsg$netlink(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=ANY=[@ANYBLOB="140100002800010004000000f8dbdf2503"], 0x114}], 0x1, 0x0, 0x0, 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) mlock(&(0x7f000051b000/0x14000)=nil, 0x14000) 2.007775699s ago: executing program 6 (id=7453): umount2(&(0x7f0000000000)='./file0\x00', 0x1) timer_create(0xfffffffffffffffc, 0x0, &(0x7f0000001400)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) close(r0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r0, 0x40107447, &(0x7f0000000180)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r3}, 0x9) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000400001351000000010000006f032fb448b508734bbe584cf7dc60bf0bb7db32616287fda58c97dd7a79cec4dcbd6451dfc66138c3c797e7b5c2654a68347b81b6bca12d0e64c859e9654235aa5bbf7385f8c6e1b03781fb10441e23d3e04990677156119415e14b3389"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002, 0x6, @rand_addr, 0x5}, 0x1c) sendto$inet6(r1, 0x0, 0x91, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x3, @loopback}, 0x1c) 2.007290229s ago: executing program 6 (id=7454): sched_setscheduler(0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000730000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x4, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@abs={0x0, 0x0, 0x8000}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_enter\x00', r5, 0x0, 0x10001}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x0, &(0x7f0000000680), 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) r6 = syz_io_uring_setup(0x39, &(0x7f0000000580)={0x0, 0xe7b7, 0x13500}, &(0x7f0000000240), &(0x7f0000001880)) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r6, 0x21, &(0x7f0000000440), 0x1) shmget(0x0, 0x1000, 0xa04, &(0x7f0000ffd000/0x1000)=nil) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x14b9c0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'\x00', 0x2}) ioctl$TUNSETDEBUG(r7, 0x400454c9, 0xffffffffffffffff) ioctl$TUNSETLINK(r7, 0x400454cd, 0x337) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) write$tun(r8, &(0x7f0000000040)=ANY=[@ANYBLOB="01018600e4b4944c1c09010af3ed9530c7f9ffcfb653af679b4f5c6342b6c3e332c00030e8b0c2cf1d283c9a194be5e64d35e28e2c09b8"], 0x37) 1.315491615s ago: executing program 2 (id=7462): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000005c0)=ANY=[@ANYBLOB="140100002800010004000080f8dbdf2503"], 0x114}], 0x1, 0x0, 0x0, 0x1}, 0x0) 1.315187745s ago: executing program 2 (id=7463): syz_open_dev$tty20(0xc, 0x4, 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@newqdisc={0x50, 0x24, 0x3fe3aa0262d8c583, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, r1, {0x0, 0xffe0}, {0xffff, 0xffff}, {0x10, 0xe}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x24, 0x2, [@TCA_FQ_FLOW_DEFAULT_RATE={0x8, 0x6, 0xffffffff}, @TCA_FQ_QUANTUM={0x8, 0x3, 0x9}, @TCA_FQ_RATE_ENABLE={0x8, 0x5, 0x1}, @TCA_FQ_FLOW_PLIMIT={0x8, 0x2, 0xba06}]}}]}, 0x50}}, 0x4048000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000500)={'veth1\x00', &(0x7f0000000200)=@ethtool_per_queue_op={0x4b, 0xf, [0xa, 0x1, 0x7fff, 0x1, 0x4, 0x9, 0xa4, 0xffb, 0x7, 0xb69, 0xc1, 0x4, 0x1, 0x3, 0x5, 0x101, 0x65d, 0x9, 0x3, 0x3, 0x1, 0xfffffffa, 0x0, 0x6, 0x9, 0x4, 0x7, 0x1000005, 0x100000, 0x75f, 0x3, 0xd, 0xe, 0x2b12, 0x100, 0x6, 0x1c00, 0xfffffff9, 0x8, 0xbed4, 0x8, 0x8000100, 0x61, 0x0, 0x11000, 0x1008, 0x1, 0x79b, 0x2, 0x1, 0x7f, 0x4, 0x400, 0x7, 0xf, 0x101, 0xd7, 0x1fa0860a, 0x7, 0xaa, 0x81, 0x2, 0x180000, 0x4007, 0x8b, 0x5, 0x2af, 0xf7, 0x5, 0x2, 0x6, 0xb, 0x4, 0x7, 0x4009, 0x0, 0x5, 0x100002, 0x8, 0x752, 0x0, 0x3, 0x0, 0x10001, 0x82, 0xd, 0x6, 0x6, 0xa, 0x80000000, 0xfdffffff, 0x2, 0x2, 0x84, 0x100, 0x5, 0x252, 0x81, 0xb, 0x5, 0x20006, 0x5, 0x2, 0x15f, 0x84ac, 0xd9a, 0x5, 0x82a2, 0xfff, 0x3, 0x2, 0x5, 0x8, 0x0, 0x4, 0x2, 0x40, 0x8, 0x7, 0x4, 0x401, 0x66cd, 0x8, 0x8, 0x1, 0x1fc, 0xc5c, 0xffffffff]}}) r2 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r2, &(0x7f0000000040)={0x2a, 0xffffffffffffffff, 0xfffffffe}, 0xc) r3 = syz_io_uring_setup(0x495, &(0x7f0000000a40)={0x0, 0x4661, 0x800, 0x0, 0x20e}, &(0x7f0000000540)=0x0, &(0x7f0000000680)=0x0) r6 = epoll_create(0xa) r7 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000080), 0x88102) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r7, &(0x7f00000000c0)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r2, 0x0, 0x0, 0x0, 0x0, 0x1}) io_uring_enter(r3, 0x40f9, 0x217, 0xa5, 0x0, 0x97ff) unshare(0x22020600) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/vlan/vlan0\x00') socket$pppl2tp(0x18, 0x1, 0x1) syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ppoll(&(0x7f00000001c0)=[{r8, 0x1}], 0x1, 0x0, 0x0, 0x0) 1.304424736s ago: executing program 2 (id=7464): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/bus/input/devices\x00', 0x0, 0x0) r2 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r2, 0xffffffff80000001, r1, &(0x7f00000000c0)={0x30000000}) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r4 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6, 0x0, 0x7}, 0x18) capset(&(0x7f0000000300)={0x20071026}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x81, 0xfffffffb}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18"], 0x0, 0x4}, 0x94) r7 = syz_io_uring_setup(0x3, &(0x7f0000000580)={0x0, 0x7fa, 0x13500, 0x0, 0xfffffffd}, &(0x7f0000000240), &(0x7f0000001880)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r7, 0x21, &(0x7f0000000440), 0x1) r8 = socket(0x11, 0x3, 0x0) fchdir(r5) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r9 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r9, &(0x7f0000000180)='./file0/../file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x162) r10 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r8, &(0x7f0000000180)={0x11, 0x0, r11, 0x1, 0x0, 0x6, @dev}, 0x14) setsockopt$packet_int(r8, 0x107, 0xf, &(0x7f0000000240)=0xe9, 0x4) sendmsg$netlink(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000280)=ANY=[@ANYBLOB="02011400012918000e3580009f000114000000110600ac141430e0000003808a8972bd0b72e41082b1a3d206"], 0xdd12}], 0x1}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0xaa114ad013a741d8, r4, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[], 0x44f0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 1.271316628s ago: executing program 2 (id=7465): syz_io_uring_submit(0x0, 0x0, &(0x7f0000000300)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x2, 0xa3d8, 0x0, 0x0, 0x8, 0x1, {0x2}}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000400), 0x440) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) 1.256735339s ago: executing program 2 (id=7467): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) write$binfmt_misc(r0, &(0x7f0000000240), 0xfffffecc) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 1.103890061s ago: executing program 6 (id=7468): pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000001980)=ANY=[@ANYBLOB], &(0x7f00000000c0)='syzkaller\x00'}, 0x94) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r3}, &(0x7f00000001c0), &(0x7f0000000380)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x3, 0x13, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @map_val={0x18, 0x1, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, @sched_cls=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg$inet6(r4, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc8040) sendmmsg(r4, &(0x7f0000001400)=[{{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000740)="d7921b9e26b6b4ad941e8a2f2fb63db984d78962c4727739d3bbcc270eb4e65b3e7bbeb55b65397ebb74c76a31a03957a50a51ea5eb66f21cfaa01e9328cd01abb07a3c712", 0x45}], 0x1, &(0x7f0000000c00)=ANY=[], 0xe0}}], 0x400000000000184, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$nl_route(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x74, 0x0, 0x80}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_ICV_LEN={0x5, 0x3, 0xe}]}}}]}, 0x3c}}, 0x24008804) splice(r4, 0x0, r1, 0x0, 0x7ffff000, 0x6) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="4c00000002060108000034e40000000000000000050001000600000005000400000000000900020073797a3100000080050005000200000011000300686173683a69702c706f7274"], 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$IPSET_CMD_ADD(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="50000000090601020000000000000000020000840900020073797a31000000000500010007000000280007800c00018008000140fffffff70500070084000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x10000082}, 0x90) sendmsg$IPSET_CMD_LIST(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x38, 0x7, 0x6, 0x101, 0x0, 0x0, {0x2, 0x0, 0x2}, [@IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x91}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FLAGS={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x2000c094) 910.471577ms ago: executing program 5 (id=7474): bpf$MAP_CREATE(0x0, 0x0, 0x48) prctl$PR_SET_NAME(0xf, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xc, &(0x7f0000000280)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2725}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) socket$kcm(0xa, 0x922000000003, 0x11) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x81}, 0x8) r4 = open(&(0x7f0000000080)='./file1\x00', 0x64842, 0x86) pwritev2(r4, 0x0, 0x0, 0x7800, 0x0, 0x3) lstat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e21, @empty}], 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r4, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f00000004c0)=ANY=[@ANYRES32=r2, @ANYBLOB='D\x00\x00\x00', @ANYBLOB="0100000000000000000008000000180001801400020073797a5f74756e00000000000000000018000280080002000a00000004000100080004", @ANYRES16=r0, @ANYRES8=0x0, @ANYRESOCT=r2], 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x20000010) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x5}, 0x8) r5 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r5, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20044002) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet_sctp(r3, &(0x7f0000000140)={&(0x7f0000000340)=@in={0x2, 0x4e21, @local}, 0x10, &(0x7f0000000380)=[{&(0x7f00000001c0)='N', 0x1}], 0x1, 0x0, 0x0, 0x804c040}, 0x4000891) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000002c0)={0x0, 0x8, 0x1698}, 0x8) r6 = socket(0x2, 0x80805, 0x0) r7 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000040)={0x84, @dev={0xac, 0x14, 0x14, 0x2d}, 0x4e20, 0x3, 'wrr\x00', 0x1, 0x2, 0x6e}, 0x2c) setsockopt$IP_VS_SO_SET_ADDDEST(r6, 0x0, 0x487, &(0x7f0000000000)={{0x84, @private=0xa000101, 0x4e21, 0x3, 'lc\x00', 0x6, 0x8, 0x77}, {@multicast1, 0x4e23, 0x2, 0xcd, 0x12d5f, 0x3}}, 0x44) 910.320427ms ago: executing program 5 (id=7475): bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000180)='kfree\x00', r0, 0x0, 0x6}, 0x18) lsetxattr$security_selinux(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580), &(0x7f0000000600)='system_u:object_r:admin_passwd_exec_t:s0\x00', 0x29, 0x3) 910.047887ms ago: executing program 5 (id=7476): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000600)='kfree\x00', r0, 0x0, 0x6}, 0x18) r2 = signalfd4(r1, &(0x7f0000000040)={[0x8000000000000000]}, 0x8, 0x800) connect$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0x2710, @host}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4) r6 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x40010, r5, 0xc6c94000) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000240)='./file0\x00', 0x18000, &(0x7f0000000640)=ANY=[@ANYRES8=0x0, @ANYRES64, @ANYRES16=0x0, @ANYRES8=r5, @ANYRES16=r3, @ANYRES32, @ANYRES32=r6, @ANYRESHEX=r2], 0x1, 0x2fd, &(0x7f0000000c00)="$eJzs3E1PE1sYwPGnL5S2BMri5t7cm9xwohvdTKC6VhoDibGJBKnxJTEZYKpNx5Z0mpoaI7hya/wQLghLdiTKF2DjTjdu3LExcSELY02nM/RtAO0LRfj/EjIP85yn55xMIc80bXfvvHqcTVtaWi+KP6zEJyKyJzIufnH5nKPfjkPSaE0ujnz98P+tu/duJJLJmXmlZhMLl+JKqbGJt0+eRZxhW8OyM/5g90v8887fO//u/lh4lLFUxlK5fFHpajH/qagvmoZazlhZTak509AtQ2VyllGo5fO1fNrMr6yUlZ5bHo2uFAzLUnqurLJGWRXzqlgoq8BDPZNTmqap0ajgKKn1+Xk90WHxUo8Xgz4pFBJ6QEQibZnU+kAWBAAABqq1//eL6mX/v3Fuuzhye3PM6f+3Ql79/+WPtcdq6v/DIuLZ/7vze/b/+u/1/+0d0dnSVf+Pk2Ei1HbKVw+ryUJCjzp/v7YX9zcm7YD+HwAAAAAAAAAAAAAAAAAAAACAP8FepRKrVCox9+j+DItIWETc3z1KAyJydQBLRg91cf1xCtQ/uBccEzFfllKlVO3oDNgWEVMMmZSYfLefD45q7H7ySFWNyztz1alfLaUCdiaRloxdPyWxIWmtr1RmrydnplRNvV5WS6khiTbWxyUmfzXXr4lItT7eVl89huTC+YZ6TWLyfknyYsqyvY76/M+nlLp2M9lSH7HHAQAAAABwGmhqn+f9u6YdlK/V799ft74+EKjfX0963p8H5b/gYPcOAAAAAMBZYZWfZnXTNAqHBBE5ekznQbBPj+zu8Fer3Pcy9G+nhwTu5E2psHOy+ykarqA4Xw/b5Zr90knVRHU3qtvtuC8bHTRG5qb7cZlKPq9U0zL+ef3mW+8mvbIZPmKnnQeBw58AQ8f2DwgAAADAsak3/e6Z6cEuCAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAM+g4vt9u0HsEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAToqfAQAA//875v8f") pidfd_send_signal(r2, 0x22, &(0x7f0000000580)={0x10, 0xfffffff8, 0xffffff09}, 0x0) write$selinux_load(r6, &(0x7f0000000000)=ANY=[], 0x606c) 891.780749ms ago: executing program 5 (id=7477): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32, @ANYBLOB="8700"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000003ae5904f9592ea41f46758249b90a2a4047f31288a64f904f126339e4a5b79fe812923e759088d408245d8ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r1}, 0x18) r2 = socket$kcm(0x15, 0x5, 0x0) sendmsg$inet(r2, &(0x7f0000000300)={&(0x7f00000002c0)={0xa, 0xffff, @rand_addr=0x64010101}, 0x1c, 0x0, 0x0, &(0x7f0000000380)=ANY=[], 0x6b}, 0xc000040) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0xa}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r4, 0x0, 0x3}, 0x18) r5 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$bt_hci(r5, &(0x7f0000000240)={0x27, 0x3}, 0x6) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000800)=ANY=[@ANYBLOB="040100001a00070025bd700000000000fe80000000000000000000000000001be0000002000000000000000000000000ffff0000000000000000000002000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="ff010000000000000000000000000001000000002b000000fc00000000000000000000000000000000000000000000000400000000000000020000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000700000000000000fdffffffffffffff0000040000000000e80a000000000000000000000a000200700000000000000014000e00fe8000000000000000000000000000bbc68a4b6b44c2aea6110a4759f9a3b50c35e342d8665dda6bbca3b92045d45f4ddb1d3978959a0dfb3b6bfcbccbf673056cb78e7bf9c6dbb254010e7916d2108e22a1697d900b151447fb7fedd09e454287d2b8183270a1cf0cababa8efb5aad4ef8ade694feabc53f6db0afaa85ed84f867a47344a73692bd4d8d50f50a0b9546afb2f488503876c232b593f676ea44588de257f06fce8d20cca4b3308af13136214636887ec99158107d752cec202fd40f69b4202c9e27d6b43e79ad400c3b15f0169949dcde23bdb531ca94130da457189688016616c441578d74b"], 0x104}}, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x8040, 0x0) ioctl$TCSETS(r7, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x4, 0x0, 0x0, "ff00f7000000000000000000af88008300"}) r8 = syz_open_pts(r7, 0x141601) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r9 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r9}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) write(r8, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TCSETSF(r8, 0x5404, &(0x7f0000000080)={0x8, 0x20000000, 0xfffffffc, 0x7fffffd, 0x5, "682341f2fd71a6a76177920ea7e60c0ac7a4a5"}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x13, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000ba20702500000000002003007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000009b00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r10, 0x0, 0x10, 0x10, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\b\x00\x00', &(0x7f0000000300)=""/8, 0x6c00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 406.689567ms ago: executing program 8 (id=7488): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0xb007}, 0x4) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0180000000000000000001000000000000000b00000000030014"], 0x28}}, 0x40000) 398.795928ms ago: executing program 8 (id=7489): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff0000001100a200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000000000000000000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x2, 0x0, 0x7fff0000}]}) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, 0x0, &(0x7f00000000c0)=@chain) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702507aa71ea6e6cfde87b1a3167a37c34e401f8ff00000000bfa10000000000f107010000f8ffffffb702000004000000b703000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xe, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r3, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x76200}], 0x1, 0x7c00, 0x0, 0x3) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x143a82, 0x8) dup(r4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='scsi_dispatch_cmd_start\x00', r5}, 0x10) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) 178.143246ms ago: executing program 8 (id=7491): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000123c00006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1a4fd55ce45978e7f8ff04008ca8fbd78850d533f20000bfa1000000ffb702000008000000b5"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x40f00, 0x8}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) timer_create(0x0, 0x0, &(0x7f0000bbdffc)=0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='\n\x00\x00'], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r3, 0x0, 0x6}, 0x18) timer_delete(r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r4 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r4, 0x402, 0x5) fcntl$notify(r4, 0x402, 0x0) 141.526639ms ago: executing program 2 (id=7492): umount2(&(0x7f0000000000)='./file0\x00', 0x1) timer_create(0xfffffffffffffffc, 0x0, &(0x7f0000001400)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) close(r0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r0, 0x40107447, &(0x7f0000000180)) syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r3}, 0x9) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000400001351000000010000006f032fb448b508734bbe584cf7dc60bf0bb7db32616287fda58c97dd7a79cec4dcbd6451dfc66138c3c797e7b5c2654a68347b81b6bca12d0e64c859e9654235aa5bbf7385f8c6e1b03781fb10441e23d3e04990677156119415e14b3389"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002, 0x6, @rand_addr, 0x5}, 0x1c) sendto$inet6(r1, 0x0, 0x91, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x3, @loopback}, 0x1c) 138.612229ms ago: executing program 8 (id=7493): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000600)='kfree\x00', r0, 0x0, 0x6}, 0x18) r2 = signalfd4(r1, &(0x7f0000000040)={[0x8000000000000000]}, 0x8, 0x800) connect$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0x2710, @host}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4) pidfd_send_signal(r2, 0x22, &(0x7f0000000580)={0x10, 0xfffffff8, 0xffffff09}, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x606c) 133.420359ms ago: executing program 0 (id=7494): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000060000850000001b000000b7"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) 109.820241ms ago: executing program 8 (id=7495): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0xb007}, 0x4) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0180000000000000000001000000000000000b00000000030014"], 0x28}}, 0x40000) 109.355701ms ago: executing program 0 (id=7496): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000005c0)=ANY=[@ANYBLOB="140100002800010004000080f8dbdf2503"], 0x114}], 0x1, 0x0, 0x0, 0x1}, 0x0) 85.983863ms ago: executing program 0 (id=7497): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000060000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000080)=ANY=[@ANYRESOCT=0x0, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000dfff75390000000000000000850000007d00000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r1}, 0x10) r2 = io_uring_setup(0x6c0a, &(0x7f0000000100)={0x0, 0x9705, 0x10, 0x0, 0x71}) io_uring_register$IORING_REGISTER_IOWQ_MAX_WORKERS(r2, 0x13, &(0x7f0000000180)=[0x282, 0x80000001], 0x2) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="850000006b000000760000000000000027007fffffff00009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x8, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffc62, 0x10, 0x0, 0xfffffffffffffed8, 0x0, 0xffffffffffffffff, 0xfffffffffffffeee}, 0x23) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b7030000000000fd850000000400000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = syz_open_dev$loop(&(0x7f0000000480), 0xb0910, 0x8001) ioctl$BLKFINISHZONE(r3, 0x40101288, &(0x7f0000000880)={0x7fffffff, 0x1c00000000}) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/timer_list\x00', 0x0, 0x0) setsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f0000000440)=0x8000, 0x2) close(r4) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)=0x0) timer_settime(r7, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex_waitv(&(0x7f0000001b00)=[{0xffb, &(0x7f0000000240)=0x200000006, 0x6}], 0x1, 0x0, 0x0, 0x1) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000400), 0xc100, 0x0) 85.551973ms ago: executing program 8 (id=7498): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x54}, 0x1, 0xba01, 0x0, 0x4010}, 0x4000000) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000340)={r3, 0x3, 0x4, 0x4}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000020007fafb72d13b2a4a2719302000000030b43026c26236925000400fe7f0000bd2dca8a9848a3c728f138d509000000000100005ae583de0dd7d8319f98af84fda542e718f94b929ade5b175c0a9b2ce9", 0x55}], 0x1}, 0x4000000) socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f00000012c0)=[{{0x0, 0x0, 0x0}, 0x10}], 0x1, 0x10003, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000180)=0x6, 0x4) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000140)=0xd, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x6e, &(0x7f00000001c0)={@local, @link_local, @val={@void, {0x8100, 0x0, 0x0, 0x1}}, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x4, "e675910f0547f567a5afbe81b11967155e46616ed4dd5c55", "15df9c8340e53b20e91b913c5bc01a3a1deb091c6f52dada80e8eb5b17692de5"}}}}}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001940)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0xfffffffd, 0x25dfdbfc, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe56, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{}, {}, {}, {}, {}, {0x448eade7}, {0x0, 0x0, 0x80000000}, {}, {}, {}, {}, {}, {}, {0x2}, {}, {}, {0x0, 0x20000000, 0x0, 0xffffffff, 0x3}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0xfffffffc, 0x0, 0x0, 0x0, 0x2}, {}, {}, {}, {0x0, 0x4}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, {0xfffffffd}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, {0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0xfffffffe}, {}, {0xd5}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {0x0, 0x10}, {0x80000000}, {0x8eb9, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x4, 0x0, 0x7ee}, {}, {}, {}, {0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x9}, {}, {}, {}, {}, {0x3}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, {}, {0x0, 0x9, 0xfffffffc, 0x0, 0x0, 0xfffffffd}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {0x0, 0x0, 0x0, 0x4, 0x2}, {}, {}, {}, {}, {}, {0x10000}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xb}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x3}, {}, {}, {}, {}, {}, {0x0, 0x1}, {0x7}, {0x0, 0x1}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {0x2}, {0x2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {0x3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$sock_bt_hci(r9, 0x400448dc, &(0x7f0000000040)="6a9920032b856f4998d568e0b1e168f605bb4de9688b660a6902c41fc818fb463782de0b5238fde54b2cd24eaaa77c91") 62.629025ms ago: executing program 0 (id=7499): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0xb007}, 0x4) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0180000000000000000001000000000000000b00000000030014"], 0x28}}, 0x40000) 39.603657ms ago: executing program 0 (id=7500): r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) getsockname$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="400000001000390400"/20, @ANYRES32=r1, @ANYBLOB="01980000000000002000128008000100677265001400028008000100", @ANYRES32=r1], 0x40}, 0x1, 0x0, 0x0, 0x4014}, 0x4c094) r3 = socket(0x10, 0x3, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x44, 0x24, 0x5820a61ca228659, 0x0, 0xfffffffe, {0x0, 0x0, 0x0, r6, {0x0, 0x9}, {0xffff, 0xffff}, {0x5, 0x7}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_USC={0x10, 0x3, {0x6, 0x2}}}}]}, 0x79}}, 0x800) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001540)=@newtfilter={0x68, 0x28, 0xd2b, 0x1004001, 0x25dfdbfd, {0x0, 0x0, 0x0, r6, {0xffff, 0x9}, {}, {0x2, 0xb}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_sample={0x30, 0x215, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}]}, 0x68}, 0x1, 0x0, 0x0, 0x8810}, 0x404c0c0) 39.192697ms ago: executing program 5 (id=7501): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff0000001100a200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1809000000000000000000000000000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x2, 0x0, 0x7fff0000}]}) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, 0x0, &(0x7f00000000c0)=@chain) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702507aa71ea6e6cfde87b1a3167a37c34e401f8ff00000000bfa10000000000f107010000f8ffffffb702000004000000b703000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xe, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r3, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x76200}], 0x1, 0x7c00, 0x0, 0x3) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x143a82, 0x8) dup(r4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='scsi_dispatch_cmd_start\x00', r5}, 0x10) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) 12.019119ms ago: executing program 0 (id=7502): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) write$binfmt_misc(r0, &(0x7f0000000240), 0xfffffecc) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 0s ago: executing program 5 (id=7503): r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000001200), 0xa0000) read(r1, &(0x7f0000000200)=""/209, 0xd1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x335, @time={0xa2eb, 0x8}, 0x0, {}, 0x20}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000940)) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x9e, 0x1, 'queue1\x00', 0x10000}) tkill(r0, 0x7) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000540)=ANY=[@ANYRESDEC, @ANYBLOB="da295ec9b1b015f739f590dc63cbbc2ae94f1770430f9fd8db05661e906c461da919bf09409f7bd4bbce8830a00fe928c9651ab119928c79e4672a1c5458e82c436c7e191f2ceafd819723b468e8ab96f342066d3e8d350b89b669356399a9a349ec471db0d500bd2420b1e4c76a87c056b075b7a1b70a2a6cff75fcf31f08", @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095", @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x28, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$iso9660(&(0x7f0000002900), &(0x7f0000000000)='./file0\x00', 0x2, &(0x7f00000002c0)=ANY=[], 0x1, 0x5b1, &(0x7f0000001000)="$eJzs3MFv29YZAPDHxK4NBwsGFGvSNEDZtIfsEFeSFwdGBywaTdtsJVEg5cI5DcXiZMHsblg2YMmly6VDgQ077bz1utOO+6d62T/ggRLlybIzuWkbZcDvB8TvUfzI9z2C4QcRIgMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEKJks9FoRqGT9Xb34udLNou8e7y0EKbXj/f3rxPNCYsTf0MUQlT9C8vL4eroo6uv/zf2B9WfG+HKaOlKWK6a5fD00hvf/+D1hQvVhotRdCqLl+3xk6e//OTgYP83X2Obo6Ojz6rZfIdpvTTbaS8r86zb3k7jrMzjjfX1xvs7W2W8lXXS8l45SLtxUqTtQV7EN5O7IYSNtThdvZfv9rY32500vpn8MG5ubNy51Wo01uMPV/tpuyjz3vsfrpbJTtbpZL3tYUy1+lbr7XCnOhE/ygbxIG134/jBo4P9tVlJVkHN8wS1ZgW1Gq1Ws9lqNddvb9y+02gs12fr8QcLjSlhepOF+Z+0vHSv1SfKcGF8jXvtW7uIwws6Sv4y7xQAAACA71g0vMceDe/LXx32trJO2jgRcxTNLT0AAADgWzD8an+lvgEQwtUQnf7+DwAAAPx/+/u4c+YzdiGKQtlfisaPqvT33osO21WvfXhx9NHF6T0Otq5Fl+udDJv1hXopSa9Hb46C3hxHf1U3D57/rN8/Q5VHVBSL0bNvlkD4U7g2irl2f9TeH68ZzXZlK+ukq0ne+aAZ2u3LFwbp3uB3nz76fQhFcXTxi173chQePDrYX/35rw7uD3N5Vu3l2WH9C4lTP5Q4mctSmMjlt8fPPdYzvnvyyC8Ob8RUs/6i110ZjduYnP+F0eYXvsb8Pw9vjWLeWhm1Kyfnv1yN2Vw9Y/aTWTT7e+8t1YOdc+ZTWVwfxVy/OTyx3r1Zr1mcyKI1K4vW5PF/oWNxnMW7J7KYPBZrs7JY+4ZZAMzLg+kqdKr+n6q7L3CV+x/VvRqlKuEzq/svZo7yeXhnFPPOtYW6Il0MYeqK3ph1RW+cs66HcHYW/wg3/vbXEHbDjXHw82psNe6fT1TV6PDLaoMvT4/7h1FT/vvhzqWqs3T46/DG4ydPbz06/OTh/sP9T1uttfXGjxqN262wOJxG3ag9AJwhLb6KVgZ/jIoi6/+subHRbA920rjIk4/iItvcTuOsN0iLZKfd207jfpEP8iTvVJ2Ps820jMvdfj+vKklexP28zPaGb36J61e/lGm33RtkSdnvpO0yjZO8N2gng3gzK5O4v/vTTlbupEW8lRdx2U+TbCtL2oMs78Vlvlsk6Wocl2k6EZhtpkefhZBV3V7cL7Juu7gXf5x3drtpvJlW1bI/yKNQ7XA8VtbbyovucLer8z7YAPCKeBzqN9gdv8ru8U/Gq56cWnVmJyzPiJnzFAGAKdNVemneCQEAAAAAAAAAAAAAAKdMPq734/qVPud77O+V7dy9dNaqt+ef2GQnhLDwCqShc87O8quRxmL93/ZF9xOFEGYHf6+KmedVCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADO9p8AAAD//0n5kWY=") r2 = socket$unix(0x1, 0x2, 0x0) getpgrp(r0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x200000, &(0x7f0000000200), 0x5, 0x570, &(0x7f0000000680)="$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") r3 = open(&(0x7f00000001c0)='./file1\x00', 0x14927e, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0x404c534a, &(0x7f0000000c00)={0x4, 0x0, 0x10}) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], &(0x7f0000000080)='GPL\x00', 0x85, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$igmp(0x2, 0x3, 0x2) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB], 0x330}}, 0x0) r4 = mq_open(&(0x7f0000000180)='\r\x00elinu\xef\xe3elinux\x00\x96\xf6\x92\n#*\xac\x05\xce\xf8D\\\x9a\xe6[]L+\xf6\v\xe8\xf2\xd3\b\x15\n\xb8F!Q9o\x1f#\xbdt\r\xfb\"\x18%\xfdM\xaf_t\xd2\xdcJ\x10\a\xbab\x1a\xdf\xb1\xbdU\xd7Lo\xe7\xac\x81\x10k\xce-\xf5@\xbb\x9d;\xe8\xf6\xffQ\x04\xaai\x92k\x1b;\xddM\xa2\xe1-\x0e\xd8\xde\x00\xff\x18\xdd\bL\xfb\xa2.\xb6{\xb5\x85#\x88\xdc\xf0\x0f\x05\xf1\xc4 \xdeV\x80q\xf7\x04\xf5\x85T\x1f\xc2S]*\xc9lw\xd3J\xc5\xe8\x02\xcb\xbbAHxr\xac\xb77F\xdf\x1c\xcb\xd4\xce\x88L\xf1\xf9[\x98\xd4+pTx\x95\xb5\x1b]x\x1a\x95\xe1c6\xe7`83\xb7n#\xe0\xc1_\xec\xba\xde\a\x8b\xc5\x86woo\xbc\x1c\xa3r\x82\xf3enq-\x90/\xed\xff\xad+\x03\x10\t\xda\xfd\xa2\xd0\xef4\n%\xf1\xd8', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x4}) mq_getsetattr(r4, &(0x7f00000007c0)={0x800, 0x1ed00000000000, 0x9, 0x4}, 0x0) mq_timedreceive(r4, &(0x7f0000000340)=""/195, 0xc3, 0x0, 0x0) mq_timedreceive(r4, &(0x7f0000000080)=""/92, 0x5c, 0x1000002, 0x0) syz_mount_image$iso9660(&(0x7f0000000b00), &(0x7f0000000040)='./file0\x00', 0x4002, &(0x7f0000000140)=ANY=[@ANYBLOB='map=off,cruft,iocharset=ascii,block=0x0000000000000200,unhide,session=0x0000000000000011,uid=', @ANYRESDEC=0x0, @ANYBLOB="2c004238994fceef7f633ea81416b1324d35327f7ace27c590b7f9fb133af0ffd6dfc4d893195864142b1450fbace6795f6e181993255fbbca2cb54fcf79cc53b3a6c3704aed82da89741aad5205bb43ded29cfd65509ff9c85cbdb7337ef48b9412ff439da96bb3f5ac11273d94d3d75d"], 0x1, 0xa2f, &(0x7f0000001580)="$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") kernel console output (not intermixed with test programs): 02 compat=0 ip=0x7f6446dcebe9 code=0x7ffc0000 [ 310.844122][T19286] FAULT_INJECTION: forcing a failure. [ 310.844122][T19286] name failslab, interval 1, probability 0, space 0, times 0 [ 310.870941][ T29] audit: type=1326 audit(1755443615.601:38824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19274 comm="syz.8.5802" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f6446dcebe9 code=0x7ffc0000 [ 310.884986][T19286] CPU: 1 UID: 0 PID: 19286 Comm: syz.2.5805 Tainted: G W 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(voluntary) [ 310.885038][T19286] Tainted: [W]=WARN [ 310.885045][T19286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 310.885058][T19286] Call Trace: [ 310.885067][T19286] [ 310.885075][T19286] __dump_stack+0x1d/0x30 [ 310.885096][T19286] dump_stack_lvl+0xe8/0x140 [ 310.885171][T19286] dump_stack+0x15/0x1b [ 310.885187][T19286] should_fail_ex+0x265/0x280 [ 310.885208][T19286] should_failslab+0x8c/0xb0 [ 310.885296][T19286] kmem_cache_alloc_node_noprof+0x57/0x320 [ 310.885323][T19286] ? __alloc_skb+0x101/0x320 [ 310.885354][T19286] __alloc_skb+0x101/0x320 [ 310.885421][T19286] ? audit_log_start+0x365/0x6c0 [ 310.885530][T19286] audit_log_start+0x380/0x6c0 [ 310.885560][T19286] audit_seccomp+0x48/0x100 [ 310.885584][T19286] ? __seccomp_filter+0x68c/0x10d0 [ 310.885605][T19286] __seccomp_filter+0x69d/0x10d0 [ 310.885674][T19286] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 310.885733][T19286] ? vfs_write+0x7e8/0x960 [ 310.885853][T19286] ? __rcu_read_unlock+0x4f/0x70 [ 310.885873][T19286] ? __fget_files+0x184/0x1c0 [ 310.885955][T19286] __secure_computing+0x82/0x150 [ 310.885975][T19286] syscall_trace_enter+0xcf/0x1e0 [ 310.885998][T19286] do_syscall_64+0xac/0x200 [ 310.886023][T19286] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 310.886056][T19286] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 310.886110][T19286] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 310.886168][T19286] RIP: 0033:0x7ff166bdebe9 [ 310.886184][T19286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 310.886201][T19286] RSP: 002b:00007ff165647038 EFLAGS: 00000246 ORIG_RAX: 00000000000000b3 [ 310.886220][T19286] RAX: ffffffffffffffda RBX: 00007ff166e05fa0 RCX: 00007ff166bdebe9 [ 310.886233][T19286] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff80000202 [ 310.886245][T19286] RBP: 00007ff165647090 R08: 0000000000000000 R09: 0000000000000000 [ 310.886257][T19286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 310.886297][T19286] R13: 00007ff166e06038 R14: 00007ff166e05fa0 R15: 00007ffded6cab28 [ 310.886315][T19286] [ 310.886325][T19286] audit: audit_lost=6 audit_rate_limit=0 audit_backlog_limit=64 [ 312.041329][T19357] netlink: 20 bytes leftover after parsing attributes in process `syz.5.5834'. [ 312.221399][T19374] vlan2: entered allmulticast mode [ 312.646551][T19413] netlink: 'syz.8.5855': attribute type 4 has an invalid length. [ 312.646567][T19413] netlink: 17 bytes leftover after parsing attributes in process `syz.8.5855'. [ 312.709060][T19413] netlink: 2 bytes leftover after parsing attributes in process `syz.8.5855'. [ 314.465635][T19478] sd 0:0:1:0: device reset [ 314.511948][T19488] loop6: detected capacity change from 0 to 512 [ 314.551811][T19488] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 314.551975][T19488] ext4 filesystem being mounted at /52/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 314.638879][T18813] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 314.706048][T19501] loop6: detected capacity change from 0 to 512 [ 314.714675][T19501] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 314.735982][T19501] EXT4-fs (loop6): revision level too high, forcing read-only mode [ 314.744544][T19501] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=e000e118, mo2=0002] [ 314.747964][T19501] System zones: 0-1, 15-15, 18-18, 34-34 [ 314.748150][T19501] EXT4-fs (loop6): orphan cleanup on readonly fs [ 314.748205][T19501] EXT4-fs warning (device loop6): ext4_enable_quotas:7168: Failed to enable quota tracking (type=1, err=-22, ino=4). Please run e2fsck to fix. [ 314.748229][T19501] EXT4-fs (loop6): Cannot turn on quotas: error -22 [ 314.748709][T19501] EXT4-fs error (device loop6): ext4_validate_block_bitmap:441: comm syz.6.5891: bg 0: block 40: padding at end of block bitmap is not set [ 314.748900][T19501] EXT4-fs error (device loop6) in ext4_mb_clear_bb:6657: Corrupt filesystem [ 314.749186][T19501] EXT4-fs (loop6): 1 truncate cleaned up [ 314.749610][T19501] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 314.857926][T19508] FAULT_INJECTION: forcing a failure. [ 314.857926][T19508] name failslab, interval 1, probability 0, space 0, times 0 [ 314.858011][T19508] CPU: 1 UID: 0 PID: 19508 Comm: +}[@ Tainted: G W 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(voluntary) [ 314.858042][T19508] Tainted: [W]=WARN [ 314.858109][T19508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 314.858120][T19508] Call Trace: [ 314.858127][T19508] [ 314.858135][T19508] __dump_stack+0x1d/0x30 [ 314.858156][T19508] dump_stack_lvl+0xe8/0x140 [ 314.858176][T19508] dump_stack+0x15/0x1b [ 314.858193][T19508] should_fail_ex+0x265/0x280 [ 314.858248][T19508] should_failslab+0x8c/0xb0 [ 314.858344][T19508] kmem_cache_alloc_noprof+0x50/0x310 [ 314.858370][T19508] ? alloc_empty_file+0x76/0x200 [ 314.858466][T19508] alloc_empty_file+0x76/0x200 [ 314.858497][T19508] alloc_file_pseudo+0xc6/0x160 [ 314.858598][T19508] __shmem_file_setup+0x1de/0x210 [ 314.858693][T19508] shmem_file_setup+0x3b/0x50 [ 314.858723][T19508] __se_sys_memfd_create+0x2c3/0x590 [ 314.858741][T19508] __x64_sys_memfd_create+0x31/0x40 [ 314.858763][T19508] x64_sys_call+0x2abe/0x2ff0 [ 314.858825][T19508] do_syscall_64+0xd2/0x200 [ 314.858852][T19508] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 314.858877][T19508] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 