last executing test programs: 2m12.680803017s ago: executing program 0 (id=5251): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000008085000000040000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='kmem_cache_free\x00', r0}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) msgget$private(0x0, 0x214) 2m12.664016888s ago: executing program 0 (id=5252): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a3000000000540003800800024000"], 0xa8}}, 0x0) 2m11.779126842s ago: executing program 0 (id=5264): syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000000)='./file0\x00', 0x1018000, &(0x7f00000003c0)=ANY=[@ANYRES8=0x0, @ANYRES16, @ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC], 0x1, 0x2f2, &(0x7f0000000b00)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a40)={r0, 0xfffffffffffffebb, &(0x7f0000000340)}, 0x10) write$binfmt_script(r0, &(0x7f0000000040), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) 2m11.560618265s ago: executing program 0 (id=5266): syz_mount_image$ext4(&(0x7f0000000bc0)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x4000, &(0x7f0000000000)={[{@bsdgroups}, {@grpquota}, {@init_itable}, {@orlov}, {@nomblk_io_submit}]}, 0xa, 0xbb8, &(0x7f00000017c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./bus\x00', 0x141842, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000200), 0xfea7) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9010000005345204c696e7578"], 0x10) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) rt_sigprocmask(0x1, &(0x7f0000000040)={[0x7]}, 0x0, 0x8) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r4 = open(&(0x7f0000000500)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x4, 0x8001, 0x0, 0x2, 0x19, 0x5, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5c9d000ff8ee09e737ff0edf110ff4117639c2eb4b78c66ee677df701905b9aafab4afaaf755a3f6a004", "cba3d625780820d1cbf7db71038259ca171ce1a311ef97e4298d1e14ef01060000e9009600fdff00000000000000000000000000000000000400", "d3b5ed52000000000000000000000d0000001000", [0x0, 0x800000000020002]}) copy_file_range(r1, 0x0, r0, 0x0, 0xffffffffa003e45c, 0x700000000000000) syz_mount_image$ext4(&(0x7f0000000bc0)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x4000, &(0x7f0000000000)={[{@bsdgroups}, {@grpquota}, {@init_itable}, {@orlov}, {@nomblk_io_submit}]}, 0xa, 0xbb8, &(0x7f00000017c0)="$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") (async) openat(0xffffffffffffff9c, &(0x7f0000000200)='./bus\x00', 0x141842, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x275a, 0x0) (async) write$binfmt_script(r2, &(0x7f0000000200), 0xfea7) (async) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) write$selinux_load(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9010000005345204c696e7578"], 0x10) (async) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) (async) rt_sigprocmask(0x1, &(0x7f0000000040)={[0x7]}, 0x0, 0x8) (async) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) (async) open(&(0x7f0000000500)='./bus\x00', 0x0, 0x0) (async) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x4, 0x8001, 0x0, 0x2, 0x19, 0x5, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5c9d000ff8ee09e737ff0edf110ff4117639c2eb4b78c66ee677df701905b9aafab4afaaf755a3f6a004", "cba3d625780820d1cbf7db71038259ca171ce1a311ef97e4298d1e14ef01060000e9009600fdff00000000000000000000000000000000000400", "d3b5ed52000000000000000000000d0000001000", [0x0, 0x800000000020002]}) (async) copy_file_range(r1, 0x0, r0, 0x0, 0xffffffffa003e45c, 0x700000000000000) (async) 2m11.356510469s ago: executing program 0 (id=5269): r0 = socket$key(0xf, 0x3, 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2010008, &(0x7f00000001c0), 0xff, 0x52e, &(0x7f0000000640)="$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") bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$igmp6(0xa, 0x3, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r2, @ANYRESHEX=r1], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000c40)=ANY=[@ANYBLOB="58abacf65d253a00000010001fff00062ba08f4b20dcc28100000060f7823fc23359f7b9e075f596d66097a5b35ff5bd1bdcec9eb5f2b6ffeaac563935fc6f42ecdeb2a1fb3ba1906b2d4313766fd8a0ec3ce3de2eeaf7cf6f377b6d960b42dfeefb12761561df1478055444f96e75f9e9097cf255b4a77acd6e4a57446d4461fb44332a4eaaf698b7c33f5143961998149aeac5e2e059a7", @ANYRES64=r1, @ANYRES8=r5, @ANYRESOCT=r0], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000480)=@mangle={'mangle\x00', 0x1f, 0x6, 0x500, 0xd0, 0x1c8, 0x2c0, 0xd0, 0x1c8, 0x538, 0x538, 0x538, 0x538, 0x538, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00', 0x0, {0x0, 0x8}}}, {{@ipv6={@local, @private1={0xfc, 0x1, '\x00', 0x1}, [0x100fffffe, 0xffffff00, 0xff, 0xff000000], [0x0, 0xffffffff, 0xff000000, 0xff], 'macvlan0\x00', 'dummy0\x00', {0xff}, {0xff}, 0x29, 0x7, 0x1, 0x6c}, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x34}}}, {{@ipv6={@local, @private2, [0xffffffff, 0xff000000, 0x0, 0xffffff00], [0xff000000, 0x1ff000100, 0xff000000, 0xffffffff], 'veth0_vlan\x00', '\x00', {0xff}, {}, 0xc, 0x2c, 0x9, 0x21}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @empty, [0xff, 0xff, 0x0, 0xffffffff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 'pimreg0\x00', 'nicvf0\x00', {0xff}, {0xff}, 0x2c, 0x85, 0x6, 0x10}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@private0, @empty, [0xff000000, 0x0, 0xffffffff, 0xff000000], [0xffffff00, 0xffffff00, 0xff000000], 'macvtap0\x00', 'wg0\x00', {0xff}, {}, 0x73, 0x80}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@broadcast, @ipv6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x3b, 0x6a, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x560) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r6}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffd}]}) getgroups(0x0, 0x0) mmap(&(0x7f0000668000/0x2000)=nil, 0x2000, 0x1000000, 0x200000005c831, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x52, 0x0, &(0x7f0000ff0000), 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, &(0x7f0000001740)={0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYRES8=r4], &(0x7f0000000300)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = syz_io_uring_setup(0x7834, &(0x7f0000000b80)={0x0, 0xd133, 0x20, 0x0, 0x255}, &(0x7f0000000280)=0x0, &(0x7f0000000240)=0x0) syz_io_uring_submit(r10, r11, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r8}) io_uring_enter(r9, 0xa3d, 0x0, 0x0, 0x0, 0xff39) shutdown(r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00'}, 0x10) sendmsg$key(r0, &(0x7f0000000400)={0x10000000, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="020e0080150000000000000000000000030005000000000002004e24ac1e00010000000000000000030006003c000000020000fc34000000000000000000000001001800000000000800120000000200fcffffff000000000600330000000000000000000000eafffd8000000000000000000000000000aa000000000000000000000000000000000400"], 0xa8}}, 0x2) 2m10.575494242s ago: executing program 0 (id=5277): bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[], 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0xf4369000) openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000480)={0x404000, 0x16d, 0x3a}, 0x18) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000000)='./file0\x00', 0x1018000, &(0x7f00000003c0)=ANY=[@ANYRES8=0x0, @ANYRES16, @ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC], 0x1, 0x2f2, &(0x7f0000000b00)="$eJzs3M9PE1sUwPHTH5S2BMri5b28l7xwoxvdTKC6VhoDibGJBKnxR2IywFSbji3pNDU1RnTl1vhHuCAs2ZEo/wAbd7px446NiQtZGMd0OkNpO4CU0iJ8PwmZw9x7eu9tB3LuhGHrzuvH+aylZfWyBKNKAiIi2yKjEhRPwD0GnTgiu72Qi0PfPv5/6+69G6l0empWqenU3KWkUmpk7N2TZzG32/qgbI4+2Pqa/LL59+a/Wz/nHuUslbNUoVhWupovfi7r86ahFnNWXlNqxjR0y1C5gmWU6u3FenvWLC4tVZVeWByOL5UMy1J6oaryRlWVi6pcqqrQQz1XUJqmqeG44CCZldlZPdVh8kKXJ4NjUiql9JCIxNpaMit9mRAAAOir1vo/KKqb9f/quY3y0O21Ebf+X4/41f+XP9Vfq6n+j4qIb/3vje9b/+uHq//bK6Kz5Uj1P06GsUjbqUAjrDWWUnrc/fl1vLy/Ou4E1P8AAAAAAAAAAAAAAAAAAAAAAPwJtm07Ydt2wjt6X4MiEhUR73uf1JCIXO3DlNFFR/j8cQo0HtwLj4iYryqZSqZ+dDtsiIgphoxLQn4414OrFntPHqmaUXlvLrv5y5VMyGlJZSXn5E9IYkBa8217+np6akLVNecPSHx3flIS8pd/frItf3C5konIhfO78jVJyIcFKYopi848GvnPJ5S6djPdMn7M6QcAAAAAwGmgqR2++3dN26u9nr+zv269PxBq7K/Hfff3Yfkv3N+1AwAAAABwVljVp3ndNI3SPkFMDu7TeRA+plf2Vvi7Wd7fMhzfSvcJvMGbmqLuya6/LYFDvC17BEHpJGusthp11FV4t4326iMzk737BJum8c+bt9+7N8SVtegBK+08CO1/AQz07BcQAAAAgJ5pFP3emcn+TggAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgDOoF/8mrd9rBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAE6KXwEAAP//ziYEEA==") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r0}, 0x18) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2, 0x0, 0x7}, 0x18) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040), 0x208e24b) 2m10.546899632s ago: executing program 32 (id=5277): bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[], 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0xf4369000) openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000480)={0x404000, 0x16d, 0x3a}, 0x18) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000000)='./file0\x00', 0x1018000, &(0x7f00000003c0)=ANY=[@ANYRES8=0x0, @ANYRES16, @ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC], 0x1, 0x2f2, &(0x7f0000000b00)="$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") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r0}, 0x18) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2, 0x0, 0x7}, 0x18) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040), 0x208e24b) 2.44049475s ago: executing program 2 (id=7323): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000008800e9630800000000000000", @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="12000000040000000800000008"], 0x48) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0xc9028ba210c11f88) io_uring_setup(0x1de4, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000008d0646781ae090e94c0a21d853805a98b2d89c988b55428e5a60b8c525b659b99f670d867598a50672a1f0823a1501be46df6a867870a425f9be263831303937d1697fdf6b2d1af6cd4f8a8c6a15e6e5eb995df9dda3223f7386f76d10b31c9dae1a02dc7c1c0699b9b454fa2b06891194b87ca1cf0f6c929f1e353573a80ddccfb66af7b2bfb204f294e69ca24e25e46ee78cc33018d96a91610353c57ccaea1c9305bf6c2e2746d64b016c2d7e8c7d6bd16842ac8f8f8179"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000002c0000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x62, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r3}, 0x10) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x8, 0x2, 0x80400, 0x2004, 0x800}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x65, '\x00', 0x0, @fallback=0x35, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d, @void, @value}, 0x94) syz_usb_ep_write(0xffffffffffffffff, 0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000fff000/0x1000)=nil) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r5}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYRESDEC=r5], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='kfree\x00', r6}, 0x10) r7 = socket$inet6(0xa, 0x6, 0x0) listen(r7, 0x80080400) r8 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r8, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000190b985a00000000ff000000850000006d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000003c0)='ext4_fc_cleanup\x00', r9, 0x0, 0xfffffffffffffffd}, 0x18) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000010900010073797a310000000048000000030a01010000000000000000010000000900030073797a3100000000080007006e6174000900010073797a310000000014000480080002407c40280f080001"], 0xb8}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) getsockopt$inet_int(r8, 0x10d, 0xa9, &(0x7f0000000000), &(0x7f0000000280)=0x1a) 1.908192508s ago: executing program 2 (id=7338): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000500)=[{0x200000000006, 0x0, 0xcf, 0x7ffc1ff8}]}) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="18010000000100000000000000040000850000006d00000095", @ANYRES32], &(0x7f0000000140)='syzkaller\x00', 0x571d, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r3, &(0x7f0000000140)='2', 0x1, 0x8000c61) ioctl$EXT4_IOC_MOVE_EXT(r3, 0x40305829, &(0x7f0000000240)={0x17c04, 0xffffffffffffffff, 0x2, 0x100000001, 0x0, 0x1ffffffffffff}) ioctl$PPPIOCSACTIVE(r3, 0x40107446, &(0x7f00000006c0)={0x7, &(0x7f0000000680)=[{0x8, 0x1, 0x1, 0x7}, {0x8, 0x5, 0xc5}, {0x7fff, 0x1, 0x0, 0x6}, {0x7fff, 0xfb, 0x10, 0x7}, {0x439d, 0x2, 0x9, 0x5}, {0x8, 0x3, 0xe, 0xd}, {0x1ff, 0xf8, 0x2, 0x1cdc}]}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000e40)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c0, 0x0, 0x18c, 0x203, 0x8000000, 0x19030000, 0x3f0, 0x2e0, 0x2e0, 0x3f0, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x300, 0x2d8, 0x300, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x13, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xe}, {}, {0x0, 0x0, 0x3}, {0x2}, {}, {0x0, 0x0, 0x0, 0x1}, {}, {}, {0x16}, {}, {}, {0x7}, {}, {0x0, 0x0, 0x0, 0x101}, {}, {}, {}, {}, {}, {}, {0xfffe}, {}, {}, {}, {0x0, 0xfd}, {}, {0x7a04}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x800}, {}, {0xb84, 0x0, 0x0, 0xf00}, {0x0, 0x1, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}]}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x4}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0xb, 'syz1\x00', {0x6c8}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x520) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) unshare(0x8040600) r7 = socket$inet6_dccp(0xa, 0x6, 0x0) r8 = openat(r6, &(0x7f0000000300)='./file0\x00', 0x402, 0x1) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000340)={0x0, 0x7f, "de0471a172dee83736d6258d4fc1a68d833adef06b356ebe2df6b2c5630fd49bc6ae2672edc1292075d63b4ed8b46d9a0b1c918106f33acbcafaadb6ba95a51f76fd27d109efe656a4a1e05bff50565d99690325c7555dac9f4427bbad8fca1c63289fd9fbb26d7f6b0f2321682f94fd0ea505819cf1788c680f664df237a2"}, &(0x7f0000000400)=0x87) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r8, 0x84, 0x13, &(0x7f0000000580)={r9, 0x6}, &(0x7f00000005c0)=0x8) setsockopt$inet6_int(r7, 0x10d, 0xb, 0x0, 0x0) sendmsg$netlink(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)={0x18, 0x2d, 0x1, 0x0, 0x6000, "", [@typed={0x8, 0x13e, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x3f}}]}, 0x18}], 0x1, 0x0, 0x0, 0x44010}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r10, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='xen_mmu_flush_tlb_multi\x00', r11, 0x0, 0x3}, 0x18) r12 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x101880, 0x9) finit_module(r12, 0x0, 0x3) r13 = dup(r12) io_setup(0x3, &(0x7f0000000140)=0x0) io_submit(r14, 0x1, &(0x7f0000000800)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x0, r13, 0x0}]) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) move_mount(r10, &(0x7f0000000600)='./file0\x00', r10, &(0x7f0000000640)='./file0\x00', 0x210) 1.386577737s ago: executing program 1 (id=7350): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x4508, &(0x7f00000004c0)={[{@noinit_itable}, {@block_validity}, {@sysvgroups}]}, 0x1, 0x4e4, &(0x7f0000001400)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x6}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x107842, 0x42) 1.330226168s ago: executing program 1 (id=7351): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f0000000080)={[{@noblock_validity}, {@usrquota}, {@sysvgroups}, {@norecovery}, {@oldalloc}, {@orlov}, {@oldalloc}, {@auto_da_alloc}, {@nomblk_io_submit}]}, 0x3, 0x580, &(0x7f0000001b40)="$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") chdir(&(0x7f0000000200)='./file0\x00') (async) chdir(&(0x7f0000000200)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x42, 0x10) pwrite64(r0, &(0x7f0000000140)='2', 0x1, 0x8080c61) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000080)={0x17c04, r0, 0x4000, 0x1000fffff, 0x1d}) (async) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000080)={0x17c04, r0, 0x4000, 0x1000fffff, 0x1d}) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f00000010c0)) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x800, @void, @value}, 0x94) r2 = syz_io_uring_setup(0xec5, &(0x7f0000000c00)={0x0, 0x0, 0x2}, &(0x7f0000000500)=0x0, &(0x7f0000000600)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) (async) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) io_uring_enter(r2, 0x2f67, 0x10a5, 0x3, &(0x7f0000000000), 0x8) (async) io_uring_enter(r2, 0x2f67, 0x10a5, 