last executing test programs: 2m26.222113113s ago: executing program 32 (id=131): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@ipv6_deladdrlabel={0x38, 0x49, 0x1, 0x70bd2c, 0x25dfdbff, {0xa, 0x0, 0x3f, 0x0, 0x0, 0x8}, [@IFAL_LABEL={0x8, 0x2, 0x4}, @IFAL_ADDRESS={0x14, 0x1, @remote}]}, 0x38}}, 0x20040000) 1m59.740419212s ago: executing program 33 (id=600): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='loginuid\x00') pwritev(r0, &(0x7f0000000500)=[{0x0}, {&(0x7f00000002c0)='2', 0x1}], 0x2, 0x0, 0x0) 1m51.801529253s ago: executing program 3 (id=727): ioperm(0xa, 0x4, 0x6) prctl$PR_SET_FPEMU(0xa, 0x3) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000240)=ANY=[@ANYBLOB="48000000100005ff00000000000000000000004a", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b0001006261746164760000", @ANYRES32=r2], 0x48}}, 0x40000) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r4, 0x0, 0x10000000000}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 1m51.748220203s ago: executing program 3 (id=729): perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x3c, 0x1, 0x0, 0x0, 0x0, 0x2, 0x80000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0x1b}, 0x8000, 0xffffffff, 0x20000, 0x9, 0x0, 0x268, 0xfff9, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0x13}, 0x2, 0xffffffff, 0x6, 0x6, 0x4, 0x1, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r1, 0x0, 0x8008000000010, &(0x7f00000003c0)="17000000020001000003d68c5ee17688a2003208030300ecff3f0000000300000a0000000098fc5ad9485bbb6a880000d6c8db0000dba67e06000000e28900000200df018000000000f50607bdff59100ac45761547a681f009cee4a5acb3da400001fb700674f00c88ebbf9315033bf79ac2dff060115003901000000000000ea000000000000000002ffff02dfccebf6ba0008400200000000e90554062a80e605007f71174aa951f3c63e5c83f1ba2112ce68bf17a6e0", 0xb8) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="021200000200000000000000000000004068cf74e4e6d49319df66a1"], 0x10}}, 0x0) 1m51.615568832s ago: executing program 3 (id=731): syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, 0x0, 0x5, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CONTROL_PORT_OVER_NL80211={0x4}, @NL80211_ATTR_TX_RATES={0x10, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0xc, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x5, 0x2, [{0x1, 0x1}]}]}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x4040011}, 0x40840) r0 = socket$nl_route(0x10, 0x3, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3000000019000100000000000000000080200000001100050000000014000900"], 0x30}}, 0x0) prctl$PR_SCHED_CORE(0x39, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000e80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095", @ANYRESDEC], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) socket$inet6(0xa, 0x2, 0x9) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000440)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}]}, 0x2c}}, 0x0) 1m51.033077171s ago: executing program 3 (id=747): socket$inet_smc(0x2b, 0x1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000400)='kfree\x00', r0, 0x0, 0x4}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='module_request\x00', r0, 0x0, 0xba9e}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000b80)={[{@nombcache}, {@abort}, {@dioread_lock}, {@norecovery}, {@discard}, {@lazytime}, {@noload}, {@usrquota}, {@noauto_da_alloc}]}, 0xfe, 0x558, &(0x7f0000000c00)="$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") chdir(&(0x7f000009df00)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x169242, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$setregs(0x1a, r2, 0xc, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f00000008c0)=""/49, 0x31) 1m50.57043086s ago: executing program 3 (id=751): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) open(&(0x7f0000000140)='./file0\x00', 0xec40, 0x12) mount$9p_fd(0xff8c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000400)=ANY=[]) 1m49.624066668s ago: executing program 3 (id=766): r0 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x7fff, @empty, 0x68a9761d, 0x1}, 0x20) setresgid(0xee00, 0xee01, 0x0) setuid(0xee00) setgid(0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa1000000000000070101000000ffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1m49.574348357s ago: executing program 34 (id=766): r0 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x7fff, @empty, 0x68a9761d, 0x1}, 0x20) setresgid(0xee00, 0xee01, 0x0) setuid(0xee00) setgid(0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa1000000000000070101000000ffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1m48.950357266s ago: executing program 1 (id=776): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) close(0xffffffffffffffff) socket$inet6_mptcp(0xa, 0x1, 0x106) recvmsg$unix(0xffffffffffffffff, 0x0, 0x103) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = socket$packet(0x11, 0x3, 0x300) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x19, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000180)='kfree\x00', r0, 0x0, 0x1}, 0x18) bind$packet(r2, 0x0, 0x0) bind$packet(r2, &(0x7f0000000100)={0x11, 0x18, 0x0, 0x1, 0x0, 0x6, @random="9ec6112b418a"}, 0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000050000000000000000001811", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000c80)='kfree\x00', r3}, 0x18) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'veth0_to_bond\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000000)={r5}, 0x10) sendmsg$nl_route_sched(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@getchain={0x24, 0x11, 0x839, 0x70bd2d, 0x25dfdc03, {0x0, 0x0, 0x0, r5, {0xc}, {0xfff3}}}, 0x24}}, 0x20040000) 1m48.417843105s ago: executing program 1 (id=784): r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x13, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000d40)=ANY=[@ANYBLOB="6400000002060500000000000000000000000000120003006269746d61703a0073797a31000000000780050003001f0000000c00018008000140000000000500050600000000050001000600"/86], 0x64}, 0x1, 0x0, 0x0, 0x40001}, 0x0) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000000)=@nat={'nat\x00', 0x670, 0x5, 0x460, 0xf8, 0xf8, 0xfeffffff, 0x2f0, 0x2f0, 0x3c8, 0x3c8, 0xffffffff, 0x3c8, 0x3c8, 0x5, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x0, 0x0, 'veth0_to_bond\x00', 'caif0\x00', {}, {}, 0x6}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@inet=@tcp={{0x30}}, @common=@inet=@tcp={{0x30}, {[], [], 0x0, 0x0, 0x2}}]}, @common=@inet=@TCPMSS={0x28}}, {{@uncond, 0x0, 0xf0, 0x128, 0x0, {}, [@common=@set={{0x40}}, @common=@set={{0x40}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x0, @broadcast, @remote, @icmp_id}}}}, {{@ip={@loopback, @rand_addr, 0x0, 0x0, 'lo\x00', 'ip6tnl0\x00'}, 0x0, 0x98, 0xd0, 0x0, {}, [@common=@ttl={{0x28}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x10, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id}}}}, {{@ip={@remote, @broadcast, 0x0, 0x0, 'pim6reg0\x00', 'wlan0\x00'}, 0x0, 0x90, 0xd8, 0x0, {}, [@common=@socket0={{0x20}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv6=@private2, @ipv4=@dev, @port, @gre_key}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) fcntl$lock(r4, 0x26, &(0x7f0000000000)={0x1}) r6 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r6, 0x0, 0xc8, &(0x7f0000003d40), 0x4) fcntl$lock(r4, 0x25, &(0x7f0000000300)={0x0, 0x0, 0x80, 0x7}) fcntl$lock(r4, 0x25, &(0x7f00000000c0)={0x1, 0x2, 0x0, 0x80000000}) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='cma_release\x00', r9, 0x0, 0x800000000}, 0x18) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000001800)=ANY=[@ANYBLOB="b40e0000", @ANYRES16=r7, @ANYBLOB="10002abdac8b7cd500"/18, @ANYRES32=0x0, @ANYBLOB="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"], 0xeb4}, 0x1, 0x0, 0x0, 0x8000}, 0xc050) wait4(r3, 0x0, 0x0, 0x0) ptrace$cont(0x20, r3, 0x6, 0xe0) sendmsg$IPSET_CMD_DESTROY(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000400)={0x28, 0x3, 0x6, 0x201, 0x0, 0x0, {0x5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x28}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) r10 = socket$nl_generic(0x10, 0x3, 0x10) ioperm(0x0, 0xef, 0x7) io_cancel(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0x9, 0x0, 0x2}, 0x0) r11 = syz_genetlink_get_family_id$devlink(&(0x7f0000008280), r10) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f00000084c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="010026bd7000fddbdf250f0000000e0001006e657464657673696dda80efc3d1a9070d9ce34c75c900060011004000"/75], 0x44}}, 0x40080) 1m47.953297024s ago: executing program 1 (id=787): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x26e1, 0x0) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="12000000290000000400000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r2}, &(0x7f0000000440), &(0x7f0000000480)=r1}, 0x20) unshare(0x60600) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000da6700000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r6}, 0x10) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xc, &(0x7f0000000040)=@framed={{0x18, 0x8, 0x0, 0x0, 0x4}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r7}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, @exit], {0x95, 0x0, 0xff85}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xbb2, @void, @value}, 0x94) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x6, 0x4, &(0x7f0000002180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0xc0, &(0x7f00000020c0)=""/192, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) r11 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000080)={r9, r10, 0x25, 0x0, @void}, 0x10) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000140)={r11}, 0x10) sendmsg$inet(r0, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="2c000000000000000000000007000000441805"], 0x30}, 0x7e8166965e22236a) 1m47.653312453s ago: executing program 0 (id=789): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000040), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='coredump_filter\x00') writev(r2, &(0x7f0000000100)=[{&(0x7f00000004c0)='4', 0x1}], 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree\x00'}, 0x10) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x161042, 0x0) ioctl$PPPIOCNEWUNIT(r5, 0xc004743e, &(0x7f0000000140)) ioctl$PPPIOCSPASS(r5, 0x40107447, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8a, 0xe7c9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0, @void, @value, @void, @value}, 0x48) unshare(0x44040200) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r6}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000580)=@qipcrtr={0x2a, 0x1, 0x7fff}, 0x80, 0x0}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001200)={&(0x7f00000004c0)={0x38, 0x1403, 0x1, 0x70bd2d, 0x0, "", [{{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'lo\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x854}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r8 = socket(0x2b, 0x80801, 0x1) setsockopt$IP_VS_SO_SET_STOPDAEMON(r8, 0x0, 0x48c, &(0x7f00000001c0)={0x1, '\x00', 0x1}, 0x18) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r8, 0x29, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000000000000005"], 0x78) 1m47.452234533s ago: executing program 1 (id=792): socket$inet_smc(0x2b, 0x1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000400)='kfree\x00', r0, 0x0, 0x4}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='module_request\x00', r0, 0x0, 0xba9e}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000b80)={[{@nombcache}, {@abort}, {@dioread_lock}, {@norecovery}, {@discard}, {@lazytime}, {@noload}, {@usrquota}, {@noauto_da_alloc}]}, 0xfe, 0x558, &(0x7f0000000c00)="$eJzs3U1rG0cfAPD/ynbenOeJAyG0PRRDDk1JI8d2X1LoIT2WNjTQ3lNhb0ywHAVLDrEbaHJoLr2UUCilgdIP0HuPoV+gnyLQBkIJpj30orLyylFsyZZtpVaq3w82mdldaXY0+x/PaCQUwMAaz/4pRLwcEV8nEcdajg1HfnB87bzVJ7dmsi2Jev2TP5JI8n3N85P8/9E881JE/PJlxJnC5nKryyvzpXI5XczzE7WF6xPV5ZWzVxdKc+lcem1qevr8W9NT777zds/q+vqlv777+MEH5786tfrtT4+O30viQhzNj7XWYw9ut2bGYzx/TUbiwoYTJ3tQWD9J9vsC2JWhPM5HIusDjsVQHvXAf98XEVEHBlQi/mFANccBzbl9j+bBL4zH769NgDbXf3jtvZE41JgbHVlNnpkZZfPdsR6Un5Xx8+/372Vb9O59CIBt3b4TEeeGhzf3f0ne/+3euS7O2VjGDvu/+g4vCWjxIBv/vNFu/FNYH/9Em/HPaJvY3Y3t47/wqAfFdJSN/95rO/5dX7QaG8pz/2uM+UaSK1fLada3/T8iTsfIwSy/1XrO+dWHHfup1vFftmXlN8eC+XU8Gj747GNmS7XSXurc6vGdiFfajn+T9fZP2rR/9npc6rKMk+n9Vzsd277+z1f9x4jX2rb/0xWtZOv1yYnG/TDRvCs2+/PuyV87lb/f9c/a/8jW9R9LWtdrqzsv44dDf6edju32/j+QfNpIH8j33SzVaouTEQeSjzbvn3r62Ga+eX5W/9Ontu7/2t3/hyPisy7rf/fE3Y6n9kP7z+6o/XeeePjh5993Kr+79n+zkTqd7+mm/+v2Avfy2gEAAAAAAEC/KUTE0UgKxfV0oVAsrn2+40QcKZQr1dqZK5Wla7PR+K7sWIwUmivdoy2fh5jMPw/bzE9tyE9HxPGI+GbocCNfnKmUZ/e78gAAAAAAAAAAAAAAAAAAANAnRjt8/z/z29B+Xx3w3PnJbxhc28Z/L37pCehL/v7D4BL/MLjEPwwu8Q+DS/zD4BL/MLjEPwwu8Q8AAAAAAAAAAAAAAAAAAAAAAAAAAAA9denixWyrrz65NZPlZ28sL81XbpydTavzxYWlmeJMZfF6ca5SmSunxZnKwnbPV65Urk9OxdLNiVparU1Ul1cuL1SWrtUuX10ozaWX05F/pVYAAAAAAAAAAAAAAAAAAADwYqkur8yXyuV0UUJiV4nh/rgMibVEM7D3/IT72y8BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQKt/AgAA//+jgjYy") chdir(&(0x7f000009df00)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x169242, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$setregs(0x1a, r2, 0xc, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00'}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r3, &(0x7f00000008c0)=""/49, 0x31) 1m47.152832922s ago: executing program 1 (id=793): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb, 0x4008032, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, r1) sendmsg$IEEE802154_LIST_PHY(r1, 0x0, 0x40000) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) writev(r0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000009c0)={0x2, 0x4e24, @empty}, 0x10) writev(r0, &(0x7f0000000200)=[{&(0x7f00000000c0)='X', 0x8030000}], 0x1) 1m46.723408001s ago: executing program 1 (id=794): socket$inet_smc(0x2b, 0x1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000400)='kfree\x00', r0, 0x0, 0x4}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='module_request\x00', r0, 0x0, 0xba9e}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000b80)={[{@nombcache}, {@abort}, {@dioread_lock}, {@norecovery}, {@discard}, {@lazytime}, {@noload}, {@usrquota}, {@noauto_da_alloc}]}, 0xfe, 0x558, &(0x7f0000000c00)="$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") chdir(&(0x7f000009df00)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x169242, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$setregs(0x1a, r2, 0xc, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00'}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r3, &(0x7f00000008c0)=""/49, 0x31) 1m46.701268591s ago: executing program 35 (id=794): socket$inet_smc(0x2b, 0x1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000400)='kfree\x00', r0, 0x0, 0x4}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='module_request\x00', r0, 0x0, 0xba9e}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000b80)={[{@nombcache}, {@abort}, {@dioread_lock}, {@norecovery}, {@discard}, {@lazytime}, {@noload}, {@usrquota}, {@noauto_da_alloc}]}, 0xfe, 0x558, &(0x7f0000000c00)="$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") chdir(&(0x7f000009df00)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x169242, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$setregs(0x1a, r2, 0xc, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00'}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r3, &(0x7f00000008c0)=""/49, 0x31) 1m46.565512931s ago: executing program 0 (id=797): bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000003000083850000002d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000080000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb8500000043000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x18) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYRESOCT=0x0], 0x64}}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = syz_io_uring_setup(0x110, &(0x7f0000000340)={0x0, 0x810c, 0x8, 0x40000, 0x100000f0}, &(0x7f0000000400)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) syz_io_uring_submit(r3, r4, &(0x7f0000000440)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r5, 0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[], 0x348}, 0x0, 0x800, 0x1}) io_uring_enter(r2, 0x8aa, 0x0, 0x0, 0x0, 0x0) 1m46.36484619s ago: executing program 0 (id=800): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x121301, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x3, 0x0, 0x2}) r2 = syz_open_pts(r0, 0x8000) r3 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000040)) close_range(r0, r3, 0x0) 1m46.19782918s ago: executing program 0 (id=802): socket$inet_smc(0x2b, 0x1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000400)='kfree\x00', r0, 0x0, 0x4}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='module_request\x00', r0, 0x0, 0xba9e}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000b80)={[{@nombcache}, {@abort}, {@dioread_lock}, {@norecovery}, {@discard}, {@lazytime}, {@noload}, {@usrquota}, {@noauto_da_alloc}]}, 0xfe, 0x558, &(0x7f0000000c00)="$eJzs3U1rG0cfAPD/ynbenOeJAyG0PRRDDk1JI8d2X1LoIT2WNjTQ3lNhb0ywHAVLDrEbaHJoLr2UUCilgdIP0HuPoV+gnyLQBkIJpj30orLyylFsyZZtpVaq3w82mdldaXY0+x/PaCQUwMAaz/4pRLwcEV8nEcdajg1HfnB87bzVJ7dmsi2Jev2TP5JI8n3N85P8/9E881JE/PJlxJnC5nKryyvzpXI5XczzE7WF6xPV5ZWzVxdKc+lcem1qevr8W9NT777zds/q+vqlv777+MEH5786tfrtT4+O30viQhzNj7XWYw9ut2bGYzx/TUbiwoYTJ3tQWD9J9vsC2JWhPM5HIusDjsVQHvXAf98XEVEHBlQi/mFANccBzbl9j+bBL4zH769NgDbXf3jtvZE41JgbHVlNnpkZZfPdsR6Un5Xx8+/372Vb9O59CIBt3b4TEeeGhzf3f0ne/+3euS7O2VjGDvu/+g4vCWjxIBv/vNFu/FNYH/9Em/HPaJvY3Y3t47/wqAfFdJSN/95rO/5dX7QaG8pz/2uM+UaSK1fLada3/T8iTsfIwSy/1XrO+dWHHfup1vFftmXlN8eC+XU8Gj747GNmS7XSXurc6vGdiFfajn+T9fZP2rR/9npc6rKMk+n9Vzsd277+z1f9x4jX2rb/0xWtZOv1yYnG/TDRvCs2+/PuyV87lb/f9c/a/8jW9R9LWtdrqzsv44dDf6edju32/j+QfNpIH8j33SzVaouTEQeSjzbvn3r62Ga+eX5W/9Ontu7/2t3/hyPisy7rf/fE3Y6n9kP7z+6o/XeeePjh5993Kr+79n+zkTqd7+mm/+v2Avfy2gEAAAAAAEC/KUTE0UgKxfV0oVAsrn2+40QcKZQr1dqZK5Wla7PR+K7sWIwUmivdoy2fh5jMPw/bzE9tyE9HxPGI+GbocCNfnKmUZ/e78gAAAAAAAAAAAAAAAAAAANAnRjt8/z/z29B+Xx3w3PnJbxhc28Z/L37pCehL/v7D4BL/MLjEPwwu8Q+DS/zD4BL/MLjEPwwu8Q8AAAAAAAAAAAAAAAAAAAAAAAAAAAA9denixWyrrz65NZPlZ28sL81XbpydTavzxYWlmeJMZfF6ca5SmSunxZnKwnbPV65Urk9OxdLNiVparU1Ul1cuL1SWrtUuX10ozaWX05F/pVYAAAAAAAAAAAAAAAAAAADwYqkur8yXyuV0UUJiV4nh/rgMibVEM7D3/IT72y8BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQKt/AgAA//+jgjYy") chdir(&(0x7f000009df00)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x169242, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) ptrace$setregs(0x1a, r1, 0xc, &(0x7f0000000000)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r3, &(0x7f00000008c0)=""/49, 0x31) 1m46.024231989s ago: executing program 0 (id=805): openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x8, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000f20000000000000000000018110000", @ANYRES32=r0, @ANYRESDEC=r0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$UHID_CREATE2(r2, &(0x7f00000002c0)={0xb, {'syz1\x00', 'syz0\x00', 'syz1\x00', 0xb8, 0x4, 0x2, 0xfffffff7, 0xfffffffa, 0xff, "03df92da185ed97e7ea822c92dc29d45cb393264f4f1f41d3b4b672c4fe1fdea8abded57f4942c703fe87f0691421ed65cb6ad2f20fec35cd9b206ffee77ba3e63e21c0bbab8e834a3936214cfcde049e4dc2888a33105d98fb372e04a3d95c8f4ebdebdaacbdafacf6a94e9afe1527bd939c836e7c112a41f0d7c39843f0bb89a1f5cc56223fcbf54f5a3ca6b9691072a72846eaa34b70e92997fd7268e27612a458631983b1e56951f2ea0b7ef01f7c280b022886eb77e"}}, 0x1d0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sys_enter\x00', r1, 0x0, 0x5}, 0x18) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/consoles\x00', 0x0, 0x0) rseq(&(0x7f0000000040), 0x20, 0x0, 0x0) rseq(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x4}, 0xfffffffffffffee6, 0x1, 0x0) preadv2(r3, 0x0, 0x0, 0x9fffd, 0x3, 0x12) 1m45.816119009s ago: executing program 5 (id=809): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040)=0x2, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x66, &(0x7f0000000100)={@link_local, @multicast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "010700", 0x30, 0x11, 0xff, @private1={0xfc, 0x1, '\x00', 0xfe}, @mcast2, {[], {0x0, 0xe22, 0x30, 0x0, @gue={{0x1, 0x0, 0x2, 0x0, 0x0, @void}, "f7c7794c6de9ccc2867ce74a12d218b249c564f6b41d4ec3362354c7d05f8f70b09b86da"}}}}}}}, 0x0) 1m45.807176749s ago: executing program 5 (id=810): syz_open_dev$loop(&(0x7f0000000000), 0x6, 0x5c4131a7c90e292b) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x48) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000380)={0x0, 0x0}) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) preadv(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f0000000280)='./file0\x00', 0x14806, &(0x7f0000000b00)=ANY=[], 0x0, 0x6fe, &(0x7f0000001340)="$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") futimesat(r1, &(0x7f0000000000)='./file1\x00', 0x0) 1m45.692675699s ago: executing program 5 (id=811): syz_open_dev$loop(&(0x7f0000000000), 0x6, 0x5c4131a7c90e292b) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, 0x0, 0x48) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000380)={0x0, 0x0}) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) preadv(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f0000000280)='./file0\x00', 0x14806, &(0x7f0000000b00)=ANY=[], 0x0, 0x6fe, &(0x7f0000001340)="$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") futimesat(r1, &(0x7f0000000000)='./file1\x00', 0x0) 1m45.532133138s ago: executing program 0 (id=812): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x121301, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x3, 0x0, 0x2}) r2 = syz_open_pts(r0, 0x8000) r3 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000040)) close_range(r0, r3, 0x0) 1m45.523055148s ago: executing program 36 (id=812): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x121301, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x3, 0x0, 0x2}) r2 = syz_open_pts(r0, 0x8000) r3 