314.858935][T19508] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 314.858994][T19508] RIP: 0033:0x7ff166bdebe9 [ 314.859007][T19508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 314.859121][T19508] RSP: 002b:00007ff165646e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 314.859137][T19508] RAX: ffffffffffffffda RBX: 000000000000050b RCX: 00007ff166bdebe9 [ 314.859173][T19508] RDX: 00007ff165646ef0 RSI: 0000000000000000 RDI: 00007ff166c627e8 [ 314.859184][T19508] RBP: 0000200000000700 R08: 00007ff165646bb7 R09: 00007ff165646e40 [ 314.859198][T19508] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000000 [ 314.859225][T19508] R13: 00007ff165646ef0 R14: 00007ff165646eb0 R15: 0000200000000400 [ 314.859241][T19508] [ 315.227324][T18813] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 315.342529][T19529] loop5: detected capacity change from 0 to 8192 [ 315.487785][T19552] netlink: 'syz.5.5911': attribute type 21 has an invalid length. [ 315.495946][T19552] netlink: 132 bytes leftover after parsing attributes in process `syz.5.5911'. [ 315.512321][T19552] loop5: detected capacity change from 0 to 164 [ 315.519839][T19552] rock: corrupted directory entry. extent=28, offset=16056320, size=0 [ 315.760288][ T29] kauditd_printk_skb: 299 callbacks suppressed [ 315.760301][ T29] audit: type=1326 audit(1755443620.721:39122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19560 comm="syz.2.5915" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff166bdebe9 code=0x7ffc0000 [ 315.760453][ T29] audit: type=1326 audit(1755443620.721:39123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19560 comm="syz.2.5915" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff166bdebe9 code=0x7ffc0000 [ 315.767352][ T29] audit: type=1326 audit(1755443620.721:39124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19560 comm="syz.2.5915" exe="/root/syz-executor" sig=0 arch=c000003e syscall=293 compat=0 ip=0x7ff166bdebe9 code=0x7ffc0000 [ 315.767548][ T29] audit: type=1326 audit(1755443620.721:39125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19560 comm="syz.2.5915" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff166bdebe9 code=0x7ffc0000 [ 316.065444][ T29] audit: type=1326 audit(1755443620.801:39126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19560 comm="syz.2.5915" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7ff166bdebe9 code=0x7ffc0000 [ 316.065478][ T29] audit: type=1326 audit(1755443620.801:39127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19560 comm="syz.2.5915" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff166bdebe9 code=0x7ffc0000 [ 316.065517][ T29] audit: type=1326 audit(1755443620.801:39128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19560 comm="syz.2.5915" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff166bdebe9 code=0x7ffc0000 [ 316.348461][T19575] loop2: detected capacity change from 0 to 512 [ 316.376988][T19575] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 316.400316][T19574] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.400542][T19574] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.424396][T19575] ext4 filesystem being mounted at /562/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 316.446744][ T29] audit: type=1326 audit(1755443621.401:39129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19579 comm="syz.0.5922" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a0e4febe9 code=0x7ffc0000 [ 316.446776][ T29] audit: type=1326 audit(1755443621.401:39130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19579 comm="syz.0.5922" exe="/root/syz-executor" sig=0 arch=c000003e syscall=149 compat=0 ip=0x7f9a0e4febe9 code=0x7ffc0000 [ 316.514885][ T29] audit: type=1326 audit(1755443621.471:39131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19579 comm="syz.0.5922" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a0e4febe9 code=0x7ffc0000 [ 316.553755][T19574] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 316.588026][T19574] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 316.618341][T11722] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 316.718041][ T9458] netdevsim netdevsim6 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 316.736742][ T9458] netdevsim netdevsim6 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 316.745820][ T9458] netdevsim netdevsim6 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 316.754904][ T9458] netdevsim netdevsim6 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 317.179018][T19633] FAULT_INJECTION: forcing a failure. [ 317.179018][T19633] name failslab, interval 1, probability 0, space 0, times 0 [ 317.191802][T19633] CPU: 1 UID: 0 PID: 19633 Comm: syz.6.5943 Tainted: G W 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(voluntary) [ 317.191837][T19633] Tainted: [W]=WARN [ 317.191844][T19633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 317.191856][T19633] Call Trace: [ 317.191863][T19633] [ 317.191872][T19633] __dump_stack+0x1d/0x30 [ 317.191918][T19633] dump_stack_lvl+0xe8/0x140 [ 317.191938][T19633] dump_stack+0x15/0x1b [ 317.191969][T19633] should_fail_ex+0x265/0x280 [ 317.191990][T19633] should_failslab+0x8c/0xb0 [ 317.192014][T19633] __kmalloc_noprof+0xa5/0x3e0 [ 317.192040][T19633] ? kobject_get_path+0x92/0x1c0 [ 317.192106][T19633] kobject_get_path+0x92/0x1c0 [ 317.192136][T19633] input_devices_seq_show+0x36/0x470 [ 317.192159][T19633] seq_read_iter+0x319/0x940 [ 317.192220][T19633] seq_read+0x270/0x2b0 [ 317.192290][T19633] ? __pfx_seq_read+0x10/0x10 [ 317.192316][T19633] proc_reg_read+0x125/0x1c0 [ 317.192422][T19633] ? __pfx_proc_reg_read+0x10/0x10 [ 317.192492][T19633] vfs_readv+0x3f8/0x690 [ 317.192525][T19633] __x64_sys_preadv+0xfd/0x1c0 [ 317.192549][T19633] x64_sys_call+0x282a/0x2ff0 [ 317.192573][T19633] do_syscall_64+0xd2/0x200 [ 317.192670][T19633] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 317.192741][T19633] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 317.192762][T19633] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 317.192779][T19633] RIP: 0033:0x7fa73863ebe9 [ 317.192793][T19633] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 317.192845][T19633] RSP: 002b:00007fa7370a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 317.192863][T19633] RAX: ffffffffffffffda RBX: 00007fa738865fa0 RCX: 00007fa73863ebe9 [ 317.192903][T19633] RDX: 0000000000000001 RSI: 00002000000015c0 RDI: 0000000000000005 [ 317.192917][T19633] RBP: 00007fa7370a7090 R08: 0000000000207fff R09: 0000000000000000 [ 317.192929][T19633] R10: 00000000000000f2 R11: 0000000000000246 R12: 0000000000000001 [ 317.192952][T19633] R13: 00007fa738866038 R14: 00007fa738865fa0 R15: 00007ffe766ece28 [ 317.192972][T19633] [ 317.720920][T19665] netlink: 24 bytes leftover after parsing attributes in process `syz.8.5958'. [ 317.754344][T19669] FAULT_INJECTION: forcing a failure. [ 317.754344][T19669] name failslab, interval 1, probability 0, space 0, times 0 [ 317.767497][T19669] CPU: 0 UID: 0 PID: 19669 Comm: syz.2.5959 Tainted: G W 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(voluntary) [ 317.767547][T19669] Tainted: [W]=WARN [ 317.767554][T19669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 317.767578][T19669] Call Trace: [ 317.767585][T19669] [ 317.767593][T19669] __dump_stack+0x1d/0x30 [ 317.767616][T19669] dump_stack_lvl+0xe8/0x140 [ 317.767635][T19669] dump_stack+0x15/0x1b [ 317.767660][T19669] should_fail_ex+0x265/0x280 [ 317.767679][T19669] should_failslab+0x8c/0xb0 [ 317.767701][T19669] __kvmalloc_node_noprof+0x123/0x4e0 [ 317.767727][T19669] ? alloc_netdev_mqs+0x553/0xa30 [ 317.767753][T19669] ? get_random_bytes+0x1d/0x30 [ 317.767775][T19669] alloc_netdev_mqs+0x553/0xa30 [ 317.767795][T19669] ip6_tnl_locate+0x37e/0x4a0 [ 317.767823][T19669] ip6_tnl_siocdevprivate+0x550/0x920 [ 317.767859][T19669] dev_ifsioc+0x8f5/0xaa0 [ 317.767882][T19669] dev_ioctl+0x78d/0x960 [ 317.767921][T19669] sock_ioctl+0x593/0x610 [ 317.767943][T19669] ? __pfx_sock_ioctl+0x10/0x10 [ 317.767964][T19669] __se_sys_ioctl+0xcb/0x140 [ 317.767994][T19669] __x64_sys_ioctl+0x43/0x50 [ 317.768019][T19669] x64_sys_call+0x1816/0x2ff0 [ 317.768087][T19669] do_syscall_64+0xd2/0x200 [ 317.768111][T19669] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 317.768135][T19669] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 317.768156][T19669] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 317.768240][T19669] RIP: 0033:0x7ff166bdebe9 [ 317.768255][T19669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 317.768270][T19669] RSP: 002b:00007ff165647038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 317.768290][T19669] RAX: ffffffffffffffda RBX: 00007ff166e05fa0 RCX: 00007ff166bdebe9 [ 317.768303][T19669] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000007 [ 317.768315][T19669] RBP: 00007ff165647090 R08: 0000000000000000 R09: 0000000000000000 [ 317.768328][T19669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 317.768340][T19669] R13: 00007ff166e06038 R14: 00007ff166e05fa0 R15: 00007ffded6cab28 [ 317.768388][T19669] [ 318.345483][T19704] loop6: detected capacity change from 0 to 2048 [ 318.360228][T19704] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000900 r/w without journal. Quota mode: writeback. [ 318.631976][T19708] EXT4-fs error (device loop6): ext4_mb_generate_buddy:1289: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 318.649699][T19708] EXT4-fs (loop6): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1004 with error 28 [ 318.663303][T19708] EXT4-fs (loop6): This should not happen!! Data will be lost [ 318.663303][T19708] [ 318.673162][T19708] EXT4-fs (loop6): Total free blocks count 0 [ 318.679893][T19708] EXT4-fs (loop6): Free/Dirty block details [ 318.685850][T19708] EXT4-fs (loop6): free_blocks=2415919104 [ 318.691791][T19708] EXT4-fs (loop6): dirty_blocks=1008 [ 318.697279][T19708] EXT4-fs (loop6): Block reservation details [ 318.703535][T19708] EXT4-fs (loop6): i_reserved_data_blocks=63 [ 319.038132][ T385] EXT4-fs (loop6): Delayed block allocation failed for inode 18 at logical offset 24 with max blocks 2 with error 28 [ 319.097381][T19719] vhci_hcd: default hub control req: 0310 v0006 i0006 l0 [ 319.163761][T19719] netlink: 'syz.8.5977': attribute type 13 has an invalid length. [ 319.172289][T19719] netlink: 'syz.8.5977': attribute type 17 has an invalid length. [ 319.284445][T19719] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 319.771251][T19764] netlink: 'syz.6.5991': attribute type 4 has an invalid length. [ 319.771269][T19764] netlink: 17 bytes leftover after parsing attributes in process `syz.6.5991'. [ 320.585128][T19783] loop5: detected capacity change from 0 to 764 [ 320.699877][T19785] Symlink component flag not implemented [ 320.699885][T19785] Symlink component flag not implemented [ 320.699912][T19785] Symlink component flag not implemented (129) [ 320.699936][T19785] Symlink component flag not implemented (6) [ 321.016193][T19789] netlink: 32 bytes leftover after parsing attributes in process `syz.0.6004'. [ 321.372831][T19816] netlink: 'syz.6.6015': attribute type 4 has an invalid length. [ 321.372847][T19816] netlink: 17 bytes leftover after parsing attributes in process `syz.6.6015'. [ 321.419996][T19818] netlink: 32 bytes leftover after parsing attributes in process `syz.5.6016'. [ 321.942959][T19825] loop2: detected capacity change from 0 to 764 [ 322.093368][T19829] Symlink component flag not implemented [ 322.093374][T19829] Symlink component flag not implemented [ 322.093397][T19829] Symlink component flag not implemented (129) [ 322.093407][T19829] Symlink component flag not implemented (6) [ 322.186323][T19833] netlink: 152 bytes leftover after parsing attributes in process `syz.0.6022'. [ 322.223133][T19833] netlink: 16 bytes leftover after parsing attributes in process `syz.0.6022'. [ 322.235242][T19833] netlink: 272 bytes leftover after parsing attributes in process `syz.0.6022'. [ 322.837738][ T29] kauditd_printk_skb: 293 callbacks suppressed [ 322.837765][ T29] audit: type=1400 audit(1755443627.791:39425): avc: denied { connect } for pid=19860 comm="syz.2.6034" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 322.877504][T19861] netlink: 256 bytes leftover after parsing attributes in process `syz.2.6034'. [ 322.908191][ T29] audit: type=1326 audit(1755443627.861:39426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19865 comm="syz.2.6035" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff166bdebe9 code=0x7ffc0000 [ 322.934193][ T29] audit: type=1326 audit(1755443627.861:39427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19865 comm="syz.2.6035" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff166bdebe9 code=0x7ffc0000 [ 322.959918][ T29] audit: type=1326 audit(1755443627.861:39428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19865 comm="syz.2.6035" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff166bdebe9 code=0x7ffc0000 [ 322.985250][ T29] audit: type=1326 audit(1755443627.871:39429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19865 comm="syz.2.6035" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff166bdebe9 code=0x7ffc0000 [ 323.009699][ T29] audit: type=1326 audit(1755443627.871:39430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19865 comm="syz.2.6035" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff166bdebe9 code=0x7ffc0000 [ 323.034086][ T29] audit: type=1326 audit(1755443627.871:39431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19865 comm="syz.2.6035" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff166bdebe9 code=0x7ffc0000 [ 323.058253][ T29] audit: type=1326 audit(1755443627.871:39432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19865 comm="syz.2.6035" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff166bdebe9 code=0x7ffc0000 [ 323.062209][T19869] netlink: 256 bytes leftover after parsing attributes in process `syz.2.6036'. [ 323.083420][ T29] audit: type=1326 audit(1755443627.871:39433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19865 comm="syz.2.6035" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff166bdebe9 code=0x7ffc0000 [ 323.083450][ T29] audit: type=1326 audit(1755443627.871:39434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19865 comm="syz.2.6035" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff166bdebe9 code=0x7ffc0000 [ 323.170899][T19868] netlink: 24 bytes leftover after parsing attributes in process `syz.2.6036'. [ 323.191666][T19868] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=19868 comm=syz.2.6036 [ 323.206715][T19868] netlink: 256 bytes leftover after parsing attributes in process `syz.2.6036'. [ 323.332168][T19887] loop2: detected capacity change from 0 to 764 [ 323.402945][T19889] Symlink component flag not implemented [ 323.408715][T19889] Symlink component flag not implemented [ 323.416209][T19889] Symlink component flag not implemented (129) [ 323.422506][T19889] Symlink component flag not implemented (6) [ 323.593015][T19898] sd 0:0:1:0: device reset [ 323.618523][T19900] netlink: 'syz.6.6048': attribute type 32 has an invalid length. [ 323.628032][T19900] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6048'. [ 323.639498][T19900] (unnamed net_device) (uninitialized): option coupled_control: invalid value (110) [ 323.864660][T19923] loop8: detected capacity change from 0 to 764 [ 323.882402][ T9458] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 323.914039][T19901] chnl_net:caif_netlink_parms(): no params data found [ 323.937911][ T9458] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 323.951992][T19929] sd 0:0:1:0: device reset [ 323.993309][ T9458] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 324.014917][T19935] Symlink component flag not implemented [ 324.020907][T19935] Symlink component flag not implemented [ 324.026841][T19901] bridge0: port 1(bridge_slave_0) entered blocking state [ 324.034067][T19901] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.035026][T19935] Symlink component flag not implemented (129) [ 324.047717][T19935] Symlink component flag not implemented (6) [ 324.058997][T19937] netlink: 256 bytes leftover after parsing attributes in process `syz.6.6057'. [ 324.088646][T19901] bridge_slave_0: entered allmulticast mode [ 324.106892][T19901] bridge_slave_0: entered promiscuous mode [ 324.120208][T19901] bridge0: port 2(bridge_slave_1) entered blocking state [ 324.127279][T19901] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.134706][T19901] bridge_slave_1: entered allmulticast mode [ 324.141416][T19901] bridge_slave_1: entered promiscuous mode [ 324.154336][ T9458] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 324.217240][T19901] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 324.218346][T19901] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 324.241139][T19901] team0: Port device team_slave_0 added [ 324.242110][T19901] team0: Port device team_slave_1 added [ 324.294691][T19901] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 324.294714][T19901] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 324.294741][T19901] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 324.295788][T19901] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 324.347729][T19901] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 324.347773][T19901] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 324.410815][T19958] netlink: 8 bytes leftover after parsing attributes in process `syz.5.6066'. [ 324.435148][T19959] sd 0:0:1:0: device reset [ 324.497581][T19969] loop6: detected capacity change from 0 to 512 [ 324.512267][T19969] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 324.512346][T19969] ext4 filesystem being mounted at /86/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 324.512849][T19969] FAULT_INJECTION: forcing a failure. [ 324.512849][T19969] name failslab, interval 1, probability 0, space 0, times 0 [ 324.551224][T19969] CPU: 1 UID: 0 PID: 19969 Comm: syz.6.6070 Tainted: G W 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(voluntary) [ 324.551324][T19969] Tainted: [W]=WARN [ 324.551331][T19969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 324.551345][T19969] Call Trace: [ 324.551353][T19969] [ 324.551362][T19969] __dump_stack+0x1d/0x30 [ 324.551384][T19969] dump_stack_lvl+0xe8/0x140 [ 324.551404][T19969] dump_stack+0x15/0x1b [ 324.551421][T19969] should_fail_ex+0x265/0x280 [ 324.551471][T19969] should_failslab+0x8c/0xb0 [ 324.551538][T19969] kmem_cache_alloc_noprof+0x50/0x310 [ 324.551561][T19969] ? getname_kernel+0x3c/0x1f0 [ 324.551596][T19969] getname_kernel+0x3c/0x1f0 [ 324.551652][T19969] kern_path+0x23/0x130 [ 324.551701][T19969] lookup_bdev+0x66/0x150 [ 324.551722][T19969] __se_sys_quotactl+0x1b7/0x670 [ 324.551782][T19969] ? fput+0x8f/0xc0 [ 324.551813][T19969] __x64_sys_quotactl+0x55/0x70 [ 324.551842][T19969] x64_sys_call+0x15d6/0x2ff0 [ 324.551864][T19969] do_syscall_64+0xd2/0x200 [ 324.551890][T19969] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 324.551987][T19969] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 324.552012][T19969] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 324.552030][T19969] RIP: 0033:0x7fa73863ebe9 [ 324.552087][T19969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 324.552105][T19969] RSP: 002b:00007fa7370a7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000b3 [ 324.552127][T19969] RAX: ffffffffffffffda RBX: 00007fa738865fa0 RCX: 00007fa73863ebe9 [ 324.552159][T19969] RDX: 0000000000000000 RSI: 0000200000000800 RDI: ffffffff80000801 [ 324.552173][T19969] RBP: 00007fa7370a7090 R08: 0000000000000000 R09: 0000000000000000 [ 324.552187][T19969] R10: 0000200000000840 R11: 0000000000000246 R12: 0000000000000001 [ 324.552248][T19969] R13: 00007fa738866038 R14: 00007fa738865fa0 R15: 00007ffe766ece28 [ 324.552277][T19969] [ 324.573236][T18813] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 324.786933][T19977] netlink: 256 bytes leftover after parsing attributes in process `syz.6.6071'. [ 324.871806][ T9458] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 324.876253][ T9458] bond0 (unregistering): Released all slaves [ 324.904582][T19901] hsr_slave_0: entered promiscuous mode [ 324.912757][T19901] hsr_slave_1: entered promiscuous mode [ 324.913290][T19901] debugfs: 'hsr0' already exists in 'hsr' [ 324.925769][T19901] Cannot create hsr debugfs directory [ 324.942859][ T9458] IPVS: stopping master sync thread 18384 ... [ 324.970766][ T9458] hsr_slave_0: left promiscuous mode [ 324.989222][ T9458] hsr_slave_1: left promiscuous mode [ 325.001765][ T9458] veth1_macvtap: left promiscuous mode [ 325.001790][ T9458] veth0_macvtap: left promiscuous mode [ 325.069261][T19984] loop6: detected capacity change from 0 to 1024 [ 325.082186][T19984] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 325.113623][T19984] nfs4: Unknown parameter '{[)-(}.