0x3, &(0x7f0000000000), 0x8) rt_sigprocmask(0x1, &(0x7f0000000100)={[0x6]}, &(0x7f00000001c0), 0x8) (async) rt_sigprocmask(0x1, &(0x7f0000000100)={[0x6]}, &(0x7f00000001c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) setrlimit(0xa, &(0x7f0000000000)={0x0, 0x1}) unlink(&(0x7f0000000300)='./file0\x00') socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000002c0)) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000002c0)) io_setup(0x2004, &(0x7f0000000680)) (async) io_setup(0x2004, &(0x7f0000000680)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x2, 0x9, 0x7ffffffb}]}) r4 = socket(0x15, 0x5, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r5, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) (async) bind$inet6(r5, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r5, &(0x7f00000018c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/12, 0xc}, 0xffff8000}], 0x1, 0x832b, 0x0) setsockopt$inet6_int(r5, 0x29, 0x4a, 0x0, 0x0) setsockopt$inet6_int(r5, 0x29, 0x4d, &(0x7f0000000180)=0x8, 0x4) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) getsockopt(r4, 0x200000000114, 0x2720, &(0x7f0000019580)=""/102392, &(0x7f0000000000)=0x18ff8) 1.151086971s ago: executing program 4 (id=7361): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000140)={0x28, 0x0, 0x0, @hyper}, 0x10) 1.117859822s ago: executing program 4 (id=7362): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000002080)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000040000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000480)='gtp\x00') poll(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) sync() 1.056943493s ago: executing program 2 (id=7364): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x10000, 0x1}, 0x8002, 0x0, 0x1003, 0x2, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x100000011, @multicast2, 0x0, 0x0, 'wlc\x00', 0x15, 0x88, 0xc000067}, 0x2c) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='bic\x00', 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000170000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000feffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="900000001000010400000002fcdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="10000000a5804a2c600012800b000100697036746e6c"], 0x90}, 0x1, 0x0, 0x0, 0x8040}, 0x48000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) mlockall(0x3) 960.596844ms ago: executing program 4 (id=7365): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000c80)={&(0x7f0000000380)=@id={0x1e, 0x3, 0x1, {0x4e21, 0x3}}, 0x10, &(0x7f0000000c00)=[{&(0x7f0000000680)="510e024cc5ef69ae70ed8d9a1d875cb66a4a26a773d0f93b59d282918504fce6d1b20bda7e86f57c17701cecf926aa3cc80118c38af59455d14d3c6e333cc8073c5b60b933c3ff3626043267af58934a586ef9d32ea7d2dff1fed0ae744e9acfadf0df7b609e234056421fb05a144aa83ccaff70daeff7a2790b80da39a26f4d8e937f71a88397f70e8b1b9fda22ea20658e343de9f1181f61bae6070cf329277cf05dc54caf5279e3d9200f71b927f804b61e8c3e771358df95cf18871ff1516d8486757fb3ae43717b69e6f3c19145ffddf9a5760d78", 0xd7}, {&(0x7f0000000780)="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", 0xfb}, {&(0x7f00000003c0)="5acd6ead5196f4f663579dfa98294050d07a1d65e93d03da554d474e21de1f6bcccd9765d9ea0e61ee4e9d3c68e36051b91d4511a4ce44fb4412b62111a944f21703e695e641965b9d501b8f1cf33024fdd2fb3f697f26837ca36fa420919b110bfdd4562caf95e6ee718de3d300e647ef5c917c7adb1e03", 0x78}, {&(0x7f0000000880)="7a2543c96dc33fe82308b28e4a76e32c268f5756b3f3d40f7be082914fcf2f45797abbf8f97de4cd9ef12032b7f63fb6d71eb3351f73ba15c30b6168d2bc0e27f3fa5e62321c4a1be593e75ea8805d46263f4f0b5d245f72744077b20d50137aa7b0f58bd2e3aba55059197e06763d2d874556df6db8109d40ce8e1121599762521c52c2ba4e66c1d64908d96b10eb82b17548d52f04756d49cf3cb75a84979487ebb149a20ab7822a5812647fcab31293fe74570245eddc081e01e313180cdbdbb47c3b40e78935cd31951fb280ca8735d4bf", 0xd3}, {&(0x7f00000004c0)="80e9d9577786953997f5919c944c811ff315eae1c198a18f4ab05b09aff285ebb97238cf2c3149d97dc798f73940b5c97af1c81bd7ddad8bd51c9aa36c5b93448af4c194c812f8e4259742bc868f6c09e80631d2dafd0a6256549d2deb6caff42d42260c139ec7d8b277b54f11", 0x6d}, {&(0x7f0000000980)="1b4cf66cf9ca32a66916304d2e0bc064a85d1f9c8d4f3f88e1fd34ce825551d182b8984f25fbbcac56bc3b634fa1ed0efb98ca9c3f5db2e3ced4eb404d597c9682f5556dd8490785c29c2d5f7d21d168ffbee12db52dd6f80367d287ac", 0x5d}, {&(0x7f0000000540)="c85e50b1841ed001fd9fb733cc95239ae6c200d9b198c231f15b453214ea48f02ba7217103907a05913936fbf6bf21268430cf590e128ac389bc", 0x3a}, {&(0x7f0000000b00)="374783dc2d3b704b6de9ecd6918dbadde51dfc3d58fe28e49beeeed799d139291bbf52821e4c23de8e209876b9307b578afad30f8c95965fd221c041f72d43e85e72962a1fda032a24b048ffb4b336ecab8c3e042870b1f85e7aadd2fa742fc9fd77acc8846fd5a2fa8c3966964bb63659e294ee97c7d28bfd39f079e33b74179ccfff4ccc66d12bd8c623b4088c8b24354826e1fd981ae174caebf1cf36f75c481fd2db9989eacef753f29aa6f29e756ccd37ac4601b6d6aa0615acb5978bc2b03e1c84e552c88b5dad343f29a72193098c60ad3c9ec864926ee37ba44fadbf9e78ce40371b1a58b80eff5e79a09c1182a3588d6c", 0xf5}], 0x8, &(0x7f0000000a00)="ea1168e45688beb00d87e85a79d7327a2276453b3281e8243bbdf025fc7727a5f281805e7d", 0x25, 0x4040080}, 0x400d0) socket$inet_smc(0x2b, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = getpid() r3 = syz_clone(0x20200080, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x2, 0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r4, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0xf}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = io_uring_setup(0x1438, &(0x7f0000000280)={0x0, 0x5ffc, 0x2, 0x0, 0x1ef}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r7}, &(0x7f0000000040), &(0x7f0000000280)='%pK \x00'}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r9}, 0x10) setitimer(0x0, 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r11}, 0x10) add_key(&(0x7f0000000280)='rxrpc\x00', 0x0, &(0x7f0000000100)="01000000020000000000006bb55a2a630b00c145f94cd977", 0x18, 0xffffffffffffffff) io_uring_enter(r6, 0x4ea2, 0x74e3, 0xb, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5, 0x0, 0x100}, 0x18) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r1}, 0x4) 952.155414ms ago: executing program 4 (id=7367): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0x88, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x60, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0xc}, @NFTA_EXTHDR_OFFSET={0x8}, @NFTA_EXTHDR_TYPE={0x5, 0x2, 0x7}]}}}, {0x30, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x20, 0x2, 0x0, 0x1, [@NFTA_BITWISE_LEN={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0x12}, @NFTA_BITWISE_DATA={0x4}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0xfc}}, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="000000000087fb00b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) syz_emit_ethernet(0xfffffffffffffe22, &(0x7f0000000e00)={@multicast, @multicast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "cb6599", 0x170, 0x3a, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @mcast2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, '%kT', 0x0, 0x2b, 0x0, @private1, @private0, [@srh={0x84, 0x0, 0x4, 0x0, 0x4, 0x20, 0x70}, @dstopts={0x2c, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0x6}]}, @dstopts={0x8}, @hopopts={0x1, 0x22, '\x00', [@ra={0x5, 0x2, 0x7}, @generic={0x4, 0xf2, "e3a2f638ca71507d5da96224ab97cf8cfc062b1e1e6f474116a18e55f06b859b1db575179490958cb6f4e42b561e2f685ff9cf6f90eadfa520268350a2a6aa56d608d99f7df881269aa518e5d9ce72032cf6db3aa0402a729a064f1d6bf092648c8a12e9d86d8f01704b25f558d2e0f7a043dafe346fd538ca004c2a3fd15e47700809e6c26a107fdb92b725648e077c8c8bda1358cb957819b5c0a9af84913881e05670151fcb92e7deede6659234fa4c3669ffa527efa4b81210bb75eb1b13fa894360178f8c6d0473cdffd417cff6597598bfa2a24b89e0f66c04a3b674e1578912fc867a61ca4527c8b33b8618c1904c"}, @enc_lim={0x4, 0x1, 0x3}, @hao={0xc9, 0x10, @remote}, @ra={0x5, 0x2, 0xfab2}, @pad1]}]}}}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000680)={'ip6_vti0\x00', 0x0, 0x14, 0x0, 0x1, 0x7fffffff, 0x8, @private2={0xfc, 0x2, '\x00', 0x1}, @local, 0x40, 0x7800, 0x7, 0x401}}) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x5, [@ptr={0xa, 0x0, 0x0, 0x2, 0x1}, @union={0x6, 0x1, 0x0, 0x5, 0x0, 0x2, [{0x1, 0x3, 0x740a}]}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x2, 0x2}, {0xe, 0x4}, {0x9, 0x1}, {0x3, 0x5}, {0x1, 0x3}]}]}, {0x0, [0x30, 0x4f, 0x5f]}}, &(0x7f0000000780)=""/89, 0x75, 0x59, 0x0, 0x6, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000980)=@bpf_ext={0x1c, 0x6, &(0x7f00000001c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x3}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_fd={0x18, 0x3, 0x1, 0x0, r1}], &(0x7f0000000200)='syzkaller\x00', 0xe8, 0xb1, &(0x7f0000000580)=""/177, 0x40f00, 0x10, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000000800)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000840)={0x5, 0x7, 0x2, 0x1b}, 0x10, 0x2daf4, r2, 0x9, &(0x7f0000000880)=[r1], &(0x7f00000008c0)=[{0x0, 0x4, 0x3, 0x2}, {0x3, 0x2, 0x1, 0x4}, {0x4, 0x5, 0xa, 0x1}, {0x2, 0x3, 0xd, 0x1}, {0x5, 0x4, 0x10}, {0x5, 0x3, 0x10, 0x2}, {0x1, 0x1, 0x7, 0x8}, {0x0, 0x5, 0x0, 0x9}, {0x5, 0x3, 0xd, 0x5}], 0x10, 0x3ff, @void, @value}, 0x94) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioperm(0x200, 0x8, 0x5) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) lsm_get_self_attr(0x67, 0x0, &(0x7f0000000080), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r7}, 0x10) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@v2={0x2000000, [{0x7, 0x3}, {0x9, 0x8b}]}, 0x14, 0x1) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r5, @ANYBLOB="0000000000ff0700", @ANYRESHEX=r6, @ANYBLOB=',\x00']) 934.642285ms ago: executing program 4 (id=7368): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000003c0)='kfree\x00', r0, 0x0, 0xfffffffffffffffc}, 0x18) close(0xffffffffffffffff) syz_mount_image$iso9660(&(0x7f0000000fc0), &(0x7f0000001000)='./file1\x00', 0x0, &(0x7f0000000d80)=ANY=[], 0x3, 0x7b6, &(0x7f0000001040)="$eJzs3U9oHOfZAPBn9Emxo4AJ+T7yGeM4Yzsf2HyusrtKlIoc0s1qJE0i7YrdVbEpJQmxXIyVP8SENj408SVpS0vpqcc015BLb4UeCj20PRWaQy89FAI5lRRaKC2loDKzu9ZK1j/Hkp2kv5+I3tl3nnnnmdnJPDtr7WwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJE0ZiqVanIkIpbPp9trzLRbizvMH4z3iw3NDuuNSIr/4vDhONrrOvo/67MfLH6diuO9R8fjcNEcjmv3PXj/k/89OjJYfoeEPq2Te4xLIt4qkrrywurqymsHkMgd9L2f3/Ii/1grfs9lzbzTyhfrc1mad1rp9NRU5dH52U46my9knQudbraYNtpZvdtqp2caZ9Pq9PRkmk1caC0352bqC9mg84kv1SqVqfSZiaWs3u60mo8+M9FpzOcLC3lzroypVb4ZRcwTxYH4bN5Nu1l9MU0vXV5dmdwt1SKouqHn0IYD5/gj93/8+kd/vbxSHJDbDZL0D8xatVqrVacen378iUpltFapbeyobBI3ImIkoog4kIOWz5H9O3nDbRrp1f+IhcijGctxPtJIY6T8vf4zFodjJtrRisXi8e/HNs2/qf7/36N//u1O6x2u/4Mqf3R99rEo6/+J3qMT29T/4qS8OY+D+2l+0MtmuO9qvBHX4kq8EKuxGivx2h3M51P9jOzveHORRTPy6EQr8liMetmT9nvSmI6pmIpKPBfzMRudSGM28liILDpxITrRjaw8ohrRjizq0Y1WtCONM9GIs5FGNaZjOiYjjSwm4kK0YjmaMRczUS9HuRSXy/0+uSmvB7/9fPLW7z5+t5i+EVTdYUOS4sVcEfSXHYL6xfzh2FP9v7d/LG+MUP+/aA73n+e9xu/XqRtu21pZ/0fvdhoAAADAAUrKd9+TiBiLh8qp2Xwh+9rdTgsAAADYR+XfNR8vmrFi6qFIiuv/yhaRH97x3AAAAID9kZSfsUsiYjwe7k0NPi611ZsAAAAAwOdQ+e//J4pmPOLNssP1PwAAAHzBfGe7e+x/dE//Hr2dpUPJf/Wjl84/krxUL6bqL/X7+s1Xb4zYnT2WHOkPUjZTo9fuSyJitJEdTwZ3v/zXoV77STnCsfUbEG53r/+k3R5Lrm+fQOycQPkovh8nezEnL/bai4M5vbWMz+YL2USjtfBkNem/OdJ9/eXL34oo1v7d5uKRJC5dXl2ZePGV1YtlLteLUa6/1L89fHILuaz190A8tPUWj5UfxOivd7y33srw9o/0Fh/ZeZ3J8DrfjlO9mFPjvXZ84/YfLtZZnXiyGvX6kZFudr77+trQ1vezqN7mlr8dp3sxp8+c7jVbZFHbkMXLN2dRG85ib/tiz1m8e/LN83/7VSvJJnfLYvI2swC4Wy6Vd/1Zr0L3llXon2s9Rf3fVHcHdzW/pbPcpfVXGYPlh2rdaOxPdX87zvRizvReT4we26KuVLY4o796+dVf98/oj73/4598/cRvfrp9dVtLds7i/TjbC+w38cAvb8qiGKJa7tkfbKqq7xVLvLdtVe0s1JIYi5HenMHslW+svFyrTU5VHqtUHq/FWPlSod+oPQBsYdfv2NnDt/A8tvVVdQwq3gM3/qRgIl6MV2I1Lsa58tMGEfHw1qOOD/0ZwrldrlrHh77h5dwu15brsbXNsYdOJ7FN7OTQHvvfH5XN3w/uOQGAg3Zqlzq8l/p/bpfr7o21/Gzvi3MHV8exfS3fypcPeocAwH+ArP1JMt59J2m386XnqtPT1Xp3PkvbrcazaTufmcvSvNnN2o35enMuS5farW6rMXjjeCbrpJ3lpaVWu5vOttrpUquTny+/+T3tf/V7J1usN7t5o7O0kNU7WdpoNbv1RjedyTuNdGn56YW8M5+1y4U7S1kjn80b9W7eaqad1nK7kU2kaSfLhgLzmazZzWfzYrKZLrXzxXr7ekQsLC9m6UzWabTzpW6rN+BgXXlzttVeLIeduHnz/3Sn9zcAfBZcfePalRdWV1de2zixlmzu2XriD3uIuRqxdrc3EwAYMlylAQAAAAAAAAAAAACAz6abP65X9O76kb7hibG4heBNE4fi0yz1xZ34/w96T8t+DHg749y74Tm9p3+w3P39c8sTzz/11JXtYp5+8+j8H7OI3cfZ+v+Uq/fddPTGO0ci7vnZD3s9X7lTW/ph9LYiRm9p8bVkh5i7dkoCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgG39OwAA///BfU8u") socket$inet6(0xa, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0600000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000ad9f40d4aa59bdd4c34f68241673681367e83708fd1af88a047f298fa5bedf55d100ad04f4b26e86f5bd77b48f4a01d19d279655cce7e0ae6811bc71c0caef0fc5885a506c5e90239bc32964439df47605b3cc44abf66c7c6358525b07a959a6352e4150bf4496920476643d88a243a74f1934858b48f658ffeac8279609178e2206a2702c557c86bffd6699a80a213e937cff0e2a325af4651e5b598ee3c20083cded6a392a84cb71ca7397b6d2f591800bb4097f4e857818087dbf7257d9af0900e6b1bc815e7d9856a9f79ca7912f", @ANYRES32=0x0, @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000b2"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000001f80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000000000008500000073000000850000005000000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000040)='percpu_free_percpu\x00', r4}, 0x10) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$eJzs3c9vFFUcAPDvbH/QUrSFGBUP0sQYSJSWFjDEeICrIQ3+iBcvVloQKdDQGi2aUBK8mBgvxph48iD+F0rkyklPHrx4MiREDUcT18x2pnTb2ZYubacyn0+y9M17O7w33X773r6+NxtAZQ2m/9Qi9kbEdBLRn8wvlnVGVji48Lx7f39yOn0kUa+/8WcSSZaXPz/JvvZlJ/dExM8/JbGnY2W9M3NXzo9PTU1ezo6HZy9MD8/MXTl47sL42cmzkxdHXxo9dvTI0WMjh9q6rqsFeSevv/9h/2djb3/3zT/JyPe/jSVxPF7Nnrj0OjbKYAw2vifJyqK+YxtdWUk6sp+TpS9x0llig1iX/PXrioinoj864v6L1x+fvlZq44BNVU8i6kBFJeIfKiofB+Tv7Ze/D66VMioBtsLdEwsTACvjv3NhbjB6GnMDO+8lsXRaJ4mI9mbmmu2KiNu3xq6fuTV2PTZpHg4oNn8tIp4uiv+kEf8D0RMDjfivNcV/Oi44lX1N819vs/7lU8XiH7bOQvz3rBr/0SL+31kS/++2Wf/g/eR7vU3x39vuJQEAAAAAAEBl3TwRES8W/f2/trj+JwrW//RFxPENqH9w2fHKv//X7mxANUCBuyciXilc/1vLV/8OdGSpxxrrAbqSM+emJg9FxOMRcSC6dqTHI6vUcfDzPV+3KhvM1v/lj7T+29lawKwddzp3NJ8zMT47/rDXDUTcvRbxTOH632Sx/08K+v/098H0A9ax5/kbp1qVrR3/wGapfxuxv7D/v3/XimT1+3MMN8YDw/moYKVnP/7ih1b1txv/bjEBDy/t/3euHv8DydL79cysv47Dc531VmXtjv+7kzcbt5zpzvI+Gp+dvTwS0Z2c7Ehzm/JH199meBTl8ZDHSxr/B55bff6vaPzfGxHzy/7v5K/mPcW5J//t+71Ve4z/oTxp/E+sq/9ff2L0xsCPrep/sP7/SKOvP5DlmP+DBV/lYdrdnF8Qjp1FRVvdXgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4FNQiYlcktaHFdK02NBTRFxFPxM7a1KWZ2RfOXPrg4kRa1vj8/1r+Sb/9C8dJ/vn/A0uOR5cdH46I3RHxZUdv43jo9KWpibIvHgAAAAAAAAAAAAAAAAAAALaJvhb7/1N/dJTdOmDTdZbdAKA0BfH/SxntALae/h+qS/xDdYl/qC7xD9Ul/qG6xD9Ul/iH6hL/AAAAAADwSNm97+avSUTMv9zbeKS6s7KuUlsGbLZa2Q0ASuMWP1Bdlv5AdXmPDyRrlPe0PGmtM1czffohTgYAAAAAAAAAAACAytm/1/5/qCr7/6G67P+H6sr3/+8ruR3A1vMeH4g1dvIX7v9f8ywAAAAAAAAAAAAAYCPNzF05Pz41NXlZ4q3t0YytTNTr9avpT8F2ac//PJEvhd8u7VmWyPf6PdhZ5f1OAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAmv0XAAD//xYSJMU=") r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x0) getsockopt$IP_SET_OP_GET_BYINDEX(r6, 0x1, 0x53, &(0x7f00000001c0)={0x7, 0x7, 0x2}, &(0x7f0000000200)=0x28) write(r6, &(0x7f0000004200)='t', 0x1) sendfile(r6, r5, 0x0, 0x3ffff) sendfile(r6, r5, 0x0, 0x7ffff000) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYRES16, @ANYRES16=r3, @ANYRES64, @ANYRESOCT=r1, @ANYBLOB="55ec428fa85c89c4bdf3796aee6d6347378ea2ef7ee8883ed26a28ef7d386bf6c06ede256885ed610962e37b220c61651cc7d398f14e7766b129a1ded7198ac3fc2c5a31ee23861e74b23aa50a77399287c97767a72d0191152c095757851fd6da5e80eada29fd2bbe35a9c58d48", @ANYRESOCT=r0, @ANYBLOB="4a5fe7e9aea1ab2c19221a3c6c8edebb7248e567e0892ab3c139723642890fc7b035352dff892fd529aead42a02123a39792a056ae4d43acb2c2d182a7510d62d797f6bfd7daf25626c53f9b5898cd53e5bebb1520f1f8ae2505ab1120706ba1574aa146549c59c9c8dc42ae8ce7bf0da17c95333db3132f548060de7c030148a8cbf6a2dae3f5d4c2d9fceaf0d3665a4d360017bd3e4d880d2efdece50a0e69c1a1f2293f923bb9000c9d7dcd2ba2118c56cb0ac651fbe684544d89ef93ef150b5cd8da0504df53ff3dbab5d049f6a9362ef9c2971bb67f3ab52637b634ad11cddec9b729bb4faf9222e84d2af33d045e62dffaf10f436f1b"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1a, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000580)='percpu_free_percpu\x00', r9, 0x0, 0x2}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r10, &(0x7f000057eff8)=@file={0x1, './file0\x00'}, 0x6e) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x0, 0x0, &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x5e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, @void, @value}, 0x94) 818.870617ms