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000040)) close_range(r0, r3, 0x0) 1m45.520742738s ago: executing program 5 (id=814): socket$inet_smc(0x2b, 0x1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000400)='kfree\x00', r0, 0x0, 0x4}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='module_request\x00', r0, 0x0, 0xba9e}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000b80)={[{@nombcache}, {@abort}, {@dioread_lock}, {@norecovery}, {@discard}, {@lazytime}, {@noload}, {@usrquota}, {@noauto_da_alloc}]}, 0xfe, 0x558, &(0x7f0000000c00)="$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") chdir(&(0x7f000009df00)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x169242, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) ptrace$setregs(0x1a, r1, 0xc, &(0x7f0000000000)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r3, &(0x7f00000008c0)=""/49, 0x31) 1m45.299112287s ago: executing program 5 (id=815): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r1}, 0x10) r2 = syz_io_uring_setup(0x6908, &(0x7f00000006c0)={0x0, 0x2, 0x10100, 0x2}, &(0x7f0000000200), &(0x7f0000000100)) io_uring_enter(r2, 0x184c, 0x0, 0x0, 0x0, 0x0) 1m44.768162176s ago: executing program 5 (id=817): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket(0x22, 0x2, 0x3) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x4a000, 0x0) write$binfmt_register(r3, &(0x7f0000000400)={0x3a, 'syz1', 0x3a, 'E', 0x3a, 0x4, 0x3a, 'syzkaller\x00', 0x3a, 'syzkaller\x98', 0x3a, './file0', 0x3a, [0x46, 0x4f, 0x43, 0x4f, 0x4f, 0x43, 0x4f]}, 0x42) connect$phonet_pipe(r2, &(0x7f0000000000)={0x23, 0xff, 0x5, 0x3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) syz_emit_ethernet(0x46, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffffffffffffffff86dd6060626000102c00fe8000000000000000000000000000bbfe8000000000000000000000000000aa11000001"], 0x0) syz_emit_ethernet(0x52, &(0x7f00000007c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd601927f2001c2c00fe8000000000000600000000000000bbfe80002d60f16d0000000000000000aa000000060000000080000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f00000003c0), 0x5, r4}, 0x38) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5, 0x0, 0x2}, 0x18) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r3, &(0x7f0000000380)="edf8dfdcc285f7c2fa60fe4cc6c57f7be30910f052267ba51396a067154a94c5dee6ac3cd27b7a41debc77b0093b573feee4a1325e0b3c228bf4a03fee6fbebff2f74ead6fb32d7d3d9683bd969310c0216178c3073cd2a71e3a0323ea3f46fb0ef42a68511acaca140dba40", 0x6c) 1m44.767943166s ago: executing program 37 (id=817): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket(0x22, 0x2, 0x3) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000180), 0x4a000, 0x0) write$binfmt_register(r3, &(0x7f0000000400)={0x3a, 'syz1', 0x3a, 'E', 0x3a, 0x4, 0x3a, 'syzkaller\x00', 0x3a, 'syzkaller\x98', 0x3a, './file0', 0x3a, [0x46, 0x4f, 0x43, 0x4f, 0x4f, 0x43, 0x4f]}, 0x42) connect$phonet_pipe(r2, &(0x7f0000000000)={0x23, 0xff, 0x5, 0x3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) syz_emit_ethernet(0x46, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffffffffffffffff86dd6060626000102c00fe8000000000000000000000000000bbfe8000000000000000000000000000aa11000001"], 0x0) syz_emit_ethernet(0x52, &(0x7f00000007c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd601927f2001c2c00fe8000000000000600000000000000bbfe80002d60f16d0000000000000000aa000000060000000080000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f00000003c0), 0x5, r4}, 0x38) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5, 0x0, 0x2}, 0x18) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r3, &(0x7f0000000380)="edf8dfdcc285f7c2fa60fe4cc6c57f7be30910f052267ba51396a067154a94c5dee6ac3cd27b7a41debc77b0093b573feee4a1325e0b3c228bf4a03fee6fbebff2f74ead6fb32d7d3d9683bd969310c0216178c3073cd2a71e3a0323ea3f46fb0ef42a68511acaca140dba40", 0x6c) 1m41.618642999s ago: executing program 6 (id=830): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) open(&(0x7f0000000140)='./file0\x00', 0xec40, 0x12) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[], 0x7c}}, 0x20000001) sendmsg$NFT_BATCH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={{0x2}, [@NFT_MSG_NEWRULE={0x90, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x5}, [@NFTA_RULE_EXPRESSIONS={0x64, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_CT_DIRECTION={0x5, 0x3, 0x1}, @NFTA_CT_DREG={0x8, 0x1, 0x1, 0x0, 0x17}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x13}]}}}, {0x10, 0x1, 0x0, 0x1, @limit={{0xa}, @void}}, {0x10, 0x1, 0x0, 0x1, @target={{0xb}, @void}}, {0x18, 0x1, 0x0, 0x1, @log={{0x8}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_LOG_FLAGS={0x8, 0x6, 0x1, 0x0, 0x28}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0xb8}, 0x1, 0x0, 0x0, 0x24040880}, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000240)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0xfffc, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x6, 0xc2, 0x0, 0x0, 0x0, {[@nop]}}}}}}}, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000400)=ANY=[]) 1m41.512173879s ago: executing program 6 (id=833): bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000003000083850000002d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000080000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x18) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYRESOCT=0x0], 0x64}}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = syz_io_uring_setup(0x110, &(0x7f0000000340)={0x0, 0x810c, 0x8, 0x40000, 0x100000f0}, &(0x7f0000000400)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) syz_io_uring_submit(r3, r4, &(0x7f0000000440)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r5, 0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[], 0x348}, 0x0, 0x800, 0x1}) io_uring_enter(r2, 0x8aa, 0x0, 0x0, 0x0, 0x0) 1m41.472564419s ago: executing program 6 (id=834): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000202300800000000000000000850000"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040)=0x2, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x66, &(0x7f0000000100)={@link_local, @multicast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "010700", 0x30, 0x11, 0xff, @private1={0xfc, 0x1, '\x00', 0xfe}, @mcast2, {[], {0x0, 0xe22, 0x30, 0x0, @gue={{0x1, 0x0, 0x2, 0x0, 0x0, @void}, "f7c7794c6de9ccc2867ce74a12d218b249c564f6b41d4ec3362354c7d05f8f70b09b86da"}}}}}}}, 0x0) 1m41.370358088s ago: executing program 6 (id=835): socket$inet_smc(0x2b, 0x1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000400)='kfree\x00', r0, 0x0, 0x4}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='module_request\x00', r0, 0x0, 0xba9e}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000b80)={[{@nombcache}, {@abort}, {@dioread_lock}, {@norecovery}, {@discard}, {@lazytime}, {@noload}, {@usrquota}, {@noauto_da_alloc}]}, 0xfe, 0x558, &(0x7f0000000c00)="$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") chdir(&(0x7f000009df00)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x169242, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f00000008c0)=""/49, 0x31) 1m41.253815348s ago: executing program 6 (id=836): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x6, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x20c006, &(0x7f0000000200)={[{@i_version}, {@mblk_io_submit}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@discard}, {@data_err_abort}], [{@seclabel}]}, 0x1, 0x446, &(0x7f0000000d40)="$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") lsetxattr$security_selinux(&(0x7f00000001c0)='.\x00', &(0x7f0000000240), &(0x7f0000000280)='system_u:object_r:fsadm_exec_t:s0\x00', 0x1001, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x20000, 0x0) r2 = open_tree(r0, &(0x7f00000000c0)='./file0\x00', 0x1000) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {r2}}, '.\x00'}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) 1m40.584119647s ago: executing program 6 (id=842): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800}, 0x1745, 0x5dd7, 0x3, 0x5, 0x0, 0x20000008, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000bc0)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB='&\x00'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$unix(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/139, 0x8b}], 0x1}, 0x0) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000900)='>', 0x1}], 0x1}, 0x800) 1m40.543955417s ago: executing program 38 (id=842): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800}, 0x1745, 0x5dd7, 0x3, 0x5, 0x0, 0x20000008, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000bc0)=ANY=[@ANYRES32=r4, @ANYRES32=r3, @ANYBLOB='&\x00'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) recvmsg$unix(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/139, 0x8b}], 0x1}, 0x0) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000900)='>', 0x1}], 0x1}, 0x800) 2.817851436s ago: executing program 9 (id=3103): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) (async) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) (async) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8953, &(0x7f0000000180)={{0x2, 0x4e24, @rand_addr=0x64010102}, {0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x4}}, 0x9459831e6c2e00fd, {0x2, 0x0, @empty}, 'veth0_to_bond\x00'}) (async) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x3, 0x0, 0x0, 0x0, 0x0, 0x200, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fffffc, 0x0, @perf_config_ext={0x4, 0x8}, 0x403, 0xffffffff, 0x101, 0x6, 0x4, 0x7fffffe, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) (async) r5 = socket$nl_generic(0x10, 0x3, 0x10) (async) lsetxattr$trusted_overlay_upper(&(0x7f00000003c0)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000400), &(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x1015, 0x2) r6 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x80540, 0x188) (async) r7 = socket$pptp(0x18, 0x1, 0x2) setsockopt$sock_int(r7, 0x1, 0x12, &(0x7f0000000580)=0x800, 0x4) (async) r8 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) (async) bpf$TOKEN_CREATE(0x24, &(0x7f0000000240)={0x0, r9}, 0x8) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r10}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r11, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x1f00) (async) sendfile(r8, r6, 0x0, 0x3a) r12 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180), r5) sendmsg$TIPC_CMD_SET_LINK_PRI(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r12, @ANYBLOB="01002bbd7000fedbdf25010000000000000008410000004c0018000010006962"], 0x68}, 0x1, 0x0, 0x0, 0x20088891}, 0x20000080) (async) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x4e20, @local}, 0x10, 0x0, 0x0, &(0x7f0000000d00)=[@rdma_args={0x48, 0x114, 0x1, {{0x7, 0x4}, {0x0}, &(0x7f0000000c80)=[{&(0x7f0000002bc0)=""/4096, 0x1000}], 0x1, 0x41, 0x4}}], 0x48}, 0x0) 2.694570116s ago: executing program 9 (id=3105): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa1", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, 0x0) 2.666297916s ago: executing program 9 (id=3107): r0 = socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r1}, 0x18) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setscheduler(r3, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, r2, 0xe01e2000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) quotactl$Q_SYNC(0xffffffff80000102, 0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB='\x00'/14], 0x48) r7 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r8}, 0x10) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") add_key$fscrypt_provisioning(&(0x7f0000000600), &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000a80)=ANY=[@ANYBLOB="010000"], 0x29, 0xfffffffffffffffe) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') lseek(r9, 0x10001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x74, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 1.451410693s ago: executing program 9 (id=3137): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r1}, 0x18) r2 = syz_open_dev$usbfs(&(0x7f0000000340), 0x800000001f7, 0x82) r3 = dup(r2) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000240)={0x23, 0x3, 0x17, 0xf, 0x0, 0x2, 0x0}) 1.360564723s ago: executing program 9 (id=3140): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000040000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000180)='sys_enter\x00', r3}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000a40)='GPL\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) r6 = syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./bus\x00', 0xe, &(0x7f00000001c0)={[{@lazytime}, {@barrier_val={'barrier', 0x3d, 0x7}}, {@auto_da_alloc}, {@resgid={'resgid', 0x3d, r5}}, {@jqfmt_vfsold}, {@resuid={'resuid', 0x3d, r4}}, {@barrier_val}, {@max_batch_time={'max_batch_time', 0x3d, 0x16db}}, {@auto_da_alloc}, {@noload}]}, 0x0, 0x0, 0xfffffffffffffffd) r7 = getgid() r8 = getgid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000440)={{0x1, 0x1, 0x18, r2, {0xee00, 0xffffffffffffffff}}, './file0\x00'}) r10 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) setfsgid(r11) fsetxattr$system_posix_acl(r1, &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="02000000010004000000000002000000", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYRES64=r6, @ANYRES32=r4, @ANYBLOB="040002000000000008000000", @ANYRES32=0xee00, @ANYBLOB="08000000b7de702ba152bd985aca9a6e4e6bbcfc22768257d622c3151a14004cbbf9ffafc82324ad1f23e606589651cc24ff50ac4ce8de17eb2dcb9c5b68", @ANYRES32=r7, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="08000500", @ANYRES32=r9, @ANYBLOB="08000400", @ANYRES32=r11, @ANYBLOB="1000070042e303956c452b4e00000000fc393542a0b5cf03e0b89d"], 0x64, 0x1) r12 = socket$inet_mptcp(0x2, 0x1, 0x106) getsockopt$inet_tcp_int(r12, 0x6, 0x4, 0x0, &(0x7f0000000080)=0x4830df4f9c0e264) pipe2$9p(&(0x7f0000000000), 0x0) recvmsg(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) connect$netlink(0xffffffffffffffff, &(0x7f0000000480)=@proc={0x10, 0x0, 0x25dfdbff, 0x100}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x3, &(0x7f0000000340)=ANY=[@ANYRES8=r2], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r14, 0x29, 0x11, &(0x7f0000000080), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000040)=ANY=[@ANYRESHEX=r14], 0x0, 0x8, 0x0, 0x0, 0x0, 0x38, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000008c0)={r13, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r15 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) close_range(r15, 0xffffffffffffffff, 0x0) 1.308256933s ago: executing program 7 (id=3143): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x24, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000002d00)=@newtfilter={0x48, 0x2c, 0xd27, 0x70bd25, 0x2, {0x0, 0x0, 0x0, r3, {0x0, 0x1}, {}, {0x8}}, [@filter_kind_options=@f_matchall={{0xd}, {0x14, 0x2, [@TCA_MATCHALL_CLASSID={0x8, 0x1, {0x0, 0x10}}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x2}]}}]}, 0x48}}, 0x0) 1.261392062s ago: executing program 2 (id=3147): fchmod(0xffffffffffffffff, 0x202) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0xd71}, 0x18) socket$inet(0xa, 0x1, 0x0) io_setup(0x0, &(0x7f0000000000)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xb, 0x59032, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018", @ANYRES32], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = getpid() open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) process_vm_readv(r2, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) unshare(0x28000600) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={0xffffffffffffffff, r1, 0x2e, 0x0, @void}, 0x10) mremap(&(0x7f0000000000/0x9000)=nil, 0x600000, 0x200000, 0x3, &(0x7f0000a00000/0x600000)=nil) 1.200637402s ago: executing program 9 (id=3148): r0 = socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r1}, 0x18) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setscheduler(r3, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, r2, 0xe01e2000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) quotactl$Q_SYNC(0xffffffff80000102, 0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYBLOB='\x00'/14], 0x48) r7 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r7, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r8}, 0x10) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") add_key$fscrypt_provisioning(&(0x7f0000000600), &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000a80)=ANY=[@ANYBLOB="010000"], 0x29, 0xfffffffffffffffe) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') lseek(r9, 0x10001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x74, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 1.190214682s ago: executing program 7 (id=3150): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r1}, 0x18) r2 = syz_open_dev$usbfs(&(0x7f0000000340), 0x800000001f7, 0x82) r3 = dup(r2) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000240)={0x23, 0x3, 0x17, 0xf, 0x0, 0x2, 0x0}) 1.129100432s ago: executing program 8 (id=3152): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x26e1, 0x0) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="12000000290000000400000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r1}, &(0x7f0000000440), &(0x7f0000000480)}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff000000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000da6700000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r4}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r5}, 0x10) close(r2) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r7}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xc, &(0x7f0000000040)=@framed={{0x18, 0x8, 0x0, 0x0, 0x4}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, @exit], {0x95, 0x0, 0xff85}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xbb2, @void, @value}, 0x94) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x6, 0x4, &(0x7f0000002180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0xc0, &(0x7f00000020c0)=""/192, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) r10 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000080)={r8, r9, 0x25, 0x0, @void}, 0x10) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000140)={r10}, 0x10) sendmsg$inet(r0, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="2c000000000000000000000007000000441805"], 0x30}, 0x7e8166965e22236a) 1.124600252s ago: executing program 2 (id=3153): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x4000) mincore(&(0x7f0000634000/0x4000)=nil, 0x4000, &(0x7f0000000340)=""/218) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r0}, 0x8) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000040)={'syztnl1\x00', &(0x7f00000000c0)={'ip_vti0\x00', 0x0, 0x7610, 0x10, 0x4, 0x5, {{0x17, 0x4, 0x0, 0x6, 0x5c, 0x66, 0x0, 0x4, 0x2f, 0x0, @broadcast, @multicast2, {[@timestamp_addr={0x44, 0x14, 0x7a, 0x1, 0x9, [{@local, 0x1}, {@multicast2, 0xdb3}]}, @rr={0x7, 0x7, 0x83, [@empty]}, @timestamp={0x44, 0x10, 0xf8, 0x0, 0x1, [0x8, 0x1, 0x3ff]}, @timestamp={0x44, 0x1c, 0x72, 0x0, 0x4, [0x10000, 0x3, 0x7f1, 0x398, 0x4, 0xcbf]}, @end]}}}}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2, 0x0, 0x9}, 0x18) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) 1.115863642s ago: executing program 8 (id=3154): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="190000000400000008"], 0x48) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) recvmsg$unix(0xffffffffffffffff, 0x0, 0x103) socket$packet(0x11, 0x3, 0x300) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000180)='kfree\x00', r0, 0x0, 0x1}, 0x18) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(r2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000050000000000000000001811", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e8500000001000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000c80)='kfree\x00', r3}, 0x18) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'veth0_to_bond\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000000)={r5}, 0x10) sendmsg$nl_route_sched(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@getchain={0x24, 0x11, 0x839, 0x70bd2d, 0x25dfdc03, {0x0, 0x0, 0x0, r5, {0xc}, {0xfff3}}}, 0x24}}, 0x20040000) 1.093626002s ago: executing program 7 (id=3155): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000fb"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000001280), 0x6) 1.037852492s ago: executing program 2 (id=3156): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000120000000000000000000000850000006d000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x80000000000008, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb, 0x4008032, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYRES8=r2], 0x48) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000080)={0x42, 0x80000009, 0x2}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0), 0xffffffffffffffff) sendmsg$TIPC_NL_NET_SET(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYBLOB='D\x00', @ANYRES16=r4, @ANYBLOB="010000000000fdffffff0f0000003000078008000100050000000800020007"], 0x44}, 0x1, 0x0, 0x0, 0x44}, 0x0) r5 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000300)={0x42, 0x3}, 0x10) setsockopt$TIPC_GROUP_LEAVE(r5, 0x10f, 0x88) 1.036810572s ago: executing program 7 (id=3158): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x401) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x1000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x340, 0x11, 0x148, 0x340, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x88000000, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000900)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}, {0x0, 0x1}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x6, 0x2, 0x0, 0x2, 0xffffffff}}}}]}, 0x4c}}, 0x0) syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x410c84, &(0x7f0000000300)={[{@grpquota}, {@nodelalloc}]}, 0x1, 0x775, &(0x7f0000001180)="$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") r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f00000004c0), 0x208e24b) 998.967922ms ago: executing program 8 (id=3159): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c40)={r1, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540), 0x0, 0xc8, &(0x7f0000000c80)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000980), &(0x7f00000009c0), 0x8, 0x36, 0x8, 0x8, &(0x7f0000000a00)}}, 0x10) pipe(&(0x7f0000000600)) io_setup(0x3ff, &(0x7f0000000500)=0x0) io_submit(r2, 0x0, &(0x7f0000000200)) lseek(0xffffffffffffffff, 0x2000, 0x0) syz_io_uring_setup(0x7b, &(0x7f0000000540)={0x0, 0x0, 0x10100, 0x0, 0x1c6}, &(0x7f00000005c0), &(0x7f0000000100)) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000005c0)=ANY=[@ANYBLOB="14000000100001ff00000000000000000000000a2c000000050a01020000000000000000020000000900030073797a32000000000900010073797a300000000014000000020a031747d21400000000000000000014000000110001"], 0x68}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x18) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="190000000400000008000000ff7f000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000dd7d2b66753aa563179331b42fa414bb0a0ad3d07c8a0eb621fb906edb6ca0a1f3d78e2b0085507db569ba4015791e24ac552fdbb1890ac94dbe77dd6dcf4de9dfe8c67c1443896d7499508a8461f7e517242688539376c7d28d804df27f516bfab95ee04fbb2d1ccbb30694996656eefbb4f9ba659cf32683147270a32cff91abd642b2567296ae39dd7a5373cec1bcacfb2826c82ac5fb1fad2d1f004585760861cda5905fe39f9239082390eea7dc57344471bd0db87381723d963cae49b6c49bf62efc01804dc95396b1c9cdaf1274e15ea445d9f12a2d9df0c1731d884", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r6}, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = syz_clone(0x840000, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = syz_pidfd_open(r8, 0x0) process_mrelease(r9, 0x700000000000000) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r10}, 0x10) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000280)={'netdevsim0\x00', &(0x7f0000000400)=@ethtool_flash={0x33, 0x11fbfffd, '.