\' [ 325.137255][T18813] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 325.321236][T20006] netlink: 'syz.8.6079': attribute type 4 has an invalid length. [ 325.321255][T20006] netlink: 17 bytes leftover after parsing attributes in process `syz.8.6079'. [ 325.602169][T20024] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6084'. [ 325.686457][T19901] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 325.688370][T19901] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 325.709193][T19901] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 325.719145][T20016] loop6: detected capacity change from 0 to 736 [ 325.727129][T19901] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 325.737009][T20016] rock: directory entry would overflow storage [ 325.737021][T20016] rock: sig=0x3b10, size=4, remaining=3 [ 325.920831][T19901] 8021q: adding VLAN 0 to HW filter on device bond0 [ 325.932480][T19901] 8021q: adding VLAN 0 to HW filter on device team0 [ 325.941114][ T9483] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.941158][ T9483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.942603][ T9483] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.964664][ T9483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 326.005373][T20047] netlink: 'syz.5.6089': attribute type 4 has an invalid length. [ 326.074019][T19901] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 326.194579][T19901] veth0_vlan: entered promiscuous mode [ 326.203110][T19901] veth1_vlan: entered promiscuous mode [ 326.216934][T19901] veth0_macvtap: entered promiscuous mode [ 326.218357][T19901] veth1_macvtap: entered promiscuous mode [ 326.235747][T19901] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 326.245747][T19901] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 326.257114][ T9477] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 326.257249][ T9477] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 326.257282][ T9477] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 326.257470][ T9477] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 326.723159][T20085] netlink: 'syz.6.6099': attribute type 4 has an invalid length. [ 328.192603][T20126] FAULT_INJECTION: forcing a failure. [ 328.192603][T20126] name failslab, interval 1, probability 0, space 0, times 0 [ 328.206886][T20126] CPU: 1 UID: 0 PID: 20126 Comm: syz.2.6114 Tainted: G W 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(voluntary) [ 328.206940][T20126] Tainted: [W]=WARN [ 328.206946][T20126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 328.206956][T20126] Call Trace: [ 328.206963][T20126] [ 328.206971][T20126] __dump_stack+0x1d/0x30 [ 328.207033][T20126] dump_stack_lvl+0xe8/0x140 [ 328.207056][T20126] dump_stack+0x15/0x1b [ 328.207102][T20126] should_fail_ex+0x265/0x280 [ 328.207161][T20126] should_failslab+0x8c/0xb0 [ 328.207183][T20126] kmem_cache_alloc_node_noprof+0x57/0x320 [ 328.207282][T20126] ? __alloc_skb+0x101/0x320 [ 328.207336][T20126] __alloc_skb+0x101/0x320 [ 328.207386][T20126] netlink_alloc_large_skb+0xba/0xf0 [ 328.207419][T20126] netlink_sendmsg+0x3cf/0x6b0 [ 328.207442][T20126] ? __pfx_netlink_sendmsg+0x10/0x10 [ 328.207490][T20126] __sock_sendmsg+0x142/0x180 [ 328.207609][T20126] ____sys_sendmsg+0x31e/0x4e0 [ 328.207663][T20126] ___sys_sendmsg+0x17b/0x1d0 [ 328.207692][T20126] __x64_sys_sendmsg+0xd4/0x160 [ 328.207811][T20126] x64_sys_call+0x191e/0x2ff0 [ 328.207897][T20126] do_syscall_64+0xd2/0x200 [ 328.207963][T20126] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 328.208048][T20126] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 328.208072][T20126] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 328.208097][T20126] RIP: 0033:0x7f8b8940ebe9 [ 328.208113][T20126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 328.208128][T20126] RSP: 002b:00007f8b87e77038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 328.208173][T20126] RAX: ffffffffffffffda RBX: 00007f8b89635fa0 RCX: 00007f8b8940ebe9 [ 328.208186][T20126] RDX: 0000000000000000 RSI: 0000200000000300 RDI: 0000000000000006 [ 328.208199][T20126] RBP: 00007f8b87e77090 R08: 0000000000000000 R09: 0000000000000000 [ 328.208211][T20126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 328.208223][T20126] R13: 00007f8b89636038 R14: 00007f8b89635fa0 R15: 00007ffe22fd1aa8 [ 328.208241][T20126] [ 328.449310][ T29] kauditd_printk_skb: 90 callbacks suppressed [ 328.449325][ T29] audit: type=1326 audit(1755443633.411:39525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20131 comm="syz.0.6118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a0e4febe9 code=0x7ffc0000 [ 328.485272][ T29] audit: type=1326 audit(1755443633.441:39526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20131 comm="syz.0.6118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a0e4febe9 code=0x7ffc0000 [ 328.509552][ T29] audit: type=1326 audit(1755443633.441:39527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20131 comm="syz.0.6118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9a0e4febe9 code=0x7ffc0000 [ 328.535387][ T29] audit: type=1326 audit(1755443633.441:39528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20131 comm="syz.0.6118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a0e4febe9 code=0x7ffc0000 [ 328.561698][ T29] audit: type=1326 audit(1755443633.441:39529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20131 comm="syz.0.6118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a0e4febe9 code=0x7ffc0000 [ 328.586531][ T29] audit: type=1326 audit(1755443633.441:39530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20131 comm="syz.0.6118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=258 compat=0 ip=0x7f9a0e4febe9 code=0x7ffc0000 [ 328.613006][ T29] audit: type=1326 audit(1755443633.441:39531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20131 comm="syz.0.6118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a0e4febe9 code=0x7ffc0000 [ 328.641930][ T29] audit: type=1326 audit(1755443633.441:39532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20131 comm="syz.0.6118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f9a0e4febe9 code=0x7ffc0000 [ 328.667968][ T29] audit: type=1326 audit(1755443633.441:39533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20131 comm="syz.0.6118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a0e4febe9 code=0x7ffc0000 [ 328.694192][ T29] audit: type=1326 audit(1755443633.441:39534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20131 comm="syz.0.6118" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f9a0e4febe9 code=0x7ffc0000 [ 328.948934][T20160] __nla_validate_parse: 2 callbacks suppressed [ 328.948978][T20160] netlink: 9 bytes leftover after parsing attributes in process `syz.5.6130'. [ 328.949327][T20160] gretap0: entered promiscuous mode [ 328.983733][T20160] netlink: 5 bytes leftover after parsing attributes in process `syz.5.6130'. [ 328.983783][T20160] 0ªX¹¦D: renamed from gretap0 [ 328.994738][T20160] 0ªX¹¦D: left promiscuous mode [ 329.004494][T20160] 0ªX¹¦D: entered allmulticast mode [ 329.006149][T20160] A link change request failed with some changes committed already. Interface 30ªX¹¦D may have been left with an inconsistent configuration, please check. [ 329.040621][T20160] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12336 sclass=netlink_route_socket pid=20160 comm=syz.5.6130 [ 330.364759][T20199] lo speed is unknown, defaulting to 1000 [ 330.370810][T20199] lo speed is unknown, defaulting to 1000 [ 330.377388][T20199] lo speed is unknown, defaulting to 1000 [ 330.387051][T20199] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 330.397962][T20199] lo speed is unknown, defaulting to 1000 [ 330.405038][T20199] lo speed is unknown, defaulting to 1000 [ 330.411517][T20199] lo speed is unknown, defaulting to 1000 [ 330.429622][T20199] lo speed is unknown, defaulting to 1000 [ 330.429944][T20199] lo speed is unknown, defaulting to 1000 [ 330.769013][T20233] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6157'. [ 330.769320][T20233] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6157'. [ 331.555550][T20272] netlink: 256 bytes leftover after parsing attributes in process `syz.2.6173'. [ 333.123272][T20383] netlink: 92 bytes leftover after parsing attributes in process `syz.5.6215'. [ 333.135664][T20383] bridge: RTM_NEWNEIGH with invalid ether address [ 333.249887][T20392] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6222'. [ 333.700078][T20421] FAULT_INJECTION: forcing a failure. [ 333.700078][T20421] name failslab, interval 1, probability 0, space 0, times 0 [ 333.700106][T20421] CPU: 0 UID: 0 PID: 20421 Comm: syz.6.6229 Tainted: G W 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(voluntary) [ 333.700203][T20421] Tainted: [W]=WARN [ 333.700291][T20421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 333.700305][T20421] Call Trace: [ 333.700313][T20421] [ 333.700321][T20421] __dump_stack+0x1d/0x30 [ 333.700344][T20421] dump_stack_lvl+0xe8/0x140 [ 333.700475][T20421] dump_stack+0x15/0x1b [ 333.700493][T20421] should_fail_ex+0x265/0x280 [ 333.700514][T20421] should_failslab+0x8c/0xb0 [ 333.700534][T20421] __kmalloc_noprof+0xa5/0x3e0 [ 333.700561][T20421] ? genl_family_rcv_msg_attrs_parse+0x75/0x190 [ 333.700632][T20421] genl_family_rcv_msg_attrs_parse+0x75/0x190 [ 333.700660][T20421] genl_family_rcv_msg_doit+0x48/0x1b0 [ 333.700712][T20421] ? selinux_capable+0x31/0x40 [ 333.700739][T20421] ? security_capable+0x83/0x90 [ 333.700889][T20421] ? ns_capable+0x7d/0xb0 [ 333.700911][T20421] genl_rcv_msg+0x422/0x460 [ 333.700937][T20421] ? __pfx_ethnl_set_features+0x10/0x10 [ 333.700967][T20421] netlink_rcv_skb+0x123/0x220 [ 333.701050][T20421] ? __pfx_genl_rcv_msg+0x10/0x10 [ 333.701085][T20421] genl_rcv+0x28/0x40 [ 333.701117][T20421] netlink_unicast+0x5bd/0x690 [ 333.701149][T20421] netlink_sendmsg+0x58b/0x6b0 [ 333.701173][T20421] ? __pfx_netlink_sendmsg+0x10/0x10 [ 333.701289][T20421] __sock_sendmsg+0x142/0x180 [ 333.701312][T20421] ____sys_sendmsg+0x31e/0x4e0 [ 333.701333][T20421] ___sys_sendmsg+0x17b/0x1d0 [ 333.701435][T20421] __x64_sys_sendmsg+0xd4/0x160 [ 333.701506][T20421] x64_sys_call+0x191e/0x2ff0 [ 333.701527][T20421] do_syscall_64+0xd2/0x200 [ 333.701551][T20421] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 333.701594][T20421] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 333.701618][T20421] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 333.701638][T20421] RIP: 0033:0x7fa73863ebe9 [ 333.701729][T20421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 333.701849][T20421] RSP: 002b:00007fa7370a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 333.701870][T20421] RAX: ffffffffffffffda RBX: 00007fa738865fa0 RCX: 00007fa73863ebe9 [ 333.701884][T20421] RDX: 0000000000008000 RSI: 0000200000001b80 RDI: 0000000000000005 [ 333.701896][T20421] RBP: 00007fa7370a7090 R08: 0000000000000000 R09: 0000000000000000 [ 333.701909][T20421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 333.701949][T20421] R13: 00007fa738866038 R14: 00007fa738865fa0 R15: 00007ffe766ece28 [ 333.701967][T20421] [ 333.834232][ T29] kauditd_printk_skb: 313 callbacks suppressed [ 333.834245][ T29] audit: type=1326 audit(1755443638.791:39848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20424 comm="syz.6.6231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa73863ebe9 code=0x7ffc0000 [ 334.024083][ T29] audit: type=1326 audit(1755443638.861:39849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20424 comm="syz.6.6231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa73863ebe9 code=0x7ffc0000 [ 334.024112][ T29] audit: type=1326 audit(1755443638.901:39850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20424 comm="syz.6.6231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa73863ebe9 code=0x7ffc0000 [ 334.024136][ T29] audit: type=1326 audit(1755443638.901:39851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20424 comm="syz.6.6231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa73863ebe9 code=0x7ffc0000 [ 334.024219][ T29] audit: type=1326 audit(1755443638.901:39852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20424 comm="syz.6.6231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=72 compat=0 ip=0x7fa73863ebe9 code=0x7ffc0000 [ 334.024317][ T29] audit: type=1326 audit(1755443638.901:39853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20424 comm="syz.6.6231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa73863ebe9 code=0x7ffc0000 [ 334.024341][ T29] audit: type=1326 audit(1755443638.901:39854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20424 comm="syz.6.6231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa73863ebe9 code=0x7ffc0000 [ 334.338121][ T29] audit: type=1400 audit(1755443639.291:39855): avc: denied { ioctl } for pid=20443 comm="syz.6.6240" path="/126/file0" dev="tmpfs" ino=671 ioctlcmd=0x1273 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 334.400596][T20450] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6242'. [ 334.644940][ T29] audit: type=1326 audit(1755443639.601:39856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20472 comm="syz.6.6251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa73863ebe9 code=0x7ffc0000 [ 334.645097][ T29] audit: type=1326 audit(1755443639.601:39857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20472 comm="syz.6.6251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=7 compat=0 ip=0x7fa73863ebe9 code=0x7ffc0000 [ 335.192250][T20480] loop5: detected capacity change from 0 to 1024 [ 335.199323][T20480] EXT4-fs: test_dummy_encryption option not supported [ 335.224346][T20481] loop2: detected capacity change from 0 to 2048 [ 335.266714][T20481] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 335.303547][T20481] netlink: 12 bytes leftover after parsing attributes in process `syz.2.6254'. [ 335.334243][T19901] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 335.377868][T20507] netlink: 256 bytes leftover after parsing attributes in process `syz.2.6262'. [ 335.516262][T20520] sd 0:0:1:0: device reset [ 335.556401][T20524] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6270'. [ 335.846712][T20539] netlink: 24 bytes leftover after parsing attributes in process `syz.6.6274'. [ 335.855894][T20539] bridge: RTM_NEWNEIGH bridge0 without NUD_PERMANENT [ 335.916738][T20540] loop6: detected capacity change from 0 to 512 [ 335.917985][T20540] EXT4-fs (loop6): encrypted files will use data=ordered instead of data journaling mode [ 336.080717][T20540] EXT4-fs error (device loop6): ext4_free_branches:1023: inode #16: comm syz.6.6274: invalid indirect mapped block 4294967295 (level 0) [ 336.081121][T20540] EXT4-fs error (device loop6): ext4_free_branches:1023: inode #16: comm syz.6.6274: invalid indirect mapped block 4294967295 (level 1) [ 336.183322][T20540] EXT4-fs (loop6): 1 orphan inode deleted [ 336.183341][T20540] EXT4-fs (loop6): 1 truncate cleaned up [ 336.183732][T20540] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 336.250378][T20543] netlink: 8 bytes leftover after parsing attributes in process `syz.5.6275'. [ 336.256449][T18813] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 336.479647][T20568] loop6: detected capacity change from 0 to 512 [ 336.625928][T20588] netlink: 'syz.2.6294': attribute type 10 has an invalid length. [ 336.626186][T20588] bridge0: port 2(bridge_slave_1) entered disabled state [ 336.642007][T20588] bridge0: port 1(bridge_slave_0) entered disabled state [ 336.655668][T20588] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.655719][T20588] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.655994][T20588] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.656038][T20588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 