ago: executing program 3 (id=7373): prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) r3 = socket(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xbafe, 0x10}, &(0x7f0000000080)=0x18) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000600)='kfree\x00', r4}, 0x10) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r5, 0xc0a85320, &(0x7f00000003c0)={{0x80}, 'port0\x00', 0x511e36599023629, 0x100000, 0x0, 0x4000000, 0xffffffff, 0x1, 0x0, 0x0, 0x5, 0x4}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r5, 0x40a85321, &(0x7f00000004c0)={{0x80}, 'port1\x00', 0x0, 0x120000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x6}) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="1e0000000900000061dc00000200000064080000", @ANYRES32, @ANYBLOB='\\\b\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0400000005000000000000000d000000000000000000000000000000b7ec04925819b72ac2edd3f1edb69e6f28797f80f90fe25c38f1e33eb171c7f5e0d316b1f539f6bbfa8e25b56bbf7787d1b45617503e6ced1b2c421e029f66d57264416185fc68e532c65758a579f3fa9efadeee8e3b90ee14ed8b6b1baf618bec58bd7bc5db40"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000a819f66910bacd000000000000000000181100000000000000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r7}, 0x10) lstat(0x0, 0x0) mkdir(0x0, 0x0) ioctl$sock_bt_hci(r3, 0x6, &(0x7f0000000340)="f5fd002d0cfd435f452b4052351f3a973c7c34e4dd1eb4a38e83948701bdace75e53678e40460b80ac11d678dad11ecc273e") openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x201, 0x0) r8 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r8, &(0x7f0000000500)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x500000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x60, 0x140d, 0x400, 0x70bd26, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_RES_MRN={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_MRN={0x8}, @RDMA_NLDEV_ATTR_RES_MRN={0x8, 0x3e, 0x3}, @RDMA_NLDEV_ATTR_RES_MRN={0x8, 0x3e, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_RES_MRN={0x8, 0x3e, 0x3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_RES_MRN={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x800) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)=@generic={&(0x7f0000000240)='./file0\x00', r7}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) lstat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x204010, &(0x7f0000000100), 0xfe, 0x46e, &(0x7f00000007c0)="$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") 818.412587ms ago: executing program 5 (id=7374): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock=0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff74, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000005000000020000000700000002"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x20075, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, 0x0, 0x0) unshare(0x2c020400) syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="54000000020601080000000000000700000000000c000780080006400056a7000500010006000000050005000a00000005000400000000000900020073797a31000000000d00030068617368"], 0x54}}, 0x0) unshare(0x40020000) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) 765.792428ms ago: executing program 3 (id=7375): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0600000004000000880000000400000000000000", @ANYRES32=0x1, @ANYBLOB="00000000000000000000000000000000000000009f477fe8c6716da34c71719f8721d9abc9ef6125622da8f24a35dd8fd89ab61846f1110c4046f64c", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x6a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0xe8}}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'lo\x00', 0x100}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x182804, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x16, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000fcffffff00000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000080b70300000000000085000000730000009500000000000000b897570270997a49c9a80984e9ff60f2846ff3a3135b5b6e7c66ceeff42ea7fdca7eb0f5f760ec66a05a75547bd05c91a5e753bd51b991b5498281ccf70c74d89de8070bc4f162923003"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mount$bpf(0x0, &(0x7f0000001080)='./file0\x00', 0x0, 0x1100020, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000003c0)='kfree\x00', r7, 0x0, 0x2000000000005}, 0x18) 659.890919ms ago: executing program 3 (id=7376): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000b00)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01002d9f04c2478046d61800000004000280180001801400020067656e6576653000"], 0x30}, 0x1, 0x0, 0x0, 0x20004040}, 0x0) 623.546089ms ago: executing program 3 (id=7377): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000008800e9630800000000000000", @ANYBLOB='\x00'/10, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="12000000040000000800000008"], 0x48) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0xc9028ba210c11f88) io_uring_setup(0x1de4, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000008d0646781ae090e94c0a21d853805a98b2d89c988b55428e5a60b8c525b659b99f670d867598a50672a1f0823a1501be46df6a867870a425f9be263831303937d1697fdf6b2d1af6cd4f8a8c6a15e6e5eb995df9dda3223f7386f76d10b31c9dae1a02dc7c1c0699b9b454fa2b06891194b87ca1cf0f6c929f1e353573a80ddccfb66af7b2bfb204f294e69ca24e25e46ee78cc33018d96a91610353c57ccaea1c9305bf6c2e2746d64b016c2d7e8c7d6bd16842ac8f8f8179"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000002c0000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x62, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r3}, 0x10) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x8, 0x2, 0x80400, 0x2004, 0x800}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x65, '\x00', 0x0, @fallback=0x35, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d, @void, @value}, 0x94) syz_usb_ep_write(0xffffffffffffffff, 0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000fff000/0x1000)=nil) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r5}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYRESDEC=r5], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='kfree\x00', r6}, 0x10) r7 = socket$inet6(0xa, 0x6, 0x0) listen(r7, 0x80080400) r8 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r8, &(0x7f0000e5c000)={0x2, 0x4e20, @remote}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000190b985a00000000ff000000850000006d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000003c0)='ext4_fc_cleanup\x00', r9, 0x0, 0xfffffffffffffffd}, 0x18) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000010900010073797a310000000048000000030a01010000000000000000010000000900030073797a3100000000080007006e6174000900010073797a310000000014000480080002407c40280f080001"], 0xb8}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) getsockopt$inet_int(r8, 0x10d, 0xa9, &(0x7f0000000000), &(0x7f0000000280)=0x1a) 527.717571ms ago: executing program 5 (id=7378): r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0)={0x2009, 0x3}, 0x8) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000480)='./file0\x00', 0x18000, &(0x7f0000003240)=ANY=[@ANYRES32=0x0, @ANYRES8, @ANYRES16=0x0, @ANYBLOB="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", @ANYBLOB="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", @ANYRES16, @ANYRES64=0xffffffffffffffff], 0x8, 0x2fd, &(0x7f0000000e40)="$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") openat(0xffffffffffffff9c, 0x0, 0x42, 0x22) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) prctl$PR_GET_FP_MODE(0x2e) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r3, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) sendto$inet6(r3, &(0x7f00000000c0)="a6d5dc929a", 0x5, 0x48050, &(0x7f0000000280)={0xa, 0x4e24, 0x5405b872, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8}, 0x1c) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x10000000, &(0x7f0000000080)=[{&(0x7f0000000300)="d8000000180081054e81f783db4cb9040a1d290006007c02e8fc55a10a0015000600142603600e120800140000000401a8000500fec0ffff00000000035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbaceac3c2fb14c2ee5a7cef4090000001fb71b14d6d930dfe1d9d322fe7c9f8775820d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad9e3bb9ad809d5e1cace0d81ed0bffece0b42a9ecbee5de6ccd4e1ffffffffc1c9b6278754ca397c388b0dd6e4edef3d9300"/216, 0xd8}], 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000000), 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x9}, 0x1c) listen(r5, 0x3) syz_emit_ethernet(0x4a, &(0x7f0000000240)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0xff, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000006340)=ANY=[], 0x0) syz_emit_ethernet(0xae, &(0x7f0000000340)=ANY=[@ANYRES32=r2, @ANYRES64=r1, @ANYRESDEC=r1], 0x0) pwrite64(r2, &(0x7f00000005c0)='\"', 0x1, 0x4fed0) bind$bt_sco(r0, &(0x7f0000000400), 0x8) listen(r0, 0x0) shutdown(r0, 0x0) 348.916354ms ago: executing program 1 (id=7379): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp6\x00') preadv(r0, &(0x7f0000000bc0)=[{&(0x7f00000001c0)=""/239, 0xef}], 0x1, 0xe, 0x101) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000080)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES64=r2, @ANYBLOB="01002d9f04c2478046d61800000004000280180001801400020067656e6576653000"], 0x30}, 0x1, 0x0, 0x0, 0x20004040}, 0x0) 344.405114ms ago: executing program 1 (id=7380): r0 = socket$netlink(0x10, 0x3, 0x10) r1 = socket$netlink(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'geneve0\x00'}) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4084}, 0x20000010) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) sendmsg$DEVLINK_CMD_RATE_NEW(r0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0x1, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000840)={0x58, r5, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffbfff9}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x24004000}, 0x24040840) 309.346705ms ago: executing program 5 (id=7381): r0 = socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000140)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r1}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000005c00)={&(0x7f0000000000)=@newtaction={0xa0, 0x30, 0x9, 0x220002, 0x0, {}, [{0x8c, 0x1, [@m_bpf={0x88, 0x1, 0x0, 0x0, {{0x8}, {0x60, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x7}, @TCA_ACT_BPF_OPS={0x3c, 0x4, [{}, {}, {0x3}, {0x0, 0x7}, {0x8}, {}, {0x6, 0xfe}]}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x0, 0x0, 0x0, 0x0, 0xfffffff7}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x24000004}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$key(0xf, 0x3, 0x2) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000170000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000feffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r7}, 0x10) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) write(r8, &(0x7f0000000140)="4f38bb281743970f1e20e614d7c5d9cc792af4b92ecb96185a724ec72d70491449eff6c41cae0e11bcae681e2187c81752e22de510e137860c00b0327302554ae4e1ba0723ca744b7f9340a49605e5e2ed71a0cb4c102c99bb159a7989fade73404d9517d1d65efd542363c11a09522360fc8be5f579e35434eca508e24c25e22145a418ac073df8e467fb0fb3b001ba8a3cba8135c2d2a21999caaf6918eef8e0caba7d76e432ffe8386df8168c1cfb", 0xb0) gettid() r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1600000000000000040000000500000000000000", @ANYRES32=0x1, @ANYBLOB="6e759befd502430000000063f5deffffffffffff040000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r10}, 0x10) r11 = io_uring_setup(0x7d98, &(0x7f0000000240)={0x0, 0x918a, 0x8, 0xffffffff, 0x24a}) r12 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r12, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r12, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) close_range(r11, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='kmem_cache_free\x00', r6}, 0x10) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000001040)=ANY=[@ANYBLOB="38010000100013070000000000000000ffffffff000000000000000000000000fe8000007c6825ef00000000000000bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe8000000000000000000000000000bb0000000032000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000200000000000000000048000200656362286369706865725f6e756c6c29"], 0x138}, 0x1, 0xe}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r2}, &(0x7f0000000000), &(0x7f00000005c0)=r3}, 0x20) 284.896735ms ago: executing program 1 (id=7382): readv(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) umount2(&(0x7f00000001c0)='./bus\x00', 0x2) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ip_vs_stats\x00') mount$9p_fd(0x0, &(0x7f0000000100)='.\x00', &(0x7f0000000040), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 272.864175ms ago: executing program 2 (id=7383): r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, 0x0, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) lsm_get_self_attr(0x65, 0x0, &(0x7f00000003c0), 0x0) 250.333086ms ago: executing program 1 (id=7384): r0 = semget$private(0x0, 0x4, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = syz_clone(0x2100, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_pidfd_open(r1, 0x0) fsetxattr$system_posix_acl(r2, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000004c0)={{}, {0x1, 0x5}, [], {0x4, 0x6}, [], {0x10, 0x1}, {0x20, 0x2}}, 0x24, 0x1) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) close(r3) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x74, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000067c0)=[{{0x0, 0x0, 0x0}, 0x6}, {{0x0, 0x0, 0x0}, 0xa}, {{0x0, 0x0, 0x0}, 0x7}], 0x3, 0x100, 0x0) r4 = signalfd(0xffffffffffffffff, &(0x7f00000006c0), 0x8) mount$9p_fd(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000040)={r6}, 0xc) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r7 = eventfd2(0x0, 0x0) read$eventfd(r7, &(0x7f0000000400), 0x8) semop(r0, &(0x7f0000000000)=[{0xfcff, 0xfffb, 0x1000}, {0x2, 0x7f, 0x1800}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)=[0xb7]) 225.037566ms ago: executing program 5 (id=7385): bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xd, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4e, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='net/dev_mcast\x00') preadv(r0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/3, 0x3}], 0x1, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) listen(0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x8) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r4 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000380)={0x1, 0x10, 0xfa00, {&(0x7f00000002c0)}}, 0x18) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) restart_syscall() socket$packet(0x11, 0x2, 0x300) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000015c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5, 0x0, 0x3}, 0x18) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000340)={'veth0_to_bond\x00', 0x0}) r8 = socket$nl_route(0x10, 0x3, 0x0) bind$packet(r6, &(0x7f0000000080)={0x11, 0x4, r7, 0x1, 0x6, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3e}}, 0x14) sendmsg$nl_route_sched(r8, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@getchain={0x24, 0x11, 0x839, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, r7, {0xc}, {0xfff3}}}, 0x24}, 0x1, 0x0, 0x0, 0x4000880}, 0x20040000) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e00000005000000ff0100000200000000000400", @ANYRES32=0x1, @ANYBLOB="0700000000000000000000000000000000000000808f63ac845f25cf796cc13e29f876cdfa4eea8962db16288b5782f0133de08f706b4344624d8524b29ef3ccc7ded367699cc0beeb6353196c2fcbe6ac0b833893e5b56bad272b308b1ca30d10905034bac049a17f5dbd14095230f2f5923a0ef2fc9478068b289bccffebc39cc1c27fd2d972dda43edb897bb134f9d14ef1660c9b695cd43462ae48d9f8", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0400000001000000030000000400"/28], 0x50) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/diskstats\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x1, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 224.016246ms ago: executing program 2 (id=7386): r0 = syz_open_procfs(0x0, &(0x7f0000002a00)='net/fib_trie\x00') preadv(r0, &(0x7f0000002240)=[{&(0x7f0000001180)=""/4096, 0x1c}], 0x1, 0x37, 0x0) 211.515946ms ago: executing program 5 (id=7387): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0600000004000000880000000400000000000000", @ANYRES32=0x1, @ANYBLOB="00000000000000000000000000000000000000009f477fe8c6716da34c71719f8721d9abc9ef6125622da8f24a35dd8fd89ab61846f1110c4046f64c", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x6a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a010800000000cf01a67a5e00000000070000000900010073797a30000000004c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a3000000000080005400000001708000640ffffff000800034000000038540000000c0a0005000000000000000007000000140000001000010000000000000000000084000a8b7833ab9d6210736725139d168ddde8ad0be40b588a9be4ea52ff0cc91308d887a142a7c09b6c395eb9fd5e1367173624f83192da896151e5c83a7b87ddc8f706c0670d60743ae3a8c6e52f9e8913e6ba4e"], 0xe8}}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'lo\x00', 0x100}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x182804, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x16, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000fcffffff00000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000080b70300000000000085000000730000009500000000000000b897570270997a49c9a80984e9ff60f2846ff3a3135b5b6e7c66ceeff42ea7fdca7eb0f5f760ec66a05a75547bd05c91a5e753bd51b991b5498281ccf70c74d89de8070bc4f162923003"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mount$bpf(0x0, &(0x7f0000001080)='./file0\x00', 0x0, 0x1100020, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000003c0)='kfree\x00', r7, 0x0, 0x2000000000005}, 0x18) 191.486267ms ago: executing program 2 (id=7388): syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000000)='./file0\x00', 0x1018000, &(0x7f00000003c0)=ANY=[@ANYRES8=0x0, @ANYRES16, @ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC], 0x1, 0x2f2, &(0x7f0000000b00)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a40)={r0, 0xfffffffffffffebb, &(0x7f0000000340)}, 0x10) write$binfmt_script(r0, &(0x7f0000000040), 0x208e24b) fdatasync(r0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x80c0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000080)=0x1, 0x4) close_range(r1, r1, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) mlock2(&(0x7f0000004000/0x4000)=nil, 0x40ef, 0x0) socket$packet(0x11, 0x3, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000008085000000040000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x400, &(0x7f0000000100)=ANY=[@ANYBLOB="6572726f72733d72656d6f756e742d726f2c757466383d302c757365667265652c646973636172642c757466383d312c756e695f786c6174653d302c73686f72746e616d653d77696e39352c756e695f786c6174653d302c756e695f786c6174653d302c0008442895b66131b4e4d54b2ba6ae54dabaa5206d4a2a060b5ccc774b3ec4c81a1a9852327ff871d16d0d9344e764c68194b9d9d0be76c595bac1fc5a0a8256a7b77e071e9bdd6100f9aeb8576d329be6e4bb168f1434000000", @ANYRESHEX=0x0], 0xfd, 0x296, &(0x7f0000001080)="$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") openat(0xffffffffffffff9c, &(0x7f0000000200)='./bus\x00', 0x141842, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x400, &(0x7f0000000000)={[{@grpjquota}, {@stripe={'stripe', 0x3d, 0x2}}]}, 0x1, 0x4bb, &(0x7f0000000580)="$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") statfs(&(0x7f00000001c0)='./file0\x00', 0x0) 190.764477ms ago: executing program 5 (id=7389): syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000000)='./file0\x00', 0x1018000, &(0x7f00000003c0)=ANY=[@ANYRES8=0x0, @ANYRES16, @ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC], 0x1, 0x2f2, &(0x7f0000000b00)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a40)={r0, 0xfffffffffffffebb, &(0x7f0000000340)}, 0x10) write$binfmt_script(r0, &(0x7f0000000040), 0x208e24b) fdatasync(r0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x80c0) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000080)=0x1, 0x4) close_range(r1, r1, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) mlock2(&(0x7f0000004000/0x4000)=nil, 0x40ef, 0x0) socket$packet(0x11, 0x3, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000008085000000040000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x400, &(0x7f0000000100)=ANY=[@ANYBLOB="6572726f72733d72656d6f756e742d726f2c757466383d302c757365667265652c646973636172642c757466383d312c756e695f786c6174653d302c73686f72746e616d653d77696e39352c756e695f786c6174653d302c756e695f786c6174653d302c0008442895b66131b4e4d54b2ba6ae54dabaa5206d4a2a060b5ccc774b3ec4c81a1a9852327ff871d16d0d9344e764c68194b9d9d0be76c595bac1fc5a0a8256a7b77e071e9bdd6100f9aeb8576d329be6e4bb168f1434000000", @ANYRESHEX=0x0], 0xfd, 0x296, &(0x7f0000001080)="$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") openat(0xffffffffffffff9c, &(0x7f0000000200)='./bus\x00', 0x141842, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x400, &(0x7f0000000000)={[{@grpjquota}, {@stripe={'stripe', 0x3d, 0x2}}]}, 0x1, 0x4bb, &(0x7f0000000580)="$eJzs3cuLXFUaAPCvqtLP9EweMwxJBiaBDGQepKsfDOmemcUMDMzMIjBMwI1CbLsrbUx1V9NVHdNNFh3dZeFCFAVx4d6/wI1ZGQVxrXtxIRGNLagglNxbVUm/KpaxUyV9fz+o9Dn33NR3Thff4da59/YNILNOJf/kIkYi4oOIONSobt3hVOPHxt3rs8krF/X6hc9z6X5JvbVr6/8djIj1iBiMiP//O+Kp3M641dW1KzPlcmm5WS/WFpaK1dW1s5cXZuZL86XF8alz09NTY5MT03s21psvPHPz/Fv/7X/z6+fv3H7xnbeTbo002zaPYy81ht4XRzZtOxARf38UwXqg0BzPUK87wkNJPr9fRcTpNP8PRSH9NIEsqNfr9e/qA+2a1+vAvpVPj4Fz+dGIaJTz/6qPNo7hfx3D+XKlWvvzpcrK4lzjWPlw9OUvXS6XxprfFQ5HXy6pj6fl+/WJbfXJiPQY+KXCUFofna2U57o71QHbHNyW/18V8vnRpBJ/6nXXgG7wlR+yS/5Ddsl/yC75D9kl/yG75D9kl/yH7JL/kF3yH7JL/kN2yX/IpP+dP5+86q373+eurq5cqVw9O5fMCQsrs6OzleWl0flKZT69Z2fhh96vXKksjf8lVq4Va6VqrVhdXbu4UFlZrF1M7+u/WOrryqiAThw5eeujXESs/3UofSX6m21yFfa3ej0Xvb4HGeiNQq8nIKBnLP1BdvmOD+zyJ3q3GGzXsLT3fQG6I9/rDgA9c+a483+QVdb/Ibus/0N2OcYHrP9D9lj/h+wa2fn8r/T5P7/Y9OyusYj4ZUR8WOgbaD3rC9gP8p/mmsf/Zw79fmR7a3/um/QUQX9EPPvahVeuzdRqy+PJ9i/uba+92tw+0Yv+A51q5WkrjwGA7Nq4e3229epm3M/+2bgIYWf8A821ycH0HOXwRm7LtQq5Pbp2Yf1GRBzbLX6u+bzzxpmP4Y3CjvhHmz9zjbdI+3sgfW56d+If3xT/d5vin/jJvxXIhlvJ/DO2W/7l05yOe/m3df4Z2aNrJ9rPf/l781+hzfx3ssMYT7/+3Cdt49+IOLFr/Fa8wTTW9vhJ3850GP/OE4/9pl1b/Y3G++wWvyUpFWsLS8Xq6trZ9O/IzZcWx6fOTU9PjU1OTBfTNepia6V6p78de//2g8Y/3CZ+u/H/o9mnP3Y4/m9/+97jpx4Q/w+nd//8j7aJnxj6EU/o/3Li4yfbtSXx59qMP78z/rvD0WqNmOwwfvXl/wx0uCsA0AXV1bUrM+VyaVlBQeEhCgM/j27seaHXMxPwqN1P+l73BAAAAAAAAAAAAOhUNy4n7vUYAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD2g+8DAAD//3bC1tg=") statfs(&(0x7f00000001c0)='./file0\x00', 0x0) 40.767989ms ago: executing program 3 (id=7390): r0 = socket(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r4 = syz_open_dev$usbfs(&(0x7f0000000180), 0x205, 0x2581) r5 = fcntl$dupfd(r4, 0x0, r4) open_tree(r5, &(0x7f0000000140)='./file0\x00', 0x1000) ioctl$USBDEVFS_SUBMITURB(r5, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x80, 0xf, 0x0, 0x0, 0x7995}, 0x10007, 0x0, 0x0, 0x48000000, 0x0, 0x40000000, 0x0}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000300)=ANY=[@ANYRESOCT=r5, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) memfd_create(&(0x7f00000001c0)='\x00\xc76\xbe\x91\x8d\x182)!\x9a%\xd9\x19\x17\xb0\xed|\xb3\xc2\x017h\xe9kL\xa2\xd28\xd6\x06\a\x0e\xfc\xfe\x12\x8f&\x13\xae%@T\xa3\xb0>\\\xec\xa9\xf9Q@6A\x10\x8cn|\x00\x00\x00\x00\x00\x00\x00\x00\xeb0\xdd\xe8\x87\x05=\xfb\x8b$\xdcQ\xee\xc5\x1f\x8bQ\xf7fo\"i\xa1hk\x1d\xf5z\xc1\x7f\xa4\\]\xc4\xbe3\xf9\xa8\t?:\xd8\xda\x84\xeepI[\x1c\x00\x00\x00\x00\xf9v\x00\x00\x00\x00\x00T\xb6\xbe\x0f~\xc0\x92\xe9O{\xa8\x81(\x01\x14\xfc\x83\xf9\xfb\x05\x94Tr@Lq]\xf9\x15zj\x87\xc4\x8e\xe8/\xb9-&R\x8e\xb2\xb3bBx\x1e1\x18\x8f2\xf7]#\xed,\xc7\x03\x00\x00\x00\xa3\xee\xcb\xaf\xb3\xe3\'}\x18\xe8O\xa8#K\xb6\xe4R$\xaa\x00U\x92\xd2\x99\xb8 [ 572.192313][T21466] FAULT_INJECTION: forcing a failure. [ 572.192313][T21466] name failslab, interval 1, probability 0, space 0, times 0 [ 572.205202][T21466] CPU: 0 UID: 0 PID: 21466 Comm: syz.1.6453 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 572.205272][T21466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 572.205284][T21466] Call Trace: [ 572.205291][T21466] [ 572.205299][T21466] dump_stack_lvl+0xf6/0x150 [ 572.205323][T21466] dump_stack+0x15/0x1a [ 572.205339][T21466] should_fail_ex+0x261/0x270 [ 572.205425][T21466] should_failslab+0x8f/0xb0 [ 572.205447][T21466] kmem_cache_alloc_noprof+0x59/0x340 [ 572.205476][T21466] ? security_inode_alloc+0x37/0x100 [ 572.205523][T21466] security_inode_alloc+0x37/0x100 [ 572.205552][T21466] inode_init_always_gfp+0x4a2/0x4f0 [ 572.205573][T21466] ? __pfx_sock_alloc_inode+0x10/0x10 [ 572.205606][T21466] alloc_inode+0x86/0x170 [ 572.205623][T21466] __sock_create+0x12b/0x5a0 [ 572.205681][T21466] __sys_socket+0xb3/0x240 [ 572.205793][T21466] __x64_sys_socket+0x3f/0x50 [ 572.205831][T21466] x64_sys_call+0x28f1/0x2e10 [ 572.205853][T21466] do_syscall_64+0xc9/0x1a0 [ 572.205878][T21466] ? clear_bhb_loop+0x25/0x80 [ 572.205899][T21466] ? clear_bhb_loop+0x25/0x80 [ 572.205973][T21466] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 572.205994][T21466] RIP: 0033:0x7f4fa0d0e169 [ 572.206008][T21466] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 572.206026][T21466] RSP: 002b:00007f4f9f377038 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 572.206044][T21466] RAX: ffffffffffffffda RBX: 00007f4fa0f35fa0 RCX: 00007f4fa0d0e169 [ 572.206056][T21466] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000010 [ 572.206068][T21466] RBP: 00007f4f9f377090 R08: 0000000000000000 R09: 0000000000000000 [ 572.206155][T21466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 572.206167][T21466] R13: 0000000000000000 R14: 00007f4fa0f35fa0 R15: 00007ffe9cd4c7f8 [ 572.206184][T21466] [ 572.206196][T21466] socket: no more sockets [ 573.130454][T21551] FAULT_INJECTION: forcing a failure. [ 573.130454][T21551] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 573.143656][T21551] CPU: 0 UID: 0 PID: 21551 Comm: syz.4.6490 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 573.143690][T21551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 573.143706][T21551] Call Trace: [ 573.143714][T21551] [ 573.143724][T21551] dump_stack_lvl+0xf6/0x150 [ 573.143831][T21551] dump_stack+0x15/0x1a [ 573.143852][T21551] should_fail_ex+0x261/0x270 [ 573.143878][T21551] should_fail+0xb/0x10 [ 573.143899][T21551] should_fail_usercopy+0x1a/0x20 [ 573.143926][T21551] strncpy_from_user+0x25/0x230 [ 573.144030][T21551] ? getname_flags+0x81/0x3b0 [ 573.144056][T21551] getname_flags+0xb0/0x3b0 [ 573.144084][T21551] do_sys_openat2+0x65/0x110 [ 573.144120][T21551] __x64_sys_openat+0xf8/0x120 [ 573.144213][T21551] x64_sys_call+0x1ac/0x2e10 [ 573.144300][T21551] do_syscall_64+0xc9/0x1a0 [ 573.144352][T21551] ? clear_bhb_loop+0x25/0x80 [ 573.144378][T21551] ? clear_bhb_loop+0x25/0x80 [ 573.144518][T21551] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 573.144545][T21551] RIP: 0033:0x7fcc2d59e169 [ 573.144563][T21551] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 573.144656][T21551] RSP: 002b:00007fcc2bc07038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 573.144679][T21551] RAX: ffffffffffffffda RBX: 00007fcc2d7c5fa0 RCX: 00007fcc2d59e169 [ 573.144694][T21551] RDX: 0000000000000002 RSI: 0000200000000180 RDI: ffffffffffffff9c [ 573.144709][T21551] RBP: 00007fcc2bc07090 R08: 0000000000000000 R09: 0000000000000000 [ 573.144725][T21551] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 573.144739][T21551] R13: 0000000000000001 R14: 00007fcc2d7c5fa0 R15: 00007ffe505ee288 [ 573.144820][T21551] [ 573.487161][T21573] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21573 comm=syz.5.6498 [ 573.502520][T21572] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21572 comm=syz.5.6498 [ 573.694074][T21592] FAULT_INJECTION: forcing a failure. [ 573.694074][T21592] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 573.708158][T21592] CPU: 1 UID: 0 PID: 21592 Comm: syz.5.6509 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 573.708189][T21592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 573.708201][T21592] Call Trace: [ 573.708207][T21592] [ 573.708277][T21592] dump_stack_lvl+0xf6/0x150 [ 573.708306][T21592] dump_stack+0x15/0x1a [ 573.708325][T21592] should_fail_ex+0x261/0x270 [ 573.708349][T21592] should_fail+0xb/0x10 [ 573.708372][T21592] should_fail_usercopy+0x1a/0x20 [ 573.708571][T21592] _copy_to_user+0x20/0xa0 [ 573.708604][T21592] simple_read_from_buffer+0xb2/0x130 [ 573.708726][T21592] proc_fail_nth_read+0x103/0x140 [ 573.708764][T21592] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 573.708863][T21592] vfs_read+0x1b2/0x710 [ 573.708880][T21592] ? __rcu_read_unlock+0x4e/0x70 [ 573.708901][T21592] ? __fget_files+0x186/0x1c0 [ 573.708923][T21592] ksys_read+0xeb/0x1b0 [ 573.708943][T21592] __x64_sys_read+0x42/0x50 [ 573.709051][T21592] x64_sys_call+0x2a3b/0x2e10 [ 573.709074][T21592] do_syscall_64+0xc9/0x1a0 [ 573.709161][T21592] ? clear_bhb_loop+0x25/0x80 [ 573.709184][T21592] ? clear_bhb_loop+0x25/0x80 [ 573.709205][T21592] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 573.709299][T21592] RIP: 0033:0x7fd6464bcb7c [ 573.709315][T21592] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 573.709332][T21592] RSP: 002b:00007fd644b27030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 573.709355][T21592] RAX: ffffffffffffffda RBX: 00007fd6466e5fa0 RCX: 00007fd6464bcb7c [ 573.709370][T21592] RDX: 000000000000000f RSI: 00007fd644b270a0 RDI: 0000000000000003 [ 573.709389][T21592] RBP: 00007fd644b27090 R08: 0000000000000000 R09: 0000000000000000 [ 573.709404][T21592] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 573.709419][T21592] R13: 0000000000000000 R14: 00007fd6466e5fa0 R15: 00007ffe1d1d7068 [ 573.709441][T21592] [ 574.066980][T21616] FAULT_INJECTION: forcing a failure. [ 574.066980][T21616] name failslab, interval 1, probability 0, space 0, times 0 [ 574.079756][T21616] CPU: 0 UID: 0 PID: 21616 Comm: syz.4.6520 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 574.079790][T21616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 574.079826][T21616] Call Trace: [ 574.079833][T21616] [ 574.079841][T21616] dump_stack_lvl+0xf6/0x150 [ 574.079865][T21616] dump_stack+0x15/0x1a [ 574.079881][T21616] should_fail_ex+0x261/0x270 [ 574.079910][T21616] should_failslab+0x8f/0xb0 [ 574.079936][T21616] __kmalloc_cache_noprof+0x55/0x320 [ 574.079984][T21616] ? audit_log_d_path+0x8e/0x150 [ 574.080016][T21616] audit_log_d_path+0x8e/0x150 [ 574.080052][T21616] audit_log_d_path_exe+0x42/0x70 [ 574.080101][T21616] audit_log_task+0x1f1/0x250 [ 574.080129][T21616] ? kstrtouint+0x7b/0xc0 [ 574.080163][T21616] audit_seccomp+0x62/0x100 [ 574.080194][T21616] __seccomp_filter+0x694/0x10e0 [ 574.080219][T21616] ? vfs_write+0x669/0x950 [ 574.080243][T21616] __secure_computing+0x7e/0x150 [ 574.080341][T21616] syscall_trace_enter+0xcf/0x1f0 [ 574.080365][T21616] do_syscall_64+0xaa/0x1a0 [ 574.080417][T21616] ? clear_bhb_loop+0x25/0x80 [ 574.080439][T21616] ? clear_bhb_loop+0x25/0x80 [ 574.080461][T21616] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 574.080495][T21616] RIP: 0033:0x7fcc2d59e169 [ 574.080510][T21616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 574.080528][T21616] RSP: 002b:00007fcc2bc07038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 574.080546][T21616] RAX: ffffffffffffffda RBX: 00007fcc2d7c5fa0 RCX: 00007fcc2d59e169 [ 574.080560][T21616] RDX: 000000000000006e RSI: 000020000057eff8 RDI: 0000000000000003 [ 574.080638][T21616] RBP: 00007fcc2bc07090 R08: 0000000000000000 R09: 0000000000000000 [ 574.080650][T21616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 574.080665][T21616] R13: 0000000000000000 R14: 00007fcc2d7c5fa0 R15: 00007ffe505ee288 [ 574.080686][T21616] [ 574.426674][T21623] FAULT_INJECTION: forcing a failure. [ 574.426674][T21623] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 574.440657][T21623] CPU: 1 UID: 0 PID: 21623 Comm: syz.5.6521 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 574.440685][T21623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 574.440766][T21623] Call Trace: [ 574.440774][T21623] [ 574.440790][T21623] dump_stack_lvl+0xf6/0x150 [ 574.440848][T21623] dump_stack+0x15/0x1a [ 574.440864][T21623] should_fail_ex+0x261/0x270 [ 574.440891][T21623] should_fail+0xb/0x10 [ 574.440916][T21623] should_fail_usercopy+0x1a/0x20 [ 574.441010][T21623] strncpy_from_user+0x25/0x230 [ 574.441045][T21623] ? __se_sys_memfd_create+0x1ea/0x5a0 [ 574.441089][T21623] __se_sys_memfd_create+0x218/0x5a0 [ 574.441129][T21623] __x64_sys_memfd_create+0x31/0x40 [ 574.441242][T21623] x64_sys_call+0x1163/0x2e10 [ 