\x00'}}) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 839.593661ms ago: executing program 4 (id=3162): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x24, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000002d00)=@newtfilter={0x48, 0x2c, 0xd27, 0x70bd25, 0x2, {0x0, 0x0, 0x0, r3, {0x0, 0x1}, {}, {0x8}}, [@filter_kind_options=@f_matchall={{0xd}, {0x14, 0x2, [@TCA_MATCHALL_CLASSID={0x8, 0x1, {0x0, 0x10}}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x2}]}}]}, 0x48}}, 0x0) 724.068671ms ago: executing program 8 (id=3163): fchmod(0xffffffffffffffff, 0x202) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0xd71}, 0x18) socket$inet(0xa, 0x1, 0x0) io_setup(0x0, &(0x7f0000000000)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xb, 0x59032, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018", @ANYRES32], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = getpid() open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) process_vm_readv(r2, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) unshare(0x28000600) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={0xffffffffffffffff, r1, 0x2e, 0x0, @void}, 0x10) mremap(&(0x7f0000000000/0x9000)=nil, 0x600000, 0x200000, 0x3, &(0x7f0000a00000/0x600000)=nil) 692.422141ms ago: executing program 4 (id=3164): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000200)='./bus/file0\x00', 0x0) rmdir(&(0x7f00000000c0)='./bus/file0\x00') 608.703921ms ago: executing program 4 (id=3165): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x26e1, 0x0) r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="12000000290000000400000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r1}, &(0x7f0000000440), &(0x7f0000000480)}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff000000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000da6700000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r5}, 0x10) close(r2) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r7}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xc, &(0x7f0000000040)=@framed={{0x18, 0x8, 0x0, 0x0, 0x4}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, @exit], {0x95, 0x0, 0xff85}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xbb2, @void, @value}, 0x94) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x6, 0x4, &(0x7f0000002180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x17}]}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0xc0, &(0x7f00000020c0)=""/192, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) r10 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000080)={r8, r9, 0x25, 0x0, @void}, 0x10) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000140)={r10}, 0x10) sendmsg$inet(r0, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="2c000000000000000000000007000000441805"], 0x30}, 0x7e8166965e22236a) 602.133681ms ago: executing program 8 (id=3166): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000000400000008000000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r1}, 0x18) r2 = syz_open_dev$usbfs(&(0x7f0000000340), 0x800000001f7, 0x82) r3 = dup(r2) ioctl$USBDEVFS_CONTROL(r3, 0xc0185500, &(0x7f0000000240)={0x23, 0x3, 0x17, 0xf, 0x0, 0x2, 0x0}) 503.753451ms ago: executing program 7 (id=3167): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000200)='./bus/file0\x00', 0x0) rmdir(&(0x7f00000000c0)='./bus/file0\x00') 503.098011ms ago: executing program 4 (id=3168): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000fb"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000001280), 0x6) 411.087211ms ago: executing program 2 (id=3169): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000fb"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r2}, 0x18) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000001280), 0x6) 410.69046ms ago: executing program 4 (id=3170): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="190000000400000008"], 0x48) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) recvmsg$unix(0xffffffffffffffff, 0x0, 0x103) socket$packet(0x11, 0x3, 0x300) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000180)='kfree\x00', r0, 0x0, 0x1}, 0x18) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(r1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000050000000000000000001811", @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000c80)='kfree\x00', r2}, 0x18) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'veth0_to_bond\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000000)={r4}, 0x10) sendmsg$nl_route_sched(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@getchain={0x24, 0x11, 0x839, 0x70bd2d, 0x25dfdc03, {0x0, 0x0, 0x0, r4, {0xc}, {0xfff3}}}, 0x24}}, 0x20040000) 362.91602ms ago: executing program 7 (id=3171): socket$nl_route(0x10, 0x3, 0x0) (async) r0 = msgget$private(0x0, 0x100) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) msgctl$IPC_SET(r0, 0x1, 0x0) (async) msgrcv(0x0, &(0x7f0000000300)={0x0, ""/54}, 0x3e, 0x2, 0x2000) (async) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$inet(r1, 0x0, 0x0, 0x40400c1) (async) msgrcv(r0, 0x0, 0x0, 0x1, 0x0) msgsnd(0x0, &(0x7f0000000800)={0x1, "fb87754b9adc8926f699d806e8cb17e3e653b8ebc3776310f33235563623f6f2e3221a024f0177c865adf9a9ec983c2c0c54121d49fa249cec30ece6c7f6e46a5e37cc18b0ad497b28792dc563ed58792aa0e18be311e81c725f974950d964919019ee27ead6dfb96b75e6c4b53fa6892dd5a18efd69e9a5bd5ce7f08e7277f5933553"}, 0x8b, 0x800) (async) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) (async) r2 = syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x8401) ioctl$USBDEVFS_SUBMITURB(r2, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0xc1, 0x0, 0x0, 0x49a}, 0x8, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) r3 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r3, 0x0) ioctl$USBDEVFS_REAPURB(r2, 0x4008550c, 0x0) (async) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000100)=0x5) (async, rerun: 64) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) (async) r6 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r6) ptrace$cont(0x7, r6, 0x5, 0x8) 360.8731ms ago: executing program 8 (id=3172): r0 = socket$key(0xf, 0x3, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, @void, @value}, 0x94) r1 = socket$unix(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000300)={'vxcan1\x00', 0x0}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r5, &(0x7f0000000200)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="0100000003ece1e40ad8871461ab0800", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="3bf81bb9f9"], 0x20000600}}, 0x0) sendmsg$can_bcm(r5, &(0x7f0000000080)={&(0x7f0000000340)={0x1d, r2, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[], 0x4640}, 0x2}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000c00)=ANY=[@ANYBLOB="3801000010001307000000000000000000000000000000000000000000000000fe88000000000000000000000000010100000100000200000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414bb0000000000000000000000000000000032000000ac1414aa000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e84100000000000000000000000000000200000000000000000000000000000000000000000000000000000002000400000000000000000048000200637473286563622d6165732d6e656f6e290000000000000000000000000000000000000000000000000000000000fdffffff000000000000000000000000000000000000fc0800d7867cb0817244f8563875254c1d615d02c88a2729a1b3d831d6fd2b0955ec47d3afa0dfd4a17defb700cd16a6eb22698d21673c4982a7b8ff917a704ba9e0113d291d3056b9350855080dba293a07a24a5cfab45f33b4ce6310701460cac5ef9a9eef344ab1666f8b7154565f12253b62419ec6b0535faf64aa6eca0d3f2923b6d6cc66cf878291c6551b5c0718036d2ea7ee48036fbabe0fb300c1d66528ce7c78697ecfe81946e85a50ab8eee6feee9ad305409546038d5cbd6dd84e8084f78d419e6ed8dd97bce5d547c8b1bfd9ba8098ba46af8bea797a915fe031a09e8c5d481ccffabf48b0decd119c53850160bd90babb25acb0aa83ccd02c9a02123051e6ea00ad29973dc49e9ee353f77be4a83ee53df7b474e46f12856a3e04bce754c94655c942ea542e10e7609be506d50524a3bdca2c3b9474d0ed9181e8f21129b07b0e8a329df148eae3dd5f7cdd9e92b197358197e5938207c906b885685ce364d8b4a866bea71ec14793ae9"], 0x138}}, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r8, &(0x7f0000000300)=ANY=[@ANYRES8], 0x15) r9 = dup(r8) write$P9_RLERRORu(r9, &(0x7f0000000540)=ANY=[], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r9, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r9, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r7, @ANYBLOB=',wfdno=', @ANYRESHEX=r9]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r6}, 0x10) r10 = syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x665a, 0x0, 0x8003}, &(0x7f0000000440)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r11, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) syz_io_uring_submit(r11, r12, &(0x7f00000004c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x38, 0x3, r10, 0x0, 0x0, 0x0, 0x1, 0x1, {0x2}}) io_uring_enter(r10, 0x6e2, 0x600, 0x1, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) read$msr(r13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000040)={0xa, 0x0, &(0x7f0000000340)={&(0x7f0000000b00)=ANY=[@ANYBLOB="020300000b0000000000000000000000030006000000000002000000e000000100000000000000000200010000001c000000fb18000000000300050000000000020000007f0000010000000000000000010018"], 0x58}, 0x1, 0x7}, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) 228.79042ms ago: executing program 2 (id=3173): bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000003000083850000002d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000080000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xae, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x18) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYRESOCT=0x0], 0x64}}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = syz_io_uring_setup(0x110, &(0x7f0000000340)={0x0, 0x810c, 0x8, 0x40000, 0x100000f0}, &(0x7f0000000400)=0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) syz_io_uring_submit(r3, 0x0, &(0x7f0000000440)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r4, 0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[], 0x348}, 0x0, 0x800, 0x1}) io_uring_enter(r2, 0x8aa, 0x0, 0x0, 0x0, 0x0) 41.50734ms ago: executing program 2 (id=3174): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000710000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 0s ago: executing program 4 (id=3175): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000fb"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000800000000000000000001811", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r0, &(0x7f0000001280), 0x6) kernel console output (not intermixed with test programs): atman_adv: batadv3: No MLD Querier present - multicast optimizations disabled [ 144.462628][T11782] netlink: 12 bytes leftover after parsing attributes in process `syz.8.2054'. [ 144.504153][T11782] bridge0: port 10(batadv8) entered blocking state [ 144.510728][T11782] bridge0: port 10(batadv8) entered disabled state [ 144.546704][T11782] batadv8: entered allmulticast mode [ 144.556019][T11782] batadv8: entered promiscuous mode [ 144.621672][T11790] netlink: 8 bytes leftover after parsing attributes in process `syz.8.2058'. [ 144.630757][T11790] netlink: 16 bytes leftover after parsing attributes in process `syz.8.2058'. [ 144.647370][T11784] netlink: 'syz.4.2056': attribute type 29 has an invalid length. [ 144.656173][T11784] netlink: 'syz.4.2056': attribute type 29 has an invalid length. [ 144.924742][T11822] netlink: 4 bytes leftover after parsing attributes in process `syz.8.2069'. [ 144.991627][T10406] batman_adv: batadv8: No IGMP Querier present - multicast optimizations disabled [ 145.001022][T10406] batman_adv: batadv8: No MLD Querier present - multicast optimizations disabled [ 145.060378][T11835] netlink: 16 bytes leftover after parsing attributes in process `syz.7.2077'. [ 145.132501][T11806] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2065'. [ 145.147565][T11837] FAULT_INJECTION: forcing a failure. [ 145.147565][T11837] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 145.161191][T11837] CPU: 1 UID: 0 PID: 11837 Comm: syz.7.2078 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 145.161224][T11837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 145.161241][T11837] Call Trace: [ 145.161248][T11837] [ 145.161258][T11837] dump_stack_lvl+0xf2/0x150 [ 145.161293][T11837] dump_stack+0x15/0x1a [ 145.161333][T11837] should_fail_ex+0x24a/0x260 [ 145.161390][T11837] should_fail+0xb/0x10 [ 145.161430][T11837] should_fail_usercopy+0x1a/0x20 [ 145.161463][T11837] _copy_from_user+0x1c/0xa0 [ 145.161502][T11837] sg_new_write+0x77a/0x8e0 [ 145.161563][T11837] sg_ioctl+0xe22/0x1870 [ 145.161592][T11837] ? __fget_files+0x17c/0x1c0 [ 145.161629][T11837] ? __pfx_sg_ioctl+0x10/0x10 [ 145.161677][T11837] __se_sys_ioctl+0xc9/0x140 [ 145.161709][T11837] __x64_sys_ioctl+0x43/0x50 [ 145.161796][T11837] x64_sys_call+0x1690/0x2dc0 [ 145.161826][T11837] do_syscall_64+0xc9/0x1c0 [ 145.161860][T11837] ? clear_bhb_loop+0x55/0xb0 [ 145.161891][T11837] ? clear_bhb_loop+0x55/0xb0 [ 145.161921][T11837] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 145.161999][T11837] RIP: 0033:0x7fbec731d169 [ 145.162014][T11837] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 145.162035][T11837] RSP: 002b:00007fbec5981038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 145.162056][T11837] RAX: ffffffffffffffda RBX: 00007fbec7535fa0 RCX: 00007fbec731d169 [ 145.162070][T11837] RDX: 0000400000000040 RSI: 0000000000002285 RDI: 0000000000000004 [ 145.162083][T11837] RBP: 00007fbec5981090 R08: 0000000000000000 R09: 0000000000000000 [ 145.162097][T11837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 145.162167][T11837] R13: 0000000000000000 R14: 00007fbec7535fa0 R15: 00007ffce4942908 [ 145.162187][T11837] [ 145.369678][T11838] FAULT_INJECTION: forcing a failure. [ 145.369678][T11838] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 145.383221][T11838] CPU: 0 UID: 0 PID: 11838 Comm: syz.2.2074 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 145.383253][T11838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 145.383275][T11838] Call Trace: [ 145.383285][T11838] [ 145.383299][T11838] dump_stack_lvl+0xf2/0x150 [ 145.383380][T11838] dump_stack+0x15/0x1a [ 145.383428][T11838] should_fail_ex+0x24a/0x260 [ 145.383459][T11838] should_fail_alloc_page+0xfd/0x110 [ 145.383542][T11838] __alloc_frozen_pages_noprof+0x109/0x340 [ 145.383614][T11838] alloc_pages_mpol+0xb4/0x260 [ 145.383637][T11838] vma_alloc_folio_noprof+0x1a0/0x310 [ 145.383662][T11838] handle_mm_fault+0xdd7/0x2ac0 [ 145.383743][T11838] exc_page_fault+0x3b9/0x650 [ 145.383771][T11838] asm_exc_page_fault+0x26/0x30 [ 145.383826][T11838] RIP: 0033:0x7f322be6a78b [ 145.383844][T11838] Code: c0 8b 87 c0 00 00 00 66 0f 6c c0 85 c0 0f 85 44 01 00 00 c7 87 c0 00 00 00 ff ff ff ff 48 8d 84 24 20 21 00 00 48 8d 7c 24 20 <0f> 29 44 24 40 49 89 e4 48 89 44 24 50 8b 43 74 48 89 9c 24 00 01 [ 145.383877][T11838] RSP: 002b:00007f322a503e10 EFLAGS: 00010246 [ 145.383892][T11838] RAX: 00007f322a505f30 RBX: 00007f322c0ac620 RCX: 0000000000000000 [ 145.383904][T11838] RDX: 00007f322a505f78 RSI: 00007f322bf1cbd8 RDI: 00007f322a503e30 [ 145.383916][T11838] RBP: 0000000000000009 R08: 0000000000000000 R09: 0000000000000000 [ 145.383927][T11838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 145.383939][T11838] R13: 0000000000000001 R14: 00007f322c0d6080 R15: 00007ffe3913fcd8 [ 145.383956][T11838] [ 145.384060][T11838] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 145.413515][T11839] netlink: 'syz.8.2075': attribute type 29 has an invalid length. [ 145.549578][T11831] netlink: 'syz.8.2075': attribute type 29 has an invalid length. [ 145.565072][ T6175] EXT4-fs (loop9): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 145.693388][T11851] netlink: 4 bytes leftover after parsing attributes in process `syz.9.2083'. [ 145.725614][T11857] xt_hashlimit: max too large, truncated to 1048576 [ 145.734806][T11857] netlink: 36 bytes leftover after parsing attributes in process `syz.8.2086'. [ 145.743901][T11857] netlink: 36 bytes leftover after parsing attributes in process `syz.8.2086'. [ 145.760841][T11857] sch_tbf: peakrate 8 is lower than or equals to rate 12 ! [ 146.096818][T11900] +: renamed from syzkaller0 [ 146.131111][T11901] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=41664 sclass=netlink_route_socket pid=11901 comm=syz.7.2105 [ 146.314419][T11919] bridge0: port 6(batadv4) entered blocking state [ 146.320925][T11919] bridge0: port 6(batadv4) entered disabled state [ 146.338532][T11919] batadv4: entered allmulticast mode [ 146.346106][T11919] batadv4: entered promiscuous mode [ 146.553492][T11950] bridge0: port 7(batadv5) entered blocking state [ 146.560256][T11950] bridge0: port 7(batadv5) entered disabled state [ 146.577559][T11950] batadv5: entered allmulticast mode [ 146.585379][T11950] batadv5: entered promiscuous mode [ 146.633536][T11957] veth0_vlan: entered allmulticast mode [ 146.760654][T11962] usb usb2: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 146.768176][T11962] vhci_hcd: default hub control req: 2314 v0008 i0002 l0 [ 146.785737][T11962] xt_bpf: check failed: parse error [ 146.791128][T10406] batman_adv: batadv4: No IGMP Querier present - multicast optimizations disabled [ 146.800517][T10406] batman_adv: batadv4: No MLD Querier present - multicast optimizations disabled [ 146.921285][T11976] 9p: Unknown access argument (P=nܘ=ÊÀîÌ3·€‘‚еÇ—ò·!