336.658162][T20588] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 336.930568][T20600] loop2: detected capacity change from 0 to 128 [ 337.209428][T20625] loop6: detected capacity change from 0 to 764 [ 337.296002][T20632] Symlink component flag not implemented [ 337.296009][T20632] Symlink component flag not implemented [ 337.296036][T20632] Symlink component flag not implemented (129) [ 337.296045][T20632] Symlink component flag not implemented (6) [ 337.531183][T20644] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6317'. [ 337.559507][T20649] SELinux: Context system_u:object_r:admin_passwd_exec_t:s0 is not valid (left unmapped). [ 338.589578][T20691] program syz.8.6336 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 338.708046][T20709] netlink: 256 bytes leftover after parsing attributes in process `syz.2.6345'. [ 338.800895][T20722] loop2: detected capacity change from 0 to 1024 [ 338.810393][T20722] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 338.836830][T20722] EXT4-fs (loop2): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 338.850602][T20722] EXT4-fs (loop2): re-mounted 00000000-0000-0000-0000-000000000000 r/w. [ 339.117288][T20739] netlink: 20 bytes leftover after parsing attributes in process `syz.0.6354'. [ 339.126434][T20739] netlink: 20 bytes leftover after parsing attributes in process `syz.0.6354'. [ 339.613129][T19901] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 339.659003][ T29] kauditd_printk_skb: 214 callbacks suppressed [ 339.659017][ T29] audit: type=1326 audit(1755443644.621:40072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20758 comm="syz.8.6363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6446dcebe9 code=0x7ffc0000 [ 339.719273][ T29] audit: type=1326 audit(1755443644.621:40073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20758 comm="syz.8.6363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6446dcebe9 code=0x7ffc0000 [ 339.743710][ T29] audit: type=1326 audit(1755443644.651:40074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20758 comm="syz.8.6363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=149 compat=0 ip=0x7f6446dcebe9 code=0x7ffc0000 [ 339.768044][ T29] audit: type=1400 audit(1755443644.661:40075): avc: denied { write } for pid=20756 comm="syz.5.6362" path="socket:[65985]" dev="sockfs" ino=65985 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 339.792496][ T29] audit: type=1326 audit(1755443644.681:40076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20758 comm="syz.8.6363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6446dcebe9 code=0x7ffc0000 [ 339.816920][ T29] audit: type=1326 audit(1755443644.681:40077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20758 comm="syz.8.6363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6446dcebe9 code=0x7ffc0000 [ 339.841796][ T29] audit: type=1326 audit(1755443644.761:40078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20758 comm="syz.8.6363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6446dcebe9 code=0x7ffc0000 [ 339.866047][ T29] audit: type=1326 audit(1755443644.761:40079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20758 comm="syz.8.6363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6446dcebe9 code=0x7ffc0000 [ 339.890313][ T29] audit: type=1326 audit(1755443644.761:40080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20758 comm="syz.8.6363" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6446dcebe9 code=0x7ffc0000 [ 339.966592][ T29] audit: type=1326 audit(1755443644.921:40081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20769 comm="syz.6.6366" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa73863ebe9 code=0x7ffc0000 [ 340.090620][T20779] __nla_validate_parse: 3 callbacks suppressed [ 340.090635][T20779] netlink: 256 bytes leftover after parsing attributes in process `syz.6.6370'. [ 340.886232][T20826] netlink: 12 bytes leftover after parsing attributes in process `syz.6.6388'. [ 340.895900][T20826] netlink: 28 bytes leftover after parsing attributes in process `syz.6.6388'. [ 340.904966][T20826] netlink: 12 bytes leftover after parsing attributes in process `syz.6.6388'. [ 340.916252][T20826] netlink: 28 bytes leftover after parsing attributes in process `syz.6.6388'. [ 340.925700][T20826] netlink: 'syz.6.6388': attribute type 6 has an invalid length. [ 341.277938][T20853] netlink: 'syz.0.6396': attribute type 7 has an invalid length. [ 341.286160][T20853] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6396'. [ 341.747877][T20860] netlink: 256 bytes leftover after parsing attributes in process `syz.2.6399'. [ 341.823955][T20868] netlink: 40 bytes leftover after parsing attributes in process `syz.2.6401'. [ 342.862889][T20971] random: crng reseeded on system resumption [ 343.085755][T20993] FAULT_INJECTION: forcing a failure. [ 343.085755][T20993] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 343.099880][T20993] CPU: 0 UID: 0 PID: 20993 Comm: syz.8.6423 Tainted: G W 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(voluntary) [ 343.099947][T20993] Tainted: [W]=WARN [ 343.099954][T20993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 343.099967][T20993] Call Trace: [ 343.099974][T20993] [ 343.100056][T20993] __dump_stack+0x1d/0x30 [ 343.100078][T20993] dump_stack_lvl+0xe8/0x140 [ 343.100097][T20993] dump_stack+0x15/0x1b [ 343.100114][T20993] should_fail_ex+0x265/0x280 [ 343.100167][T20993] should_fail+0xb/0x20 [ 343.100253][T20993] should_fail_usercopy+0x1a/0x20 [ 343.100275][T20993] _copy_from_user+0x1c/0xb0 [ 343.100301][T20993] do_sock_getsockopt+0xf1/0x240 [ 343.100324][T20993] __x64_sys_getsockopt+0x11e/0x1a0 [ 343.100392][T20993] x64_sys_call+0x2bc6/0x2ff0 [ 343.100485][T20993] do_syscall_64+0xd2/0x200 [ 343.100572][T20993] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 343.100615][T20993] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 343.100741][T20993] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 343.100817][T20993] RIP: 0033:0x7f6446dcebe9 [ 343.100832][T20993] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 343.100881][T20993] RSP: 002b:00007f6445837038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 343.100900][T20993] RAX: ffffffffffffffda RBX: 00007f6446ff5fa0 RCX: 00007f6446dcebe9 [ 343.100911][T20993] RDX: 0000000000000053 RSI: 0000000000000000 RDI: 0000000000000005 [ 343.100922][T20993] RBP: 00007f6445837090 R08: 0000200000000040 R09: 0000000000000000 [ 343.100988][T20993] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 343.101002][T20993] R13: 00007f6446ff6038 R14: 00007f6446ff5fa0 R15: 00007ffe248a4ce8 [ 343.101023][T20993] [ 343.355941][T21009] netlink: 'syz.0.6426': attribute type 39 has an invalid length. [ 344.946988][T21143] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6448'. [ 345.237812][ T29] kauditd_printk_skb: 51 callbacks suppressed [ 345.237825][ T29] audit: type=1326 audit(1755443650.191:40133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21177 comm="syz.6.6455" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa73863ebe9 code=0x7ffc0000 [ 345.282265][ T29] audit: type=1326 audit(1755443650.191:40134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21177 comm="syz.6.6455" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa73863ebe9 code=0x7ffc0000 [ 345.309229][ T29] audit: type=1326 audit(1755443650.191:40135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21177 comm="syz.6.6455" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa73863ebe9 code=0x7ffc0000 [ 345.335049][ T29] audit: type=1326 audit(1755443650.191:40136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21177 comm="syz.6.6455" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa73863ebe9 code=0x7ffc0000 [ 345.340320][T21187] netlink: 256 bytes leftover after parsing attributes in process `syz.6.6457'. [ 345.360064][ T29] audit: type=1326 audit(1755443650.191:40137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21177 comm="syz.6.6455" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa73863ebe9 code=0x7ffc0000 [ 345.394003][ T29] audit: type=1326 audit(1755443650.191:40138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21177 comm="syz.6.6455" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa73863ebe9 code=0x7ffc0000 [ 345.418858][ T29] audit: type=1326 audit(1755443650.191:40139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21177 comm="syz.6.6455" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa73863ebe9 code=0x7ffc0000 [ 345.444605][ T29] audit: type=1326 audit(1755443650.191:40140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21177 comm="syz.6.6455" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa73863ebe9 code=0x7ffc0000 [ 345.469074][ T29] audit: type=1326 audit(1755443650.191:40141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21177 comm="syz.6.6455" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa73863ebe9 code=0x7ffc0000 [ 345.494427][ T29] audit: type=1326 audit(1755443650.191:40142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21177 comm="syz.6.6455" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa73863ebe9 code=0x7ffc0000 [ 345.779715][T21217] netlink: 'syz.6.6465': attribute type 3 has an invalid length. [ 345.779734][T21217] netlink: 3 bytes leftover after parsing attributes in process `syz.6.6465'. [ 345.816589][T21217] loop6: detected capacity change from 0 to 512 [ 345.842548][T21217] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 345.860632][T21217] ext4 filesystem being mounted at /184/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 345.861638][T21217] EXT4-fs error (device loop6): ext4_do_update_inode:5653: inode #4: comm syz.6.6465: corrupted inode contents [ 345.861738][T21217] EXT4-fs error (device loop6): ext4_dirty_inode:6538: inode #4: comm syz.6.6465: mark_inode_dirty error [ 345.862011][T21217] EXT4-fs error (device loop6): ext4_do_update_inode:5653: inode #4: comm syz.6.6465: corrupted inode contents [ 345.862070][T21217] EXT4-fs error (device loop6): __ext4_ext_dirty:206: inode #4: comm syz.6.6465: mark_inode_dirty error [ 345.862192][T21217] EXT4-fs error (device loop6): ext4_acquire_dquot:6933: comm syz.6.6465: Failed to acquire dquot type 1 [ 345.894746][T18813] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 346.216525][T21233] loop8: detected capacity change from 0 to 736 [ 346.251848][T21233] rock: directory entry would overflow storage [ 346.258967][T21233] rock: sig=0x3b10, size=4, remaining=3 [ 346.599779][T21286] lo speed is unknown, defaulting to 1000 [ 347.389929][T21341] serio: Serial port ttyS3 [ 347.737710][T21343] loop6: detected capacity change from 0 to 736 [ 347.773037][T21353] netlink: 'syz.0.6490': attribute type 4 has an invalid length. [ 347.780943][T21353] netlink: 17 bytes leftover after parsing attributes in process `syz.0.6490'. [ 347.890956][T21343] rock: directory entry would overflow storage [ 347.897437][T21343] rock: sig=0x3b10, size=4, remaining=3 [ 349.100880][T21453] vlan2: entered allmulticast mode [ 349.816920][T21464] loop5: detected capacity change from 0 to 736 [ 349.920042][T21493] netlink: 'syz.6.6511': attribute type 4 has an invalid length. [ 349.927947][T21493] netlink: 17 bytes leftover after parsing attributes in process `syz.6.6511'. [ 350.100150][T21464] rock: directory entry would overflow storage [ 350.106950][T21464] rock: sig=0x3b10, size=4, remaining=3 [ 350.241010][ T29] kauditd_printk_skb: 250 callbacks suppressed [ 350.241026][ T29] audit: type=1326 audit(1755443655.201:40391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21463 comm="syz.5.6504" exe="/root/syz-executor" sig=0 arch=c000003e syscall=111 compat=0 ip=0x7f46609aebe9 code=0x7ffc0000 [ 350.444354][T21505] netlink: 20 bytes leftover after parsing attributes in process `syz.8.6515'. [ 350.510908][ T29] audit: type=1326 audit(1755443655.241:40392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21463 comm="syz.5.6504" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f46609aebe9 code=0x7ffc0000 [ 350.535105][ T29] audit: type=1326 audit(1755443655.241:40393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21463 comm="syz.5.6504" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f46609aebe9 code=0x7ffc0000 [ 350.559339][ T29] audit: type=1326 audit(1755443655.251:40394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21463 comm="syz.5.6504" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f46609aebe9 code=0x7ffc0000 [ 350.584250][ T29] audit: type=1326 audit(1755443655.251:40395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21463 comm="syz.5.6504" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f46609aebe9 code=0x7ffc0000 [ 350.608871][ T29] audit: type=1326 audit(1755443655.251:40396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21463 comm="syz.5.6504" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f46609aebe9 code=0x7ffc0000 [ 350.634191][ T29] audit: type=1326 audit(1755443655.251:40397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21463 comm="syz.5.6504" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f46609aec23 code=0x7ffc0000 [ 350.660585][ T29] audit: type=1400 audit(1755443655.271:40398): avc: denied { ioctl } for pid=21499 comm="syz.8.6515" path="socket:[67755]" dev="sockfs" ino=67755 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 350.688608][ T29] audit: type=1400 audit(1755443655.341:40399): avc: denied { sys_module } for pid=21499 comm="syz.8.6515" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 350.711942][ T29] audit: type=1326 audit(1755443655.431:40400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21463 comm="syz.5.6504" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f46609ad69f code=0x7ffc0000 [ 350.958565][T21505] netlink: 16 bytes leftover after parsing attributes in process `syz.8.6515'. [ 351.194405][T21522] netlink: 256 bytes leftover after parsing attributes in process `syz.5.6521'. [ 351.412114][T21512] loop2: detected capacity change from 0 to 736 [ 351.566807][T21512] rock: directory entry would overflow storage [ 351.573664][T21512] rock: sig=0x3b10, size=4, remaining=3 [ 352.237915][T21570] netlink: 256 bytes leftover after parsing attributes in process `syz.0.6534'. [ 352.595550][T21625] FAULT_INJECTION: forcing a failure. [ 352.595550][T21625] name failslab, interval 1, probability 0, space 0, times 0 [ 352.609139][T21625] CPU: 1 UID: 0 PID: 21625 Comm: syz.5.6555 Tainted: G W 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(voluntary) [ 352.609230][T21625] Tainted: [W]=WARN [ 352.609237][T21625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 352.609249][T21625] Call Trace: [ 352.609257][T21625] [ 352.609266][T21625] __dump_stack+0x1d/0x30 [ 352.609287][T21625] dump_stack_lvl+0xe8/0x140 [ 352.609307][T21625] dump_stack+0x15/0x1b [ 352.609369][T21625] should_fail_ex+0x265/0x280 [ 352.609387][T21625] should_failslab+0x8c/0xb0 [ 352.609417][T21625] kmem_cache_alloc_node_noprof+0x57/0x320 [ 352.609445][T21625] ? __alloc_skb+0x101/0x320 [ 352.609478][T21625] ? __rcu_read_unlock+0x4f/0x70 [ 352.609497][T21625] __alloc_skb+0x101/0x320 [ 352.609522][T21625] netlink_dump+0x10d/0x8a0 [ 352.609538][T21625] ? __kfree_skb+0x109/0x150 [ 352.609567][T21625] ? nlmon_xmit+0x4f/0x60 [ 352.609591][T21625] ? consume_skb+0x49/0x150 [ 352.609618][T21625] __netlink_dump_start+0x43e/0x520 [ 352.609639][T21625] ? __pfx_tc_dump_chain+0x10/0x10 [ 352.609675][T21625] rtnetlink_rcv_msg+0x552/0x6d0 [ 352.609696][T21625] ? __pfx_tc_dump_chain+0x10/0x10 [ 352.609737][T21625] ? __pfx_rtnl_dumpit+0x10/0x10 [ 352.609756][T21625] ? __pfx_tc_dump_chain+0x10/0x10 [ 352.609779][T21625] netlink_rcv_skb+0x123/0x220 [ 352.609841][T21625] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 352.609868][T21625] rtnetlink_rcv+0x1c/0x30 [ 352.609890][T21625] netlink_unicast+0x5bd/0x690 [ 352.609924][T21625] netlink_sendmsg+0x58b/0x6b0 [ 352.609995][T21625] ? __pfx_netlink_sendmsg+0x10/0x10 [ 352.610092][T21625] __sock_sendmsg+0x142/0x180 [ 352.610118][T21625] ____sys_sendmsg+0x31e/0x4e0 [ 352.610189][T21625] ___sys_sendmsg+0x17b/0x1d0 [ 352.610221][T21625] __x64_sys_sendmsg+0xd4/0x160 [ 352.610246][T21625] x64_sys_call+0x191e/0x2ff0 [ 352.610342][T21625] do_syscall_64+0xd2/0x200 [ 352.610366][T21625] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 352.610386][T21625] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 352.610406][T21625] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 352.610433][T21625] RIP: 0033:0x7f46609aebe9 [ 352.610476][T21625] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 352.610494][T21625] RSP: 002b:00007f465f40f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 352.610515][T21625] RAX: ffffffffffffffda RBX: 00007f4660bd5fa0 RCX: 00007f46609aebe9 [ 352.610528][T21625] RDX: 0000000000004000 RSI: 0000200000000300 RDI: 0000000000000003 [ 352.610539][T21625] RBP: 00007f465f40f090 R08: 0000000000000000 R09: 0000000000000000 [ 352.610567][T21625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 352.610579][T21625] R13: 00007f4660bd6038 R14: 00007f4660bd5fa0 R15: 00007ffe70d60f28 [ 352.610605][T21625] [ 353.666281][T21697] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6581'. [ 353.676124][T21697] netlink: 12 bytes leftover after parsing attributes in process `syz.6.6581'. [ 353.754079][T21702] netlink: 'syz.2.6582': attribute type 4 has an invalid length. [ 353.762312][T21702] netlink: 17 bytes leftover after parsing attributes in process `syz.2.6582'. [ 353.823436][T21710] tap0: tun_chr_ioctl cmd 1074025681 [ 354.518994][T21753] netlink: 96 bytes leftover after parsing attributes in process `syz.5.6605'. [ 355.203140][T21807] FAULT_INJECTION: forcing a failure. [ 355.203140][T21807] name failslab, interval 1, probability 0, space 0, times 0 [ 355.216671][T21807] CPU: 1 UID: 0 PID: 21807 Comm: syz.8.6628 Tainted: G W 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(voluntary) [ 355.216708][T21807] Tainted: [W]=WARN [ 355.216713][T21807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 355.216726][T21807] Call Trace: [ 355.216734][T21807] [ 355.216805][T21807] __dump_stack+0x1d/0x30 [ 355.216827][T21807] dump_stack_lvl+0xe8/0x140 [ 355.216845][T21807] dump_stack+0x15/0x1b [ 355.216859][T21807] should_fail_ex+0x265/0x280 [ 