574.441269][T21623] do_syscall_64+0xc9/0x1a0 [ 574.441301][T21623] ? clear_bhb_loop+0x25/0x80 [ 574.441328][T21623] ? clear_bhb_loop+0x25/0x80 [ 574.441353][T21623] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 574.441417][T21623] RIP: 0033:0x7fd6464be169 [ 574.441431][T21623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 574.441448][T21623] RSP: 002b:00007fd644b26e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 574.441469][T21623] RAX: ffffffffffffffda RBX: 0000000000000446 RCX: 00007fd6464be169 [ 574.441540][T21623] RDX: 00007fd644b26ef0 RSI: 0000000000000000 RDI: 00007fd646541404 [ 574.441553][T21623] RBP: 0000200000000d40 R08: 00007fd644b26bb7 R09: 00007fd644b26e40 [ 574.441564][T21623] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000000 [ 574.441578][T21623] R13: 00007fd644b26ef0 R14: 00007fd644b26eb0 R15: 0000200000000480 [ 574.441621][T21623] [ 574.852789][T21656] FAULT_INJECTION: forcing a failure. [ 574.852789][T21656] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 574.866043][T21656] CPU: 0 UID: 0 PID: 21656 Comm: syz.1.6537 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 574.866071][T21656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 574.866084][T21656] Call Trace: [ 574.866090][T21656] [ 574.866098][T21656] dump_stack_lvl+0xf6/0x150 [ 574.866196][T21656] dump_stack+0x15/0x1a [ 574.866217][T21656] should_fail_ex+0x261/0x270 [ 574.866248][T21656] should_fail+0xb/0x10 [ 574.866274][T21656] should_fail_usercopy+0x1a/0x20 [ 574.866360][T21656] _copy_to_user+0x20/0xa0 [ 574.866508][T21656] simple_read_from_buffer+0xb2/0x130 [ 574.866543][T21656] proc_fail_nth_read+0x103/0x140 [ 574.866608][T21656] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 574.866649][T21656] vfs_read+0x1b2/0x710 [ 574.866670][T21656] ? __rcu_read_unlock+0x4e/0x70 [ 574.866692][T21656] ? __fget_files+0x186/0x1c0 [ 574.866740][T21656] ksys_read+0xeb/0x1b0 [ 574.866764][T21656] __x64_sys_read+0x42/0x50 [ 574.866825][T21656] x64_sys_call+0x2a3b/0x2e10 [ 574.866847][T21656] do_syscall_64+0xc9/0x1a0 [ 574.866877][T21656] ? clear_bhb_loop+0x25/0x80 [ 574.866903][T21656] ? clear_bhb_loop+0x25/0x80 [ 574.866997][T21656] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 574.867021][T21656] RIP: 0033:0x7f4fa0d0cb7c [ 574.867035][T21656] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 574.867056][T21656] RSP: 002b:00007f4f9f377030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 574.867079][T21656] RAX: ffffffffffffffda RBX: 00007f4fa0f35fa0 RCX: 00007f4fa0d0cb7c [ 574.867094][T21656] RDX: 000000000000000f RSI: 00007f4f9f3770a0 RDI: 0000000000000003 [ 574.867174][T21656] RBP: 00007f4f9f377090 R08: 0000000000000000 R09: 0000000000000000 [ 574.867185][T21656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 574.867197][T21656] R13: 0000000000000000 R14: 00007f4fa0f35fa0 R15: 00007ffe9cd4c7f8 [ 574.867263][T21656] [ 574.936186][T21654] FAULT_INJECTION: forcing a failure. [ 574.936186][T21654] name failslab, interval 1, probability 0, space 0, times 0 [ 575.084935][T21654] CPU: 1 UID: 0 PID: 21654 Comm: syz.2.6536 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 575.084975][T21654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 575.084988][T21654] Call Trace: [ 575.084995][T21654] [ 575.085050][T21654] dump_stack_lvl+0xf6/0x150 [ 575.085079][T21654] dump_stack+0x15/0x1a [ 575.085164][T21654] should_fail_ex+0x261/0x270 [ 575.085194][T21654] should_failslab+0x8f/0xb0 [ 575.085278][T21654] kmem_cache_alloc_lru_noprof+0x5e/0x330 [ 575.085471][T21654] ? shmem_alloc_inode+0x34/0x50 [ 575.085498][T21654] shmem_alloc_inode+0x34/0x50 [ 575.085532][T21654] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 575.085560][T21654] alloc_inode+0x40/0x170 [ 575.085577][T21654] new_inode+0x1e/0xe0 [ 575.085603][T21654] shmem_get_inode+0x24e/0x730 [ 575.085629][T21654] __shmem_file_setup+0x127/0x1f0 [ 575.085657][T21654] shmem_file_setup+0x3b/0x50 [ 575.085680][T21654] __se_sys_memfd_create+0x2e1/0x5a0 [ 575.085790][T21654] __x64_sys_memfd_create+0x31/0x40 [ 575.085900][T21654] x64_sys_call+0x1163/0x2e10 [ 575.085921][T21654] do_syscall_64+0xc9/0x1a0 [ 575.085986][T21654] ? clear_bhb_loop+0x25/0x80 [ 575.086011][T21654] ? clear_bhb_loop+0x25/0x80 [ 575.086074][T21654] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 575.086096][T21654] RIP: 0033:0x7fccd059e169 [ 575.086113][T21654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 575.086134][T21654] RSP: 002b:00007fcccec06e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 575.086152][T21654] RAX: ffffffffffffffda RBX: 0000000000000502 RCX: 00007fccd059e169 [ 575.086243][T21654] RDX: 00007fcccec06ef0 RSI: 0000000000000000 RDI: 00007fccd0621404 [ 575.086255][T21654] RBP: 0000200000001d00 R08: 00007fcccec06bb7 R09: 00007fcccec06e40 [ 575.086267][T21654] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000000 [ 575.086280][T21654] R13: 00007fcccec06ef0 R14: 00007fcccec06eb0 R15: 0000200000000040 [ 575.086299][T21654] [ 575.315807][ T29] kauditd_printk_skb: 886 callbacks suppressed [ 575.315822][ T29] audit: type=1400 audit(1744988683.798:10903): avc: denied { read write } for pid=19868 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 575.349466][ T29] audit: type=1400 audit(1744988683.798:10904): avc: denied { map_create } for pid=21666 comm="syz.3.6542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 575.368950][ T29] audit: type=1400 audit(1744988683.798:10905): avc: denied { prog_load } for pid=21666 comm="syz.3.6542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 575.388243][ T29] audit: type=1400 audit(1744988683.798:10906): avc: denied { prog_load } for pid=21666 comm="syz.3.6542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 575.407570][ T29] audit: type=1400 audit(1744988683.798:10907): avc: denied { create } for pid=21666 comm="syz.3.6542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 575.427422][ T29] audit: type=1400 audit(1744988683.798:10908): avc: denied { map_create } for pid=21669 comm="syz.4.6544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 575.446897][ T29] audit: type=1400 audit(1744988683.798:10909): avc: denied { prog_load } for pid=21669 comm="syz.4.6544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 575.466652][ T29] audit: type=1400 audit(1744988683.798:10910): avc: denied { prog_load } for pid=21669 comm="syz.4.6544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 575.486001][ T29] audit: type=1400 audit(1744988683.828:10911): avc: denied { read write } for pid=19868 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 575.622333][ T29] audit: type=1400 audit(1744988683.848:10912): avc: denied { map_create } for pid=21672 comm="syz.4.6545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 576.037851][T21719] FAULT_INJECTION: forcing a failure. [ 576.037851][T21719] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 576.051000][T21719] CPU: 1 UID: 0 PID: 21719 Comm: syz.4.6567 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 576.051031][T21719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 576.051046][T21719] Call Trace: [ 576.051055][T21719] [ 576.051064][T21719] dump_stack_lvl+0xf6/0x150 [ 576.051159][T21719] dump_stack+0x15/0x1a [ 576.051175][T21719] should_fail_ex+0x261/0x270 [ 576.051200][T21719] should_fail+0xb/0x10 [ 576.051228][T21719] should_fail_usercopy+0x1a/0x20 [ 576.051260][T21719] _copy_from_user+0x1c/0xa0 [ 576.051301][T21719] __sys_bpf+0x16a/0x800 [ 576.051342][T21719] __x64_sys_bpf+0x43/0x50 [ 576.051369][T21719] x64_sys_call+0x23da/0x2e10 [ 576.051404][T21719] do_syscall_64+0xc9/0x1a0 [ 576.051434][T21719] ? clear_bhb_loop+0x25/0x80 [ 576.051461][T21719] ? clear_bhb_loop+0x25/0x80 [ 576.051566][T21719] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 576.051591][T21719] RIP: 0033:0x7fcc2d59e169 [ 576.051607][T21719] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 576.051628][T21719] RSP: 002b:00007fcc2bc07038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 576.051650][T21719] RAX: ffffffffffffffda RBX: 00007fcc2d7c5fa0 RCX: 00007fcc2d59e169 [ 576.051665][T21719] RDX: 0000000000000020 RSI: 0000200000001d40 RDI: 0000000000000009 [ 576.051680][T21719] RBP: 00007fcc2bc07090 R08: 0000000000000000 R09: 0000000000000000 [ 576.051748][T21719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 576.051763][T21719] R13: 0000000000000000 R14: 00007fcc2d7c5fa0 R15: 00007ffe505ee288 [ 576.051785][T21719] [ 576.610467][T21752] FAULT_INJECTION: forcing a failure. [ 576.610467][T21752] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 576.623664][T21752] CPU: 0 UID: 0 PID: 21752 Comm: syz.1.6581 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 576.623721][T21752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 576.623734][T21752] Call Trace: [ 576.623741][T21752] [ 576.623749][T21752] dump_stack_lvl+0xf6/0x150 [ 576.623807][T21752] dump_stack+0x15/0x1a [ 576.623829][T21752] should_fail_ex+0x261/0x270 [ 576.623858][T21752] should_fail+0xb/0x10 [ 576.623882][T21752] should_fail_usercopy+0x1a/0x20 [ 576.623914][T21752] _copy_from_iter+0xd8/0xd10 [ 576.624013][T21752] ? mntput+0x49/0x70 [ 576.624045][T21752] tun_get_user+0x15b/0x2640 [ 576.624069][T21752] ? path_openat+0x1ab2/0x2000 [ 576.624107][T21752] ? _parse_integer+0x27/0x30 [ 576.624191][T21752] ? devm_kfree_strarray+0x90/0x90 [ 576.624246][T21752] ? ref_tracker_alloc+0x1ff/0x310 [ 576.624279][T21752] tun_chr_write_iter+0x188/0x240 [ 576.624304][T21752] vfs_write+0x79b/0x950 [ 576.624327][T21752] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 576.624409][T21752] ksys_write+0xeb/0x1b0 [ 576.624433][T21752] __x64_sys_write+0x42/0x50 [ 576.624532][T21752] x64_sys_call+0x2a45/0x2e10 [ 576.624554][T21752] do_syscall_64+0xc9/0x1a0 [ 576.624587][T21752] ? clear_bhb_loop+0x25/0x80 [ 576.624639][T21752] ? clear_bhb_loop+0x25/0x80 [ 576.624665][T21752] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 576.624691][T21752] RIP: 0033:0x7f4fa0d0e169 [ 576.624709][T21752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 576.624731][T21752] RSP: 002b:00007f4f9f377038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 576.624750][T21752] RAX: ffffffffffffffda RBX: 00007f4fa0f35fa0 RCX: 00007f4fa0d0e169 [ 576.624762][T21752] RDX: 000000000000008b RSI: 0000200000000080 RDI: 0000000000000003 [ 576.624791][T21752] RBP: 00007f4f9f377090 R08: 0000000000000000 R09: 0000000000000000 [ 576.624805][T21752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 576.624820][T21752] R13: 0000000000000000 R14: 00007f4fa0f35fa0 R15: 00007ffe9cd4c7f8 [ 576.624841][T21752] [ 578.022625][T21854] FAULT_INJECTION: forcing a failure. [ 578.022625][T21854] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 578.035912][T21854] CPU: 1 UID: 0 PID: 21854 Comm: syz.1.6627 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 578.036028][T21854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 578.036042][T21854] Call Trace: [ 578.036048][T21854] [ 578.036056][T21854] dump_stack_lvl+0xf6/0x150 [ 578.036082][T21854] dump_stack+0x15/0x1a [ 578.036103][T21854] should_fail_ex+0x261/0x270 [ 578.036129][T21854] should_fail+0xb/0x10 [ 578.036158][T21854] should_fail_usercopy+0x1a/0x20 [ 578.036189][T21854] _copy_to_user+0x20/0xa0 [ 578.036297][T21854] simple_read_from_buffer+0xb2/0x130 [ 578.036371][T21854] proc_fail_nth_read+0x103/0x140 [ 578.036427][T21854] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 578.036512][T21854] vfs_read+0x1b2/0x710 [ 578.036576][T21854] ? __rcu_read_unlock+0x4e/0x70 [ 578.036598][T21854] ? __fget_files+0x186/0x1c0 [ 578.036626][T21854] ksys_read+0xeb/0x1b0 [ 578.036649][T21854] __x64_sys_read+0x42/0x50 [ 578.036698][T21854] x64_sys_call+0x2a3b/0x2e10 [ 578.036780][T21854] do_syscall_64+0xc9/0x1a0 [ 578.036812][T21854] ? clear_bhb_loop+0x25/0x80 [ 578.036838][T21854] ? clear_bhb_loop+0x25/0x80 [ 578.036864][T21854] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 578.036891][T21854] RIP: 0033:0x7f4fa0d0cb7c [ 578.036906][T21854] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 578.036957][T21854] RSP: 002b:00007f4f9f377030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 578.036980][T21854] RAX: ffffffffffffffda RBX: 00007f4fa0f35fa0 RCX: 00007f4fa0d0cb7c [ 578.036996][T21854] RDX: 000000000000000f RSI: 00007f4f9f3770a0 RDI: 0000000000000003 [ 578.037010][T21854] RBP: 00007f4f9f377090 R08: 0000000000000000 R09: 0000000000000000 [ 578.037025][T21854] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 578.037040][T21854] R13: 0000000000000000 R14: 00007f4fa0f35fa0 R15: 00007ffe9cd4c7f8 [ 578.037094][T21854] [ 578.526243][T21898] FAULT_INJECTION: forcing a failure. [ 578.526243][T21898] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 578.539527][T21898] CPU: 1 UID: 0 PID: 21898 Comm: syz.1.6648 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 578.539626][T21898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 578.539642][T21898] Call Trace: [ 578.539651][T21898] [ 578.539660][T21898] dump_stack_lvl+0xf6/0x150 [ 578.539774][T21898] dump_stack+0x15/0x1a [ 578.539794][T21898] should_fail_ex+0x261/0x270 [ 578.539822][T21898] should_fail+0xb/0x10 [ 578.539848][T21898] should_fail_usercopy+0x1a/0x20 [ 578.539946][T21898] _copy_to_user+0x20/0xa0 [ 578.539979][T21898] simple_read_from_buffer+0xb2/0x130 [ 578.540042][T21898] proc_fail_nth_read+0x103/0x140 [ 578.540081][T21898] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 578.540120][T21898] vfs_read+0x1b2/0x710 [ 578.540140][T21898] ? __rcu_read_unlock+0x4e/0x70 [ 578.540245][T21898] ? __fget_files+0x186/0x1c0 [ 578.540268][T21898] ksys_read+0xeb/0x1b0 [ 578.540289][T21898] __x64_sys_read+0x42/0x50 [ 578.540311][T21898] x64_sys_call+0x2a3b/0x2e10 [ 578.540338][T21898] do_syscall_64+0xc9/0x1a0 [ 578.540387][T21898] ? clear_bhb_loop+0x25/0x80 [ 578.540412][T21898] ? clear_bhb_loop+0x25/0x80 [ 578.540514][T21898] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 578.540540][T21898] RIP: 0033:0x7f4fa0d0cb7c [ 578.540558][T21898] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 578.540580][T21898] RSP: 002b:00007f4f9f377030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 578.540602][T21898] RAX: ffffffffffffffda RBX: 00007f4fa0f35fa0 RCX: 00007f4fa0d0cb7c [ 578.540616][T21898] RDX: 000000000000000f RSI: 00007f4f9f3770a0 RDI: 0000000000000003 [ 578.540632][T21898] RBP: 00007f4f9f377090 R08: 0000000000000000 R09: 0000000000000001 [ 578.540697][T21898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 578.540711][T21898] R13: 0000000000000000 R14: 00007f4fa0f35fa0 R15: 00007ffe9cd4c7f8 [ 578.540734][T21898] [ 579.996454][T21999] FAULT_INJECTION: forcing a failure. [ 579.996454][T21999] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 580.010416][T21999] CPU: 1 UID: 0 PID: 21999 Comm: syz.5.6690 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 580.010446][T21999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 580.010459][T21999] Call Trace: [ 580.010466][T21999] [ 580.010474][T21999] dump_stack_lvl+0xf6/0x150 [ 580.010524][T21999] dump_stack+0x15/0x1a [ 580.010544][T21999] should_fail_ex+0x261/0x270 [ 580.010586][T21999] should_fail+0xb/0x10 [ 580.010607][T21999] should_fail_usercopy+0x1a/0x20 [ 580.010632][T21999] _copy_to_user+0x20/0xa0 [ 580.010668][T21999] simple_read_from_buffer+0xb2/0x130 [ 580.010710][T21999] proc_fail_nth_read+0x103/0x140 [ 580.010752][T21999] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 580.010792][T21999] vfs_read+0x1b2/0x710 [ 580.010813][T21999] ? __rcu_read_unlock+0x4e/0x70 [ 580.010836][T21999] ? __fget_files+0x186/0x1c0 [ 580.010858][T21999] ksys_read+0xeb/0x1b0 [ 580.010876][T21999] __x64_sys_read+0x42/0x50 [ 580.010910][T21999] x64_sys_call+0x2a3b/0x2e10 [ 580.010933][T21999] do_syscall_64+0xc9/0x1a0 [ 580.010960][T21999] ? clear_bhb_loop+0x25/0x80 [ 580.010984][T21999] ? clear_bhb_loop+0x25/0x80 [ 580.011005][T21999] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 580.011094][T21999] RIP: 0033:0x7fd6464bcb7c [ 580.011108][T21999] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 580.011125][T21999] RSP: 002b:00007fd644b27030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 580.011147][T21999] RAX: ffffffffffffffda RBX: 00007fd6466e5fa0 RCX: 00007fd6464bcb7c [ 580.011162][T21999] RDX: 000000000000000f