>Eˆn'Š ŸvŸ?Nú¢NYÓ¶00000000000000000000: -22 [ 146.975708][T11981] +: renamed from syzkaller0 [ 147.042014][T10411] batman_adv: batadv5: No IGMP Querier present - multicast optimizations disabled [ 147.051464][T10411] batman_adv: batadv5: No MLD Querier present - multicast optimizations disabled [ 147.061327][T11985] netlink: 'syz.7.2143': attribute type 1 has an invalid length. [ 147.240952][T11999] syzkaller0: tun_chr_ioctl cmd 3288896564 [ 147.278675][T11999] wg2: entered promiscuous mode [ 147.283660][T11999] wg2: entered allmulticast mode [ 147.720720][T12025] +: renamed from syzkaller0 [ 147.781179][T12027] FAULT_INJECTION: forcing a failure. [ 147.781179][T12027] name failslab, interval 1, probability 0, space 0, times 0 [ 147.793893][T12027] CPU: 1 UID: 0 PID: 12027 Comm: syz.4.2163 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 147.793925][T12027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 147.793941][T12027] Call Trace: [ 147.793948][T12027] [ 147.793957][T12027] dump_stack_lvl+0xf2/0x150 [ 147.794049][T12027] dump_stack+0x15/0x1a [ 147.794140][T12027] should_fail_ex+0x24a/0x260 [ 147.794173][T12027] should_failslab+0x8f/0xb0 [ 147.794203][T12027] kmem_cache_alloc_node_noprof+0x59/0x320 [ 147.794229][T12027] ? __alloc_skb+0x10b/0x310 [ 147.794253][T12027] __alloc_skb+0x10b/0x310 [ 147.794313][T12027] netlink_alloc_large_skb+0xad/0xe0 [ 147.794423][T12027] netlink_sendmsg+0x3b4/0x6e0 [ 147.794535][T12027] ? __pfx_netlink_sendmsg+0x10/0x10 [ 147.794570][T12027] __sock_sendmsg+0x140/0x180 [ 147.794618][T12027] ____sys_sendmsg+0x326/0x4b0 [ 147.794701][T12027] __sys_sendmsg+0x19d/0x230 [ 147.794740][T12027] __x64_sys_sendmsg+0x46/0x50 [ 147.794793][T12027] x64_sys_call+0x2734/0x2dc0 [ 147.794823][T12027] do_syscall_64+0xc9/0x1c0 [ 147.794856][T12027] ? clear_bhb_loop+0x55/0xb0 [ 147.794917][T12027] ? clear_bhb_loop+0x55/0xb0 [ 147.794950][T12027] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 147.794981][T12027] RIP: 0033:0x7f2a8a6ad169 [ 147.794998][T12027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 147.795019][T12027] RSP: 002b:00007f2a88d17038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 147.795110][T12027] RAX: ffffffffffffffda RBX: 00007f2a8a8c5fa0 RCX: 00007f2a8a6ad169 [ 147.795124][T12027] RDX: 0000000004040000 RSI: 0000400000000100 RDI: 0000000000000004 [ 147.795138][T12027] RBP: 00007f2a88d17090 R08: 0000000000000000 R09: 0000000000000000 [ 147.795151][T12027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 147.795164][T12027] R13: 0000000000000000 R14: 00007f2a8a8c5fa0 R15: 00007ffcda14d308 [ 147.795183][T12027] [ 148.091417][ T29] kauditd_printk_skb: 742 callbacks suppressed [ 148.091430][ T29] audit: type=1326 audit(1740783423.359:8532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12032 comm="syz.2.2165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 148.121162][ T29] audit: type=1326 audit(1740783423.359:8533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12032 comm="syz.2.2165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 148.144737][ T29] audit: type=1326 audit(1740783423.359:8534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12032 comm="syz.2.2165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 148.185752][ T29] audit: type=1326 audit(1740783423.432:8535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12032 comm="syz.2.2165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 148.209524][ T29] audit: type=1326 audit(1740783423.432:8536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12032 comm="syz.2.2165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 148.233232][ T29] audit: type=1326 audit(1740783423.432:8537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12032 comm="syz.2.2165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 148.256846][ T29] audit: type=1326 audit(1740783423.432:8538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12032 comm="syz.2.2165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 148.281155][ T29] audit: type=1326 audit(1740783423.432:8539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12032 comm="syz.2.2165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 148.304965][ T29] audit: type=1326 audit(1740783423.432:8540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12032 comm="syz.2.2165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=140 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 148.328518][ T29] audit: type=1326 audit(1740783423.432:8541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12032 comm="syz.2.2165" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 148.384351][T12046] bridge0: port 11(batadv9) entered blocking state [ 148.391025][T12046] bridge0: port 11(batadv9) entered disabled state [ 148.427680][T12046] batadv9: entered allmulticast mode [ 148.435655][T12046] batadv9: entered promiscuous mode [ 148.437757][T12056] FAULT_INJECTION: forcing a failure. [ 148.437757][T12056] name failslab, interval 1, probability 0, space 0, times 0 [ 148.453651][T12056] CPU: 0 UID: 0 PID: 12056 Comm: syz.9.2174 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 148.453681][T12056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 148.453694][T12056] Call Trace: [ 148.453699][T12056] [ 148.453706][T12056] dump_stack_lvl+0xf2/0x150 [ 148.453732][T12056] dump_stack+0x15/0x1a [ 148.453788][T12056] should_fail_ex+0x24a/0x260 [ 148.453823][T12056] should_failslab+0x8f/0xb0 [ 148.453872][T12056] kmem_cache_alloc_noprof+0x52/0x320 [ 148.453913][T12056] ? getname_flags+0x81/0x3b0 [ 148.454027][T12056] getname_flags+0x81/0x3b0 [ 148.454060][T12056] user_path_create+0x26/0x120 [ 148.454091][T12056] bpf_obj_pin_user+0xc9/0x260 [ 148.454153][T12056] bpf_obj_pin+0xd8/0xf0 [ 148.454190][T12056] __sys_bpf+0x5ad/0x7a0 [ 148.454225][T12056] __x64_sys_bpf+0x43/0x50 [ 148.454249][T12056] x64_sys_call+0x2914/0x2dc0 [ 148.454286][T12056] do_syscall_64+0xc9/0x1c0 [ 148.454323][T12056] ? clear_bhb_loop+0x55/0xb0 [ 148.454406][T12056] ? clear_bhb_loop+0x55/0xb0 [ 148.454440][T12056] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 148.454472][T12056] RIP: 0033:0x7f706eabd169 [ 148.454490][T12056] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 148.454512][T12056] RSP: 002b:00007f706d127038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 148.454534][T12056] RAX: ffffffffffffffda RBX: 00007f706ecd5fa0 RCX: 00007f706eabd169 [ 148.454600][T12056] RDX: 0000000000000018 RSI: 0000400000001740 RDI: 0000000000000006 [ 148.454615][T12056] RBP: 00007f706d127090 R08: 0000000000000000 R09: 0000000000000000 [ 148.454629][T12056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 148.454644][T12056] R13: 0000000000000000 R14: 00007f706ecd5fa0 R15: 00007fff440efd18 [ 148.454663][T12056] [ 148.803007][T12082] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 148.829878][T12085] bridge0: port 8(batadv6) entered blocking state [ 148.836360][T12085] bridge0: port 8(batadv6) entered disabled state [ 148.855342][T12085] batadv6: entered allmulticast mode [ 148.861124][T12085] batadv6: entered promiscuous mode [ 148.872023][T10415] batman_adv: batadv9: No IGMP Querier present - multicast optimizations disabled [ 148.881288][T10415] batman_adv: batadv9: No MLD Querier present - multicast optimizations disabled [ 148.906207][T12093] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 148.919362][T12082] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 148.947014][T12098] netlink: 'syz.2.2184': attribute type 5 has an invalid length. [ 148.959781][T12083] lo speed is unknown, defaulting to 1000 [ 148.993476][T12101] siw: device registration error -23 [ 149.021431][T12082] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 149.117030][T12082] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 149.158605][T12113] __nla_validate_parse: 20 callbacks suppressed [ 149.158621][T12113] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2199'. [ 149.202580][T12082] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 149.224635][T12082] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 149.243828][T12082] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 149.255920][T12082] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 149.332230][T10386] batman_adv: batadv6: No IGMP Querier present - multicast optimizations disabled [ 149.341558][T10386] batman_adv: batadv6: No MLD Querier present - multicast optimizations disabled [ 149.411841][T12125] +: renamed from syzkaller0 [ 149.494606][T12129] netlink: 'syz.4.2201': attribute type 29 has an invalid length. [ 149.570901][T12139] netlink: 4 bytes leftover after parsing attributes in process `syz.7.2207'. [ 149.603969][T12138] lo speed is unknown, defaulting to 1000 [ 149.653497][T12147] siw: device registration error -23 [ 149.707855][T12148] netlink: 8 bytes leftover after parsing attributes in process `syz.8.2213'. [ 149.716832][T12148] netlink: 16 bytes leftover after parsing attributes in process `syz.8.2213'. [ 149.815817][T12151] netlink: 'syz.2.2212': attribute type 29 has an invalid length. [ 149.824329][T12151] netlink: 'syz.2.2212': attribute type 29 has an invalid length. [ 150.073969][T12166] lo speed is unknown, defaulting to 1000 [ 150.346570][T12192] lo speed is unknown, defaulting to 1000 [ 150.364639][T12194] vhci_hcd: invalid port number 15 [ 150.369924][T12194] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 150.388555][T12199] siw: device registration error -23 [ 150.390042][T12194] netlink: 'syz.4.2233': attribute type 30 has an invalid length. [ 150.446383][T12201] wg2: entered promiscuous mode [ 150.451335][T12201] wg2: entered allmulticast mode [ 150.639308][T12212] lo speed is unknown, defaulting to 1000 [ 150.749015][T12212] siw: device registration error -23 [ 150.761550][T12225] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2247'. [ 150.770529][T12225] netlink: 16 bytes leftover after parsing attributes in process `syz.4.2247'. [ 150.976642][T12239] netlink: 'syz.9.2248': attribute type 29 has an invalid length. [ 150.986619][T12239] netlink: 'syz.9.2248': attribute type 29 has an invalid length. [ 151.125771][T12250] netlink: 12 bytes leftover after parsing attributes in process `syz.7.2259'. [ 151.142121][T12244] lo speed is unknown, defaulting to 1000 [ 151.147714][T12250] bridge0: port 6(batadv4) entered blocking state [ 151.154523][T12250] bridge0: port 6(batadv4) entered disabled state [ 151.162410][T12251] siw: device registration error -23 [ 151.170023][T12250] batadv4: entered allmulticast mode [ 151.177139][T12250] batadv4: entered promiscuous mode [ 151.404370][T12273] wg2: left promiscuous mode [ 151.409152][T12273] wg2: left allmulticast mode [ 151.423945][T12273] syzkaller0: tun_chr_ioctl cmd 3288896564 [ 151.547333][T12279] +: renamed from syzkaller0 [ 151.585079][T12283] netlink: 64 bytes leftover after parsing attributes in process `syz.2.2274'. [ 151.634255][T10406] batman_adv: batadv4: No IGMP Querier present - multicast optimizations disabled [ 151.643552][T10406] batman_adv: batadv4: No MLD Querier present - multicast optimizations disabled [ 151.676566][T12293] +: renamed from syzkaller0 [ 151.715305][T12296] netlink: 12 bytes leftover after parsing attributes in process `syz.7.2280'. [ 151.863159][T12314] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2290'. [ 151.873924][T12312] syzkaller0: tun_chr_ioctl cmd 3288896564 [ 152.129332][T12352] sg_write: data in/out 28/42 bytes for SCSI command 0x0-- guessing data in; [ 152.129332][T12352] program syz.7.2303 not setting count and/or reply_len properly [ 152.151073][T12351] vhci_hcd: invalid port number 15 [ 152.156218][T12351] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 152.167085][T12351] netlink: 'syz.9.2301': attribute type 30 has an invalid length. [ 152.175196][T12352] netlink: 'syz.7.2303': attribute type 8 has an invalid length. [ 152.185353][T12357] netlink: 'syz.8.2298': attribute type 29 has an invalid length. [ 152.251780][T12363] FAULT_INJECTION: forcing a failure. [ 152.251780][T12363] name failslab, interval 1, probability 0, space 0, times 0 [ 152.264514][T12363] CPU: 0 UID: 0 PID: 12363 Comm: syz.4.2306 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 152.264620][T12363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 152.264637][T12363] Call Trace: [ 152.264645][T12363] [ 152.264654][T12363] dump_stack_lvl+0xf2/0x150 [ 152.264689][T12363] dump_stack+0x15/0x1a [ 152.264713][T12363] should_fail_ex+0x24a/0x260 [ 152.264742][T12363] ? fsnotify_add_mark_locked+0x264/0x7f0 [ 152.264824][T12363] should_failslab+0x8f/0xb0 [ 152.264883][T12363] __kmalloc_cache_noprof+0x4e/0x320 [ 152.264907][T12363] fsnotify_add_mark_locked+0x264/0x7f0 [ 152.264982][T12363] fcntl_dirnotify+0x35e/0x590 [ 152.265024][T12363] do_fcntl+0x650/0xe10 [ 152.265047][T12363] __se_sys_fcntl+0xbd/0x1b0 [ 152.265069][T12363] __x64_sys_fcntl+0x43/0x50 [ 152.265090][T12363] x64_sys_call+0x2129/0x2dc0 [ 152.265127][T12363] do_syscall_64+0xc9/0x1c0 [ 152.265171][T12363] ? clear_bhb_loop+0x55/0xb0 [ 152.265203][T12363] ? clear_bhb_loop+0x55/0xb0 [ 152.265235][T12363] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 152.265279][T12363] RIP: 0033:0x7f2a8a6ad169 [ 152.265293][T12363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 152.265310][T12363] RSP: 002b:00007f2a88d17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 152.265327][T12363] RAX: ffffffffffffffda RBX: 00007f2a8a8c5fa0 RCX: 00007f2a8a6ad169 [ 152.265341][T12363] RDX: 0000000000000005 RSI: 0000000000000402 RDI: 0000000000000004 [ 152.265355][T12363] RBP: 00007f2a88d17090 R08: 0000000000000000 R09: 0000000000000000 [ 152.265406][T12363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 152.265420][T12363] R13: 0000000000000000 R14: 00007f2a8a8c5fa0 R15: 00007ffcda14d308 [ 152.265441][T12363] [ 152.470993][T12365] syzkaller0: tun_chr_ioctl cmd 3288896564 [ 152.614471][T12385] FAULT_INJECTION: forcing a failure. [ 152.614471][T12385] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 152.627826][T12385] CPU: 1 UID: 0 PID: 12385 Comm: syz.4.2317 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 152.627853][T12385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 152.627864][T12385] Call Trace: [ 152.627870][T12385] [ 152.627877][T12385] dump_stack_lvl+0xf2/0x150 [ 152.627978][T12385] dump_stack+0x15/0x1a [ 152.628053][T12385] should_fail_ex+0x24a/0x260 [ 152.628080][T12385] should_fail_alloc_page+0xfd/0x110 [ 152.628109][T12385] __alloc_frozen_pages_noprof+0x109/0x340 [ 152.628142][T12385] alloc_pages_bulk_noprof+0x3a0/0x570 [ 152.628190][T12385] ? should_failslab+0x8f/0xb0 [ 152.628223][T12385] ? __kmalloc_noprof+0x1e3/0x3f0 [ 152.628246][T12385] ? copy_splice_read+0xb5/0x5b0 [ 152.628274][T12385] copy_splice_read+0xe5/0x5b0 [ 152.628364][T12385] ? __kmalloc_noprof+0x284/0x3f0 [ 152.628386][T12385] ? alloc_pipe_info+0x1cb/0x360 [ 152.628496][T12385] ? __pfx_copy_splice_read+0x10/0x10 [ 152.628525][T12385] splice_direct_to_actor+0x269/0x670 [ 152.628551][T12385] ? __pfx_direct_splice_actor+0x10/0x10 [ 152.628580][T12385] do_splice_direct+0xd7/0x150 [ 152.628607][T12385] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 152.628721][T12385] do_sendfile+0x398/0x660 [ 152.628741][T12385] __x64_sys_sendfile64+0x110/0x150 [ 152.628775][T12385] x64_sys_call+0xfbd/0x2dc0 [ 152.628844][T12385] do_syscall_64+0xc9/0x1c0 [ 152.628872][T12385] ? clear_bhb_loop+0x55/0xb0 [ 152.628921][T12385] ? clear_bhb_loop+0x55/0xb0 [ 152.628951][T12385] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 152.628981][T12385] RIP: 0033:0x7f2a8a6ad169 [ 152.628996][T12385] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 152.629016][T12385] RSP: 002b:00007f2a88d17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 152.629040][T12385] RAX: ffffffffffffffda RBX: 00007f2a8a8c5fa0 RCX: 00007f2a8a6ad169 [ 152.629054][T12385] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000004 [ 152.629069][T12385] RBP: 00007f2a88d17090 R08: 0000000000000000 R09: 0000000000000000 [ 152.629082][T12385] R10: 000000000000003a R11: 0000000000000246 R12: 0000000000000001 [ 152.629095][T12385] R13: 0000000000000000 R14: 00007f2a8a8c5fa0 R15: 00007ffcda14d308 [ 152.629131][T12385] [ 153.029892][ T29] kauditd_printk_skb: 181 callbacks suppressed [ 153.029910][ T29] audit: type=1400 audit(1740783428.547:8723): avc: denied { create } for pid=12411 comm="syz.8.2329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 153.063193][T12414] wg2: entered promiscuous mode [ 153.068140][T12414] wg2: entered allmulticast mode [ 153.079436][ T29] audit: type=1400 audit(1740783428.589:8724): avc: denied { accept } for pid=12411 comm="syz.8.2329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 153.150118][ T29] audit: type=1400 audit(1740783428.652:8725): avc: denied { accept } for pid=12421 comm="syz.4.2334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 153.199985][T12432] FAULT_INJECTION: forcing a failure. [ 153.199985][T12432] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 153.211780][T12426] 9pnet: Could not find request transport: f [ 153.213129][T12432] CPU: 0 UID: 0 PID: 12432 Comm: syz.8.2338 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 153.213223][T12432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 153.213241][T12432] Call Trace: [ 153.213250][T12432] [ 153.213261][T12432] dump_stack_lvl+0xf2/0x150 [ 153.213297][T12432] dump_stack+0x15/0x1a [ 153.213382][T12432] should_fail_ex+0x24a/0x260 [ 153.213420][T12432] should_fail+0xb/0x10 [ 153.213476][T12432] should_fail_usercopy+0x1a/0x20 [ 153.213570][T12432] _copy_from_user+0x1c/0xa0 [ 153.213613][T12432] memdup_user+0x64/0xc0 [ 153.213652][T12432] strndup_user+0x68/0xa0 [ 153.213692][T12432] __se_sys_mount+0x4e/0x2d0 [ 153.213732][T12432] ? __bpf_trace_sys_enter+0x10/0x30 [ 153.213762][T12432] ? trace_sys_enter+0xcd/0x110 [ 153.213928][T12432] __x64_sys_mount+0x67/0x80 [ 153.213967][T12432] x64_sys_call+0x2c84/0x2dc0 [ 153.214001][T12432] do_syscall_64+0xc9/0x1c0 [ 153.214041][T12432] ? clear_bhb_loop+0x55/0xb0 [ 153.214154][T12432] ? clear_bhb_loop+0x55/0xb0 [ 153.214213][T12432] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 153.214248][T12432] RIP: 0033:0x7f41c3efd169 [ 153.214267][T12432] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 153.214351][T12432] RSP: 002b:00007f41c2561038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 153.214377][T12432] RAX: ffffffffffffffda RBX: 00007f41c4115fa0 RCX: 00007f41c3efd169 [ 153.214466][T12432] RDX: 0000400000000b80 RSI: 0000400000000040 RDI: 0000000000000000 [ 153.214505][T12432] RBP: 00007f41c2561090 R08: 0000400000000580 R09: 0000000000000000 [ 153.214522][T12432] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 153.214538][T12432] R13: 0000000000000000 R14: 00007f41c4115fa0 R15: 00007ffc0ef98628 [ 153.214561][T12432] [ 153.214691][ T29] audit: type=1326 audit(1740783428.715:8726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12427 comm="syz.4.2336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a8a6ad169 code=0x7ffc0000 [ 153.425414][ T29] audit: type=1326 audit(1740783428.715:8727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12427 comm="syz.4.2336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7f2a8a6ad169 code=0x7ffc0000 [ 153.449000][ T29] audit: type=1326 audit(1740783428.715:8728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12427 comm="syz.4.2336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a8a6ad169 code=0x7ffc0000 [ 153.472610][ T29] audit: type=1326 audit(1740783428.715:8729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12427 comm="syz.4.2336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=209 compat=0 ip=0x7f2a8a6ad169 code=0x7ffc0000 [ 153.496228][ T29] audit: type=1326 audit(1740783428.715:8730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12427 comm="syz.4.2336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2a8a6ad169 code=0x7ffc0000 [ 153.699920][ T29] audit: type=1326 audit(1740783429.240:8731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12455 comm="syz.9.2349" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f706eabd169 code=0x7ffc0000 [ 153.723567][ T29] audit: type=1326 audit(1740783429.240:8732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12455 comm="syz.9.2349" exe="/root/syz-executor" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7f706eabd169 code=0x7ffc0000 [ 153.745415][T12468] PM: Enabling pm_trace changes system date and time during resume. [ 153.745415][T12468] PM: Correct system time has to be restored manually after resume. [ 153.854508][T12482] FAULT_INJECTION: forcing a failure. [ 153.854508][T12482] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 153.867861][T12482] CPU: 0 UID: 0 PID: 12482 Comm: syz.4.2360 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 153.867888][T12482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 153.867901][T12482] Call Trace: [ 153.867973][T12482] [ 153.867980][T12482] dump_stack_lvl+0xf2/0x150 [ 153.868010][T12482] dump_stack+0x15/0x1a [ 153.868029][T12482] should_fail_ex+0x24a/0x260 [ 153.868088][T12482] should_fail_alloc_page+0xfd/0x110 [ 153.868162][T12482] __alloc_frozen_pages_noprof+0x109/0x340 [ 153.868258][T12482] __alloc_pages_noprof+0x9/0x20 [ 153.868317][T12482] ___kmalloc_large_node+0x7a/0x120 [ 153.868395][T12482] __kmalloc_large_node_noprof+0x17/0xa0 [ 153.868421][T12482] __kmalloc_noprof+0x2b8/0x3f0 [ 153.868438][T12482] ? sctp_auth_set_key+0x1b1/0x510 [ 153.868457][T12482] sctp_auth_set_key+0x1b1/0x510 [ 153.868476][T12482] sctp_setsockopt_auth_key+0x2cb/0x410 [ 153.868572][T12482] sctp_setsockopt+0x511/0xee0 [ 153.868601][T12482] sock_common_setsockopt+0x64/0x80 [ 153.868630][T12482] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 153.868665][T12482] __sys_setsockopt+0x187/0x200 [ 153.868701][T12482] __x64_sys_setsockopt+0x66/0x80 [ 153.868742][T12482] x64_sys_call+0x282e/0x2dc0 [ 153.868806][T12482] do_syscall_64+0xc9/0x1c0 [ 153.868837][T12482] ? clear_bhb_loop+0x55/0xb0 [ 153.868861][T12482] ? clear_bhb_loop+0x55/0xb0 [ 153.868935][T12482] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 153.868963][T12482] RIP: 0033:0x7f2a8a6ad169 [ 153.868976][T12482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 153.869064][T12482] RSP: 002b:00007f2a88d17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 153.869083][T12482] RAX: ffffffffffffffda RBX: 00007f2a8a8c5fa0 RCX: 00007f2a8a6ad169 [ 153.869095][T12482] RDX: 0000000000000017 RSI: 0000000000000084 RDI: 0000000000000005 [ 153.869107][T12482] RBP: 00007f2a88d17090 R08: 000000000000ffc9 R09: 0000000000000000 [ 153.869130][T12482] R10: 0000400000000000 R11: 0000000000000246 R12: 0000000000000001 [ 153.869142][T12482] R13: 0000000000000000 R14: 00007f2a8a8c5fa0 R15: 00007ffcda14d308 [ 153.869160][T12482] [ 154.174084][T12494] IPv6: Can't replace route, no match found [ 154.260859][T12498] __nla_validate_parse: 7 callbacks suppressed [ 154.260873][T12498] netlink: 4 bytes leftover after parsing attributes in process `syz.7.2369'. [ 154.353995][T12510] FAULT_INJECTION: forcing a failure. [ 154.353995][T12510] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 154.367206][T12510] CPU: 0 UID: 0 PID: 12510 Comm: syz.8.2374 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 154.367234][T12510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 154.367246][T12510] Call Trace: [ 154.367251][T12510] [ 154.367258][T12510] dump_stack_lvl+0xf2/0x150 [ 154.367288][T12510] dump_stack+0x15/0x1a [ 154.367366][T12510] should_fail_ex+0x24a/0x260 [ 154.367400][T12510] should_fail+0xb/0x10 [ 154.367431][T12510] should_fail_usercopy+0x1a/0x20 [ 154.367574][T12510] _copy_from_iter+0xd5/0xd00 [ 154.367674][T12510] ? kmalloc_reserve+0x16e/0x190 [ 154.367693][T12510] ? __build_skb_around+0x196/0x1f0 [ 154.367712][T12510] ? __alloc_skb+0x21f/0x310 [ 154.367732][T12510] ? __virt_addr_valid+0x1ed/0x250 [ 154.367800][T12510] ? __check_object_size+0x364/0x520 [ 154.367830][T12510] netlink_sendmsg+0x460/0x6e0 [ 154.367871][T12510] ? __pfx_netlink_sendmsg+0x10/0x10 [ 154.367909][T12510] __sock_sendmsg+0x140/0x180 [ 154.368021][T12510] sock_write_iter+0x15e/0x1a0 [ 