355.216876][T21807] should_failslab+0x8c/0xb0 [ 355.216900][T21807] kmem_cache_alloc_noprof+0x50/0x310 [ 355.216951][T21807] ? audit_log_start+0x365/0x6c0 [ 355.216981][T21807] audit_log_start+0x365/0x6c0 [ 355.217012][T21807] audit_seccomp+0x48/0x100 [ 355.217111][T21807] ? __seccomp_filter+0x68c/0x10d0 [ 355.217147][T21807] __seccomp_filter+0x69d/0x10d0 [ 355.217239][T21807] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 355.217261][T21807] ? vfs_write+0x7e8/0x960 [ 355.217279][T21807] ? __rcu_read_unlock+0x4f/0x70 [ 355.217371][T21807] ? __fget_files+0x184/0x1c0 [ 355.217458][T21807] __secure_computing+0x82/0x150 [ 355.217470][T21807] syscall_trace_enter+0xcf/0x1e0 [ 355.217484][T21807] do_syscall_64+0xac/0x200 [ 355.217565][T21807] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 355.217579][T21807] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 355.217597][T21807] RIP: 0033:0x7f6446dcebe9 [ 355.217612][T21807] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 355.217629][T21807] RSP: 002b:00007f6445837038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 355.217677][T21807] RAX: ffffffffffffffda RBX: 00007f6446ff5fa0 RCX: 00007f6446dcebe9 [ 355.217685][T21807] RDX: 000000000200c000 RSI: 0000200000000240 RDI: ffffffffffffffff [ 355.217692][T21807] RBP: 00007f6445837090 R08: 0000000000000000 R09: 0000000000000000 [ 355.217700][T21807] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 355.217707][T21807] R13: 00007f6446ff6038 R14: 00007f6446ff5fa0 R15: 00007ffe248a4ce8 [ 355.217745][T21807] [ 355.432411][ T29] kauditd_printk_skb: 1515 callbacks suppressed [ 355.432422][ T29] audit: type=1326 audit(1755443660.171:41914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21806 comm="syz.8.6628" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6446dcebe9 code=0x7ffc0000 [ 355.462953][ T29] audit: type=1326 audit(1755443660.391:41915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21806 comm="syz.8.6628" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6446dcebe9 code=0x7ffc0000 [ 355.487219][ T29] audit: type=1326 audit(1755443660.391:41916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21806 comm="syz.8.6628" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6446dcebe9 code=0x7ffc0000 [ 355.526878][ T29] audit: type=1400 audit(1755443660.431:41917): avc: denied { read write } for pid=18813 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 355.553103][ T29] audit: type=1400 audit(1755443660.481:41918): avc: denied { prog_load } for pid=21810 comm="syz.0.6629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 355.573544][ T29] audit: type=1400 audit(1755443660.481:41919): avc: denied { read } for pid=21810 comm="syz.0.6629" name="ppp" dev="devtmpfs" ino=139 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=0 [ 355.598907][ T29] audit: type=1400 audit(1755443660.481:41920): avc: denied { create } for pid=21810 comm="syz.0.6629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 355.619938][ T29] audit: type=1400 audit(1755443660.481:41921): avc: denied { read write } for pid=17872 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 355.645316][ T29] audit: type=1400 audit(1755443660.481:41922): avc: denied { map_create } for pid=21809 comm="syz.6.6630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 355.665402][ T29] audit: type=1400 audit(1755443660.481:41923): avc: denied { prog_load } for pid=21809 comm="syz.6.6630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 355.870563][T21841] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6641'. [ 356.646490][T21879] netlink: 8 bytes leftover after parsing attributes in process `syz.5.6655'. [ 357.676976][T21919] !: renamed from dummy0 (while UP) [ 358.674823][T21969] can0: slcan on ptm0. [ 358.708552][T21968] can0 (unregistered): slcan off ptm0. [ 359.066729][T21990] netlink: 'syz.0.6698': attribute type 13 has an invalid length. [ 359.066786][T21990] netlink: 'syz.0.6698': attribute type 17 has an invalid length. [ 359.258699][T21990] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 359.258759][ T6523] lo speed is unknown, defaulting to 1000 [ 359.810188][T22031] FAULT_INJECTION: forcing a failure. [ 359.810188][T22031] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 359.810220][T22031] CPU: 0 UID: 0 PID: 22031 Comm: syz.0.6715 Tainted: G W 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(voluntary) [ 359.810252][T22031] Tainted: [W]=WARN [ 359.810263][T22031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 359.810275][T22031] Call Trace: [ 359.810281][T22031] [ 359.810287][T22031] __dump_stack+0x1d/0x30 [ 359.810309][T22031] dump_stack_lvl+0xe8/0x140 [ 359.810327][T22031] dump_stack+0x15/0x1b [ 359.810343][T22031] should_fail_ex+0x265/0x280 [ 359.810363][T22031] should_fail+0xb/0x20 [ 359.810378][T22031] should_fail_usercopy+0x1a/0x20 [ 359.810479][T22031] _copy_from_user+0x1c/0xb0 [ 359.810532][T22031] ___sys_sendmsg+0xc1/0x1d0 [ 359.810561][T22031] __sys_sendmmsg+0x178/0x300 [ 359.810658][T22031] __x64_sys_sendmmsg+0x57/0x70 [ 359.810676][T22031] x64_sys_call+0x1c4a/0x2ff0 [ 359.810799][T22031] do_syscall_64+0xd2/0x200 [ 359.810894][T22031] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 359.810919][T22031] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 359.810961][T22031] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 359.811014][T22031] RIP: 0033:0x7f9a0e4febe9 [ 359.811030][T22031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 359.811046][T22031] RSP: 002b:00007f9a0cf67038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 359.811065][T22031] RAX: ffffffffffffffda RBX: 00007f9a0e725fa0 RCX: 00007f9a0e4febe9 [ 359.811077][T22031] RDX: 000000000800001d RSI: 0000200000007fc0 RDI: 0000000000000004 [ 359.811088][T22031] RBP: 00007f9a0cf67090 R08: 0000000000000000 R09: 0000000000000000 [ 359.811163][T22031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 359.811176][T22031] R13: 00007f9a0e726038 R14: 00007f9a0e725fa0 R15: 00007ffd1bdedbd8 [ 359.811194][T22031] [ 359.840615][T22033] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 359.947154][T22043] netlink: 'syz.5.6720': attribute type 4 has an invalid length. [ 359.995328][T22045] FAULT_INJECTION: forcing a failure. [ 359.995328][T22045] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 360.000326][T22043] netlink: 17 bytes leftover after parsing attributes in process `syz.5.6720'. [ 360.008459][T22045] CPU: 1 UID: 0 PID: 22045 Comm: syz.2.6721 Tainted: G W 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(voluntary) [ 360.008506][T22045] Tainted: [W]=WARN [ 360.008513][T22045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 360.008535][T22045] Call Trace: [ 360.008543][T22045] [ 360.008551][T22045] __dump_stack+0x1d/0x30 [ 360.008572][T22045] dump_stack_lvl+0xe8/0x140 [ 360.008601][T22045] dump_stack+0x15/0x1b [ 360.008617][T22045] should_fail_ex+0x265/0x280 [ 360.008662][T22045] should_fail+0xb/0x20 [ 360.008679][T22045] should_fail_usercopy+0x1a/0x20 [ 360.008700][T22045] _copy_from_user+0x1c/0xb0 [ 360.008726][T22045] __sys_bpf+0x178/0x7b0 [ 360.008778][T22045] __x64_sys_bpf+0x41/0x50 [ 360.008801][T22045] x64_sys_call+0x2aea/0x2ff0 [ 360.008822][T22045] do_syscall_64+0xd2/0x200 [ 360.008847][T22045] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 360.008874][T22045] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 360.008897][T22045] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 360.008918][T22045] RIP: 0033:0x7f8b8940ebe9 [ 360.008934][T22045] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 360.009017][T22045] RSP: 002b:00007f8b87e77038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 360.009036][T22045] RAX: ffffffffffffffda RBX: 00007f8b89635fa0 RCX: 00007f8b8940ebe9 [ 360.009049][T22045] RDX: 0000000000000038 RSI: 0000200000000480 RDI: 0000000000000018 [ 360.009062][T22045] RBP: 00007f8b87e77090 R08: 0000000000000000 R09: 0000000000000000 [ 360.009074][T22045] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 360.009087][T22045] R13: 00007f8b89636038 R14: 00007f8b89635fa0 R15: 00007ffe22fd1aa8 [ 360.009104][T22045] [ 360.081143][T22051] netlink: 2 bytes leftover after parsing attributes in process `syz.5.6720'. [ 360.448093][ T29] kauditd_printk_skb: 1095 callbacks suppressed [ 360.448106][ T29] audit: type=1400 audit(1755443665.401:43017): avc: denied { read write } for pid=18813 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 360.485579][ T29] audit: type=1400 audit(1755443665.451:43018): avc: denied { map_create } for pid=22064 comm="syz.6.6726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 360.506392][ T29] audit: type=1400 audit(1755443665.471:43019): avc: denied { prog_load } for pid=22064 comm="syz.6.6726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 360.506961][ T29] audit: type=1400 audit(1755443665.471:43020): avc: denied { write } for pid=22064 comm="syz.6.6726" name="mcfilter6" dev="proc" ino=4026533263 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 360.527976][ T29] audit: type=1400 audit(1755443665.491:43021): avc: denied { map_create } for pid=22064 comm="syz.6.6726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 360.528207][ T29] audit: type=1400 audit(1755443665.491:43022): avc: denied { map_create } for pid=22064 comm="syz.6.6726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 360.551811][ T29] audit: type=1400 audit(1755443665.491:43023): avc: denied { map_create } for pid=22064 comm="syz.6.6726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 360.551835][ T29] audit: type=1400 audit(1755443665.491:43024): avc: denied { prog_load } for pid=22064 comm="syz.6.6726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 360.551855][ T29] audit: type=1400 audit(1755443665.491:43025): avc: denied { prog_load } for pid=22064 comm="syz.6.6726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 360.636972][ T29] audit: type=1400 audit(1755443665.601:43026): avc: denied { read } for pid=22064 comm="syz.6.6726" dev="nsfs" ino=4026532389 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 361.123071][T22107] netlink: 'syz.5.6742': attribute type 4 has an invalid length. [ 361.123088][T22107] netlink: 17 bytes leftover after parsing attributes in process `syz.5.6742'. [ 361.193824][T22110] netlink: 2 bytes leftover after parsing attributes in process `syz.5.6742'. [ 361.377805][T22121] FAULT_INJECTION: forcing a failure. [ 361.377805][T22121] name failslab, interval 1, probability 0, space 0, times 0 [ 361.390899][T22121] CPU: 0 UID: 0 PID: 22121 Comm: syz.2.6748 Tainted: G W 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(voluntary) [ 361.390931][T22121] Tainted: [W]=WARN [ 361.390939][T22121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 361.390952][T22121] Call Trace: [ 361.390959][T22121] [ 361.390968][T22121] __dump_stack+0x1d/0x30 [ 361.391114][T22121] dump_stack_lvl+0xe8/0x140 [ 361.391186][T22121] dump_stack+0x15/0x1b [ 361.391203][T22121] should_fail_ex+0x265/0x280 [ 361.391291][T22121] should_failslab+0x8c/0xb0 [ 361.391381][T22121] kmem_cache_alloc_noprof+0x50/0x310 [ 361.391403][T22121] ? security_file_alloc+0x32/0x100 [ 361.391482][T22121] security_file_alloc+0x32/0x100 [ 361.391512][T22121] init_file+0x5c/0x1d0 [ 361.391551][T22121] alloc_empty_file+0x8b/0x200 [ 361.391660][T22121] path_openat+0x68/0x2170 [ 361.391678][T22121] ? _parse_integer_limit+0x170/0x190 [ 361.391701][T22121] ? _parse_integer+0x27/0x40 [ 361.391721][T22121] ? kstrtoull+0x111/0x140 [ 361.391811][T22121] ? kstrtouint+0x76/0xc0 [ 361.391828][T22121] do_filp_open+0x109/0x230 [ 361.391853][T22121] do_sys_openat2+0xa6/0x110 [ 361.391878][T22121] __x64_sys_creat+0x65/0x90 [ 361.391908][T22121] x64_sys_call+0x2d94/0x2ff0 [ 361.391927][T22121] do_syscall_64+0xd2/0x200 [ 361.391971][T22121] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 361.391992][T22121] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 361.392014][T22121] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 361.392036][T22121] RIP: 0033:0x7f8b8940ebe9 [ 361.392116][T22121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 361.392133][T22121] RSP: 002b:00007f8b87e77038 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 361.392154][T22121] RAX: ffffffffffffffda RBX: 00007f8b89635fa0 RCX: 00007f8b8940ebe9 [ 361.392182][T22121] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00002000000000c0 [ 361.392194][T22121] RBP: 00007f8b87e77090 R08: 0000000000000000 R09: 0000000000000000 [ 361.392205][T22121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 361.392215][T22121] R13: 00007f8b89636038 R14: 00007f8b89635fa0 R15: 00007ffe22fd1aa8 [ 361.392307][T22121] [ 361.677304][T22133] netlink: 168 bytes leftover after parsing attributes in process `syz.6.6753'. [ 361.807067][T22150] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6761'. [ 361.868420][T22155] FAULT_INJECTION: forcing a failure. [ 361.868420][T22155] name failslab, interval 1, probability 0, space 0, times 0 [ 361.881223][T22155] CPU: 0 UID: 0 PID: 22155 Comm: syz.8.6763 Tainted: G W 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(voluntary) [ 361.881310][T22155] Tainted: [W]=WARN [ 361.881314][T22155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 361.881326][T22155] Call Trace: [ 361.881329][T22155] [ 361.881334][T22155] __dump_stack+0x1d/0x30 [ 361.881347][T22155] dump_stack_lvl+0xe8/0x140 [ 361.881407][T22155] dump_stack+0x15/0x1b [ 361.881421][T22155] should_fail_ex+0x265/0x280 [ 361.881460][T22155] should_failslab+0x8c/0xb0 [ 361.881474][T22155] kmem_cache_alloc_noprof+0x50/0x310 [ 361.881489][T22155] ? getname_flags+0x80/0x3b0 [ 361.881506][T22155] getname_flags+0x80/0x3b0 [ 361.881521][T22155] do_sys_openat2+0x60/0x110 [ 361.881539][T22155] __x64_sys_openat+0xf2/0x120 [ 361.881563][T22155] x64_sys_call+0x2e9c/0x2ff0 [ 361.881574][T22155] do_syscall_64+0xd2/0x200 [ 361.881589][T22155] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 361.881618][T22155] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 361.881631][T22155] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 361.881643][T22155] RIP: 0033:0x7f6446dcebe9 [ 361.881653][T22155] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 361.881730][T22155] RSP: 002b:00007f6445837038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 361.881742][T22155] RAX: ffffffffffffffda RBX: 00007f6446ff5fa0 RCX: 00007f6446dcebe9 [ 361.881749][T22155] RDX: 0000000000000000 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 361.881756][T22155] RBP: 00007f6445837090 R08: 0000000000000000 R09: 0000000000000000 [ 361.881766][T22155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 361.881787][T22155] R13: 00007f6446ff6038 R14: 00007f6446ff5fa0 R15: 00007ffe248a4ce8 [ 361.881802][T22155] [ 362.514124][T22179] FAULT_INJECTION: forcing a failure. [ 362.514124][T22179] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 362.527642][T22179] CPU: 0 UID: 0 PID: 22179 Comm: syz.2.6771 Tainted: G W 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(voluntary) [ 362.527674][T22179] Tainted: [W]=WARN [ 362.527680][T22179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 362.527693][T22179] Call Trace: [ 362.527699][T22179] [ 362.527708][T22179] __dump_stack+0x1d/0x30 [ 362.527727][T22179] dump_stack_lvl+0xe8/0x140 [ 362.527748][T22179] dump_stack+0x15/0x1b [ 362.527764][T22179] should_fail_ex+0x265/0x280 [ 362.527785][T22179] should_fail+0xb/0x20 [ 362.527803][T22179] should_fail_usercopy+0x1a/0x20 [ 362.527822][T22179] _copy_from_user+0x1c/0xb0 [ 362.527887][T22179] __sys_bpf+0x178/0x7b0 [ 362.527913][T22179] __x64_sys_bpf+0x41/0x50 [ 362.527935][T22179] x64_sys_call+0x2aea/0x2ff0 [ 362.528018][T22179] do_syscall_64+0xd2/0x200 [ 362.528069][T22179] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 362.528089][T22179] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 362.528161][T22179] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 362.528179][T22179] RIP: 0033:0x7f8b8940ebe9 [ 362.528220][T22179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 362.528238][T22179] RSP: 002b:00007f8b87e77038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 362.528259][T22179] RAX: ffffffffffffffda RBX: 00007f8b89635fa0 RCX: 00007f8b8940ebe9 [ 362.528320][T22179] RDX: 0000000000000020 RSI: 0000200000000640 RDI: 0000000000000015 [ 362.528334][T22179] RBP: 00007f8b87e77090 R08: 0000000000000000 R09: 0000000000000000 [ 362.528348][T22179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 362.528360][T22179] R13: 00007f8b89636038 R14: 00007f8b89635fa0 R15: 00007ffe22fd1aa8 [ 362.528378][T22179] [ 362.738653][T22182] netlink: 14 bytes leftover after parsing attributes in process `syz.6.6772'. [ 362.748084][T22182] hsr_slave_0: left promiscuous mode [ 362.755204][T22182] hsr_slave_1: left promiscuous mode [ 362.805572][T22185] netlink: 24 bytes leftover after parsing attributes in process `syz.2.6774'. [ 362.911139][T22193] netlink: 'syz.6.6776': attribute type 4 has an invalid length. [ 362.919108][T22193] netlink: 17 bytes leftover after parsing attributes in process `syz.6.6776'. [ 362.992020][T22200] netlink: 2 bytes leftover after parsing attributes in process `syz.6.6776'. [ 363.023848][T22204] ipvlan2: entered promiscuous mode [ 363.030529][T22204] bridge0: port 3(ipvlan2) entered blocking state [ 363.037005][T22204] bridge0: port 3(ipvlan2) entered disabled state [ 363.043788][T22204] ipvlan2: entered allmulticast mode [ 363.049127][T22204] bridge0: entered allmulticast mode [ 363.055049][T22204] ipvlan2: left allmulticast mode [ 363.060295][T22204] bridge0: left allmulticast mode [ 363.135182][T22213] netlink: 24 bytes leftover after parsing attributes in process `syz.2.6782'. [ 363.170312][T22215] sch_fq: defrate 4294967295 ignored. [ 364.207883][T22262] vhci_hcd vhci_hcd.0: pdev(8) rhport(0) sockfd(4) [ 364.207905][T22262] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 364.207936][T22262] vhci_hcd vhci_hcd.0: Device attached [ 364.218460][T22263] vhci_hcd: connection closed [ 364.219574][ T9472] vhci_hcd: stop threads [ 364.219584][ T9472] vhci_hcd: release socket [ 364.219592][ T9472] vhci_hcd: disconnect device [ 365.451024][ T29] kauditd_printk_skb: 5146 callbacks suppressed [ 365.451040][ T29] audit: type=1326 audit(1755443670.411:48173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22219 