RSI: 00007fd644b270a0 RDI: 0000000000000003 [ 580.011176][T21999] RBP: 00007fd644b27090 R08: 0000000000000000 R09: 0000000000000000 [ 580.011265][T21999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 580.011279][T21999] R13: 0000000000000000 R14: 00007fd6466e5fa0 R15: 00007ffe1d1d7068 [ 580.011315][T21999] [ 580.231009][ T12] netdevsim netdevsim0 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 580.241009][ T12] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 580.355323][ T29] kauditd_printk_skb: 1137 callbacks suppressed [ 580.355388][ T29] audit: type=1400 audit(1744988688.748:12050): avc: denied { read write } for pid=20330 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 580.386177][ T29] audit: type=1400 audit(1744988688.748:12051): avc: denied { mounton } for pid=22002 comm="syz.2.6692" path="/127" dev="tmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 580.408581][ T29] audit: type=1400 audit(1744988688.748:12052): avc: denied { prog_load } for pid=22002 comm="syz.2.6692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 580.428010][ T29] audit: type=1400 audit(1744988688.748:12053): avc: denied { map_create } for pid=22002 comm="syz.2.6692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 580.447644][ T29] audit: type=1400 audit(1744988688.748:12054): avc: denied { prog_load } for pid=22002 comm="syz.2.6692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 580.466980][ T29] audit: type=1400 audit(1744988688.748:12055): avc: denied { open } for pid=22002 comm="syz.2.6692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 580.486383][ T29] audit: type=1400 audit(1744988688.748:12056): avc: denied { create } for pid=22002 comm="syz.2.6692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 580.506884][ T29] audit: type=1400 audit(1744988688.748:12057): avc: denied { read } for pid=22002 comm="syz.2.6692" name="mISDNtimer" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 580.530115][ T29] audit: type=1400 audit(1744988688.748:12058): avc: denied { prog_load } for pid=22002 comm="syz.2.6692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 580.545231][ T12] netdevsim netdevsim0 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 580.549341][ T29] audit: type=1400 audit(1744988688.748:12059): avc: denied { prog_load } for pid=22002 comm="syz.2.6692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 580.559861][ T12] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 580.636591][ T12] netdevsim netdevsim0 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 580.647198][ T12] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 580.707103][ T12] netdevsim netdevsim0 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 580.717119][ T12] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 580.757667][T22031] FAULT_INJECTION: forcing a failure. [ 580.757667][T22031] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 580.770870][T22031] CPU: 0 UID: 0 PID: 22031 Comm: syz.5.6705 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 580.770902][T22031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 580.770917][T22031] Call Trace: [ 580.770925][T22031] [ 580.770935][T22031] dump_stack_lvl+0xf6/0x150 [ 580.770963][T22031] dump_stack+0x15/0x1a [ 580.771011][T22031] should_fail_ex+0x261/0x270 [ 580.771154][T22031] should_fail+0xb/0x10 [ 580.771176][T22031] should_fail_usercopy+0x1a/0x20 [ 580.771207][T22031] _copy_from_user+0x1c/0xa0 [ 580.771242][T22031] __sys_bpf+0x16a/0x800 [ 580.771354][T22031] __x64_sys_bpf+0x43/0x50 [ 580.771385][T22031] x64_sys_call+0x23da/0x2e10 [ 580.771411][T22031] do_syscall_64+0xc9/0x1a0 [ 580.771441][T22031] ? clear_bhb_loop+0x25/0x80 [ 580.771462][T22031] ? clear_bhb_loop+0x25/0x80 [ 580.771505][T22031] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 580.771531][T22031] RIP: 0033:0x7fd6464be169 [ 580.771549][T22031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 580.771570][T22031] RSP: 002b:00007fd644b27038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 580.771593][T22031] RAX: ffffffffffffffda RBX: 00007fd6466e5fa0 RCX: 00007fd6464be169 [ 580.771605][T22031] RDX: 0000000000000020 RSI: 0000200000000400 RDI: 0000000000000002 [ 580.771654][T22031] RBP: 00007fd644b27090 R08: 0000000000000000 R09: 0000000000000000 [ 580.771669][T22031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 580.771683][T22031] R13: 0000000000000000 R14: 00007fd6466e5fa0 R15: 00007ffe1d1d7068 [ 580.771702][T22031] [ 580.956048][ T12] bridge_slave_1: left allmulticast mode [ 580.961840][ T12] bridge_slave_1: left promiscuous mode [ 580.968253][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 580.977168][ T12] bridge_slave_0: left allmulticast mode [ 580.982850][ T12] bridge_slave_0: left promiscuous mode [ 580.988561][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 581.012501][T22026] FAULT_INJECTION: forcing a failure. [ 581.012501][T22026] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 581.025730][T22026] CPU: 0 UID: 0 PID: 22026 Comm: syz.3.6703 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 581.025764][T22026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 581.025776][T22026] Call Trace: [ 581.025782][T22026] [ 581.025790][T22026] dump_stack_lvl+0xf6/0x150 [ 581.025816][T22026] dump_stack+0x15/0x1a [ 581.025877][T22026] should_fail_ex+0x261/0x270 [ 581.025917][T22026] should_fail+0xb/0x10 [ 581.025936][T22026] should_fail_usercopy+0x1a/0x20 [ 581.025967][T22026] _copy_from_user+0x1c/0xa0 [ 581.026001][T22026] copy_msghdr_from_user+0x54/0x2b0 [ 581.026163][T22026] ? __fget_files+0x186/0x1c0 [ 581.026192][T22026] __sys_sendmsg+0x141/0x240 [ 581.026235][T22026] __x64_sys_sendmsg+0x46/0x50 [ 581.026263][T22026] x64_sys_call+0x26f3/0x2e10 [ 581.026287][T22026] do_syscall_64+0xc9/0x1a0 [ 581.026344][T22026] ? clear_bhb_loop+0x25/0x80 [ 581.026368][T22026] ? clear_bhb_loop+0x25/0x80 [ 581.026415][T22026] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 581.026440][T22026] RIP: 0033:0x7f17e7c2e169 [ 581.026456][T22026] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 581.026476][T22026] RSP: 002b:00007f17e6297038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 581.026574][T22026] RAX: ffffffffffffffda RBX: 00007f17e7e55fa0 RCX: 00007f17e7c2e169 [ 581.026587][T22026] RDX: 0000000000000003 RSI: 0000200000000980 RDI: 0000000000000004 [ 581.026599][T22026] RBP: 00007f17e6297090 R08: 0000000000000000 R09: 0000000000000000 [ 581.026612][T22026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 581.026627][T22026] R13: 0000000000000000 R14: 00007f17e7e55fa0 R15: 00007fff842772e8 [ 581.026647][T22026] [ 581.251734][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 581.269020][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 581.281915][ T12] bond0 (unregistering): Released all slaves [ 581.311116][ T12] hsr_slave_0: left promiscuous mode [ 581.327364][ T12] hsr_slave_1: left promiscuous mode [ 581.343643][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 581.351162][ T12] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 581.369675][ T12] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 581.377266][ T12] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 581.417279][ T12] veth1_macvtap: left promiscuous mode [ 581.434127][ T12] veth0_macvtap: left promiscuous mode [ 581.440337][ T12] veth1_vlan: left promiscuous mode [ 581.464614][ T12] veth0_vlan: left promiscuous mode [ 581.624130][ T12] team0 (unregistering): Port device team_slave_1 removed [ 581.648613][ T12] team0 (unregistering): Port device team_slave_0 removed [ 582.614936][T22135] xt_CT: You must specify a L4 protocol and not use inversions on it [ 583.069527][T22156] FAULT_INJECTION: forcing a failure. [ 583.069527][T22156] name failslab, interval 1, probability 0, space 0, times 0 [ 583.082199][T22156] CPU: 1 UID: 0 PID: 22156 Comm: syz.2.6758 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 583.082227][T22156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 583.082239][T22156] Call Trace: [ 583.082247][T22156] [ 583.082256][T22156] dump_stack_lvl+0xf6/0x150 [ 583.082396][T22156] dump_stack+0x15/0x1a [ 583.082433][T22156] should_fail_ex+0x261/0x270 [ 583.082551][T22156] should_failslab+0x8f/0xb0 [ 583.082574][T22156] __kmalloc_cache_noprof+0x55/0x320 [ 583.082618][T22156] ? sel_netport_sid+0x1e0/0x420 [ 583.082657][T22156] sel_netport_sid+0x1e0/0x420 [ 583.082764][T22156] selinux_socket_bind+0x51e/0x6c0 [ 583.082804][T22156] security_socket_bind+0x47/0x80 [ 583.082834][T22156] __sys_bind+0xc4/0x190 [ 583.082949][T22156] __x64_sys_bind+0x41/0x50 [ 583.082991][T22156] x64_sys_call+0x1e4a/0x2e10 [ 583.083018][T22156] do_syscall_64+0xc9/0x1a0 [ 583.083114][T22156] ? clear_bhb_loop+0x25/0x80 [ 583.083140][T22156] ? clear_bhb_loop+0x25/0x80 [ 583.083165][T22156] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 583.083213][T22156] RIP: 0033:0x7fccd059e169 [ 583.083276][T22156] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 583.083294][T22156] RSP: 002b:00007fcccec07038 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 583.083313][T22156] RAX: ffffffffffffffda RBX: 00007fccd07c5fa0 RCX: 00007fccd059e169 [ 583.083325][T22156] RDX: 0000000000000080 RSI: 0000200000000000 RDI: 0000000000000003 [ 583.083337][T22156] RBP: 00007fcccec07090 R08: 0000000000000000 R09: 0000000000000000 [ 583.083349][T22156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 583.083367][T22156] R13: 0000000000000000 R14: 00007fccd07c5fa0 R15: 00007ffebc1d5b68 [ 583.083388][T22156] [ 583.902380][T22188] FAULT_INJECTION: forcing a failure. [ 583.902380][T22188] name failslab, interval 1, probability 0, space 0, times 0 [ 583.915148][T22188] CPU: 1 UID: 0 PID: 22188 Comm: syz.2.6771 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 583.915183][T22188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 583.915198][T22188] Call Trace: [ 583.915206][T22188] [ 583.915216][T22188] dump_stack_lvl+0xf6/0x150 [ 583.915323][T22188] dump_stack+0x15/0x1a [ 583.915344][T22188] should_fail_ex+0x261/0x270 [ 583.915374][T22188] should_failslab+0x8f/0xb0 [ 583.915401][T22188] __kmalloc_noprof+0xad/0x410 [ 583.915511][T22188] ? skcipher_next_slow+0x95/0x130 [ 583.915538][T22188] skcipher_next_slow+0x95/0x130 [ 583.915563][T22188] skcipher_walk_next+0x3a8/0x460 [ 583.915604][T22188] skcipher_walk_done+0x21d/0x3c0 [ 583.915699][T22188] ? crypto_inc+0xe5/0x110 [ 583.915735][T22188] crypto_ctr_crypt+0x1f5/0x310 [ 583.915788][T22188] ? __pfx_crypto_aes_encrypt+0x10/0x10 [ 583.915832][T22188] ? crypto_gcm_init_common+0x312/0x340 [ 583.915857][T22188] crypto_skcipher_encrypt+0x97/0xb0 [ 583.915951][T22188] crypto_gcm_encrypt+0x1ca/0x210 [ 583.915982][T22188] crypto_aead_encrypt+0x5f/0x80 [ 583.916015][T22188] tls_push_record+0x1260/0x1700 [ 583.916103][T22188] bpf_exec_tx_verdict+0x6e7/0xb50 [ 583.916165][T22188] tls_sw_sendmsg+0x1142/0x1640 [ 583.916201][T22188] ? __pfx_tls_sw_sendmsg+0x10/0x10 [ 583.916224][T22188] inet6_sendmsg+0xc5/0xd0 [ 583.916258][T22188] __sock_sendmsg+0x8b/0x180 [ 583.916296][T22188] sock_write_iter+0x186/0x1c0 [ 583.916376][T22188] vfs_write+0x79b/0x950 [ 583.916394][T22188] ? __pfx_sock_write_iter+0x10/0x10 [ 583.916432][T22188] ksys_write+0xeb/0x1b0 [ 583.916456][T22188] __x64_sys_write+0x42/0x50 [ 583.916480][T22188] x64_sys_call+0x2a45/0x2e10 [ 583.916577][T22188] do_syscall_64+0xc9/0x1a0 [ 583.916606][T22188] ? clear_bhb_loop+0x25/0x80 [ 583.916689][T22188] ? clear_bhb_loop+0x25/0x80 [ 583.916722][T22188] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 583.916743][T22188] RIP: 0033:0x7fccd059e169 [ 583.916758][T22188] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 583.916775][T22188] RSP: 002b:00007fcccec07038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 583.916867][T22188] RAX: ffffffffffffffda RBX: 00007fccd07c5fa0 RCX: 00007fccd059e169 [ 583.916883][T22188] RDX: 000000000000000b RSI: 0000200000000780 RDI: 0000000000000003 [ 583.916897][T22188] RBP: 00007fcccec07090 R08: 0000000000000000 R09: 0000000000000000 [ 583.916911][T22188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 583.916926][T22188] R13: 0000000000000000 R14: 00007fccd07c5fa0 R15: 00007ffebc1d5b68 [ 583.916947][T22188] [ 584.420037][T22226] capability: warning: `syz.3.6785' uses 32-bit capabilities (legacy support in use) [ 585.368261][ T29] kauditd_printk_skb: 916 callbacks suppressed [ 585.368279][ T29] audit: type=1326 audit(1744988693.848:12972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22277 comm="syz.2.6808" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fccd059e169 code=0x7ffc0000 [ 585.371201][T22278] FAULT_INJECTION: forcing a failure. [ 585.371201][T22278] name failslab, interval 1, probability 0, space 0, times 0 [ 585.374612][ T29] audit: type=1326 audit(1744988693.848:12973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22277 comm="syz.2.6808" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fccd059e169 code=0x7ffc0000 [ 585.374643][ T29] audit: type=1326 audit(1744988693.848:12974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22277 comm="syz.2.6808" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fccd059e169 code=0x7ffc0000 [ 585.374750][ T29] audit: type=1400 audit(1744988693.848:12975): avc: denied { map_create } for pid=22277 comm="syz.2.6808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 585.374796][ T29] audit: type=1326 audit(1744988693.848:12976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22277 comm="syz.2.6808" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fccd059e169 code=0x7ffc0000 [ 585.374835][ T29] audit: type=1326 audit(1744988693.848:12977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22277 comm="syz.2.6808" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fccd059e169 code=0x7ffc0000 [ 585.398624][T22278] CPU: 0 UID: 0 PID: 22278 Comm: syz.2.6808 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 585.398658][T22278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 585.398673][T22278] Call Trace: [ 585.398680][T22278] [ 585.398690][T22278] dump_stack_lvl+0xf6/0x150 [ 585.398777][T22278] dump_stack+0x15/0x1a [ 585.398798][T22278] should_fail_ex+0x261/0x270 [ 585.398827][T22278] should_failslab+0x8f/0xb0 [ 585.398854][T22278] kmem_cache_alloc_node_noprof+0x5c/0x340 [ 585.398890][T22278] ? __alloc_skb+0x10d/0x320 [ 585.398932][T22278] __alloc_skb+0x10d/0x320 [ 585.398954][T22278] ? audit_log_start+0x37f/0x6e0 [ 585.399028][T22278] audit_log_start+0x39a/0x6e0 [ 585.399095][T22278] ? kstrtouint+0x7b/0xc0 [ 585.399122][T22278] audit_seccomp+0x49/0x100 [ 585.399154][T22278] __seccomp_filter+0x694/0x10e0 [ 585.399201][T22278] ? vfs_write+0x669/0x950 [ 585.399222][T22278] ? putname+0xe1/0x100 [ 585.399253][T22278] __secure_computing+0x7e/0x150 [ 585.399291][T22278] syscall_trace_enter+0xcf/0x1f0 [ 585.399321][T22278] ? fpregs_assert_state_consistent+0x83/0xa0 [ 585.399372][T22278] do_syscall_64+0xaa/0x1a0 [ 585.399439][T22278] ? clear_bhb_loop+0x25/0x80 [ 585.399467][T22278] ? clear_bhb_loop+0x25/0x80 [ 585.399494][T22278] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 585.399654][T22278] RIP: 0033:0x7fccd059e169 [ 585.399674][T22278] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 585.399697][T22278] RSP: 002b:00007fcccec07038 EFLAGS: 00000246 ORIG_RAX: 0000000000000124 [ 585.399724][T22278] RAX: ffffffffffffffda RBX: 00007fccd07c5fa0 RCX: 00007fccd059e169 [ 585.399740][T22278] RDX: 0000000000080000 RSI: ffffffffffffffff RDI: ffffffffffffffff [ 585.399756][T22278] RBP: 00007fcccec07090 R08: 0000000000000000 R09: 0000000000000000 [ 585.399772][T22278] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 585.399787][T22278] R13: 0000000000000000 R14: 00007fccd07c5fa0 R15: 00007ffebc1d5b68 [ 585.399810][T22278] [ 585.399820][T22278] audit: audit_lost=7 audit_rate_limit=0 audit_backlog_limit=64 [ 585.411878][ T29] audit: type=1400 audit(1744988693.848:12978): avc: denied { prog_load } for pid=22277 comm="syz.2.6808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 585.411943][ T29] audit: type=1326 audit(1744988693.848:12979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22277 comm="syz.2.6808" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fccd059e169 code=0x7ffc0000 [ 585.411974][ T29] audit: type=1326 audit(1744988693.848:12980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22277 comm="syz.2.6808" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fccd059e169 code=0x7ffc0000 Apr 18 15:04:54 syzkaller daemon.err dhcpcd[22285]: ps_bpf_start_bpf: bpf_open: Invalid argument Apr 18 15:04:54 syzkaller daemon.err dhcpcd[22285]: ps_root_recvmsg: Invalid argument [ 585.952585][T22299] FAULT_INJECTION: forcing a failure. [ 585.952585][T22299] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 585.966516][T22299] CPU: 1 UID: 0 PID: 22299 Comm: syz.5.6816 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 585.966551][T22299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 585.966619][T22299] Call Trace: [ 585.966629][T22299] [ 585.966639][T22299] dump_stack_lvl+0xf6/0x150 [ 585.966665][T22299] dump_stack+0x15/0x1a [ 585.966681][T22299] should_fail_ex+0x261/0x270 [ 585.966708][T22299] should_fail+0xb/0x10 [ 585.966735][T22299] should_fail_usercopy+0x1a/0x20 [ 585.966887][T22299] _copy_to_user+0x20/0xa0 [ 585.966917][T22299] simple_read_from_buffer+0xb2/0x130 [ 585.966958][T22299] proc_fail_nth_read+0x103/0x140 [ 585.967126][T22299] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 585.967168][T22299] vfs_read+0x1b2/0x710 [ 585.967189][T22299] ? __rcu_read_unlock+0x4e/0x70 [ 585.967233][T22299] ? __fget_files+0x186/0x1c0 [ 585.967263][T22299] ksys_read+0xeb/0x1b0 [ 585.967293][T22299] __x64_sys_read+0x42/0x50 [ 585.967311][T22299] x64_sys_call+0x2a3b/0x2e10 [ 585.967334][T22299] do_syscall_64+0xc9/0x1a0 [ 585.967373][T22299] ? clear_bhb_loop+0x25/0x80 [ 585.967400][T22299] ? clear_bhb_loop+0x25/0x80 [ 585.967422][T22299] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 585.967459][T22299] RIP: 0033:0x7fd6464bcb7c [ 585.967479][T22299] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 585.967502][T22299] RSP: 002b:00007fd644b27030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 585.967526][T22299] RAX: ffffffffffffffda RBX: 00007fd6466e5fa0 RCX: 00007fd6464bcb7c [ 585.967542][T22299] RDX: 000000000000000f RSI: 00007fd644b270a0 RDI: 0000000000000004 [ 585.967557][T22299] RBP: 00007fd644b27090 R08: 0000000000000000 R09: 0000000000000000 [ 585.967572][T22299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 585.967639][T22299] R13: 0000000000000000 R14: 00007fd6466e5fa0 R15: 00007ffe1d1d7068 [ 585.967662][T22299] Apr 18 15:04:55 syzkaller daemon.err dhcpcd[22340]: ps_bpf_start_bpf: bpf_open: Invalid argument Apr 18 15:04:55 syzkaller daemon.err dhcpcd[22340]: ps_root_recvmsg: Invalid argument [ 587.283205][T22344] FAULT_INJECTION: forcing a failure. [ 587.283205][T22344] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 587.296689][T22344] CPU: 0 UID: 0 PID: 22344 Comm: syz.4.6836 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 587.296724][T22344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 587.296737][T22344] Call Trace: [ 587.296760][T22344] [ 587.296769][T22344] dump_stack_lvl+0xf6/0x150 [ 587.296797][T22344] dump_stack+0x15/0x1a [ 587.296818][T22344] should_fail_ex+0x261/0x270 [ 587.296848][T22344] should_fail+0xb/0x10 [ 587.296869][T22344] should_fail_usercopy+0x1a/0x20 [ 587.296908][T22344] _copy_from_user+0x1c/0xa0 [ 587.296953][T22344] copy_msghdr_from_user+0x54/0x2b0 [ 587.296984][T22344] ? __fget_files+0x186/0x1c0 [ 587.297046][T22344] __sys_sendmsg+0x141/0x240 [ 587.297098][T22344] __x64_sys_sendmsg+0x46/0x50 [ 587.297122][T22344] x64_sys_call+0x26f3/0x2e10 [ 587.297143][T22344] do_syscall_64+0xc9/0x1a0 [ 587.297187][T22344] ? clear_bhb_loop+0x25/0x80 [ 587.297235][T22344] ? clear_bhb_loop+0x25/0x80 [ 587.297257][T22344] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 587.297280][T22344] RIP: 0033:0x7fcc2d59e169 [ 587.297298][T22344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 587.297316][T22344] RSP: 002b:00007fcc2bc07038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 587.297335][T22344] RAX: ffffffffffffffda RBX: 00007fcc2d7c5fa0 RCX: 00007fcc2d59e169 [ 587.297375][T22344] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000003 [ 587.297392][T22344] RBP: 00007fcc2bc07090 R08: 0000000000000000 R09: 0000000000000000 [ 587.297406][T22344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 587.297421][T22344] R13: 0000000000000000 R14: 00007fcc2d7c5fa0 R15: 00007ffe505ee288 [ 587.297451][T22344] Apr 18 15:04:56 syzkaller daemon.err dhcpcd[22398]: ps_bpf_start_bpf: bpf_open: Invalid argument Apr 18 15:04:56 syzkaller daemon.err dhcpcd[22398]: ps_root_recvmsg: Invalid argument Apr 18 15:04:56 syzkaller daemon.err dhcpcd[22411]: ps_bpf_start_bpf: bpf_open: Invalid argument Apr 18 15:04:56 syzkaller daemon.err dhcpcd[22411]: ps_root_recvmsg: Invalid argument [ 588.499730][T22417] FAULT_INJECTION: forcing a failure. [ 588.499730][T22417] name failslab, interval 1, probability 0, space 0, times 0 [ 588.512561][T22417] CPU: 0 UID: 0 PID: 22417 Comm: +}[@ Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 588.512594][T22417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 588.512682][T22417] Call Trace: [ 588.512688][T22417] [ 588.512697][T22417] dump_stack_lvl+0xf6/0x150 [ 588.512726][T22417] dump_stack+0x15/0x1a [ 588.512746][T22417] should_fail_ex+0x261/0x270 [ 588.512775][T22417] should_failslab+0x8f/0xb0 [ 588.512875][T22417] kmem_cache_alloc_noprof+0x59/0x340 [ 588.512910][T22417] ? audit_log_start+0x37f/0x6e0 [ 588.512947][T22417] audit_log_start+0x37f/0x6e0 [ 588.512989][T22417] ? kstrtouint+0x7b/0xc0 [ 588.513020][T22417] audit_seccomp+0x49/0x100 [ 588.513052][T22417] __seccomp_filter+0x694/0x10e0 [ 588.513114][T22417] ? vfs_write+0x669/0x950 [ 588.513135][T22417] ? putname+0xe1/0x100 [ 588.513167][T22417] __secure_computing+0x7e/0x150 [ 588.513191][T22417] syscall_trace_enter+0xcf/0x1f0 [ 588.513305][T22417] ? fpregs_assert_state_consistent+0x83/0xa0 [ 588.513419][T22417] do_syscall_64+0xaa/0x1a0 [ 588.513444][T22417] ? clear_bhb_loop+0x25/0x80 [ 588.513590][T22417] ? clear_bhb_loop+0x25/0x80 [ 588.513612][T22417] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 588.513691][T22417] RIP: 0033:0x7f17e7c2e169 [ 588.513709][T22417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 588.513729][T22417] RSP: 002b:00007f17e6297038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ef [ 588.513790][T22417] RAX: ffffffffffffffda RBX: 00007f17e7e55fa0 RCX: 00007f17e7c2e169 [ 588.513806][T22417] RDX: 0000000000000007 RSI: 0000000000000000 RDI: 0000000000000000 [ 588.513820][T22417] RBP: 00007f17e6297090 R08: 0000000000000002 R09: 0000000000000000 [ 588.513832][T22417] R10: 0000200000f8b000 R11: 0000000000000246 R12: 0000000000000001 [ 588.513850][T22417] R13: 0000000000000000 R14: 00007f17e7e55fa0 R15: 00007fff842772e8 [ 588.513868][T22417] [ 589.237106][T22455] FAULT_INJECTION: forcing a failure. [ 589.237106][T22455] name failslab, interval 1, probability 0, space 0, times 0 [ 589.249829][T22455] CPU: 1 UID: 0 PID: 22455 Comm: syz.1.6881 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 589.249922][T22455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 589.249938][T22455] Call Trace: [ 589.249946][T22455] [ 589.249954][T22455] dump_stack_lvl+0xf6/0x150 [ 589.249983][T22455] dump_stack+0x15/0x1a [ 589.250003][T22455] should_fail_ex+0x261/0x270 [ 589.250033][T22455] should_failslab+0x8f/0xb0 [ 589.250087][T22455] kmem_cache_alloc_node_noprof+0x5c/0x340 [ 589.250124][T22455] ? __alloc_skb+0x10d/0x320 [ 589.250190][T22455] __alloc_skb+0x10d/0x320 [ 589.250211][T22455] ? avc_has_perm+0xd6/0x150 [ 589.250237][T22455] alloc_skb_with_frags+0x80/0x460 [ 589.250281][T22455] ? selinux_file_open+0x356/0x3c0 [ 589.250307][T22455] sock_alloc_send_pskb+0x437/0x500 [ 589.250354][T22455] ? mntput+0x49/0x70 [ 589.250438][T22455] tun_get_user+0x9b8/0x2640 [ 589.250461][T22455] ? _parse_integer+0x27/0x30 [ 589.250481][T22455] ? devm_kfree_strarray+0x90/0x90 [ 589.250503][T22455] ? ref_tracker_alloc+0x1ff/0x310 [ 589.250537][T22455] tun_chr_write_iter+0x188/0x240 [ 589.250580][T22455] vfs_write+0x79b/0x950 [ 589.250603][T22455] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 589.250633][T22455] ksys_write+0xeb/0x1b0 [ 589.250656][T22455] __x64_sys_write+0x42/0x50 [ 589.250725][T22455] x64_sys_call+0x2a45/0x2e10 [ 589.250828][T22455] do_syscall_64+0xc9/0x1a0 [ 589.250860][T22455] ? clear_bhb_loop+0x25/0x80 [ 589.250886][T22455] ? clear_bhb_loop+0x25/0x80 [ 589.250912][T22455] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 589.250981][T22455] RIP: 0033:0x7f4fa0d0cc1f [ 589.251000][T22455] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 589.251046][T22455] RSP: 002b:00007f4f9f377000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 589.251068][T22455] RAX: ffffffffffffffda RBX: 00007f4fa0f35fa0 RCX: 00007f4fa0d0cc1f [ 589.251083][T22455] RDX: 000000000000fdef RSI: 0000200000000300 RDI: 00000000000000c8 [ 589.251136][T22455] RBP: 00007f4f9f377090 R08: 0000000000000000 R09: 0000000000000000 [ 589.251151][T22455] R10: 000000000000fdef R11: 0000000000000293 R12: 0000000000000001 [ 589.251163][T22455] R13: 0000000000000000 R14: 00007f4fa0f35fa0 R15: 00007ffe9cd4c7f8 [ 589.251180][T22455] [ 589.906045][T22483] FAULT_INJECTION: forcing a failure. [ 589.906045][T22483] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 589.919220][T22483] CPU: 1 UID: 0 PID: 22483 Comm: syz.3.6894 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 589.919248][T22483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 589.919261][T22483] Call Trace: [ 589.919267][T22483] [ 589.919274][T22483] dump_stack_lvl+0xf6/0x150 [ 589.919302][T22483] dump_stack+0x15/0x1a [ 589.919378][T22483] should_fail_ex+0x261/0x270 [ 589.919403][T22483] should_fail+0xb/0x10 [ 589.919428][T22483] should_fail_usercopy+0x1a/0x20 [ 589.919458][T22483] _copy_to_user+0x20/0xa0 [ 589.919506][T22483] simple_read_from_buffer+0xb2/0x130 [ 589.919561][T22483] proc_fail_nth_read+0x103/0x140 [ 589.919630][T22483] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 589.919703][T22483] vfs_read+0x1b2/0x710 [ 589.919719][T22483] ? __rcu_read_unlock+0x4e/0x70 [ 589.919740][T22483] ? __fget_files+0x186/0x1c0 [ 589.919767][T22483] ksys_read+0xeb/0x1b0 [ 589.919790][T22483] __x64_sys_read+0x42/0x50 [ 589.919881][T22483] x64_sys_call+0x2a3b/0x2e10 [ 589.919902][T22483] do_syscall_64+0xc9/0x1a0 [ 589.919930][T22483] ? clear_bhb_loop+0x25/0x80 [ 589.919956][T22483] ? clear_bhb_loop+0x25/0x80 [ 589.919983][T22483] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 589.920067][T22483] RIP: 0033:0x7f17e7c2cb7c [ 589.920085][T22483] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 589.920158][T22483] RSP: 002b:00007f17e6297030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 589.920176][T22483] RAX: ffffffffffffffda RBX: 00007f17e7e55fa0 RCX: 00007f17e7c2cb7c [ 589.920189][T22483] RDX: 000000000000000f RSI: 00007f17e62970a0 RDI: 0000000000000003 [ 589.920208][T22483] RBP: 00007f17e6297090 R08: 0000000000000000 R09: 0000000000000000 [ 589.920223][T22483] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 589.920237][T22483] R13: 0000000000000000 R14: 00007f17e7e55fa0 R15: 00007fff842772e8 [ 589.920284][T22483] [ 590.182045][T22498] FAULT_INJECTION: forcing a failure. [ 590.182045][T22498] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 590.195383][T22498] CPU: 1 UID: 0 PID: 22498 Comm: syz.4.6900 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 590.195417][T22498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 590.195432][T22498] Call Trace: [ 590.195441][T22498] [ 590.195450][T22498] dump_stack_lvl+0xf6/0x150 [ 590.195483][T22498] dump_stack+0x15/0x1a [ 590.195508][T22498] should_fail_ex+0x261/0x270 [ 590.195540][T22498] should_fail+0xb/0x10 [ 590.195565][T22498] should_fail_usercopy+0x1a/0x20 [ 590.195595][T22498] _copy_to_user+0x20/0xa0 [ 590.195631][T22498] simple_read_from_buffer+0xb2/0x130 [ 590.195720][T22498] proc_fail_nth_read+0x103/0x140 [ 590.195769][T22498] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 590.195914][T22498] vfs_read+0x1b2/0x710 [ 590.195932][T22498] ? __rcu_read_unlock+0x4e/0x70 [ 590.195958][T22498] ? __fget_files+0x186/0x1c0 [ 590.196058][T22498] ksys_read+0xeb/0x1b0 [ 590.196077][T22498] __x64_sys_read+0x42/0x50 [ 590.196095][T22498] x64_sys_call+0x2a3b/0x2e10 [ 590.196118][T22498] do_syscall_64+0xc9/0x1a0 [ 590.196149][T22498] ? clear_bhb_loop+0x25/0x80 [ 590.196182][T22498] ? clear_bhb_loop+0x25/0x80 [ 590.196249][T22498] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 590.196276][T22498] RIP: 0033:0x7fcc2d59cb7c [ 590.196294][T22498] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 590.196312][T22498] RSP: 002b:00007fcc2bc07030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 590.196331][T22498] RAX: ffffffffffffffda RBX: 00007fcc2d7c5fa0 RCX: 00007fcc2d59cb7c [ 590.196344][T22498] RDX: 000000000000000f RSI: 00007fcc2bc070a0 RDI: 0000000000000003 [ 590.196359][T22498] RBP: 00007fcc2bc07090 R08: 0000000000000000 R09: 0000000000000000 [ 590.196410][T22498] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 590.196427][T22498] R13: 0000000000000000 R14: 00007fcc2d7c5fa0 R15: 00007ffe505ee288 [ 590.196447][T22498] [ 590.402176][ T29] kauditd_printk_skb: 812 callbacks suppressed [ 590.402213][ T29] audit: type=1400 audit(1744988698.878:13790): avc: denied { read write } for pid=18090 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 590.435555][ T29] audit: type=1400 audit(1744988698.888:13791): avc: denied { map_create } for pid=22503 comm="syz.5.6902" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 590.454953][ T29] audit: type=1400 audit(1744988698.888:13792): avc: denied { map_create } for pid=22503 comm="syz.5.6902" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 590.474482][ T29] audit: type=1400 audit(1744988698.888:13793): avc: denied { prog_load } for pid=22503 comm="syz.5.6902" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 590.493837][ T29] audit: type=1400 audit(1744988698.888:13794): avc: denied { create } for pid=22503 comm="syz.5.6902" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=0 [ 590.515160][ T29] audit: type=1400 audit(1744988698.888:13795): avc: denied { allowed } for pid=22503 comm="syz.5.6902" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 590.534719][ T29] audit: type=1400 audit(1744988698.888:13796): avc: denied { map_create } for pid=22503 comm="syz.5.6902" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 590.554204][ T29] audit: type=1400 audit(1744988698.888:13797): avc: denied { prog_load } for pid=22503 comm="syz.5.6902" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 590.573469][ T29] audit: type=1400 audit(1744988698.888:13798): avc: denied { prog_load } for pid=22503 comm="syz.5.6902" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 590.592839][ T29] audit: type=1400 audit(1744988698.888:13799): avc: denied { prog_load } for pid=22503 comm="syz.5.6902" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 591.890933][T22570] binfmt_misc: register: failed to install interpreter file ./file0 [ 591.939616][T22574] FAULT_INJECTION: forcing a failure. [ 591.939616][T22574] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 591.952880][T22574] CPU: 1 UID: 0 PID: 22574 Comm: syz.5.6931 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 591.952912][T22574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 591.952977][T22574] Call Trace: [ 591.952986][T22574] [ 591.952995][T22574] dump_stack_lvl+0xf6/0x150 [ 591.953022][T22574] dump_stack+0x15/0x1a [ 591.953039][T22574] should_fail_ex+0x261/0x270 [ 591.953146][T22574] should_fail+0xb/0x10 [ 591.953170][T22574] should_fail_usercopy+0x1a/0x20 [ 591.953196][T22574] _copy_from_user+0x1c/0xa0 [ 591.953258][T22574] kstrtouint_from_user+0x84/0x100 [ 591.953288][T22574] ? 