154.368057][T12510] vfs_write+0x77b/0x920 [ 154.368144][T12510] ? __pfx_sock_write_iter+0x10/0x10 [ 154.368219][T12510] ksys_write+0xe8/0x1b0 [ 154.368250][T12510] __x64_sys_write+0x42/0x50 [ 154.368279][T12510] x64_sys_call+0x287e/0x2dc0 [ 154.368316][T12510] do_syscall_64+0xc9/0x1c0 [ 154.368349][T12510] ? clear_bhb_loop+0x55/0xb0 [ 154.368380][T12510] ? clear_bhb_loop+0x55/0xb0 [ 154.368411][T12510] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 154.368475][T12510] RIP: 0033:0x7f41c3efd169 [ 154.368489][T12510] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 154.368504][T12510] RSP: 002b:00007f41c2561038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 154.368520][T12510] RAX: ffffffffffffffda RBX: 00007f41c4115fa0 RCX: 00007f41c3efd169 [ 154.368553][T12510] RDX: 0000000000000024 RSI: 0000400000000000 RDI: 0000000000000008 [ 154.368567][T12510] RBP: 00007f41c2561090 R08: 0000000000000000 R09: 0000000000000000 [ 154.368581][T12510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 154.368594][T12510] R13: 0000000000000000 R14: 00007f41c4115fa0 R15: 00007ffc0ef98628 [ 154.368667][T12510] [ 154.643343][T12516] binfmt_misc: register: failed to install interpreter file ./file0 [ 154.683544][T12531] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2382'. [ 154.862147][T12549] wg2: left promiscuous mode [ 154.866883][T12549] wg2: left allmulticast mode [ 154.909725][T12549] wg2: entered promiscuous mode [ 154.914691][T12549] wg2: entered allmulticast mode [ 155.444350][T12623] FAULT_INJECTION: forcing a failure. [ 155.444350][T12623] name failslab, interval 1, probability 0, space 0, times 0 [ 155.457179][T12623] CPU: 1 UID: 0 PID: 12623 Comm: syz.8.2425 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 155.457203][T12623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 155.457217][T12623] Call Trace: [ 155.457224][T12623] [ 155.457232][T12623] dump_stack_lvl+0xf2/0x150 [ 155.457263][T12623] dump_stack+0x15/0x1a [ 155.457308][T12623] should_fail_ex+0x24a/0x260 [ 155.457335][T12623] should_failslab+0x8f/0xb0 [ 155.457369][T12623] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 155.457465][T12623] ? sidtab_sid2str_get+0xb8/0x140 [ 155.457493][T12623] kmemdup_noprof+0x2b/0x70 [ 155.457541][T12623] sidtab_sid2str_get+0xb8/0x140 [ 155.457568][T12623] security_sid_to_context_core+0x1eb/0x2f0 [ 155.457651][T12623] security_sid_to_context+0x27/0x30 [ 155.457682][T12623] selinux_lsmprop_to_secctx+0x68/0xf0 [ 155.457735][T12623] security_lsmprop_to_secctx+0x40/0x80 [ 155.457762][T12623] audit_log_task_context+0x76/0x180 [ 155.457806][T12623] audit_log_task+0xf9/0x250 [ 155.457903][T12623] audit_seccomp+0x68/0x130 [ 155.457938][T12623] __seccomp_filter+0x6fa/0x1180 [ 155.458046][T12623] __secure_computing+0x9f/0x1c0 [ 155.458112][T12623] syscall_trace_enter+0xd1/0x1f0 [ 155.458137][T12623] do_syscall_64+0xaa/0x1c0 [ 155.458206][T12623] ? clear_bhb_loop+0x55/0xb0 [ 155.458251][T12623] ? clear_bhb_loop+0x55/0xb0 [ 155.458285][T12623] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 155.458315][T12623] RIP: 0033:0x7f41c3efd169 [ 155.458330][T12623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 155.458346][T12623] RSP: 002b:00007f41c2561038 EFLAGS: 00000246 ORIG_RAX: 0000000000000046 [ 155.458363][T12623] RAX: ffffffffffffffda RBX: 00007f41c4115fa0 RCX: 00007f41c3efd169 [ 155.458446][T12623] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 155.458459][T12623] RBP: 00007f41c2561090 R08: 0000000000002000 R09: 0000000000000000 [ 155.458471][T12623] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 [ 155.458484][T12623] R13: 0000000000000000 R14: 00007f41c4115fa0 R15: 00007ffc0ef98628 [ 155.458502][T12623] [ 155.820267][T12641] bridge0: port 7(ipvlan2) entered blocking state [ 155.826955][T12641] bridge0: port 7(ipvlan2) entered disabled state [ 155.853138][T12641] ipvlan2: entered allmulticast mode [ 155.858566][T12641] bridge0: entered allmulticast mode [ 155.869669][T12643] serio: Serial port ptm0 [ 155.911093][T12641] ipvlan2: left allmulticast mode [ 155.916330][T12641] bridge0: left allmulticast mode [ 155.937243][T12651] wg2: entered promiscuous mode [ 155.942309][T12651] wg2: entered allmulticast mode [ 156.213545][T12677] lo speed is unknown, defaulting to 1000 [ 156.257561][T12689] netlink: 'syz.9.2440': attribute type 29 has an invalid length. [ 156.265889][T12677] siw: device registration error -23 [ 156.287519][T12689] netlink: 'syz.9.2440': attribute type 29 has an invalid length. [ 156.331478][T12696] wg2: entered promiscuous mode [ 156.336455][T12696] wg2: entered allmulticast mode [ 156.418673][T12705] binfmt_misc: register: failed to install interpreter file ./file2 [ 156.572954][T12721] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2471'. [ 156.679623][T12733] wg2: left promiscuous mode [ 156.684322][T12733] wg2: left allmulticast mode [ 156.713170][T12733] wg2: entered promiscuous mode [ 156.718063][T12733] wg2: entered allmulticast mode [ 156.728910][T12735] +: renamed from syzkaller0 [ 157.033732][T12775] FAULT_INJECTION: forcing a failure. [ 157.033732][T12775] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 157.046936][T12775] CPU: 0 UID: 0 PID: 12775 Comm: syz.2.2495 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 157.047079][T12775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 157.047093][T12775] Call Trace: [ 157.047100][T12775] [ 157.047108][T12775] dump_stack_lvl+0xf2/0x150 [ 157.047141][T12775] dump_stack+0x15/0x1a [ 157.047163][T12775] should_fail_ex+0x24a/0x260 [ 157.047199][T12775] should_fail+0xb/0x10 [ 157.047288][T12775] should_fail_usercopy+0x1a/0x20 [ 157.047323][T12775] _copy_from_iter+0xd5/0xd00 [ 157.047357][T12775] ? kmalloc_reserve+0x16e/0x190 [ 157.047375][T12775] ? __build_skb_around+0x196/0x1f0 [ 157.047394][T12775] ? __alloc_skb+0x21f/0x310 [ 157.047413][T12775] ? __virt_addr_valid+0x1ed/0x250 [ 157.047440][T12775] ? __check_object_size+0x364/0x520 [ 157.047490][T12775] netlink_sendmsg+0x460/0x6e0 [ 157.047572][T12775] ? __pfx_netlink_sendmsg+0x10/0x10 [ 157.047610][T12775] __sock_sendmsg+0x140/0x180 [ 157.047641][T12775] ____sys_sendmsg+0x326/0x4b0 [ 157.047707][T12775] __sys_sendmsg+0x19d/0x230 [ 157.047746][T12775] __x64_sys_sendmsg+0x46/0x50 [ 157.047774][T12775] x64_sys_call+0x2734/0x2dc0 [ 157.047799][T12775] do_syscall_64+0xc9/0x1c0 [ 157.047903][T12775] ? clear_bhb_loop+0x55/0xb0 [ 157.047931][T12775] ? clear_bhb_loop+0x55/0xb0 [ 157.047964][T12775] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 157.047989][T12775] RIP: 0033:0x7f322bebd169 [ 157.048056][T12775] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 157.048077][T12775] RSP: 002b:00007f322a527038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 157.048095][T12775] RAX: ffffffffffffffda RBX: 00007f322c0d5fa0 RCX: 00007f322bebd169 [ 157.048108][T12775] RDX: 0000000024040084 RSI: 0000400000006040 RDI: 0000000000000003 [ 157.048122][T12775] RBP: 00007f322a527090 R08: 0000000000000000 R09: 0000000000000000 [ 157.048133][T12775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 157.048172][T12775] R13: 0000000000000000 R14: 00007f322c0d5fa0 R15: 00007ffe3913fcd8 [ 157.048191][T12775] [ 157.267189][T12776] vhci_hcd: invalid port number 15 [ 157.272420][T12776] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 157.353488][T12794] netlink: 68 bytes leftover after parsing attributes in process `syz.2.2501'. [ 157.382872][T12778] sch_tbf: burst 0 is lower than device lo mtu (11337746) ! [ 157.390986][T12782] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2498'. [ 157.634167][T12818] netlink: 4 bytes leftover after parsing attributes in process `syz.7.2513'. [ 157.818337][ T29] kauditd_printk_skb: 851 callbacks suppressed [ 157.818353][ T29] audit: type=1326 audit(1740783433.587:9583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12837 comm="syz.2.2521" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 157.848105][ T29] audit: type=1326 audit(1740783433.587:9584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12837 comm="syz.2.2521" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 157.902277][T12845] wg2: left promiscuous mode [ 157.906980][T12845] wg2: left allmulticast mode [ 157.942450][T12847] FAULT_INJECTION: forcing a failure. [ 157.942450][T12847] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 157.955599][T12847] CPU: 0 UID: 0 PID: 12847 Comm: syz.4.2525 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 157.955627][T12847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 157.955641][T12847] Call Trace: [ 157.955647][T12847] [ 157.955654][T12847] dump_stack_lvl+0xf2/0x150 [ 157.955745][T12847] dump_stack+0x15/0x1a [ 157.955769][T12847] should_fail_ex+0x24a/0x260 [ 157.955802][T12847] should_fail+0xb/0x10 [ 157.955896][T12847] should_fail_usercopy+0x1a/0x20 [ 157.955974][T12847] _copy_from_user+0x1c/0xa0 [ 157.956040][T12847] move_addr_to_kernel+0x82/0x120 [ 157.956081][T12847] __sys_sendto+0x12e/0x230 [ 157.956114][T12847] __x64_sys_sendto+0x78/0x90 [ 157.956139][T12847] x64_sys_call+0x29fa/0x2dc0 [ 157.956169][T12847] do_syscall_64+0xc9/0x1c0 [ 157.956260][T12847] ? clear_bhb_loop+0x55/0xb0 [ 157.956287][T12847] ? clear_bhb_loop+0x55/0xb0 [ 157.956384][T12847] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 157.956422][T12847] RIP: 0033:0x7f2a8a6aeffc [ 157.956438][T12847] Code: 2a 5f 02 00 44 8b 4c 24 2c 4c 8b 44 24 20 89 c5 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 <48> 3d 00 f0 ff ff 77 34 89 ef 48 89 44 24 08 e8 70 5f 02 00 48 8b [ 157.956455][T12847] RSP: 002b:00007f2a88d15ec0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 157.956475][T12847] RAX: ffffffffffffffda RBX: 00007f2a88d15fc0 RCX: 00007f2a8a6aeffc [ 157.956497][T12847] RDX: 0000000000000020 RSI: 00007f2a88d16010 RDI: 0000000000000003 [ 157.956511][T12847] RBP: 0000000000000000 R08: 00007f2a88d15f14 R09: 000000000000000c [ 157.956524][T12847] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 157.956613][T12847] R13: 00007f2a88d15f68 R14: 00007f2a88d16010 R15: 0000000000000000 [ 157.956629][T12847] [ 158.145769][T12845] wg2: entered promiscuous mode [ 158.150669][T12845] wg2: entered allmulticast mode [ 158.167903][T12853] FAULT_INJECTION: forcing a failure. [ 158.167903][T12853] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 158.181085][T12853] CPU: 0 UID: 0 PID: 12853 Comm: syz.8.2526 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 158.181154][T12853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 158.181169][T12853] Call Trace: [ 158.181175][T12853] [ 158.181182][T12853] dump_stack_lvl+0xf2/0x150 [ 158.181220][T12853] dump_stack+0x15/0x1a [ 158.181246][T12853] should_fail_ex+0x24a/0x260 [ 158.181327][T12853] should_fail+0xb/0x10 [ 158.181357][T12853] should_fail_usercopy+0x1a/0x20 [ 158.181394][T12853] _copy_from_user+0x1c/0xa0 [ 158.181472][T12853] do_semtimedop+0x150/0x200 [ 158.181491][T12853] ? bpf_get_stack_raw_tp+0xfe/0x140 [ 158.181536][T12853] __x64_sys_semop+0x43/0x50 [ 158.181568][T12853] x64_sys_call+0x1d2b/0x2dc0 [ 158.181592][T12853] do_syscall_64+0xc9/0x1c0 [ 158.181628][T12853] ? clear_bhb_loop+0x55/0xb0 [ 158.181662][T12853] ? clear_bhb_loop+0x55/0xb0 [ 158.181714][T12853] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 158.181812][T12853] RIP: 0033:0x7f41c3efd169 [ 158.181826][T12853] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 158.181843][T12853] RSP: 002b:00007f41c2561038 EFLAGS: 00000246 ORIG_RAX: 0000000000000041 [ 158.181862][T12853] RAX: ffffffffffffffda RBX: 00007f41c4115fa0 RCX: 00007f41c3efd169 [ 158.181876][T12853] RDX: 0000000000000001 RSI: 0000400000000200 RDI: 0000000000000000 [ 158.181888][T12853] RBP: 00007f41c2561090 R08: 0000000000000000 R09: 0000000000000000 [ 158.181906][T12853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 158.181977][T12853] R13: 0000000000000000 R14: 00007f41c4115fa0 R15: 00007ffc0ef98628 [ 158.181996][T12853] [ 158.377564][T12849] netlink: 4 bytes leftover after parsing attributes in process `syz.9.2527'. [ 158.417844][ T29] audit: type=1326 audit(1740783434.195:9585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12860 comm="syz.2.2530" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 158.441394][ T29] audit: type=1326 audit(1740783434.195:9586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12860 comm="syz.2.2530" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 158.465048][ T29] audit: type=1326 audit(1740783434.195:9587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12860 comm="syz.2.2530" exe="/root/syz-executor" sig=0 arch=c000003e syscall=304 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 158.490453][ T29] audit: type=1326 audit(1740783434.206:9588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12860 comm="syz.2.2530" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 158.692681][ T29] audit: type=1400 audit(1740783434.489:9589): avc: denied { mount } for pid=12884 comm="syz.2.2540" name="/" dev="ramfs" ino=33046 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 158.765435][T12887] wg2: left promiscuous mode [ 158.770160][T12887] wg2: left allmulticast mode [ 158.795239][T12887] wg2: entered promiscuous mode [ 158.800211][T12887] wg2: entered allmulticast mode [ 158.884703][ T29] audit: type=1326 audit(1740783434.689:9590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12890 comm="syz.9.2543" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f706eabd169 code=0x7ffc0000 [ 158.908260][ T29] audit: type=1326 audit(1740783434.689:9591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12890 comm="syz.9.2543" exe="/root/syz-executor" sig=0 arch=c000003e syscall=304 compat=0 ip=0x7f706eabd169 code=0x7ffc0000 [ 158.931777][ T29] audit: type=1326 audit(1740783434.689:9592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12890 comm="syz.9.2543" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f706eabd169 code=0x7ffc0000 [ 159.040887][T12901] FAULT_INJECTION: forcing a failure. [ 159.040887][T12901] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 159.054021][T12901] CPU: 0 UID: 0 PID: 12901 Comm: syz.2.2547 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 159.054046][T12901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 159.054075][T12901] Call Trace: [ 159.054081][T12901] [ 159.054088][T12901] dump_stack_lvl+0xf2/0x150 [ 159.054122][T12901] dump_stack+0x15/0x1a [ 159.054148][T12901] should_fail_ex+0x24a/0x260 [ 159.054178][T12901] should_fail+0xb/0x10 [ 159.054258][T12901] should_fail_usercopy+0x1a/0x20 [ 159.054289][T12901] _copy_from_user+0x1c/0xa0 [ 159.054386][T12901] sg_new_write+0x77a/0x8e0 [ 159.054433][T12901] sg_ioctl+0xe22/0x1870 [ 159.054458][T12901] ? __fget_files+0x17c/0x1c0 [ 159.054530][T12901] ? __pfx_sg_ioctl+0x10/0x10 [ 159.054555][T12901] __se_sys_ioctl+0xc9/0x140 [ 159.054593][T12901] __x64_sys_ioctl+0x43/0x50 [ 159.054645][T12901] x64_sys_call+0x1690/0x2dc0 [ 159.054741][T12901] do_syscall_64+0xc9/0x1c0 [ 159.054844][T12901] ? clear_bhb_loop+0x55/0xb0 [ 159.054871][T12901] ? clear_bhb_loop+0x55/0xb0 [ 159.054977][T12901] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 159.055009][T12901] RIP: 0033:0x7f322bebd169 [ 159.055027][T12901] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 159.055047][T12901] RSP: 002b:00007f322a527038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 159.055065][T12901] RAX: ffffffffffffffda RBX: 00007f322c0d5fa0 RCX: 00007f322bebd169 [ 159.055076][T12901] RDX: 0000400000000040 RSI: 0000000000002285 RDI: 0000000000000004 [ 159.055088][T12901] RBP: 00007f322a527090 R08: 0000000000000000 R09: 0000000000000000 [ 159.055126][T12901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 159.055141][T12901] R13: 0000000000000000 R14: 00007f322c0d5fa0 R15: 00007ffe3913fcd8 [ 159.055163][T12901] [ 159.329260][T12908] +: renamed from syzkaller0 [ 159.356805][T12912] netlink: 4 bytes leftover after parsing attributes in process `syz.9.2552'. [ 159.400846][T12916] wg2: left promiscuous mode [ 159.405698][T12916] wg2: left allmulticast mode [ 159.416820][T12918] netlink: 8 bytes leftover after parsing attributes in process `syz.9.2553'. [ 159.425861][T12918] netlink: 16 bytes leftover after parsing attributes in process `syz.9.2553'. [ 159.435399][T12916] wg2: entered promiscuous mode [ 159.440480][T12916] wg2: entered allmulticast mode [ 159.523760][T12924] FAULT_INJECTION: forcing a failure. [ 159.523760][T12924] name failslab, interval 1, probability 0, space 0, times 0 [ 159.536445][T12924] CPU: 0 UID: 0 PID: 12924 Comm: syz.8.2557 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 159.536469][T12924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 159.536482][T12924] Call Trace: [ 159.536488][T12924] [ 159.536496][T12924] dump_stack_lvl+0xf2/0x150 [ 159.536558][T12924] dump_stack+0x15/0x1a [ 159.536580][T12924] should_fail_ex+0x24a/0x260 [ 159.536608][T12924] should_failslab+0x8f/0xb0 [ 159.536688][T12924] kmem_cache_alloc_noprof+0x52/0x320 [ 159.536708][T12924] ? skb_clone+0x154/0x1f0 [ 159.536812][T12924] skb_clone+0x154/0x1f0 [ 159.536842][T12924] __udp6_lib_mcast_deliver+0x5a9/0x830 [ 159.536875][T12924] __udp6_lib_rcv+0x491/0xaf0 [ 159.536935][T12924] udpv6_rcv+0x4f/0x60 [ 159.536958][T12924] ? __pfx_udpv6_rcv+0x10/0x10 [ 159.537033][T12924] ip6_protocol_deliver_rcu+0xa6a/0x1090 [ 159.537067][T12924] ip6_input+0xbf/0x1c0 [ 159.537092][T12924] ? __pfx_ip6_input_finish+0x10/0x10 [ 159.537124][T12924] ip6_mc_input+0x349/0x480 [ 159.537213][T12924] ? __pfx_ip6_mc_input+0x10/0x10 [ 159.537232][T12924] ip6_rcv_finish+0x320/0x330 [ 159.537252][T12924] ipv6_rcv+0x74/0x150 [ 159.537273][T12924] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 159.537296][T12924] __netif_receive_skb+0xa2/0x280 [ 159.537358][T12924] netif_receive_skb+0x4a/0x320 [ 159.537379][T12924] ? kcsan_setup_watchpoint+0x404/0x410 [ 159.537429][T12924] ? tun_rx_batched+0xba/0x410 [ 159.537450][T12924] tun_rx_batched+0xf0/0x410 [ 159.537473][T12924] ? tun_get_user+0x1dea/0x25c0 [ 159.537558][T12924] tun_get_user+0x1f21/0x25c0 [ 159.537585][T12924] ? avc_has_perm+0xd4/0x160 [ 159.537602][T12924] ? ref_tracker_alloc+0x1f5/0x2f0 [ 159.537636][T12924] tun_chr_write_iter+0x188/0x240 [ 159.537659][T12924] vfs_write+0x77b/0x920 [ 159.537750][T12924] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 159.537777][T12924] ksys_write+0xe8/0x1b0 [ 159.537801][T12924] __x64_sys_write+0x42/0x50 [ 159.537824][T12924] x64_sys_call+0x287e/0x2dc0 [ 159.537928][T12924] do_syscall_64+0xc9/0x1c0 [ 159.537958][T12924] ? clear_bhb_loop+0x55/0xb0 [ 159.537987][T12924] ? clear_bhb_loop+0x55/0xb0 [ 159.538092][T12924] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 159.538116][T12924] RIP: 0033:0x7f41c3efbc1f [ 159.538129][T12924] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 159.538293][T12924] RSP: 002b:00007f41c2561000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 159.538310][T12924] RAX: ffffffffffffffda RBX: 00007f41c4115fa0 RCX: 00007f41c3efbc1f [ 159.538320][T12924] RDX: 00000000000000d2 RSI: 0000400000000d00 RDI: 00000000000000c8 [ 159.538331][T12924] RBP: 00007f41c2561090 R08: 0000000000000000 R09: 0000000000000000 [ 159.538344][T12924] R10: 00000000000000d2 R11: 0000000000000293 R12: 0000000000000001 [ 159.538357][T12924] R13: 0000000000000000 R14: 00007f41c4115fa0 R15: 00007ffc0ef98628 [ 159.538376][T12924] [ 159.850871][T12932] FAULT_INJECTION: forcing a failure. [ 159.850871][T12932] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 159.864265][T12932] CPU: 0 UID: 0 PID: 12932 Comm: syz.8.2561 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 159.864293][T12932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 159.864340][T12932] Call Trace: [ 159.864348][T12932] [ 159.864357][T12932] dump_stack_lvl+0xf2/0x150 [ 159.864389][T12932] dump_stack+0x15/0x1a [ 159.864411][T12932] should_fail_ex+0x24a/0x260 [ 159.864439][T12932] should_fail_alloc_page+0xfd/0x110 [ 159.864508][T12932] __alloc_frozen_pages_noprof+0x109/0x340 [ 159.864546][T12932] alloc_pages_mpol+0xb4/0x260 [ 159.864574][T12932] folio_alloc_mpol_noprof+0x36/0x80 [ 159.864680][T12932] shmem_get_folio_gfp+0x3d1/0xd90 [ 159.864724][T12932] shmem_write_begin+0xa2/0x180 [ 159.864745][T12932] generic_perform_write+0x1a8/0x4a0 [ 159.864801][T12932] shmem_file_write_iter+0xc2/0xe0 [ 159.864835][T12932] vfs_write+0x77b/0x920 [ 159.864860][T12932] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 159.864957][T12932] ksys_write+0xe8/0x1b0 [ 159.864986][T12932] __x64_sys_write+0x42/0x50 [ 159.865013][T12932] x64_sys_call+0x287e/0x2dc0 [ 159.865038][T12932] do_syscall_64+0xc9/0x1c0 [ 159.865106][T12932] ? clear_bhb_loop+0x55/0xb0 [ 159.865137][T12932] ? clear_bhb_loop+0x55/0xb0 [ 159.865186][T12932] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 159.865217][T12932] RIP: 0033:0x7f41c3efd169 [ 159.865235][T12932] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 159.865262][T12932] RSP: 002b:00007f41c2561038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 159.865280][T12932] RAX: ffffffffffffffda RBX: 00007f41c4115fa0 RCX: 00007f41c3efd169 [ 159.865291][T12932] RDX: 000000000208e24b RSI: 0000400000000040 RDI: 0000000000000007 [ 159.865351][T12932] RBP: 00007f41c2561090 R08: 0000000000000000 R09: 0000000000000000 [ 159.865362][T12932] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 159.865374][T12932] R13: 0000000000000000 R14: 00007f41c4115fa0 R15: 00007ffc0ef98628 [ 159.865391][T12932] [ 160.211190][T12938] vhci_hcd: invalid port number 15 [ 160.216365][T12938] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 160.287765][T12950] +: renamed from syzkaller0 [ 160.311593][T12947] netlink: 12 bytes leftover after parsing attributes in process `syz.9.2567'. [ 160.456412][T12965] lo speed is unknown, defaulting to 1000 [ 160.737961][T12983] netlink: 12 bytes leftover after parsing attributes in process `syz.9.2583'. [ 