comm="syz.0.6786" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f9a0e4f5ba7 code=0x7ffc0000 [ 365.498158][ T29] audit: type=1326 audit(1755443670.451:48174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22219 comm="syz.0.6786" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f9a0e49add9 code=0x7ffc0000 [ 365.522387][ T29] audit: type=1326 audit(1755443670.451:48175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22219 comm="syz.0.6786" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f9a0e4f5ba7 code=0x7ffc0000 [ 365.546219][ T29] audit: type=1326 audit(1755443670.451:48176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22219 comm="syz.0.6786" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f9a0e49add9 code=0x7ffc0000 [ 365.569903][ T29] audit: type=1326 audit(1755443670.451:48177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22219 comm="syz.0.6786" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f9a0e4f5ba7 code=0x7ffc0000 [ 365.593795][ T29] audit: type=1326 audit(1755443670.451:48178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22219 comm="syz.0.6786" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f9a0e49add9 code=0x7ffc0000 [ 365.618009][ T29] audit: type=1326 audit(1755443670.451:48179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22219 comm="syz.0.6786" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f9a0e4f5ba7 code=0x7ffc0000 [ 365.643083][ T29] audit: type=1326 audit(1755443670.451:48180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22219 comm="syz.0.6786" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f9a0e49add9 code=0x7ffc0000 [ 365.666874][ T29] audit: type=1326 audit(1755443670.451:48181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22219 comm="syz.0.6786" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f9a0e4f5ba7 code=0x7ffc0000 [ 365.690685][ T29] audit: type=1326 audit(1755443670.451:48182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22219 comm="syz.0.6786" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f9a0e49add9 code=0x7ffc0000 [ 367.257123][T22377] FAULT_INJECTION: forcing a failure. [ 367.257123][T22377] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 367.270571][T22377] CPU: 0 UID: 0 PID: 22377 Comm: syz.0.6848 Tainted: G W 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(voluntary) [ 367.270607][T22377] Tainted: [W]=WARN [ 367.270614][T22377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 367.270627][T22377] Call Trace: [ 367.270634][T22377] [ 367.270642][T22377] __dump_stack+0x1d/0x30 [ 367.270665][T22377] dump_stack_lvl+0xe8/0x140 [ 367.270738][T22377] dump_stack+0x15/0x1b [ 367.270755][T22377] should_fail_ex+0x265/0x280 [ 367.270777][T22377] should_fail+0xb/0x20 [ 367.270795][T22377] should_fail_usercopy+0x1a/0x20 [ 367.270830][T22377] _copy_to_user+0x20/0xa0 [ 367.270859][T22377] simple_read_from_buffer+0xb5/0x130 [ 367.270939][T22377] proc_fail_nth_read+0x10e/0x150 [ 367.270966][T22377] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 367.270999][T22377] vfs_read+0x1a5/0x770 [ 367.271044][T22377] ? __rcu_read_unlock+0x4f/0x70 [ 367.271067][T22377] ? __fget_files+0x184/0x1c0 [ 367.271094][T22377] ksys_read+0xda/0x1a0 [ 367.271116][T22377] __x64_sys_read+0x40/0x50 [ 367.271176][T22377] x64_sys_call+0x27bc/0x2ff0 [ 367.271199][T22377] do_syscall_64+0xd2/0x200 [ 367.271262][T22377] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 367.271286][T22377] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 367.271311][T22377] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 367.271334][T22377] RIP: 0033:0x7f9a0e4fd5fc [ 367.271350][T22377] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 367.271386][T22377] RSP: 002b:00007f9a0cf67030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 367.271407][T22377] RAX: ffffffffffffffda RBX: 00007f9a0e725fa0 RCX: 00007f9a0e4fd5fc [ 367.271420][T22377] RDX: 000000000000000f RSI: 00007f9a0cf670a0 RDI: 0000000000000003 [ 367.271434][T22377] RBP: 00007f9a0cf67090 R08: 0000000000000000 R09: 0000000000000000 [ 367.271447][T22377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 367.271461][T22377] R13: 00007f9a0e726038 R14: 00007f9a0e725fa0 R15: 00007ffd1bdedbd8 [ 367.271480][T22377] [ 368.844871][T22463] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6880'. [ 369.168511][T22474] FAULT_INJECTION: forcing a failure. [ 369.168511][T22474] name failslab, interval 1, probability 0, space 0, times 0 [ 369.181413][T22474] CPU: 1 UID: 0 PID: 22474 Comm: syz.6.6885 Tainted: G W 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(voluntary) [ 369.181447][T22474] Tainted: [W]=WARN [ 369.181454][T22474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 369.181466][T22474] Call Trace: [ 369.181474][T22474] [ 369.181531][T22474] __dump_stack+0x1d/0x30 [ 369.181553][T22474] dump_stack_lvl+0xe8/0x140 [ 369.181637][T22474] dump_stack+0x15/0x1b [ 369.181771][T22474] should_fail_ex+0x265/0x280 [ 369.181852][T22474] should_failslab+0x8c/0xb0 [ 369.181873][T22474] kmem_cache_alloc_noprof+0x50/0x310 [ 369.181898][T22474] ? audit_log_start+0x365/0x6c0 [ 369.181928][T22474] audit_log_start+0x365/0x6c0 [ 369.182007][T22474] audit_seccomp+0x48/0x100 [ 369.182031][T22474] ? __seccomp_filter+0x68c/0x10d0 [ 369.182104][T22474] __seccomp_filter+0x69d/0x10d0 [ 369.182127][T22474] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 369.182152][T22474] ? vfs_write+0x7e8/0x960 [ 369.182170][T22474] ? __rcu_read_unlock+0x4f/0x70 [ 369.182264][T22474] ? __fget_files+0x184/0x1c0 [ 369.182292][T22474] __secure_computing+0x82/0x150 [ 369.182312][T22474] syscall_trace_enter+0xcf/0x1e0 [ 369.182335][T22474] do_syscall_64+0xac/0x200 [ 369.182383][T22474] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 369.182407][T22474] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 369.182430][T22474] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 369.182538][T22474] RIP: 0033:0x7fa73863ebe9 [ 369.182553][T22474] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 369.182636][T22474] RSP: 002b:00007fa7370a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000025 [ 369.182655][T22474] RAX: ffffffffffffffda RBX: 00007fa738865fa0 RCX: 00007fa73863ebe9 [ 369.182667][T22474] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 369.182680][T22474] RBP: 00007fa7370a7090 R08: 0000000000000000 R09: 0000000000000000 [ 369.182691][T22474] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 369.182727][T22474] R13: 00007fa738866038 R14: 00007fa738865fa0 R15: 00007ffe766ece28 [ 369.182742][T22474] [ 369.507628][T22479] vhci_hcd vhci_hcd.0: pdev(8) rhport(0) sockfd(5) [ 369.518248][T22479] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 369.525948][T22479] vhci_hcd vhci_hcd.0: Device attached [ 369.728422][ T6525] vhci_hcd: vhci_device speed not set [ 369.799904][ T6525] usb 17-1: new low-speed USB device number 2 using vhci_hcd [ 369.869339][T22480] vhci_hcd: connection reset by peer [ 369.874945][ T9472] vhci_hcd: stop threads [ 369.879378][ T9472] vhci_hcd: release socket [ 369.879393][ T9472] vhci_hcd: disconnect device [ 370.461338][ T29] kauditd_printk_skb: 2145 callbacks suppressed [ 370.461351][ T29] audit: type=1400 audit(1755443675.421:50326): avc: denied { prog_load } for pid=22516 comm="syz.6.6901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 370.468362][ T29] audit: type=1400 audit(1755443675.421:50327): avc: denied { prog_load } for pid=22516 comm="syz.6.6901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 370.508259][ T29] audit: type=1400 audit(1755443675.471:50328): avc: denied { map_create } for pid=22516 comm="syz.6.6901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 370.508289][ T29] audit: type=1400 audit(1755443675.471:50329): avc: denied { prog_load } for pid=22516 comm="syz.6.6901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 370.528106][ T29] audit: type=1400 audit(1755443675.471:50330): avc: denied { prog_load } for pid=22516 comm="syz.6.6901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 370.567579][ T29] audit: type=1400 audit(1755443675.511:50331): avc: denied { allowed } for pid=22516 comm="syz.6.6901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 370.568424][ T29] audit: type=1400 audit(1755443675.531:50332): avc: denied { prog_load } for pid=22516 comm="syz.6.6901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 370.633470][T22519] sch_fq: defrate 4294967295 ignored. [ 370.663098][ T29] audit: type=1400 audit(1755443675.551:50333): avc: denied { prog_load } for pid=22516 comm="syz.6.6901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 370.682668][ T29] audit: type=1400 audit(1755443675.551:50334): avc: denied { prog_load } for pid=22516 comm="syz.6.6901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 370.702254][ T29] audit: type=1400 audit(1755443675.581:50335): avc: denied { read write } for pid=18573 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 370.705220][T22530] FAULT_INJECTION: forcing a failure. [ 370.705220][T22530] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 370.740859][T22530] CPU: 1 UID: 0 PID: 22530 Comm: syz.5.6907 Tainted: G W 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(voluntary) [ 370.741001][T22530] Tainted: [W]=WARN [ 370.741007][T22530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 370.741083][T22530] Call Trace: [ 370.741091][T22530] [ 370.741099][T22530] __dump_stack+0x1d/0x30 [ 370.741190][T22530] dump_stack_lvl+0xe8/0x140 [ 370.741207][T22530] dump_stack+0x15/0x1b [ 370.741224][T22530] should_fail_ex+0x265/0x280 [ 370.741246][T22530] should_fail+0xb/0x20 [ 370.741263][T22530] should_fail_usercopy+0x1a/0x20 [ 370.741359][T22530] _copy_to_user+0x20/0xa0 [ 370.741386][T22530] simple_read_from_buffer+0xb5/0x130 [ 370.741518][T22530] proc_fail_nth_read+0x10e/0x150 [ 370.741545][T22530] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 370.741607][T22530] vfs_read+0x1a5/0x770 [ 370.741643][T22530] ? __rcu_read_unlock+0x4f/0x70 [ 370.741720][T22530] ? __fget_files+0x184/0x1c0 [ 370.741746][T22530] ksys_read+0xda/0x1a0 [ 370.741767][T22530] __x64_sys_read+0x40/0x50 [ 370.741818][T22530] x64_sys_call+0x27bc/0x2ff0 [ 370.741836][T22530] do_syscall_64+0xd2/0x200 [ 370.741866][T22530] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 370.741889][T22530] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 370.741910][T22530] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 370.741931][T22530] RIP: 0033:0x7f46609ad5fc [ 370.741946][T22530] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 370.742038][T22530] RSP: 002b:00007f465f40f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 370.742059][T22530] RAX: ffffffffffffffda RBX: 00007f4660bd5fa0 RCX: 00007f46609ad5fc [ 370.742073][T22530] RDX: 000000000000000f RSI: 00007f465f40f0a0 RDI: 0000000000000003 [ 370.742101][T22530] RBP: 00007f465f40f090 R08: 0000000000000000 R09: 0000000000000000 [ 370.742111][T22530] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 370.742123][T22530] R13: 00007f4660bd6038 R14: 00007f4660bd5fa0 R15: 00007ffe70d60f28 [ 370.742141][T22530] [ 370.990423][T22538] sch_fq: defrate 4294967295 ignored. [ 371.012611][T22540] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6911'. [ 371.103136][T22550] netlink: 32 bytes leftover after parsing attributes in process `syz.2.6915'. [ 371.472323][T22562] sch_fq: defrate 4294967295 ignored. [ 371.516010][T22566] sch_fq: defrate 4294967295 ignored. [ 371.556115][T22570] sch_fq: defrate 4294967295 ignored. [ 371.564247][T22568] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6922'. [ 372.077595][T22609] sch_fq: defrate 4294967295 ignored. [ 372.384570][T22637] netlink: 32 bytes leftover after parsing attributes in process `syz.5.6949'. [ 372.445207][T22646] sch_fq: defrate 4294967295 ignored. [ 373.007195][T22695] sch_fq: defrate 4294967295 ignored. [ 373.130308][T22714] sch_fq: defrate 4294967295 ignored. [ 373.288758][T22738] sch_fq: defrate 4294967295 ignored. [ 373.462457][T22781] FAULT_INJECTION: forcing a failure. [ 373.462457][T22781] name failslab, interval 1, probability 0, space 0, times 0 [ 373.475349][T22781] CPU: 1 UID: 0 PID: 22781 Comm: syz.2.7008 Tainted: G W 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(voluntary) [ 373.475440][T22781] Tainted: [W]=WARN [ 373.475447][T22781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 373.475476][T22781] Call Trace: [ 373.475482][T22781] [ 373.475491][T22781] __dump_stack+0x1d/0x30 [ 373.475551][T22781] dump_stack_lvl+0xe8/0x140 [ 373.475570][T22781] dump_stack+0x15/0x1b [ 373.475587][T22781] should_fail_ex+0x265/0x280 [ 373.475648][T22781] should_failslab+0x8c/0xb0 [ 373.475662][T22781] kmem_cache_alloc_noprof+0x50/0x310 [ 373.475678][T22781] ? audit_log_start+0x365/0x6c0 [ 373.475695][T22781] audit_log_start+0x365/0x6c0 [ 373.475779][T22781] audit_seccomp+0x48/0x100 [ 373.475817][T22781] ? __seccomp_filter+0x68c/0x10d0 [ 373.475829][T22781] __seccomp_filter+0x69d/0x10d0 [ 373.475841][T22781] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 373.475856][T22781] ? vfs_write+0x7e8/0x960 [ 373.475889][T22781] ? __rcu_read_unlock+0x4f/0x70 [ 373.475901][T22781] ? __fget_files+0x184/0x1c0 [ 373.475915][T22781] __secure_computing+0x82/0x150 [ 373.475926][T22781] syscall_trace_enter+0xcf/0x1e0 [ 373.475940][T22781] do_syscall_64+0xac/0x200 [ 373.476030][T22781] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 373.476044][T22781] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 373.476057][T22781] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 373.476069][T22781] RIP: 0033:0x7f8b8940ebe9 [ 373.476078][T22781] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 373.476144][T22781] RSP: 002b:00007f8b87e77038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ad [ 373.476156][T22781] RAX: ffffffffffffffda RBX: 00007f8b89635fa0 RCX: 00007f8b8940ebe9 [ 373.476163][T22781] RDX: ffffffffffffff9c RSI: 0000200000000140 RDI: 0000000000000003 [ 373.476170][T22781] RBP: 00007f8b87e77090 R08: 0000000000000000 R09: 0000000000000000 [ 373.476177][T22781] R10: 0000200000000180 R11: 0000000000000246 R12: 0000000000000001 [ 373.476184][T22781] R13: 00007f8b89636038 R14: 00007f8b89635fa0 R15: 00007ffe22fd1aa8 [ 373.476193][T22781] [ 374.329506][T22864] netlink: 'syz.6.7039': attribute type 21 has an invalid length. [ 374.345820][T22861] netlink: 14 bytes leftover after parsing attributes in process `+}[@'. [ 374.369246][T22861] hsr_slave_0: left promiscuous mode [ 374.375481][T22861] hsr_slave_1: left promiscuous mode [ 374.839139][ T6525] usb 17-1: enqueue for inactive port 0 [ 374.854468][ T6525] usb 17-1: enqueue for inactive port 0 [ 374.928880][ T6525] vhci_hcd: vhci_device speed not set [ 375.243875][T22905] FAULT_INJECTION: forcing a failure. [ 375.243875][T22905] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 375.257089][T22905] CPU: 1 UID: 0 PID: 22905 Comm: syz.0.7054 Tainted: G W 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(voluntary) [ 375.257131][T22905] Tainted: [W]=WARN [ 375.257151][T22905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 375.257164][T22905] Call Trace: [ 375.257171][T22905] [ 375.257178][T22905] __dump_stack+0x1d/0x30 [ 375.257197][T22905] dump_stack_lvl+0xe8/0x140 [ 375.257291][T22905] dump_stack+0x15/0x1b [ 375.257348][T22905] should_fail_ex+0x265/0x280 [ 375.257370][T22905] should_fail+0xb/0x20 [ 375.257384][T22905] should_fail_usercopy+0x1a/0x20 [ 375.257403][T22905] _copy_from_user+0x1c/0xb0 [ 375.257471][T22905] __sys_bpf+0x178/0x7b0 [ 375.257498][T22905] __x64_sys_bpf+0x41/0x50 [ 375.257518][T22905] x64_sys_call+0x2aea/0x2ff0 [ 375.257544][T22905] do_syscall_64+0xd2/0x200 [ 375.257570][T22905] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 375.257614][T22905] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 375.257633][T22905] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 375.257651][T22905] RIP: 0033:0x7f9a0e4febe9 [ 375.257664][T22905] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 375.257716][T22905] RSP: 002b:00007f9a0cf67038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 375.257751][T22905] RAX: ffffffffffffffda RBX: 00007f9a0e725fa0 RCX: 00007f9a0e4febe9 [ 375.257762][T22905] RDX: 0000000000000010 RSI: 0000200000000400 RDI: 0000000000000008 [ 375.257774][T22905] RBP: 00007f9a0cf67090 R08: 0000000000000000 R09: 0000000000000000 [ 375.257787][T22905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 375.257801][T22905] R13: 00007f9a0e726038 R14: 00007f9a0e725fa0 R15: 00007ffd1bdedbd8 [ 375.257820][T22905] [ 375.489635][ T29] kauditd_printk_skb: 2083 callbacks suppressed [ 375.489649][ T29] audit: type=1400 audit(1755443680.451:52417): avc: denied { read write } for pid=18813 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 375.525343][ T29] audit: type=1400 audit(1755443680.451:52418): avc: denied { map_create } for pid=22913 comm="syz.6.7058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 375.544806][ T29] audit: type=1400 audit(1755443680.451:52419): avc: denied { prog_load } for pid=22913 comm="syz.6.7058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 375.564138][ T29] audit: type=1400 audit(1755443680.451:52420): avc: denied { prog_load } for pid=22913 comm="syz.6.7058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 375.583670][ T29] audit: type=1400 audit(1755443680.451:52421): avc: denied { create } for pid=22913 comm="syz.6.7058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 375.603301][ T29] audit: type=1400 audit(1755443680.451:52422): avc: denied { prog_load } for pid=22913 comm="syz.6.7058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 375.622601][ T29] audit: type=1400 audit(1755443680.451:52423): avc: denied { map_create } for pid=22913 comm="syz.6.7058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 375.642661][ T29] audit: type=1400 audit(1755443680.451:52424): avc: denied { prog_load } for pid=22913 comm="syz.6.7058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 375.661985][ T29] audit: type=1400 audit(1755443680.451:52425): avc: denied { read } for pid=22913 comm="syz.6.7058" dev="nsfs" ino=4026532389 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 375.683565][ T29] audit: type=1400 audit(1755443680.451:52426): avc: denied { create } for pid=22913 