160.810582][T12988] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2584'. [ 160.872288][T12988] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2584'. [ 160.941004][T12990] vhci_hcd: invalid port number 15 [ 160.946418][T12990] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 160.958263][T12991] netlink: 'syz.4.2584': attribute type 20 has an invalid length. [ 161.262120][T13011] +: renamed from syzkaller0 [ 161.269406][T13012] vhci_hcd: invalid port number 15 [ 161.274555][T13012] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 161.522716][T13050] FAULT_INJECTION: forcing a failure. [ 161.522716][T13050] name failslab, interval 1, probability 0, space 0, times 0 [ 161.535486][T13050] CPU: 0 UID: 0 PID: 13050 Comm: syz.2.2612 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 161.535546][T13050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 161.535558][T13050] Call Trace: [ 161.535563][T13050] [ 161.535570][T13050] dump_stack_lvl+0xf2/0x150 [ 161.535597][T13050] dump_stack+0x15/0x1a [ 161.535627][T13050] should_fail_ex+0x24a/0x260 [ 161.535680][T13050] should_failslab+0x8f/0xb0 [ 161.535715][T13050] kmem_cache_alloc_noprof+0x52/0x320 [ 161.535740][T13050] ? skb_clone+0x154/0x1f0 [ 161.535827][T13050] skb_clone+0x154/0x1f0 [ 161.535857][T13050] __netlink_deliver_tap+0x2bd/0x4f0 [ 161.535907][T13050] netlink_unicast+0x64a/0x670 [ 161.535943][T13050] netlink_sendmsg+0x5cc/0x6e0 [ 161.535977][T13050] ? __pfx_netlink_sendmsg+0x10/0x10 [ 161.536063][T13050] __sock_sendmsg+0x140/0x180 [ 161.536101][T13050] sock_write_iter+0x15e/0x1a0 [ 161.536142][T13050] vfs_write+0x77b/0x920 [ 161.536249][T13050] ? __pfx_sock_write_iter+0x10/0x10 [ 161.536290][T13050] ksys_write+0xe8/0x1b0 [ 161.536323][T13050] __x64_sys_write+0x42/0x50 [ 161.536430][T13050] x64_sys_call+0x287e/0x2dc0 [ 161.536535][T13050] do_syscall_64+0xc9/0x1c0 [ 161.536568][T13050] ? clear_bhb_loop+0x55/0xb0 [ 161.536601][T13050] ? clear_bhb_loop+0x55/0xb0 [ 161.536688][T13050] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 161.536719][T13050] RIP: 0033:0x7f322bebd169 [ 161.536735][T13050] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 161.536754][T13050] RSP: 002b:00007f322a527038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 161.536845][T13050] RAX: ffffffffffffffda RBX: 00007f322c0d5fa0 RCX: 00007f322bebd169 [ 161.536858][T13050] RDX: 0000000000000024 RSI: 0000400000000000 RDI: 0000000000000008 [ 161.536881][T13050] RBP: 00007f322a527090 R08: 0000000000000000 R09: 0000000000000000 [ 161.536915][T13050] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 161.536930][T13050] R13: 0000000000000000 R14: 00007f322c0d5fa0 R15: 00007ffe3913fcd8 [ 161.536952][T13050] [ 161.536967][T13050] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2612'. [ 161.674923][T13060] netlink: 4 bytes leftover after parsing attributes in process `syz.9.2615'. [ 161.746997][T13050] batadv7: left allmulticast mode [ 161.767332][T13050] batadv7: left promiscuous mode [ 161.772499][T13050] bridge0: port 9(batadv7) entered disabled state [ 161.810562][T13050] batadv6: left allmulticast mode [ 161.815639][T13050] batadv6: left promiscuous mode [ 161.820755][T13050] bridge0: port 8(batadv6) entered disabled state [ 161.857533][T13050] batadv5: left allmulticast mode [ 161.862784][T13050] batadv5: left promiscuous mode [ 161.867916][T13050] bridge0: port 7(batadv5) entered disabled state [ 161.904339][T13050] batadv4: left allmulticast mode [ 161.908020][T13071] netlink: 12 bytes leftover after parsing attributes in process `syz.7.2618'. [ 161.909380][T13050] batadv4: left promiscuous mode [ 161.909512][T13050] bridge0: port 6(batadv4) entered disabled state [ 161.947431][T13050] batadv3: left allmulticast mode [ 161.952570][T13050] batadv3: left promiscuous mode [ 161.957638][T13050] bridge0: port 5(batadv3) entered disabled state [ 161.984157][T13050] batadv2: left allmulticast mode [ 161.989223][T13050] batadv2: left promiscuous mode [ 161.994354][T13050] bridge0: port 4(batadv2) entered disabled state [ 162.010094][T13050] batadv1: left allmulticast mode [ 162.015182][T13050] batadv1: left promiscuous mode [ 162.020295][T13050] bridge0: port 3(batadv1) entered disabled state [ 162.028421][T13050] bridge_slave_1: left allmulticast mode [ 162.034086][T13050] bridge_slave_1: left promiscuous mode [ 162.039996][T13050] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.049455][T13050] bridge_slave_0: left allmulticast mode [ 162.055134][T13050] bridge_slave_0: left promiscuous mode [ 162.060889][T13050] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.099212][T13078] FAULT_INJECTION: forcing a failure. [ 162.099212][T13078] name failslab, interval 1, probability 0, space 0, times 0 [ 162.112029][T13078] CPU: 1 UID: 0 PID: 13078 Comm: syz.7.2619 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 162.112068][T13078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 162.112085][T13078] Call Trace: [ 162.112092][T13078] [ 162.112101][T13078] dump_stack_lvl+0xf2/0x150 [ 162.112135][T13078] dump_stack+0x15/0x1a [ 162.112161][T13078] should_fail_ex+0x24a/0x260 [ 162.112231][T13078] ? call_usermodehelper_setup+0x72/0x190 [ 162.112277][T13078] should_failslab+0x8f/0xb0 [ 162.112356][T13078] __kmalloc_cache_noprof+0x4e/0x320 [ 162.112384][T13078] call_usermodehelper_setup+0x72/0x190 [ 162.112457][T13078] ? __pfx_free_modprobe_argv+0x10/0x10 [ 162.112487][T13078] __request_module+0x25a/0x3e0 [ 162.112514][T13078] ? capable+0x7c/0xb0 [ 162.112544][T13078] dev_load+0x5e/0xb0 [ 162.112569][T13078] dev_ioctl+0x7e4/0xab0 [ 162.112623][T13078] sock_do_ioctl+0x11c/0x260 [ 162.112655][T13078] sock_ioctl+0x40f/0x600 [ 162.112690][T13078] ? __pfx_sock_ioctl+0x10/0x10 [ 162.112725][T13078] __se_sys_ioctl+0xc9/0x140 [ 162.112763][T13078] __x64_sys_ioctl+0x43/0x50 [ 162.112817][T13078] x64_sys_call+0x1690/0x2dc0 [ 162.112848][T13078] do_syscall_64+0xc9/0x1c0 [ 162.112921][T13078] ? clear_bhb_loop+0x55/0xb0 [ 162.112960][T13078] ? clear_bhb_loop+0x55/0xb0 [ 162.113007][T13078] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 162.113033][T13078] RIP: 0033:0x7fbec731d169 [ 162.113047][T13078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 162.113120][T13078] RSP: 002b:00007fbec593f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 162.113139][T13078] RAX: ffffffffffffffda RBX: 00007fbec7536160 RCX: 00007fbec731d169 [ 162.113151][T13078] RDX: 0000400000000100 RSI: 0000000000008914 RDI: 0000000000000009 [ 162.113162][T13078] RBP: 00007fbec593f090 R08: 0000000000000000 R09: 0000000000000000 [ 162.113174][T13078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 162.113219][T13078] R13: 0000000000000000 R14: 00007fbec7536160 R15: 00007ffce4942908 [ 162.113380][T13078] [ 162.257676][T13082] sd 0:0:1:0: device reset [ 162.346280][T13078] pim6reg1: entered promiscuous mode [ 162.351699][T13078] pim6reg1: entered allmulticast mode [ 162.398527][T13076] lo speed is unknown, defaulting to 1000 [ 163.001317][T13109] vhci_hcd: invalid port number 15 [ 163.006570][T13109] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 163.258893][T13112] vlan0: entered promiscuous mode [ 163.264017][T13112] team0: entered promiscuous mode [ 163.269209][T13112] team_slave_0: entered promiscuous mode [ 163.275087][T13112] team_slave_1: entered promiscuous mode [ 163.351933][T13112] team0: left promiscuous mode [ 163.356904][T13112] team_slave_0: left promiscuous mode [ 163.362574][T13112] team_slave_1: left promiscuous mode [ 163.397884][T13111] vlan0: entered promiscuous mode [ 163.403000][T13111] team0: entered promiscuous mode [ 163.408088][T13111] team_slave_0: entered promiscuous mode [ 163.413927][T13111] team_slave_1: entered promiscuous mode [ 163.512317][T13135] FAULT_INJECTION: forcing a failure. [ 163.512317][T13135] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 163.525663][T13135] CPU: 1 UID: 0 PID: 13135 Comm: syz.7.2641 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 163.525693][T13135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 163.525741][T13135] Call Trace: [ 163.525748][T13135] [ 163.525756][T13135] dump_stack_lvl+0xf2/0x150 [ 163.525787][T13135] dump_stack+0x15/0x1a [ 163.525807][T13135] should_fail_ex+0x24a/0x260 [ 163.525849][T13135] should_fail+0xb/0x10 [ 163.525880][T13135] should_fail_usercopy+0x1a/0x20 [ 163.525914][T13135] _copy_from_iter+0xd5/0xd00 [ 163.526028][T13135] ? kmalloc_reserve+0x16e/0x190 [ 163.526052][T13135] ? __build_skb_around+0x196/0x1f0 [ 163.526117][T13135] ? __alloc_skb+0x21f/0x310 [ 163.526135][T13135] ? __virt_addr_valid+0x1ed/0x250 [ 163.526163][T13135] ? __check_object_size+0x364/0x520 [ 163.526192][T13135] netlink_sendmsg+0x460/0x6e0 [ 163.526297][T13135] ? __pfx_netlink_sendmsg+0x10/0x10 [ 163.526327][T13135] __sock_sendmsg+0x140/0x180 [ 163.526426][T13135] ____sys_sendmsg+0x326/0x4b0 [ 163.526526][T13135] __sys_sendmsg+0x19d/0x230 [ 163.526568][T13135] __x64_sys_sendmsg+0x46/0x50 [ 163.526675][T13135] x64_sys_call+0x2734/0x2dc0 [ 163.526707][T13135] do_syscall_64+0xc9/0x1c0 [ 163.526742][T13135] ? clear_bhb_loop+0x55/0xb0 [ 163.526816][T13135] ? clear_bhb_loop+0x55/0xb0 [ 163.526849][T13135] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 163.526946][T13135] RIP: 0033:0x7fbec731d169 [ 163.526964][T13135] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 163.526986][T13135] RSP: 002b:00007fbec5981038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 163.527008][T13135] RAX: ffffffffffffffda RBX: 00007fbec7535fa0 RCX: 00007fbec731d169 [ 163.527022][T13135] RDX: 0000000000000000 RSI: 0000400000000000 RDI: 0000000000000006 [ 163.527060][T13135] RBP: 00007fbec5981090 R08: 0000000000000000 R09: 0000000000000000 [ 163.527072][T13135] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 163.527083][T13135] R13: 0000000000000000 R14: 00007fbec7535fa0 R15: 00007ffce4942908 [ 163.527099][T13135] [ 163.756498][T13111] team0: left promiscuous mode [ 163.761402][T13111] team_slave_0: left promiscuous mode [ 163.766881][T13111] team_slave_1: left promiscuous mode [ 163.815828][T13143] vhci_hcd: invalid port number 15 [ 163.821060][T13143] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 163.897791][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 163.897809][ T29] audit: type=1326 audit(1740783439.960:9606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13144 comm="syz.2.2646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 163.953244][T13150] vhci_hcd: invalid port number 15 [ 163.958399][T13150] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 163.967820][ T29] audit: type=1326 audit(1740783439.960:9607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13144 comm="syz.2.2646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 163.991385][ T29] audit: type=1326 audit(1740783439.960:9608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13144 comm="syz.2.2646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 164.014998][ T29] audit: type=1326 audit(1740783439.960:9609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13144 comm="syz.2.2646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 164.038497][ T29] audit: type=1326 audit(1740783439.960:9610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13144 comm="syz.2.2646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 164.169385][ T29] audit: type=1326 audit(1740783440.117:9611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13144 comm="syz.2.2646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 164.192967][ T29] audit: type=1326 audit(1740783440.138:9612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13144 comm="syz.2.2646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 164.216624][ T29] audit: type=1326 audit(1740783440.212:9613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13144 comm="syz.2.2646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f322bebf087 code=0x7ffc0000 [ 164.240051][ T29] audit: type=1326 audit(1740783440.212:9614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13144 comm="syz.2.2646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=44 compat=0 ip=0x7f322bebeffc code=0x7ffc0000 [ 164.263554][ T29] audit: type=1326 audit(1740783440.212:9615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13144 comm="syz.2.2646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=45 compat=0 ip=0x7f322bebef34 code=0x7ffc0000 [ 164.446482][T13168] vhci_hcd: invalid port number 15 [ 164.451666][T13168] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 164.490227][T13163] __nla_validate_parse: 5 callbacks suppressed [ 164.490247][T13163] netlink: 24 bytes leftover after parsing attributes in process `syz.4.2654'. [ 164.640515][T13175] random: crng reseeded on system resumption [ 165.204231][T13200] vhci_hcd: invalid port number 15 [ 165.209456][T13200] vhci_hcd: invalid port number 15 [ 165.247855][T13200] devtmpfs: Bad value for 'nr_inodes' [ 165.855807][T13231] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2682'. [ 165.864788][T13231] netlink: 16 bytes leftover after parsing attributes in process `syz.2.2682'. [ 166.349977][T13255] netlink: 'syz.9.2691': attribute type 10 has an invalid length. [ 166.376671][T13255] team0: Device hsr_slave_0 failed to register rx_handler [ 166.773958][T13271] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2697'. [ 166.884317][T13276] bridge0: entered promiscuous mode [ 166.891002][T13276] bridge0: port 7(macsec1) entered blocking state [ 166.897503][T13276] bridge0: port 7(macsec1) entered disabled state [ 166.904455][T13276] macsec1: entered allmulticast mode [ 166.909755][T13276] bridge0: entered allmulticast mode [ 166.941247][T13276] macsec1: left allmulticast mode [ 166.946409][T13276] bridge0: left allmulticast mode [ 166.956576][T13276] bridge0: left promiscuous mode [ 167.095596][T13286] netlink: 1296 bytes leftover after parsing attributes in process `syz.2.2703'. [ 167.105969][T13286] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2703'. [ 167.125268][T13286] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 167.132938][T13286] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 167.187174][T13286] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 167.194802][T13286] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 167.224309][T13294] lo: entered promiscuous mode [ 167.234412][T13299] FAULT_INJECTION: forcing a failure. [ 167.234412][T13299] name failslab, interval 1, probability 0, space 0, times 0 [ 167.247193][T13299] CPU: 1 UID: 0 PID: 13299 Comm: syz.4.2660 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 167.247222][T13299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 167.247234][T13299] Call Trace: [ 167.247240][T13299] [ 167.247246][T13299] dump_stack_lvl+0xf2/0x150 [ 167.247272][T13299] dump_stack+0x15/0x1a [ 167.247294][T13299] should_fail_ex+0x24a/0x260 [ 167.247322][T13299] should_failslab+0x8f/0xb0 [ 167.247349][T13299] kmem_cache_alloc_noprof+0x52/0x320 [ 167.247370][T13299] ? vm_area_dup+0x2c/0x130 [ 167.247398][T13299] vm_area_dup+0x2c/0x130 [ 167.247419][T13299] __split_vma+0xf7/0x6a0 [ 167.247442][T13299] vms_gather_munmap_vmas+0x2a5/0x7a0 [ 167.247486][T13299] do_vmi_align_munmap+0x1a4/0x390 [ 167.247533][T13299] do_vmi_munmap+0x1eb/0x230 [ 167.247572][T13299] do_munmap+0x8b/0xc0 [ 167.247603][T13299] __se_sys_mremap+0xa72/0xf10 [ 167.247628][T13299] ? fput+0x1c4/0x200 [ 167.247649][T13299] __x64_sys_mremap+0x67/0x80 [ 167.247676][T13299] x64_sys_call+0x27e8/0x2dc0 [ 167.247707][T13299] do_syscall_64+0xc9/0x1c0 [ 167.247742][T13299] ? clear_bhb_loop+0x55/0xb0 [ 167.247774][T13299] ? clear_bhb_loop+0x55/0xb0 [ 167.247805][T13299] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 167.247835][T13299] RIP: 0033:0x7f2a8a6ad169 [ 167.247852][T13299] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 167.247873][T13299] RSP: 002b:00007f2a88cd5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 167.247891][T13299] RAX: ffffffffffffffda RBX: 00007f2a8a8c6160 RCX: 00007f2a8a6ad169 [ 167.247902][T13299] RDX: 0000000000003000 RSI: 0000000000003000 RDI: 0000400000ffd000 [ 167.247913][T13299] RBP: 00007f2a88cd5090 R08: 0000400000ff5000 R09: 0000000000000000 [ 167.247924][T13299] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 167.247937][T13299] R13: 0000000000000001 R14: 00007f2a8a8c6160 R15: 00007ffcda14d308 [ 167.247954][T13299] [ 167.463910][T13294] lo: entered allmulticast mode [ 167.529537][T13285] lo: left allmulticast mode [ 167.534484][T13285] lo: left promiscuous mode [ 167.726095][T13310] netlink: 12 bytes leftover after parsing attributes in process `syz.7.2710'. [ 167.755095][ C0] dccp_v4_rcv: dropped packet with invalid checksum [ 167.761774][ C0] dccp_v4_rcv: dropped packet with invalid checksum [ 168.582185][T13368] netlink: 'syz.2.2719': attribute type 10 has an invalid length. [ 168.613900][T13372] netlink: 16402 bytes leftover after parsing attributes in process `syz.7.2718'. [ 168.647992][T13364] netlink: 16402 bytes leftover after parsing attributes in process `syz.7.2718'. [ 168.917203][T13385] netlink: 36 bytes leftover after parsing attributes in process `syz.2.2722'. [ 169.052727][ T29] kauditd_printk_skb: 157 callbacks suppressed [ 169.052761][ T29] audit: type=1326 audit(1740783445.377:9773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13405 comm="syz.9.2728" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f706eabd169 code=0x7ffc0000 [ 169.090149][ T29] audit: type=1326 audit(1740783445.409:9774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13405 comm="syz.9.2728" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f706eabd169 code=0x7ffc0000 [ 169.113930][ T29] audit: type=1326 audit(1740783445.409:9775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13405 comm="syz.9.2728" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f706eabd169 code=0x7ffc0000 [ 169.137482][ T29] audit: type=1326 audit(1740783445.409:9776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13405 comm="syz.9.2728" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f706eabd169 code=0x7ffc0000 [ 169.162534][ T29] audit: type=1326 audit(1740783445.409:9777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13405 comm="syz.9.2728" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f706eabd169 code=0x7ffc0000 [ 169.186114][ T29] audit: type=1326 audit(1740783445.419:9778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13405 comm="syz.9.2728" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f706eabd169 code=0x7ffc0000 [ 169.209667][ T29] audit: type=1326 audit(1740783445.419:9779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13405 comm="syz.9.2728" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f706eabd169 code=0x7ffc0000 [ 169.233234][ T29] audit: type=1326 audit(1740783445.419:9780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13405 comm="syz.9.2728" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f706eabd169 code=0x7ffc0000 [ 169.256696][ T29] audit: type=1326 audit(1740783445.419:9781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13405 comm="syz.9.2728" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f706eabd169 code=0x7ffc0000 [ 169.280209][ T29] audit: type=1326 audit(1740783445.419:9782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13405 comm="syz.9.2728" exe="/root/syz-executor" sig=0 arch=c000003e syscall=49 compat=0 ip=0x7f706eabd169 code=0x7ffc0000 [ 169.331823][T13415] tap0: tun_chr_ioctl cmd 1074025692 [ 169.557554][T13433] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2739'. [ 169.745780][T13455] wg2: left promiscuous mode [ 169.750425][T13455] wg2: left allmulticast mode [ 169.783583][T13455] wg2: entered promiscuous mode [ 169.783604][T13455] wg2: entered allmulticast mode [ 169.866874][T13461] dccp_invalid_packet: P.Data Offset(0) too small [ 169.899586][T13463] FAULT_INJECTION: forcing a failure. [ 169.899586][T13463] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 169.899611][T13463] CPU: 0 UID: 0 PID: 13463 Comm: syz.2.2750 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 169.899684][T13463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 169.899698][T13463] Call Trace: [ 169.899704][T13463] [ 169.899710][T13463] dump_stack_lvl+0xf2/0x150 [ 169.899736][T13463] dump_stack+0x15/0x1a [ 169.899756][T13463] should_fail_ex+0x24a/0x260 [ 169.899814][T13463] should_fail+0xb/0x10 [ 169.899906][T13463] should_fail_usercopy+0x1a/0x20 [ 169.899943][T13463] _copy_from_iter+0xd5/0xd00 [ 169.899979][T13463] ? kmalloc_reserve+0x16e/0x190 [ 169.900060][T13463] ? __build_skb_around+0x196/0x1f0 [ 169.900090][T13463] ? __alloc_skb+0x21f/0x310 [ 169.900111][T13463] ? __virt_addr_valid+0x1ed/0x250 [ 169.900140][T13463] ? __check_object_size+0x364/0x520 [ 169.900236][T13463] netlink_sendmsg+0x460/0x6e0 [ 169.900277][T13463] ? __pfx_netlink_sendmsg+0x10/0x10 [ 169.900315][T13463] __sock_sendmsg+0x140/0x180 [ 169.900373][T13463] ____sys_sendmsg+0x326/0x4b0 [ 169.900405][T13463] __sys_sendmsg+0x19d/0x230 [ 169.900461][T13463] __x64_sys_sendmsg+0x46/0x50 [ 169.900489][T13463] x64_sys_call+0x2734/0x2dc0 [ 169.900530][T13463] do_syscall_64+0xc9/0x1c0 [ 169.900562][T13463] ? clear_bhb_loop+0x55/0xb0 [ 169.900586][T13463] ? clear_bhb_loop+0x55/0xb0 [ 169.900679][T13463] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 169.900732][T13463] RIP: 0033:0x7f322bebd169 [ 169.900749][T13463] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 169.900770][T13463] RSP: 002b:00007f322a527038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 169.900791][T13463] RAX: ffffffffffffffda RBX: 00007f322c0d5fa0 RCX: 00007f322bebd169 [ 169.900803][T13463] RDX: 0000000000000000 RSI: 0000400000000000 RDI: 0000000000000006 [ 169.900814][T13463] RBP: 00007f322a527090 R08: 0000000000000000 R09: 0000000000000000 [ 169.900826][T13463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 169.900837][T13463] R13: 0000000000000000 R14: 00007f322c0d5fa0 R15: 00007ffe3913fcd8 [ 169.900899][T13463] [ 170.252212][T13471] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2753'. [ 170.359444][T13480] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 170.359471][T13480] vhci_hcd: invalid port number 253 [ 170.359482][T13480] vhci_hcd: invalid port number 253 [ 170.397221][T13480] netlink: 'syz.2.2756': attribute type 13 has an invalid length. [ 170.569319][T13480] gretap0: refused to change device tx_queue_len [ 170.569341][T13480] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 170.662289][T13489] wg2: left promiscuous mode [ 170.667027][T13489] wg2: left allmulticast mode [ 170.682234][T13489] wg2: entered promiscuous mode [ 170.687175][T13489] wg2: entered allmulticast mode [ 170.928406][T13501] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2766'. [ 171.077405][T13520] wg2: left promiscuous mode [ 171.082030][T13520] wg2: left allmulticast mode [ 171.110901][T13520] wg2: entered promiscuous mode [ 171.115956][T13520] wg2: entered allmulticast mode [ 171.203224][T13528] FAULT_INJECTION: forcing a failure. [ 171.203224][T13528] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 171.216581][T13528] CPU: 1 UID: 0 PID: 13528 Comm: +}[@ Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 171.216610][T13528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 171.216665][T13528] Call Trace: [ 171.216672][T13528] [ 171.216678][T13528] dump_stack_lvl+0xf2/0x150 [ 171.216710][T13528] dump_stack+0x15/0x1a [ 171.216766][T13528] should_fail_ex+0x24a/0x260 [ 171.216850][T13528] should_fail+0xb/0x10 [ 171.216938][T13528] should_fail_usercopy+0x1a/0x20 [ 171.216975][T13528] _copy_from_iter+0xd5/0xd00 [ 171.217016][T13528] ? kmalloc_reserve+0x16e/0x190 [ 171.217036][T13528] ? __build_skb_around+0x196/0x1f0 [ 171.217061][T13528] ? __alloc_skb+0x21f/0x310 [ 171.217122][T13528] ? __virt_addr_valid+0x1ed/0x250 [ 171.217151][T13528] ? __check_object_size+0x364/0x520 [ 171.217180][T13528] netlink_sendmsg+0x460/0x6e0 [ 171.217283][T13528] ? __pfx_netlink_sendmsg+0x10/0x10 [ 171.217336][T13528] __sock_sendmsg+0x140/0x180 [ 171.217374][T13528] ____sys_sendmsg+0x326/0x4b0 [ 171.217416][T13528] __sys_sendmsg+0x19d/0x230 [ 171.217520][T13528] __x64_sys_sendmsg+0x46/0x50 [ 171.217550][T13528] x64_sys_call+0x2734/0x2dc0 [ 171.217582][T13528] do_syscall_64+0xc9/0x1c0 [ 171.217618][T13528] ? clear_bhb_loop+0x55/0xb0 [ 171.217647][T13528] ? clear_bhb_loop+0x55/0xb0 [ 171.217680][T13528] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 171.217712][T13528] RIP: 0033:0x7f2a8a6ad169 [ 171.217805][T13528] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 171.217827][T13528] RSP: 002b:00007f2a88d17038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 171.217849][T13528] RAX: ffffffffffffffda RBX: 00007f2a8a8c5fa0 RCX: 00007f2a8a6ad169 [ 171.217864][T13528] RDX: 0000000000000000 RSI: 0000400000000580 RDI: 0000000000000004 [ 171.217892][T13528] RBP: 00007f2a88d17090 R08: 0000000000000000 R09: 0000000000000000 [ 171.217903][T13528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 171.217914][T13528] R13: 0000000000000000 R14: 00007f2a8a8c5fa0 R15: 00007ffcda14d308 [ 171.217932][T13528] [ 171.462476][T13530] netlink: 'syz.7.2777': attribute type 29 has an invalid length. [ 171.548952][T13534] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2780'. [ 171.764312][T13532] netlink: 36 bytes leftover after parsing attributes in process `syz.2.2779'. [ 172.294698][T13552] 9pnet_fd: Insufficient options for proto=fd [ 172.310271][T13554] FAULT_INJECTION: forcing a failure. [ 172.310271][T13554] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 172.323390][T13554] CPU: 0 UID: 0 PID: 13554 Comm: syz.9.2788 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 172.323472][T13554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 172.323488][T13554] Call Trace: [ 172.323495][T13554] [ 172.323505][T13554] dump_stack_lvl+0xf2/0x150 [ 172.323536][T13554] dump_stack+0x15/0x1a [ 172.323557][T13554] should_fail_ex+0x24a/0x260 [ 172.323690][T13554] should_fail+0xb/0x10 [ 172.323716][T13554] should_fail_usercopy+0x1a/0x20 [ 172.323838][T13554] _copy_from_user+0x1c/0xa0 [ 172.323874][T13554] load_msg+0x17a/0x2c0 [ 172.323916][T13554] do_mq_timedsend+0x23b/0x680 [ 172.324033][T13554] __x64_sys_mq_timedsend+0xca/0x150 [ 172.324124][T13554] x64_sys_call+0x2a68/0x2dc0 [ 172.324152][T13554] do_syscall_64+0xc9/0x1c0 [ 172.324188][T13554] ? clear_bhb_loop+0x55/0xb0 [ 172.324241][T13554] ? clear_bhb_loop+0x55/0xb0 [ 172.324417][T13554] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 172.324450][T13554] RIP: 0033:0x7f706eabd169 [ 172.324465][T13554] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 172.324483][T13554] RSP: 002b:00007f706d127038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f2 [ 172.324501][T13554] RAX: ffffffffffffffda RBX: 00007f706ecd5fa0 RCX: 00007f706eabd169 [ 172.324514][T13554] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 172.324541][T13554] RBP: 00007f706d127090 R08: 0000000000000000 R09: 0000000000000000 [ 172.324556][T13554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 172.324570][T13554] R13: 0000000000000000 R14: 00007f706ecd5fa0 R15: 00007fff440efd18 [ 172.324590][T13554] [ 172.713029][T13562] netlink: 48 bytes leftover after parsing attributes in process `syz.7.2791'. [ 172.968701][T13569] netlink: 4 bytes leftover after parsing attributes in process `syz.7.2794'. [ 173.098313][T13575] netfs: Couldn't get user pages (rc=-14) [ 173.155914][T13573] netlink: 28 bytes leftover after parsing attributes in process `syz.7.2795'. [ 173.311168][T13584] netlink: 160 bytes leftover after parsing attributes in process `syz.2.2798'. [ 173.369526][T13590] netlink: 12 bytes leftover after parsing attributes in process `syz.8.2800'. [ 173.405932][T13593] wg2: left promiscuous mode [ 173.410644][T13593] wg2: left allmulticast mode [ 173.469031][T13593] wg2: entered promiscuous mode [ 173.473944][T13593] wg2: entered allmulticast mode [ 173.584551][T13616] FAULT_INJECTION: forcing a failure. [ 173.584551][T13616] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 173.597667][T13616] CPU: 0 UID: 0 PID: 13616 Comm: syz.2.2811 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 173.597697][T13616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 173.597737][T13616] Call Trace: [ 173.597745][T13616] [ 173.597753][T13616] dump_stack_lvl+0xf2/0x150 [ 173.597785][T13616] dump_stack+0x15/0x1a [ 173.597810][T13616] should_fail_ex+0x24a/0x260 [ 173.597914][T13616] should_fail+0xb/0x10 [ 173.597947][T13616] should_fail_usercopy+0x1a/0x20 [ 173.597984][T13616] _copy_to_user+0x20/0xa0 [ 173.598057][T13616] __x64_sys_clock_adjtime+0x164/0x1d0 [ 173.598105][T13616] x64_sys_call+0x21eb/0x2dc0 [ 173.598156][T13616] do_syscall_64+0xc9/0x1c0 [ 173.598188][T13616] ? clear_bhb_loop+0x55/0xb0 [ 173.598222][T13616] ? clear_bhb_loop+0x55/0xb0 [ 173.598363][T13616] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 173.598403][T13616] RIP: 0033:0x7f322bebd169 [ 173.598548][T13616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 173.598568][T13616] RSP: 002b:00007f322a527038 EFLAGS: 00000246 ORIG_RAX: 0000000000000131 [ 173.598586][T13616] RAX: ffffffffffffffda RBX: 00007f322c0d5fa0 RCX: 00007f322bebd169 [ 173.598601][T13616] RDX: 0000000000000000 RSI: 00004000000006c0 RDI: 0000000000000000 [ 173.598615][T13616] RBP: 00007f322a527090 R08: 0000000000000000 R09: 0000000000000000 [ 173.598638][T13616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 173.598652][T13616] R13: 0000000000000000 R14: 00007f322c0d5fa0 R15: 00007ffe3913fcd8 [ 173.598729][T13616] [ 174.000712][T13629] vhci_hcd: invalid port number 15 [ 174.005897][T13629] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 174.107968][T13618] netlink: 'syz.2.2812': attribute type 29 has an invalid length. [ 174.116302][T13618] netlink: 'syz.2.2812': attribute type 29 has an invalid length. [ 174.164196][T13640] pim6reg1: entered promiscuous mode [ 174.169693][T13640] pim6reg1: entered allmulticast mode [ 174.230885][T13647] FAULT_INJECTION: forcing a failure. [ 174.230885][T13647] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 174.244001][T13647] CPU: 0 UID: 0 PID: 13647 Comm: syz.8.2824 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 174.244092][T13647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 174.244107][T13647] Call Trace: [ 174.244114][T13647] [ 174.244122][T13647] dump_stack_lvl+0xf2/0x150 [ 174.244215][T13647] dump_stack+0x15/0x1a [ 174.244234][T13647] should_fail_ex+0x24a/0x260 [ 174.244260][T13647] should_fail+0xb/0x10 [ 174.244283][T13647] should_fail_usercopy+0x1a/0x20 [ 174.244388][T13647] _copy_to_user+0x20/0xa0 [ 174.244405][T13647] simple_read_from_buffer+0xa0/0x110 [ 174.244491][T13647] proc_fail_nth_read+0xf9/0x140 [ 174.244521][T13647] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 174.244581][T13647] vfs_read+0x19b/0x6f0 [ 174.244601][T13647] ? __rcu_read_unlock+0x4e/0x70 [ 174.244647][T13647] ? __fget_files+0x17c/0x1c0 [ 174.244724][T13647] ksys_read+0xe8/0x1b0 [ 174.244747][T13647] __x64_sys_read+0x42/0x50 [ 174.244823][T13647] x64_sys_call+0x2874/0x2dc0 [ 174.244846][T13647] do_syscall_64+0xc9/0x1c0 [ 174.244872][T13647] ? clear_bhb_loop+0x55/0xb0 [ 174.244896][T13647] ? clear_bhb_loop+0x55/0xb0 [ 174.244995][T13647] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 174.245018][T13647] RIP: 0033:0x7f41c3efbb7c [ 174.245044][T13647] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 174.245059][T13647] RSP: 002b:00007f41c2561030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 174.245161][T13647] RAX: ffffffffffffffda RBX: 00007f41c4115fa0 RCX: 00007f41c3efbb7c [ 174.245174][T13647] RDX: 000000000000000f RSI: 00007f41c25610a0 RDI: 0000000000000001 [ 174.245208][T13647] RBP: 00007f41c2561090 R08: 0000000000000000 R09: 0000000000000000 [ 174.245218][T13647] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 [ 174.245228][T13647] R13: 0000000000000000 R14: 00007f41c4115fa0 R15: 00007ffc0ef98628 [ 174.245243][T13647] [ 174.456798][T13651] __nla_validate_parse: 1 callbacks suppressed [ 174.463107][T13651] netlink: 24 bytes leftover after parsing attributes in process `syz.7.2825'. [ 174.479970][T13651] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=13651 comm=syz.7.2825 [ 174.493453][ T29] kauditd_printk_skb: 138 callbacks suppressed [ 174.493469][ T29] audit: type=1400 audit(1740784219.088:9921): avc: denied { read } for pid=13649 comm="syz.7.2825" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 174.501789][T13651] batadv_slave_1: entered promiscuous mode [ 174.599820][T13649] batadv_slave_1: left promiscuous mode [ 174.644652][T13656] vhci_hcd: invalid port number 15 [ 174.649970][T13656] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 174.676800][ T29] audit: type=1400 audit(1740784219.287:9922): avc: denied { create } for pid=13658 comm="syz.2.2830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 174.696814][ T29] audit: type=1400 audit(1740784219.287:9923): avc: denied { connect } for pid=13658 comm="syz.2.2830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 174.716672][ T29] audit: type=1400 audit(1740784219.287:9924): avc: denied { write } for pid=13658 comm="syz.2.2830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 174.796166][T13672] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2833'. [ 174.881914][T13681] FAULT_INJECTION: forcing a failure. [ 174.881914][T13681] name failslab, interval 1, probability 0, space 0, times 0 [ 174.894692][T13681] CPU: 1 UID: 0 PID: 13681 Comm: syz.8.2838 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 174.894740][T13681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 174.894806][T13681] Call Trace: [ 174.894815][T13681] [ 174.894824][T13681] dump_stack_lvl+0xf2/0x150 [ 174.894858][T13681] dump_stack+0x15/0x1a [ 174.894894][T13681] should_fail_ex+0x24a/0x260 [ 174.894930][T13681] should_failslab+0x8f/0xb0 [ 174.895031][T13681] kmem_cache_alloc_noprof+0x52/0x320 [ 174.895056][T13681] ? prepare_creds+0x37/0x480 [ 174.895093][T13681] ? kstrtouint_from_user+0xb0/0xe0 [ 174.895134][T13681] prepare_creds+0x37/0x480 [ 174.895217][T13681] lookup_user_key+0x132/0xdf0 [ 174.895247][T13681] ? should_fail_ex+0xd7/0x260 [ 174.895289][T13681] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 174.895325][T13681] __se_sys_add_key+0x24b/0x320 [ 174.895362][T13681] ? fput+0x1c4/0x200 [ 174.895447][T13681] __x64_sys_add_key+0x67/0x80 [ 174.895494][T13681] x64_sys_call+0x2964/0x2dc0 [ 174.895528][T13681] do_syscall_64+0xc9/0x1c0 [ 174.895564][T13681] ? clear_bhb_loop+0x55/0xb0 [ 174.895670][T13681] ? clear_bhb_loop+0x55/0xb0 [ 174.895756][T13681] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 174.895790][T13681] RIP: 0033:0x7f41c3efd169 [ 174.895809][T13681] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 174.895831][T13681] RSP: 002b:00007f41c2561038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 174.895854][T13681] RAX: ffffffffffffffda RBX: 00007f41c4115fa0 RCX: 00007f41c3efd169 [ 174.895869][T13681] RDX: 0000400000000840 RSI: 0000000000000000 RDI: 00004000000001c0 [ 174.895893][T13681] RBP: 00007f41c2561090 R08: ffffffffffffffff R09: 0000000000000000 [ 174.895906][T13681] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 174.895926][T13681] R13: 0000000000000000 R14: 00007f41c4115fa0 R15: 00007ffc0ef98628 [ 174.895943][T13681] [ 175.137959][T13685] vlan0: entered allmulticast mode [ 175.143702][T13685] bond0: entered allmulticast mode [ 175.148868][T13685] bond_slave_1: entered allmulticast mode [ 175.165100][T13685] bond0: left allmulticast mode [ 175.170020][T13685] bond_slave_1: left allmulticast mode [ 175.179713][T13687] FAULT_INJECTION: forcing a failure. [ 175.179713][T13687] name failslab, interval 1, probability 0, space 0, times 0 [ 175.192430][T13687] CPU: 0 UID: 0 PID: 13687 Comm: syz.7.2840 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 175.192524][T13687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 175.192538][T13687] Call Trace: [ 175.192545][T13687] [ 175.192552][T13687] dump_stack_lvl+0xf2/0x150 [ 175.192591][T13687] dump_stack+0x15/0x1a [ 175.192685][T13687] should_fail_ex+0x24a/0x260 [ 175.192718][T13687] should_failslab+0x8f/0xb0 [ 175.192755][T13687] __kmalloc_noprof+0xab/0x3f0 [ 175.192830][T13687] ? copy_splice_read+0xb5/0x5b0 [ 175.192906][T13687] copy_splice_read+0xb5/0x5b0 [ 175.192971][T13687] ? __kmalloc_noprof+0x36c/0x3f0 [ 175.192990][T13687] ? alloc_pipe_info+0x1cb/0x360 [ 175.193106][T13687] ? __pfx_shmem_file_splice_read+0x10/0x10 [ 175.193135][T13687] splice_direct_to_actor+0x28b/0x670 [ 175.193162][T13687] ? __pfx_direct_splice_actor+0x10/0x10 [ 175.193233][T13687] do_splice_direct+0xd7/0x150 [ 175.193263][T13687] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 175.193308][T13687] do_sendfile+0x398/0x660 [ 175.193331][T13687] __x64_sys_sendfile64+0x110/0x150 [ 175.193438][T13687] x64_sys_call+0xfbd/0x2dc0 [ 175.193466][T13687] do_syscall_64+0xc9/0x1c0 [ 175.193499][T13687] ? clear_bhb_loop+0x55/0xb0 [ 175.193531][T13687] ? clear_bhb_loop+0x55/0xb0 [ 175.193562][T13687] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 175.193636][T13687] RIP: 0033:0x7fbec731d169 [ 175.193652][T13687] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 175.193715][T13687] RSP: 002b:00007fbec5981038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 175.193768][T13687] RAX: ffffffffffffffda RBX: 00007fbec7535fa0 RCX: 00007fbec731d169 [ 175.193828][T13687] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 0000000000000008 [ 175.193839][T13687] RBP: 00007fbec5981090 R08: 0000000000000000 R09: 0000000000000000 [ 175.193851][T13687] R10: 00008000fffffffe R11: 0000000000000246 R12: 0000000000000001 [ 175.193863][T13687] R13: 0000000000000000 R14: 00007fbec7535fa0 R15: 00007ffce4942908 [ 175.193881][T13687] [ 175.452037][ T29] audit: type=1326 audit(1740784220.096:9925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13694 comm="syz.9.2844" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f706eabd169 code=0x7ffc0000 [ 175.475766][ T29] audit: type=1326 audit(1740784220.096:9926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13694 comm="syz.9.2844" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f706eabd169 code=0x7ffc0000 [ 175.499340][ T29] audit: type=1326 audit(1740784220.096:9927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13694 comm="syz.9.2844" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f706eabd169 code=0x7ffc0000 [ 175.522849][ T29] audit: type=1326 audit(1740784220.096:9928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13694 comm="syz.9.2844" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f706eabd169 code=0x7ffc0000 [ 175.546390][ T29] audit: type=1326 audit(1740784220.096:9929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13694 comm="syz.9.2844" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f706eabd169 code=0x7ffc0000 [ 175.569988][ T29] audit: type=1326 audit(1740784220.096:9930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13694 comm="syz.9.2844" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f706eabd169 code=0x7ffc0000 [ 175.599010][T13700] FAULT_INJECTION: forcing a failure. [ 175.599010][T13700] name failslab, interval 1, probability 0, space 0, times 0 [ 175.611666][T13700] CPU: 0 UID: 0 PID: 13700 Comm: syz.4.2845 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 175.611770][T13700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 175.611785][T13700] Call Trace: [ 175.611792][T13700] [ 175.611800][T13700] dump_stack_lvl+0xf2/0x150 [ 175.611896][T13700] dump_stack+0x15/0x1a [ 175.611922][T13700] should_fail_ex+0x24a/0x260 [ 175.611951][T13700] should_failslab+0x8f/0xb0 [ 175.611979][T13700] kmem_cache_alloc_noprof+0x52/0x320 [ 175.611999][T13700] ? audit_log_start+0x34c/0x6b0 [ 175.612104][T13700] audit_log_start+0x34c/0x6b0 [ 175.612132][T13700] ? __rcu_read_unlock+0x4e/0x70 [ 175.612201][T13700] audit_log_common_recv_msg+0xc0/0x180 [ 175.612273][T13700] audit_receive+0x1250/0x2580 [ 175.612298][T13700] ? __netlink_deliver_tap+0x4de/0x4f0 [ 175.612335][T13700] ? __netlink_lookup+0x253/0x290 [ 175.612366][T13700] netlink_unicast+0x599/0x670 [ 175.612423][T13700] netlink_sendmsg+0x5cc/0x6e0 [ 175.612456][T13700] ? __pfx_netlink_sendmsg+0x10/0x10 [ 175.612485][T13700] __sock_sendmsg+0x140/0x180 [ 175.612580][T13700] ____sys_sendmsg+0x326/0x4b0 [ 175.612605][T13700] __sys_sendmsg+0x19d/0x230 [ 175.612639][T13700] __x64_sys_sendmsg+0x46/0x50 [ 175.612727][T13700] x64_sys_call+0x2734/0x2dc0 [ 175.612750][T13700] do_syscall_64+0xc9/0x1c0 [ 175.612784][T13700] ? clear_bhb_loop+0x55/0xb0 [ 175.612815][T13700] ? clear_bhb_loop+0x55/0xb0 [ 175.612913][T13700] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 175.612939][T13700] RIP: 0033:0x7f2a8a6ad169 [ 175.612953][T13700] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 175.612977][T13700] RSP: 002b:00007f2a88d17038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 175.612997][T13700] RAX: ffffffffffffffda RBX: 00007f2a8a8c5fa0 RCX: 00007f2a8a6ad169 [ 175.613073][T13700] RDX: 0000000000000004 RSI: 00004000000006c0 RDI: 0000000000000006 [ 175.613087][T13700] RBP: 00007f2a88d17090 R08: 0000000000000000 R09: 0000000000000000 [ 175.613100][T13700] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 175.613111][T13700] R13: 0000000000000000 R14: 00007f2a8a8c5fa0 R15: 00007ffcda14d308 [ 175.613129][T13700] [ 175.878257][T13708] wg2: left promiscuous mode [ 175.883182][T13708] wg2: left allmulticast mode [ 175.907329][T13708] wg2: entered promiscuous mode [ 175.912239][T13708] wg2: entered allmulticast mode [ 175.923834][T13714] FAULT_INJECTION: forcing a failure. [ 175.923834][T13714] name failslab, interval 1, probability 0, space 0, times 0 [ 175.936674][T13714] CPU: 0 UID: 0 PID: 13714 Comm: +}[@ Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 175.936718][T13714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 175.936731][T13714] Call Trace: [ 175.936737][T13714] [ 175.936754][T13714] dump_stack_lvl+0xf2/0x150 [ 175.936787][T13714] dump_stack+0x15/0x1a [ 175.936861][T13714] should_fail_ex+0x24a/0x260 [ 175.936933][T13714] should_failslab+0x8f/0xb0 [ 175.936969][T13714] __kmalloc_noprof+0xab/0x3f0 [ 175.937007][T13714] ? iovec_from_user+0x84/0x210 [ 175.937032][T13714] iovec_from_user+0x84/0x210 [ 175.937162][T13714] __import_iovec+0xff/0x540 [ 175.937185][T13714] ? sock_recvmsg+0xa6/0x170 [ 175.937302][T13714] import_iovec+0xbc/0xd0 [ 175.937395][T13714] copy_msghdr_from_user+0x24e/0x2a0 [ 175.937438][T13714] do_recvmmsg+0x256/0x6d0 [ 175.937481][T13714] __x64_sys_recvmmsg+0xe2/0x170 [ 175.937575][T13714] x64_sys_call+0x2a9a/0x2dc0 [ 175.937603][T13714] do_syscall_64+0xc9/0x1c0 [ 175.937651][T13714] ? clear_bhb_loop+0x55/0xb0 [ 175.937728][T13714] ? clear_bhb_loop+0x55/0xb0 [ 175.937755][T13714] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 175.937783][T13714] RIP: 0033:0x7f706eabd169 [ 175.937801][T13714] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 175.937889][T13714] RSP: 002b:00007f706d127038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 175.937912][T13714] RAX: ffffffffffffffda RBX: 00007f706ecd5fa0 RCX: 00007f706eabd169 [ 175.937927][T13714] RDX: 000000000000002a RSI: 0000400000000f80 RDI: 0000000000000003 [ 175.937942][T13714] RBP: 00007f706d127090 R08: 0000000000000000 R09: 0000000000000000 [ 175.937956][T13714] R10: 0000000040012020 R11: 0000000000000246 R12: 0000000000000001 [ 175.937971][T13714] R13: 0000000000000000 R14: 00007f706ecd5fa0 R15: 00007fff440efd18 [ 175.937994][T13714] [ 176.189371][T13724] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2855'. [ 176.293067][T13736] netlink: 4 bytes leftover after parsing attributes in process `syz.8.2857'. [ 176.324752][T13738] netlink: 12 bytes leftover after parsing attributes in process `syz.7.2859'. [ 176.359997][T13741] FAULT_INJECTION: forcing a failure. [ 176.359997][T13741] name failslab, interval 1, probability 0, space 0, times 0 [ 176.372791][T13741] CPU: 1 UID: 0 PID: 13741 Comm: syz.8.2860 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 176.372819][T13741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 176.372832][T13741] Call Trace: [ 176.372840][T13741] [ 176.372849][T13741] dump_stack_lvl+0xf2/0x150 [ 176.372934][T13741] dump_stack+0x15/0x1a [ 176.372959][T13741] should_fail_ex+0x24a/0x260 [ 176.372994][T13741] should_failslab+0x8f/0xb0 [ 176.373029][T13741] __kmalloc_node_noprof+0xad/0x410 [ 176.373128][T13741] ? vmemdup_user+0x42/0x1b0 [ 176.373158][T13741] vmemdup_user+0x42/0x1b0 [ 176.373266][T13741] map_lookup_elem+0x1f5/0x560 [ 176.373303][T13741] __sys_bpf+0x398/0x7a0 [ 176.373340][T13741] __x64_sys_bpf+0x43/0x50 [ 176.373365][T13741] x64_sys_call+0x2914/0x2dc0 [ 176.373433][T13741] do_syscall_64+0xc9/0x1c0 [ 176.373469][T13741] ? clear_bhb_loop+0x55/0xb0 [ 176.373501][T13741] ? clear_bhb_loop+0x55/0xb0 [ 176.373566][T13741] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 176.373595][T13741] RIP: 0033:0x7f41c3efd169 [ 176.373613][T13741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 176.373634][T13741] RSP: 002b:00007f41c2561038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 176.373742][T13741] RAX: ffffffffffffffda RBX: 00007f41c4115fa0 RCX: 00007f41c3efd169 [ 176.373757][T13741] RDX: 0000000000000020 RSI: 0000400000000200 RDI: 0000000000000001 [ 176.373771][T13741] RBP: 00007f41c2561090 R08: 0000000000000000 R09: 0000000000000000 [ 176.373782][T13741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 176.373793][T13741] R13: 0000000000000000 R14: 00007f41c4115fa0 R15: 00007ffc0ef98628 [ 176.373811][T13741] [ 176.374645][ C1] dccp_v4_rcv: dropped packet with invalid checksum [ 176.582012][T13744] netlink: 'syz.9.2856': attribute type 29 has an invalid length. [ 176.681275][T13754] vhci_hcd: invalid port number 15 [ 176.686539][T13754] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 176.884419][T13775] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2869'. [ 177.118597][T13779] netlink: 'syz.2.2867': attribute type 29 has an invalid length. [ 177.150821][T13779] netlink: 'syz.2.2867': attribute type 29 has an invalid length. [ 177.464558][T13816] netlink: 12 bytes leftover after parsing attributes in process `syz.7.2887'. [ 177.499899][ C1] dccp_v4_rcv: dropped packet with invalid checksum [ 177.506567][ C1] dccp_v4_rcv: dropped packet with invalid checksum [ 177.539373][T13826] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2891'. [ 177.664807][T13841] vhci_hcd: invalid port number 15 [ 177.670028][T13841] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 177.842478][T13859] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2904'. [ 177.912596][T13873] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2909'. [ 177.962260][T13876] vhci_hcd: invalid port number 15 [ 177.967537][T13876] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 178.148455][T13894] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 178.266281][T13909] vhci_hcd: invalid port number 15 [ 178.271514][T13909] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 178.403065][T13931] bond1: entered promiscuous mode [ 178.408201][T13931] bond1: entered allmulticast mode [ 178.421411][T13931] 8021q: adding VLAN 0 to HW filter on device bond1 [ 178.444290][T13931] bond1 (unregistering): Released all slaves [ 178.539002][T13942] syzkaller0: entered promiscuous mode [ 178.544688][T13942] syzkaller0: entered allmulticast mode [ 178.666425][T13953] vhci_hcd: invalid port number 15 [ 178.671630][T13953] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 178.747919][T13960] sd 0:0:1:0: device reset [ 178.978671][T13982] vhci_hcd: invalid port number 15 [ 178.983928][T13982] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 179.113237][T13998] 9pnet_fd: Insufficient options for proto=fd [ 179.127605][T13997] wg2: entered promiscuous mode [ 179.132503][T13997] wg2: entered allmulticast mode [ 179.320620][T14015] vhci_hcd: invalid port number 15 [ 179.325866][T14015] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 179.382191][ T29] kauditd_printk_skb: 159 callbacks suppressed [ 179.382209][ T29] audit: type=1400 audit(1740784224.222:10088): avc: denied { ioctl } for pid=14018 comm="syz.4.2974" path="socket:[37025]" dev="sockfs" ino=37025 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 179.450491][T14029] wg2: left promiscuous mode [ 179.455229][T14029] wg2: left allmulticast mode [ 179.485972][T14029] wg2: entered promiscuous mode [ 179.490917][T14029] wg2: entered allmulticast mode [ 179.705129][T14044] netlink: 'syz.2.2979': attribute type 29 has an invalid length. [ 179.727238][T14044] netlink: 'syz.2.2979': attribute type 29 has an invalid length. [ 179.740693][T14048] vhci_hcd: invalid port number 15 [ 179.745979][T14048] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 179.791666][T14052] __nla_validate_parse: 3 callbacks suppressed [ 179.791710][T14052] netlink: 12 bytes leftover after parsing attributes in process `syz.9.2988'. [ 179.881538][T14061] wg2: left promiscuous mode [ 179.886266][T14061] wg2: left allmulticast mode [ 179.912871][T14061] wg2: entered promiscuous mode [ 179.917889][T14061] wg2: entered allmulticast mode [ 180.178421][ T29] audit: type=1400 audit(1740784225.051:10089): avc: denied { mount } for pid=14062 comm="syz.7.2993" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 180.196277][T14086] netlink: 36 bytes leftover after parsing attributes in process `syz.4.3001'. [ 180.455042][T14099] netlink: 'syz.8.2999': attribute type 29 has an invalid length. [ 180.561898][T14105] wg2: left promiscuous mode [ 180.566873][T14105] wg2: left allmulticast mode [ 180.616065][T14105] wg2: entered promiscuous mode [ 180.621227][T14105] wg2: entered allmulticast mode [ 180.815854][T14114] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3012'. [ 180.890763][T14118] vhci_hcd: invalid port number 15 [ 180.895945][T14118] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 180.937202][ T29] audit: type=1400 audit(1740784225.849:10090): avc: denied { mount } for pid=14119 comm="syz.9.3014" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 180.959392][ T29] audit: type=1400 audit(1740784225.849:10091): avc: denied { unmount } for pid=14119 comm="syz.9.3014" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 181.037312][T14124] netlink: 4 bytes leftover after parsing attributes in process `syz.7.3016'. [ 181.100932][ T29] audit: type=1400 audit(1740784226.028:10092): avc: denied { write } for pid=14133 comm="syz.4.3020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 181.120857][ T29] audit: type=1400 audit(1740784226.028:10093): avc: denied { ioctl } for pid=14133 comm="syz.4.3020" path="socket:[37198]" dev="sockfs" ino=37198 ioctlcmd=0x9431 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 181.192977][ T29] audit: type=1400 audit(1740784226.080:10094): avc: denied { read } for pid=14133 comm="syz.4.3020" name="event2" dev="devtmpfs" ino=245 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 181.216439][ T29] audit: type=1400 audit(1740784226.080:10095): avc: denied { open } for pid=14133 comm="syz.4.3020" path="/dev/input/event2" dev="devtmpfs" ino=245 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 181.316204][T14139] netlink: 'syz.9.3015': attribute type 29 has an invalid length. [ 181.334653][T14149] vhci_hcd: invalid port number 15 [ 181.339884][T14149] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 181.354712][T14139] netlink: 'syz.9.3015': attribute type 29 has an invalid length. [ 181.452992][T14156] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3030'. [ 181.710551][T14180] vhci_hcd: invalid port number 15 [ 181.715823][T14180] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 181.743731][T14181] wg2: left promiscuous mode [ 181.748380][T14181] wg2: left allmulticast mode [ 181.781387][T14181] wg2: entered promiscuous mode [ 181.786290][T14181] wg2: entered allmulticast mode [ 181.982225][T14185] netlink: 'syz.4.3033': attribute type 29 has an invalid length. [ 182.044304][T14189] netlink: 4 bytes leftover after parsing attributes in process `syz.7.3044'. [ 182.205028][T14196] lo speed is unknown, defaulting to 1000 [ 182.656112][T14222] vhci_hcd: invalid port number 15 [ 182.661491][T14222] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 182.733118][T14228] wg2: left promiscuous mode [ 182.737782][T14228] wg2: left allmulticast mode [ 182.763073][T14228] wg2: entered promiscuous mode [ 182.768002][T14228] wg2: entered allmulticast mode [ 182.812088][ T29] audit: type=1326 audit(1740784227.813:10096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14230 comm="syz.2.3061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 182.835916][ T29] audit: type=1326 audit(1740784227.813:10097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14230 comm="syz.2.3061" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 182.888354][T14234] netlink: 1196 bytes leftover after parsing attributes in process `syz.2.3061'. [ 182.931463][T14239] FAULT_INJECTION: forcing a failure. [ 182.931463][T14239] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 182.944648][T14239] CPU: 1 UID: 0 PID: 14239 Comm: syz.9.3064 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 182.944678][T14239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 182.944773][T14239] Call Trace: [ 182.944779][T14239] [ 182.944787][T14239] dump_stack_lvl+0xf2/0x150 [ 182.944814][T14239] dump_stack+0x15/0x1a [ 182.944835][T14239] should_fail_ex+0x24a/0x260 [ 182.944916][T14239] should_fail+0xb/0x10 [ 182.944991][T14239] should_fail_usercopy+0x1a/0x20 [ 182.945030][T14239] _copy_from_user+0x1c/0xa0 [ 182.945082][T14239] vmemdup_user+0x12e/0x1b0 [ 182.945108][T14239] path_setxattrat+0x1c9/0x310 [ 182.945213][T14239] __x64_sys_lsetxattr+0x71/0x90 [ 182.945244][T14239] x64_sys_call+0x29c8/0x2dc0 [ 182.945275][T14239] do_syscall_64+0xc9/0x1c0 [ 182.945314][T14239] ? clear_bhb_loop+0x55/0xb0 [ 182.945340][T14239] ? clear_bhb_loop+0x55/0xb0 [ 182.945366][T14239] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 182.945397][T14239] RIP: 0033:0x7f706eabd169 [ 182.945412][T14239] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 182.945485][T14239] RSP: 002b:00007f706d127038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 182.945518][T14239] RAX: ffffffffffffffda RBX: 00007f706ecd5fa0 RCX: 00007f706eabd169 [ 182.945532][T14239] RDX: 00004000000004c0 RSI: 0000400000000080 RDI: 00004000000000c0 [ 182.945546][T14239] RBP: 00007f706d127090 R08: 0000000000000000 R09: 0000000000000000 [ 182.945559][T14239] R10: 000000000000fe37 R11: 0000000000000246 R12: 0000000000000001 [ 182.945609][T14239] R13: 0000000000000000 R14: 00007f706ecd5fa0 R15: 00007fff440efd18 [ 182.945628][T14239] [ 183.506759][T14267] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3077'. [ 183.524122][T14273] vhci_hcd: invalid port number 15 [ 183.529304][T14273] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 183.561319][T14277] wg2: left promiscuous mode [ 183.561679][T14275] FAULT_INJECTION: forcing a failure. [ 183.561679][T14275] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 183.566212][T14277] wg2: left allmulticast mode [ 183.579032][T14275] CPU: 0 UID: 0 PID: 14275 Comm: syz.9.3079 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 183.579073][T14275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 183.579090][T14275] Call Trace: [ 183.579097][T14275] [ 183.579107][T14275] dump_stack_lvl+0xf2/0x150 [ 183.579143][T14275] dump_stack+0x15/0x1a [ 183.579192][T14275] should_fail_ex+0x24a/0x260 [ 183.579230][T14275] should_fail+0xb/0x10 [ 183.579262][T14275] should_fail_usercopy+0x1a/0x20 [ 183.579301][T14275] strncpy_from_user+0x25/0x210 [ 183.579406][T14275] ? kmem_cache_alloc_noprof+0x18e/0x320 [ 183.579482][T14275] ? getname_flags+0x81/0x3b0 [ 183.579523][T14275] getname_flags+0xb0/0x3b0 [ 183.579565][T14275] user_path_at+0x26/0x120 [ 183.579654][T14275] __se_sys_mount+0x24b/0x2d0 [ 183.579692][T14275] ? fput+0x1c4/0x200 [ 183.579719][T14275] __x64_sys_mount+0x67/0x80 [ 183.579757][T14275] x64_sys_call+0x2c84/0x2dc0 [ 183.579802][T14275] do_syscall_64+0xc9/0x1c0 [ 183.579864][T14275] ? clear_bhb_loop+0x55/0xb0 [ 183.579898][T14275] ? clear_bhb_loop+0x55/0xb0 [ 183.579932][T14275] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 183.579965][T14275] RIP: 0033:0x7f706eabd169 [ 183.580042][T14275] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 183.580070][T14275] RSP: 002b:00007f706d127038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 183.580088][T14275] RAX: ffffffffffffffda RBX: 00007f706ecd5fa0 RCX: 00007f706eabd169 [ 183.580099][T14275] RDX: 0000400000000100 RSI: 0000400000000040 RDI: 0000000000000000 [ 183.580111][T14275] RBP: 00007f706d127090 R08: 0000400000000200 R09: 0000000000000000 [ 183.580123][T14275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 183.580134][T14275] R13: 0000000000000000 R14: 00007f706ecd5fa0 R15: 00007fff440efd18 [ 183.580153][T14275] [ 183.802171][T14283] wg2: entered promiscuous mode [ 183.807060][T14283] wg2: entered allmulticast mode [ 184.001294][T14298] netlink: 'syz.9.3082': attribute type 29 has an invalid length. [ 184.016300][T14301] FAULT_INJECTION: forcing a failure. [ 184.016300][T14301] name failslab, interval 1, probability 0, space 0, times 0 [ 184.029071][T14301] CPU: 0 UID: 0 PID: 14301 Comm: syz.2.3090 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 184.029128][T14301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 184.029140][T14301] Call Trace: [ 184.029146][T14301] [ 184.029153][T14301] dump_stack_lvl+0xf2/0x150 [ 184.029193][T14301] dump_stack+0x15/0x1a [ 184.029273][T14301] should_fail_ex+0x24a/0x260 [ 184.029302][T14301] ? audit_log_d_path+0x8e/0x150 [ 184.029332][T14301] should_failslab+0x8f/0xb0 [ 184.029404][T14301] __kmalloc_cache_noprof+0x4e/0x320 [ 184.029432][T14301] audit_log_d_path+0x8e/0x150 [ 184.029555][T14301] audit_log_d_path_exe+0x42/0x70 [ 184.029667][T14301] audit_log_task+0x1ec/0x250 [ 184.029700][T14301] audit_seccomp+0x68/0x130 [ 184.029775][T14301] __seccomp_filter+0x6fa/0x1180 [ 184.029802][T14301] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 184.029877][T14301] ? vfs_write+0x644/0x920 [ 184.029929][T14301] __secure_computing+0x9f/0x1c0 [ 184.029957][T14301] syscall_trace_enter+0xd1/0x1f0 [ 184.030044][T14301] ? fpregs_assert_state_consistent+0x83/0xa0 [ 184.030072][T14301] do_syscall_64+0xaa/0x1c0 [ 184.030149][T14301] ? clear_bhb_loop+0x55/0xb0 [ 184.030176][T14301] ? clear_bhb_loop+0x55/0xb0 [ 184.030208][T14301] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 184.030314][T14301] RIP: 0033:0x7f322bebd169 [ 184.030332][T14301] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 184.030352][T14301] RSP: 002b:00007f322a527038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ac [ 184.030371][T14301] RAX: ffffffffffffffda RBX: 00007f322c0d5fa0 RCX: 00007f322bebd169 [ 184.030383][T14301] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 184.030396][T14301] RBP: 00007f322a527090 R08: 0000000000000000 R09: 0000000000000000 [ 184.030411][T14301] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 184.030460][T14301] R13: 0000000000000000 R14: 00007f322c0d5fa0 R15: 00007ffe3913fcd8 [ 184.030478][T14301] [ 184.264289][ T29] kauditd_printk_skb: 57 callbacks suppressed [ 184.264308][ T29] audit: type=1326 audit(1740784229.325:10155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14300 comm="syz.2.3090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f322bebbb7c code=0x7ffc0000 [ 184.293875][ T29] audit: type=1326 audit(1740784229.325:10156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14300 comm="syz.2.3090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f322bebbc1f code=0x7ffc0000 [ 184.317348][ T29] audit: type=1326 audit(1740784229.325:10157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14300 comm="syz.2.3090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f322bebbdca code=0x7ffc0000 [ 184.340797][ T29] audit: type=1326 audit(1740784229.325:10158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14300 comm="syz.2.3090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 184.364420][ T29] audit: type=1326 audit(1740784229.325:10159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14300 comm="syz.2.3090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f322bebd169 code=0x7ffc0000 [ 184.382007][T14309] netlink: 4 bytes leftover after parsing attributes in process `syz.7.3091'. [ 184.475930][T14308] netlink: 'syz.8.3083': attribute type 29 has an invalid length. [ 184.490644][T14308] netlink: 'syz.8.3083': attribute type 29 has an invalid length. [ 184.640562][ T29] audit: type=1400 audit(1740784229.745:10160): avc: denied { setopt } for pid=14335 comm="syz.9.3103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 184.743489][T14341] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3104'. [ 184.821358][T14356] netlink: 12 bytes leftover after parsing attributes in process `syz.7.3110'. [ 184.986080][T14364] netlink: 12 bytes leftover after parsing attributes in process `syz.8.3114'. [ 185.167849][T14381] wg2: left promiscuous mode [ 185.172503][T14381] wg2: left allmulticast mode [ 185.254525][T14386] netlink: 'syz.9.3107': attribute type 29 has an invalid length. [ 185.274503][T14381] wg2: entered promiscuous mode [ 185.279523][T14381] wg2: entered allmulticast mode [ 185.328725][T14391] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3124'. [ 185.469338][T14396] vhci_hcd: invalid port number 15 [ 185.474564][T14396] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 185.981048][T14421] vhci_hcd: invalid port number 15 [ 185.986295][T14421] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 186.077254][T14427] netlink: 4 bytes leftover after parsing attributes in process `syz.8.3136'. [ 186.114332][T14435] wg2: left promiscuous mode [ 186.119084][T14435] wg2: left allmulticast mode [ 186.137954][T14435] wg2: entered promiscuous mode [ 186.142960][T14435] wg2: entered allmulticast mode [ 186.162310][T14436] No source specified [ 186.273716][T14452] vhci_hcd: invalid port number 15 [ 186.278908][T14452] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 186.371316][T14462] netlink: 4 bytes leftover after parsing attributes in process `syz.8.3154'. [ 186.710107][T14491] netlink: 'syz.9.3148': attribute type 29 has an invalid length. [ 186.871508][T14498] vhci_hcd: invalid port number 15 [ 186.876669][T14498] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 187.133211][T14508] vhci_hcd: invalid port number 154 [ 187.138565][T14508] vhci_hcd: default hub control req: c100 v0000 i009a l0 [ 187.251731][T14518] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3170'. [ 187.392620][ C0] ================================================================== [ 187.400826][ C0] BUG: KCSAN: data-race in can_send / can_send [ 187.407006][ C0] [ 187.409339][ C0] read-write to 0xffff88811af36ff0 of 8 bytes by interrupt on cpu 1: [ 187.417416][ C0] can_send+0x5b6/0x6d0 [ 187.421606][ C0] bcm_can_tx+0x314/0x420 [ 187.425961][ C0] bcm_tx_timeout_handler+0xea/0x280 [ 187.431273][ C0] __hrtimer_run_queues+0x20d/0x5e0 [ 187.436479][ C0] hrtimer_run_softirq+0xe4/0x2c0 [ 187.441514][ C0] handle_softirqs+0xbf/0x280 [ 187.446203][ C0] do_softirq+0x5e/0x90 [ 187.450362][ C0] __local_bh_enable_ip+0x6e/0x70 [ 187.455386][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 187.460338][ C0] release_sock+0x117/0x150 [ 187.464861][ C0] sockopt_release_sock+0x42/0x50 [ 187.469890][ C0] do_ip_getsockopt+0xd4a/0x1270 [ 187.474834][ C0] ip_getsockopt+0x5c/0x170 [ 187.479345][ C0] tcp_getsockopt+0xaa/0xe0 [ 187.483860][ C0] sock_common_getsockopt+0x5b/0x70 [ 187.489076][ C0] do_sock_getsockopt+0x1ca/0x260 [ 187.494120][ C0] __x64_sys_getsockopt+0x18c/0x200 [ 187.499336][ C0] x64_sys_call+0x1288/0x2dc0 [ 187.504040][ C0] do_syscall_64+0xc9/0x1c0 [ 187.508556][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 187.514460][ C0] [ 187.516779][ C0] read-write to 0xffff88811af36ff0 of 8 bytes by interrupt on cpu 0: [ 187.524847][ C0] can_send+0x5b6/0x6d0 [ 187.529008][ C0] bcm_can_tx+0x314/0x420 [ 187.533343][ C0] bcm_tx_timeout_handler+0xea/0x280 [ 187.538636][ C0] __hrtimer_run_queues+0x20d/0x5e0 [ 187.543838][ C0] hrtimer_run_softirq+0xe4/0x2c0 [ 187.548891][ C0] handle_softirqs+0xbf/0x280 [ 187.553570][ C0] do_softirq+0x5e/0x90 [ 187.557726][ C0] __local_bh_enable_ip+0x6e/0x70 [ 187.562752][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 187.567690][ C0] batadv_nc_purge_paths+0x220/0x270 [ 187.572992][ C0] batadv_nc_worker+0x3db/0xad0 [ 187.577853][ C0] process_scheduled_works+0x4db/0xa20 [ 187.583314][ C0] worker_thread+0x51d/0x6f0 [ 187.587909][ C0] kthread+0x4ae/0x520 [ 187.591981][ C0] ret_from_fork+0x4b/0x60 [ 187.596396][ C0] ret_from_fork_asm+0x1a/0x30 [ 187.601215][ C0] [ 187.603530][ C0] value changed: 0x00000000000023da -> 0x00000000000023db [ 187.610632][ C0] [ 187.612957][ C0] Reported by Kernel Concurrency Sanitizer on: [ 187.619098][ C0] CPU: 0 UID: 0 PID: 10386 Comm: kworker/u8:33 Not tainted 6.14.0-rc4-syzkaller-00199-g76544811c850 #0 [ 187.630118][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 187.640172][ C0] Workqueue: bat_events batadv_nc_worker [ 187.645817][ C0] ================================================================== [ 187.828397][T14530] wg2: left promiscuous mode [ 187.833167][T14530] wg2: left allmulticast mode [ 187.915947][T14536] wg2: entered promiscuous mode [ 187.920887][T14536] wg2: entered allmulticast mode