comm="syz.6.7058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 376.477015][T22941] netlink: 'syz.5.7066': attribute type 4 has an invalid length. [ 376.484847][T22941] netlink: 17 bytes leftover after parsing attributes in process `syz.5.7066'. [ 376.546372][T22942] netlink: 2 bytes leftover after parsing attributes in process `syz.5.7066'. [ 376.888775][T22960] fq_change: 5 callbacks suppressed [ 376.888789][T22960] sch_fq: defrate 4294967295 ignored. [ 377.823472][T22984] netlink: 16 bytes leftover after parsing attributes in process `syz.2.7084'. [ 377.947655][T23000] netlink: 'syz.2.7088': attribute type 4 has an invalid length. [ 377.955438][T23000] netlink: 17 bytes leftover after parsing attributes in process `syz.2.7088'. [ 378.027071][T23005] netlink: 2 bytes leftover after parsing attributes in process `syz.2.7088'. [ 378.332277][T23014] netlink: 16 bytes leftover after parsing attributes in process `syz.6.7095'. [ 380.530910][ T29] kauditd_printk_skb: 520 callbacks suppressed [ 380.531011][ T29] audit: type=1400 audit(1755443685.491:52947): avc: denied { read write } for pid=19901 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 380.562254][ T29] audit: type=1400 audit(1755443685.501:52948): avc: denied { map_create } for pid=23068 comm="syz.2.7118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 380.582005][ T29] audit: type=1400 audit(1755443685.501:52949): avc: denied { prog_load } for pid=23068 comm="syz.2.7118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 380.601640][ T29] audit: type=1400 audit(1755443685.511:52950): avc: denied { read write } for pid=19901 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 380.626532][ T29] audit: type=1400 audit(1755443685.511:52951): avc: denied { map_create } for pid=23070 comm="syz.2.7119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 380.646214][ T29] audit: type=1400 audit(1755443685.511:52952): avc: denied { prog_load } for pid=23070 comm="syz.2.7119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 380.665674][ T29] audit: type=1400 audit(1755443685.511:52953): avc: denied { prog_load } for pid=23070 comm="syz.2.7119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 380.685109][ T29] audit: type=1326 audit(1755443685.521:52954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23070 comm="syz.2.7119" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8b8940ebe9 code=0x7ffc0000 [ 380.708787][ T29] audit: type=1326 audit(1755443685.521:52955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23070 comm="syz.2.7119" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8b8940ebe9 code=0x7ffc0000 [ 380.732683][ T29] audit: type=1326 audit(1755443685.521:52956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23070 comm="syz.2.7119" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8b8940ebe9 code=0x7ffc0000 [ 381.505735][T23090] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7126'. [ 381.580327][T23093] netlink: 'syz.2.7127': attribute type 4 has an invalid length. [ 381.588143][T23093] netlink: 17 bytes leftover after parsing attributes in process `syz.2.7127'. [ 381.650781][T23095] netlink: 2 bytes leftover after parsing attributes in process `syz.2.7127'. [ 382.396878][T23115] sch_fq: defrate 4294967295 ignored. [ 382.423850][T23117] sch_fq: defrate 4294967295 ignored. [ 382.448903][T23119] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7137'. [ 382.530684][T23127] sch_fq: defrate 4294967295 ignored. [ 382.651463][T23138] sch_fq: defrate 4294967295 ignored. [ 382.656710][T23135] netlink: 8 bytes leftover after parsing attributes in process `syz.2.7145'. [ 382.695731][T23141] netlink: 4 bytes leftover after parsing attributes in process `syz.0.7148'. [ 382.723885][T23146] sch_fq: defrate 4294967295 ignored. [ 382.868683][T23165] sch_fq: defrate 4294967295 ignored. [ 383.289036][T23195] sch_fq: defrate 4294967295 ignored. [ 383.814432][T23223] sch_fq: defrate 4294967295 ignored. [ 384.293650][T23251] sch_fq: defrate 4294967295 ignored. [ 384.419619][T23265] sch_fq: defrate 4294967295 ignored. [ 384.777053][T23299] lo speed is unknown, defaulting to 1000 [ 384.839764][T23299] Freezing with imperfect legacy cgroup freezer. See cgroup.freeze of cgroup v2 [ 385.515334][T23330] ALSA: seq fatal error: cannot create timer (-22) [ 385.522771][T23330] FAULT_INJECTION: forcing a failure. [ 385.522771][T23330] name failslab, interval 1, probability 0, space 0, times 0 [ 385.535477][T23330] CPU: 1 UID: 0 PID: 23330 Comm: syz.8.7230 Tainted: G W 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(voluntary) [ 385.535576][T23330] Tainted: [W]=WARN [ 385.535580][T23330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 385.535587][T23330] Call Trace: [ 385.535592][T23330] [ 385.535598][T23330] __dump_stack+0x1d/0x30 [ 385.535640][T23330] dump_stack_lvl+0xe8/0x140 [ 385.535650][T23330] dump_stack+0x15/0x1b [ 385.535660][T23330] should_fail_ex+0x265/0x280 [ 385.535672][T23330] ? snd_timer_instance_new+0x31/0x160 [ 385.535687][T23330] should_failslab+0x8c/0xb0 [ 385.535784][T23330] __kmalloc_cache_noprof+0x4c/0x320 [ 385.535842][T23330] snd_timer_instance_new+0x31/0x160 [ 385.535928][T23330] snd_seq_timer_open+0x12b/0x360 [ 385.535960][T23330] ? _raw_spin_lock_irqsave+0x3a/0x90 [ 385.536058][T23330] snd_seq_queue_timer_open+0x101/0x120 [ 385.536076][T23330] snd_seq_ioctl_set_queue_timer+0x14b/0x170 [ 385.536091][T23330] snd_seq_ioctl+0x17d/0x2e0 [ 385.536107][T23330] ? __pfx_snd_seq_ioctl+0x10/0x10 [ 385.536138][T23330] __se_sys_ioctl+0xcb/0x140 [ 385.536188][T23330] __x64_sys_ioctl+0x43/0x50 [ 385.536251][T23330] x64_sys_call+0x1816/0x2ff0 [ 385.536262][T23330] do_syscall_64+0xd2/0x200 [ 385.536353][T23330] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 385.536377][T23330] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 385.536447][T23330] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 385.536502][T23330] RIP: 0033:0x7f6446dcebe9 [ 385.536517][T23330] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 385.536532][T23330] RSP: 002b:00007f6445837038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 385.536552][T23330] RAX: ffffffffffffffda RBX: 00007f6446ff5fa0 RCX: 00007f6446dcebe9 [ 385.536563][T23330] RDX: 0000200000000100 RSI: 0000000040605346 RDI: 0000000000000003 [ 385.536574][T23330] RBP: 00007f6445837090 R08: 0000000000000000 R09: 0000000000000000 [ 385.536586][T23330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 385.536594][T23330] R13: 00007f6446ff6038 R14: 00007f6446ff5fa0 R15: 00007ffe248a4ce8 [ 385.536606][T23330] [ 385.762529][ T29] kauditd_printk_skb: 1233 callbacks suppressed [ 385.762544][ T29] audit: type=1400 audit(1755443690.721:54190): avc: denied { read write } for pid=19901 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 385.796541][ T29] audit: type=1400 audit(1755443690.731:54191): avc: denied { prog_load } for pid=23332 comm="syz.2.7231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 385.815913][ T29] audit: type=1400 audit(1755443690.731:54192): avc: denied { map_create } for pid=23332 comm="syz.2.7231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 385.835300][ T29] audit: type=1400 audit(1755443690.731:54193): avc: denied { prog_load } for pid=23332 comm="syz.2.7231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 385.854628][ T29] audit: type=1400 audit(1755443690.731:54194): avc: denied { create } for pid=23332 comm="syz.2.7231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 385.875290][ T29] audit: type=1400 audit(1755443690.731:54195): avc: denied { create } for pid=23332 comm="syz.2.7231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 385.896045][ T29] audit: type=1400 audit(1755443690.731:54196): avc: denied { read write } for pid=19901 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 385.920556][ T29] audit: type=1400 audit(1755443690.731:54197): avc: denied { map_create } for pid=23334 comm="syz.2.7232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 385.939946][ T29] audit: type=1400 audit(1755443690.731:54198): avc: denied { prog_load } for pid=23334 comm="syz.2.7232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 385.959169][ T29] audit: type=1400 audit(1755443690.731:54199): avc: denied { prog_load } for pid=23334 comm="syz.2.7232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 387.793704][T23478] fq_change: 10 callbacks suppressed [ 387.793717][T23478] sch_fq: defrate 4294967295 ignored. [ 387.841292][T23484] sch_fq: defrate 4294967295 ignored. [ 388.820451][T23552] sch_fq: defrate 4294967295 ignored. [ 388.933871][T23565] sch_fq: defrate 4294967295 ignored. [ 389.024659][T23572] sch_fq: defrate 4294967295 ignored. [ 389.089180][T23580] sch_fq: defrate 4294967295 ignored. [ 389.161911][T23596] sch_fq: defrate 4294967295 ignored. [ 389.919522][T23620] sch_fq: defrate 4294967295 ignored. [ 390.027631][T23631] sch_fq: defrate 4294967295 ignored. [ 390.831954][ T29] kauditd_printk_skb: 1454 callbacks suppressed [ 390.831978][ T29] audit: type=1400 audit(1755443695.791:55654): avc: denied { prog_load } for pid=23657 comm="syz.5.7363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 390.858947][ T29] audit: type=1400 audit(1755443695.821:55655): avc: denied { prog_load } for pid=23657 comm="syz.5.7363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 390.859572][ T29] audit: type=1400 audit(1755443695.821:55656): avc: denied { allowed } for pid=23657 comm="syz.5.7363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 390.916551][ T29] audit: type=1400 audit(1755443695.871:55657): avc: denied { read write } for pid=17872 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 390.960797][ T29] audit: type=1400 audit(1755443695.921:55658): avc: denied { map_create } for pid=23661 comm="syz.8.7364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 390.982245][ T29] audit: type=1400 audit(1755443695.941:55659): avc: denied { create } for pid=23661 comm="syz.8.7364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 391.002283][ T29] audit: type=1400 audit(1755443695.941:55660): avc: denied { prog_load } for pid=23661 comm="syz.8.7364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 391.021791][ T29] audit: type=1326 audit(1755443695.941:55661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23661 comm="syz.8.7364" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6446dcebe9 code=0x7ffc0000 [ 391.021819][ T29] audit: type=1326 audit(1755443695.941:55662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23661 comm="syz.8.7364" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6446dcebe9 code=0x7ffc0000 [ 391.021897][ T29] audit: type=1326 audit(1755443695.941:55663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23661 comm="syz.8.7364" exe="/root/syz-executor" sig=0 arch=c000003e syscall=7 compat=0 ip=0x7f6446dcebe9 code=0x7ffc0000 [ 391.083014][T23669] sch_fq: defrate 4294967295 ignored. [ 392.274633][T23719] FAULT_INJECTION: forcing a failure. [ 392.274633][T23719] name failslab, interval 1, probability 0, space 0, times 0 [ 392.274661][T23719] CPU: 1 UID: 0 PID: 23719 Comm: syz.2.7385 Tainted: G W 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(voluntary) [ 392.274692][T23719] Tainted: [W]=WARN [ 392.274698][T23719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 392.274710][T23719] Call Trace: [ 392.274772][T23719] [ 392.274779][T23719] __dump_stack+0x1d/0x30 [ 392.274815][T23719] dump_stack_lvl+0xe8/0x140 [ 392.274831][T23719] dump_stack+0x15/0x1b [ 392.274844][T23719] should_fail_ex+0x265/0x280 [ 392.274862][T23719] should_failslab+0x8c/0xb0 [ 392.274885][T23719] kmem_cache_alloc_node_noprof+0x57/0x320 [ 392.274966][T23719] ? __alloc_skb+0x101/0x320 [ 392.274998][T23719] __alloc_skb+0x101/0x320 [ 392.275039][T23719] ? audit_log_start+0x365/0x6c0 [ 392.275069][T23719] audit_log_start+0x380/0x6c0 [ 392.275095][T23719] audit_seccomp+0x48/0x100 [ 392.275120][T23719] ? __seccomp_filter+0x68c/0x10d0 [ 392.275139][T23719] __seccomp_filter+0x69d/0x10d0 [ 392.275189][T23719] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 392.275212][T23719] ? vfs_write+0x7e8/0x960 [ 392.275231][T23719] ? __rcu_read_unlock+0x4f/0x70 [ 392.275317][T23719] ? __fget_files+0x184/0x1c0 [ 392.275376][T23719] __secure_computing+0x82/0x150 [ 392.275393][T23719] syscall_trace_enter+0xcf/0x1e0 [ 392.275415][T23719] do_syscall_64+0xac/0x200 [ 392.275440][T23719] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 392.275459][T23719] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 392.275479][T23719] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 392.275507][T23719] RIP: 0033:0x7f8b8940ebe9 [ 392.275569][T23719] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 392.275584][T23719] RSP: 002b:00007f8b87e77038 EFLAGS: 00000246 ORIG_RAX: 000000000000004b [ 392.275605][T23719] RAX: ffffffffffffffda RBX: 00007f8b89635fa0 RCX: 00007f8b8940ebe9 [ 392.275619][T23719] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 392.275632][T23719] RBP: 00007f8b87e77090 R08: 0000000000000000 R09: 0000000000000000 [ 392.275651][T23719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 392.275662][T23719] R13: 00007f8b89636038 R14: 00007f8b89635fa0 R15: 00007ffe22fd1aa8 [ 392.275678][T23719] [ 393.340556][T23779] netlink: 'syz.6.7410': attribute type 4 has an invalid length. [ 393.340646][T23779] netlink: 17 bytes leftover after parsing attributes in process `syz.6.7410'. [ 393.361230][T23779] netlink: 2 bytes leftover after parsing attributes in process `syz.6.7410'. [ 393.459860][T23785] sch_fq: defrate 4294967295 ignored. [ 394.218851][T23870] sch_fq: defrate 4294967295 ignored. [ 394.637540][T23891] netlink: 'syz.0.7456': attribute type 4 has an invalid length. [ 394.645500][T23891] netlink: 17 bytes leftover after parsing attributes in process `syz.0.7456'. [ 394.741778][T23893] netlink: 2 bytes leftover after parsing attributes in process `syz.0.7456'. [ 394.949867][T23905] sch_fq: defrate 4294967295 ignored. [ 395.838661][ T29] kauditd_printk_skb: 1224 callbacks suppressed [ 395.838673][ T29] audit: type=1400 audit(1755443700.801:56886): avc: denied { create } for pid=23969 comm="syz.8.7488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 395.845373][ T29] audit: type=1400 audit(1755443700.801:56887): avc: denied { create } for pid=23969 comm="syz.8.7488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 395.876070][ T29] audit: type=1400 audit(1755443700.831:56888): avc: denied { read write } for pid=17872 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 395.899174][ T29] audit: type=1400 audit(1755443700.861:56889): avc: denied { prog_load } for pid=23972 comm="syz.8.7489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 395.925291][ T29] audit: type=1400 audit(1755443700.881:56890): avc: denied { prog_load } for pid=23972 comm="syz.8.7489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 395.946555][ T29] audit: type=1400 audit(1755443700.901:56891): avc: denied { map_create } for pid=23972 comm="syz.8.7489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 395.959924][ T29] audit: type=1326 audit(1755443700.901:56892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23963 comm="syz.0.7486" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a0e4febe9 code=0x7ffc0000 [ 395.959998][ T29] audit: type=1326 audit(1755443700.901:56893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23963 comm="syz.0.7486" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9a0e4febe9 code=0x7ffc0000 [ 395.960098][ T29] audit: type=1326 audit(1755443700.901:56894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23963 comm="syz.0.7486" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f9a0e4febe9 code=0x7ffc0000 [ 395.960132][ T29] audit: type=1400 audit(1755443700.901:56895): avc: denied { open } for pid=23963 comm="syz.0.7486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 396.238943][T23996] netlink: 8 bytes leftover after parsing attributes in process `syz.0.7500'. [ 396.249121][T23999] netlink: 'syz.8.7498': attribute type 4 has an invalid length. [ 396.256941][T23999] netlink: 17 bytes leftover after parsing attributes in process `syz.8.7498'. [ 396.281249][T23999] netlink: 2 bytes leftover after parsing attributes in process `syz.8.7498'. [ 396.329930][T24001] ================================================================== [ 396.329957][T24001] BUG: KCSAN: data-race in n_tty_receive_char / n_tty_write [ 396.345555][T24001] [ 396.345566][T24001] write to 0xffffc90005055028 of 8 bytes by task 24004 on cpu 1: [ 396.345583][T24001] n_tty_receive_char+0x437/0x6a0 [ 396.360594][T24001] n_tty_receive_buf_standard+0x473/0x2f10 [ 396.360625][T24001] n_tty_receive_buf_common+0x805/0xbe0 [ 396.360647][T24001] n_tty_receive_buf2+0x33/0x40 [ 396.360665][T24001] tty_ldisc_receive_buf+0x63/0xf0 [ 396.360692][T24001] paste_selection+0x333/0x490 [ 396.386729][T24001] tioclinux+0x3b5/0x460 [ 396.386764][T24001] vt_ioctl+0x75f/0x1880 [ 396.386785][T24001] tty_ioctl+0x7de/0xb80 [ 396.399484][T24001] __se_sys_ioctl+0xcb/0x140 [ 396.399526][T24001] __x64_sys_ioctl+0x43/0x50 [ 396.408688][T24001] x64_sys_call+0x1816/0x2ff0 [ 396.408714][T24001] do_syscall_64+0xd2/0x200 [ 396.417858][T24001] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 396.417885][T24001] [ 396.417891][T24001] read to 0xffffc90005055028 of 8 bytes by task 24001 on cpu 0: [ 396.417906][T24001] n_tty_write+0x14f/0xb50 [ 396.417923][T24001] file_tty_write+0x373/0x690 [ 396.417945][T24001] tty_write+0x25/0x30 [ 396.417965][T24001] vfs_write+0x527/0x960 [ 396.451100][T24001] ksys_write+0xda/0x1a0 [ 396.455345][T24001] __x64_sys_write+0x40/0x50 [ 396.455368][T24001] x64_sys_call+0x27fe/0x2ff0 [ 396.464607][T24001] do_syscall_64+0xd2/0x200 [ 396.464634][T24001] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 396.475078][T24001] [ 396.475113][T24001] value changed: 0x0000000000000095 -> 0x00000000000000a5 [ 396.484665][T24001] [ 396.484672][T24001] Reported by Kernel Concurrency Sanitizer on: [ 396.484687][T24001] CPU: 0 UID: 0 PID: 24001 Comm: syz.0.7502 Tainted: G W 6.17.0-rc1-syzkaller-00214-g99bade344cfa #0 PREEMPT(voluntary) [ 396.484716][T24001] Tainted: [W]=WARN [ 396.484722][T24001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 396.484733][T24001] ==================================================================