0xffffffff81000000 [ 591.953304][T22574] ? selinux_file_permission+0x22d/0x360 [ 591.953330][T22574] proc_fail_nth_write+0x54/0x160 [ 591.953381][T22574] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 591.953418][T22574] vfs_write+0x295/0x950 [ 591.953438][T22574] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 591.953480][T22574] ? __fget_files+0x186/0x1c0 [ 591.953581][T22574] ksys_write+0xeb/0x1b0 [ 591.953605][T22574] __x64_sys_write+0x42/0x50 [ 591.953628][T22574] x64_sys_call+0x2a45/0x2e10 [ 591.953655][T22574] do_syscall_64+0xc9/0x1a0 [ 591.953686][T22574] ? clear_bhb_loop+0x25/0x80 [ 591.953820][T22574] ? clear_bhb_loop+0x25/0x80 [ 591.953847][T22574] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 591.953905][T22574] RIP: 0033:0x7fd6464bcc1f [ 591.953919][T22574] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 591.953939][T22574] RSP: 002b:00007fd644b27030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 591.953962][T22574] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd6464bcc1f [ 591.953978][T22574] RDX: 0000000000000001 RSI: 00007fd644b270a0 RDI: 0000000000000003 [ 591.953992][T22574] RBP: 00007fd644b27090 R08: 0000000000000000 R09: 0000000000000000 [ 591.954003][T22574] R10: 0000000000000020 R11: 0000000000000293 R12: 0000000000000001 [ 591.954015][T22574] R13: 0000000000000000 R14: 00007fd6466e5fa0 R15: 00007ffe1d1d7068 [ 591.954052][T22574] [ 593.203571][T22651] FAULT_INJECTION: forcing a failure. [ 593.203571][T22651] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 593.216892][T22651] CPU: 0 UID: 0 PID: 22651 Comm: syz.3.6964 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 593.216981][T22651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 593.216997][T22651] Call Trace: [ 593.217004][T22651] [ 593.217014][T22651] dump_stack_lvl+0xf6/0x150 [ 593.217044][T22651] dump_stack+0x15/0x1a [ 593.217065][T22651] should_fail_ex+0x261/0x270 [ 593.217155][T22651] should_fail+0xb/0x10 [ 593.217181][T22651] should_fail_usercopy+0x1a/0x20 [ 593.217231][T22651] _copy_from_user+0x1c/0xa0 [ 593.217302][T22651] copy_msghdr_from_user+0x54/0x2b0 [ 593.217334][T22651] ? __fget_files+0x186/0x1c0 [ 593.217440][T22651] __sys_sendmsg+0x141/0x240 [ 593.217486][T22651] __x64_sys_sendmsg+0x46/0x50 [ 593.217515][T22651] x64_sys_call+0x26f3/0x2e10 [ 593.217578][T22651] do_syscall_64+0xc9/0x1a0 [ 593.217611][T22651] ? clear_bhb_loop+0x25/0x80 [ 593.217637][T22651] ? clear_bhb_loop+0x25/0x80 [ 593.217706][T22651] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 593.217731][T22651] RIP: 0033:0x7f17e7c2e169 [ 593.217746][T22651] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 593.217852][T22651] RSP: 002b:00007f17e6297038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 593.217872][T22651] RAX: ffffffffffffffda RBX: 00007f17e7e55fa0 RCX: 00007f17e7c2e169 [ 593.217888][T22651] RDX: 0000000000004000 RSI: 0000200000000000 RDI: 0000000000000003 [ 593.217904][T22651] RBP: 00007f17e6297090 R08: 0000000000000000 R09: 0000000000000000 [ 593.217934][T22651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 593.217999][T22651] R13: 0000000000000000 R14: 00007f17e7e55fa0 R15: 00007fff842772e8 [ 593.218021][T22651] [ 595.432078][ T29] kauditd_printk_skb: 1580 callbacks suppressed [ 595.432097][ T29] audit: type=1400 audit(1744988703.908:15378): avc: denied { read write } for pid=18090 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 595.503043][ T29] audit: type=1400 audit(1744988703.918:15379): avc: denied { open } for pid=22768 comm="syz.5.7010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 595.517481][T22777] FAULT_INJECTION: forcing a failure. [ 595.517481][T22777] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 595.523285][ T29] audit: type=1400 audit(1744988703.918:15380): avc: denied { map_create } for pid=22768 comm="syz.5.7010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 595.535648][T22777] CPU: 0 UID: 0 PID: 22777 Comm: syz.5.7014 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 595.535684][T22777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 595.535700][T22777] Call Trace: [ 595.535709][T22777] [ 595.535719][T22777] dump_stack_lvl+0xf6/0x150 [ 595.535757][T22777] dump_stack+0x15/0x1a [ 595.535779][T22777] should_fail_ex+0x261/0x270 [ 595.535836][T22777] should_fail+0xb/0x10 [ 595.535863][T22777] should_fail_usercopy+0x1a/0x20 [ 595.535896][T22777] strncpy_from_user+0x25/0x230 [ 595.535938][T22777] ? __se_sys_memfd_create+0x1ea/0x5a0 [ 595.536054][T22777] __se_sys_memfd_create+0x218/0x5a0 [ 595.536097][T22777] __x64_sys_memfd_create+0x31/0x40 [ 595.536137][T22777] x64_sys_call+0x1163/0x2e10 [ 595.536220][T22777] do_syscall_64+0xc9/0x1a0 [ 595.536253][T22777] ? clear_bhb_loop+0x25/0x80 [ 595.536280][T22777] ? clear_bhb_loop+0x25/0x80 [ 595.536360][T22777] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 595.536387][T22777] RIP: 0033:0x7fd6464be169 [ 595.536406][T22777] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 595.536428][T22777] RSP: 002b:00007fd644b26e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 595.536452][T22777] RAX: ffffffffffffffda RBX: 0000000000000537 RCX: 00007fd6464be169 [ 595.536467][T22777] RDX: 00007fd644b26ef0 RSI: 0000000000000000 RDI: 00007fd646541404 [ 595.536550][T22777] RBP: 0000200000000f80 R08: 00007fd644b26bb7 R09: 00007fd644b26e40 [ 595.536565][T22777] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000000 [ 595.536580][T22777] R13: 00007fd644b26ef0 R14: 00007fd644b26eb0 R15: 0000200000000240 [ 595.536619][T22777] [ 595.700701][T22783] audit: audit_backlog=65 > audit_backlog_limit=64 [ 595.704822][ T29] audit: type=1400 audit(1744988703.918:15381): avc: denied { open } for pid=22768 comm="syz.5.7010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 595.704851][ T29] audit: type=1400 audit(1744988703.918:15382): avc: denied { prog_load } for pid=22768 comm="syz.5.7010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 595.712967][T22783] audit: audit_lost=10 audit_rate_limit=0 audit_backlog_limit=64 [ 595.721032][ T29] audit: type=1400 audit(1744988703.918:15383): avc: denied { prog_load } for pid=22768 comm="syz.5.7010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 595.729102][T22783] audit: backlog limit exceeded [ 595.748164][T22781] audit: audit_backlog=65 > audit_backlog_limit=64 [ 596.267681][T22836] FAULT_INJECTION: forcing a failure. [ 596.267681][T22836] name failslab, interval 1, probability 0, space 0, times 0 [ 596.280419][T22836] CPU: 0 UID: 0 PID: 22836 Comm: syz.2.7038 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 596.280453][T22836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 596.280469][T22836] Call Trace: [ 596.280477][T22836] [ 596.280514][T22836] dump_stack_lvl+0xf6/0x150 [ 596.280551][T22836] dump_stack+0x15/0x1a [ 596.280571][T22836] should_fail_ex+0x261/0x270 [ 596.280598][T22836] should_failslab+0x8f/0xb0 [ 596.280625][T22836] __kmalloc_cache_noprof+0x55/0x320 [ 596.280739][T22836] ? __se_sys_memfd_create+0x1ea/0x5a0 [ 596.280783][T22836] __se_sys_memfd_create+0x1ea/0x5a0 [ 596.280825][T22836] __x64_sys_memfd_create+0x31/0x40 [ 596.280858][T22836] x64_sys_call+0x1163/0x2e10 [ 596.280913][T22836] do_syscall_64+0xc9/0x1a0 [ 596.280940][T22836] ? clear_bhb_loop+0x25/0x80 [ 596.280983][T22836] ? clear_bhb_loop+0x25/0x80 [ 596.281009][T22836] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 596.281068][T22836] RIP: 0033:0x7fccd059e169 [ 596.281083][T22836] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 596.281152][T22836] RSP: 002b:00007fcccec06e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 596.281173][T22836] RAX: ffffffffffffffda RBX: 0000000000000512 RCX: 00007fccd059e169 [ 596.281185][T22836] RDX: 00007fcccec06ef0 RSI: 0000000000000000 RDI: 00007fccd0621404 [ 596.281229][T22836] RBP: 0000200000000380 R08: 00007fcccec06bb7 R09: 00007fcccec06e40 [ 596.281244][T22836] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000180 [ 596.281259][T22836] R13: 00007fcccec06ef0 R14: 00007fcccec06eb0 R15: 0000200000000040 [ 596.281293][T22836] [ 596.528427][T22845] FAULT_INJECTION: forcing a failure. [ 596.528427][T22845] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 596.541629][T22845] CPU: 0 UID: 0 PID: 22845 Comm: syz.2.7042 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 596.541739][T22845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 596.541754][T22845] Call Trace: [ 596.541763][T22845] [ 596.541773][T22845] dump_stack_lvl+0xf6/0x150 [ 596.541799][T22845] dump_stack+0x15/0x1a [ 596.541816][T22845] should_fail_ex+0x261/0x270 [ 596.541895][T22845] should_fail+0xb/0x10 [ 596.541972][T22845] should_fail_usercopy+0x1a/0x20 [ 596.541997][T22845] _copy_from_user+0x1c/0xa0 [ 596.542034][T22845] kstrtouint_from_user+0x84/0x100 [ 596.542089][T22845] ? 0xffffffff81000000 [ 596.542105][T22845] ? selinux_file_permission+0x22d/0x360 [ 596.542132][T22845] proc_fail_nth_write+0x54/0x160 [ 596.542237][T22845] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 596.542424][T22845] vfs_write+0x295/0x950 [ 596.542446][T22845] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 596.542489][T22845] ? __fget_files+0x186/0x1c0 [ 596.542517][T22845] ksys_write+0xeb/0x1b0 [ 596.542537][T22845] __x64_sys_write+0x42/0x50 [ 596.542608][T22845] x64_sys_call+0x2a45/0x2e10 [ 596.542667][T22845] do_syscall_64+0xc9/0x1a0 [ 596.542695][T22845] ? clear_bhb_loop+0x25/0x80 [ 596.542718][T22845] ? clear_bhb_loop+0x25/0x80 [ 596.542783][T22845] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 596.542867][T22845] RIP: 0033:0x7fccd059cc1f [ 596.542881][T22845] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 596.543012][T22845] RSP: 002b:00007fcccec07030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 596.543035][T22845] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fccd059cc1f [ 596.543050][T22845] RDX: 0000000000000001 RSI: 00007fcccec070a0 RDI: 0000000000000003 [ 596.543063][T22845] RBP: 00007fcccec07090 R08: 0000000000000000 R09: 0000000000000000 [ 596.543076][T22845] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 596.543088][T22845] R13: 0000000000000000 R14: 00007fccd07c5fa0 R15: 00007ffebc1d5b68 [ 596.543171][T22845] [ 596.820448][T22858] FAULT_INJECTION: forcing a failure. [ 596.820448][T22858] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 596.833610][T22858] CPU: 0 UID: 0 PID: 22858 Comm: syz.1.7048 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 596.833703][T22858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 596.833718][T22858] Call Trace: [ 596.833726][T22858] [ 596.833734][T22858] dump_stack_lvl+0xf6/0x150 [ 596.833763][T22858] dump_stack+0x15/0x1a [ 596.833780][T22858] should_fail_ex+0x261/0x270 [ 596.833804][T22858] should_fail+0xb/0x10 [ 596.833825][T22858] should_fail_usercopy+0x1a/0x20 [ 596.833925][T22858] _copy_from_user+0x1c/0xa0 [ 596.833957][T22858] kstrtouint_from_user+0x84/0x100 [ 596.833980][T22858] ? 0xffffffff81000000 [ 596.833993][T22858] ? selinux_file_permission+0x22d/0x360 [ 596.834093][T22858] proc_fail_nth_write+0x54/0x160 [ 596.834135][T22858] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 596.834225][T22858] vfs_write+0x295/0x950 [ 596.834246][T22858] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 596.834288][T22858] ? __fget_files+0x186/0x1c0 [ 596.834351][T22858] ksys_write+0xeb/0x1b0 [ 596.834371][T22858] __x64_sys_write+0x42/0x50 [ 596.834398][T22858] x64_sys_call+0x2a45/0x2e10 [ 596.834466][T22858] do_syscall_64+0xc9/0x1a0 [ 596.834495][T22858] ? clear_bhb_loop+0x25/0x80 [ 596.834629][T22858] ? clear_bhb_loop+0x25/0x80 [ 596.834653][T22858] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 596.834676][T22858] RIP: 0033:0x7f4fa0d0cc1f [ 596.834693][T22858] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 596.834782][T22858] RSP: 002b:00007f4f9f377030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 596.834805][T22858] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4fa0d0cc1f [ 596.834820][T22858] RDX: 0000000000000001 RSI: 00007f4f9f3770a0 RDI: 0000000000000005 [ 596.834831][T22858] RBP: 00007f4f9f377090 R08: 0000000000000000 R09: 0000000000000000 [ 596.834906][T22858] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 596.834920][T22858] R13: 0000000000000000 R14: 00007f4fa0f35fa0 R15: 00007ffe9cd4c7f8 [ 596.834942][T22858] [ 597.317083][T22885] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 597.691146][T22896] binfmt_misc: register: failed to install interpreter file ./file2 [ 597.719724][T22898] FAULT_INJECTION: forcing a failure. [ 597.719724][T22898] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 597.733110][T22898] CPU: 0 UID: 0 PID: 22898 Comm: syz.1.7065 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 597.733145][T22898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 597.733235][T22898] Call Trace: [ 597.733243][T22898] [ 597.733253][T22898] dump_stack_lvl+0xf6/0x150 [ 597.733281][T22898] dump_stack+0x15/0x1a [ 597.733297][T22898] should_fail_ex+0x261/0x270 [ 597.733326][T22898] should_fail+0xb/0x10 [ 597.733348][T22898] should_fail_usercopy+0x1a/0x20 [ 597.733376][T22898] _copy_from_user+0x1c/0xa0 [ 597.733429][T22898] kstrtouint_from_user+0x84/0x100 [ 597.733455][T22898] ? 0xffffffff81000000 [ 597.733470][T22898] ? selinux_file_permission+0x22d/0x360 [ 597.733540][T22898] proc_fail_nth_write+0x54/0x160 [ 597.733581][T22898] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 597.733690][T22898] vfs_write+0x295/0x950 [ 597.733706][T22898] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 597.733743][T22898] ? __fget_files+0x186/0x1c0 [ 597.733766][T22898] ksys_write+0xeb/0x1b0 [ 597.733785][T22898] __x64_sys_write+0x42/0x50 [ 597.733883][T22898] x64_sys_call+0x2a45/0x2e10 [ 597.733905][T22898] do_syscall_64+0xc9/0x1a0 [ 597.733934][T22898] ? clear_bhb_loop+0x25/0x80 [ 597.733960][T22898] ? clear_bhb_loop+0x25/0x80 [ 597.733985][T22898] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 597.734043][T22898] RIP: 0033:0x7f4fa0d0cc1f [ 597.734059][T22898] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 597.734077][T22898] RSP: 002b:00007f4f9f377030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 597.734095][T22898] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4fa0d0cc1f [ 597.734107][T22898] RDX: 0000000000000001 RSI: 00007f4f9f3770a0 RDI: 0000000000000005 [ 597.734119][T22898] RBP: 00007f4f9f377090 R08: 0000000000000000 R09: 0000000000000000 [ 597.734133][T22898] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 597.734223][T22898] R13: 0000000000000000 R14: 00007f4fa0f35fa0 R15: 00007ffe9cd4c7f8 [ 597.734246][T22898] [ 598.214479][ T3378] IPVS: starting estimator thread 0... [ 598.306987][T22922] IPVS: using max 2304 ests per chain, 115200 per kthread [ 598.433198][ T2194] IPVS: stop unused estimator thread 0... [ 599.892986][T23022] FAULT_INJECTION: forcing a failure. [ 599.892986][T23022] name failslab, interval 1, probability 0, space 0, times 0 [ 599.906527][T23022] CPU: 1 UID: 0 PID: 23022 Comm: syz.3.7114 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 599.906557][T23022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 599.906571][T23022] Call Trace: [ 599.906578][T23022] [ 599.906586][T23022] dump_stack_lvl+0xf6/0x150 [ 599.906683][T23022] dump_stack+0x15/0x1a [ 599.906701][T23022] should_fail_ex+0x261/0x270 [ 599.906727][T23022] should_failslab+0x8f/0xb0 [ 599.906799][T23022] kmem_cache_alloc_noprof+0x59/0x340 [ 599.906832][T23022] ? getname_flags+0x81/0x3b0 [ 599.906861][T23022] getname_flags+0x81/0x3b0 [ 599.906886][T23022] path_listxattrat+0x81/0x2c0 [ 599.906963][T23022] ? ksys_write+0x180/0x1b0 [ 599.906983][T23022] __x64_sys_llistxattr+0x4d/0x60 [ 599.907007][T23022] x64_sys_call+0x286f/0x2e10 [ 599.907060][T23022] do_syscall_64+0xc9/0x1a0 [ 599.907092][T23022] ? clear_bhb_loop+0x25/0x80 [ 599.907115][T23022] ? clear_bhb_loop+0x25/0x80 [ 599.907135][T23022] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 599.907156][T23022] RIP: 0033:0x7f17e7c2e169 [ 599.907221][T23022] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 599.907242][T23022] RSP: 002b:00007f17e6297038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c3 [ 599.907330][T23022] RAX: ffffffffffffffda RBX: 00007f17e7e55fa0 RCX: 00007f17e7c2e169 [ 599.907404][T23022] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000003040 [ 599.907419][T23022] RBP: 00007f17e6297090 R08: 0000000000000000 R09: 0000000000000000 [ 599.907434][T23022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 599.907448][T23022] R13: 0000000000000000 R14: 00007f17e7e55fa0 R15: 00007fff842772e8 [ 599.907469][T23022] [ 600.244791][T23040] FAULT_INJECTION: forcing a failure. [ 600.244791][T23040] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 600.257990][T23040] CPU: 0 UID: 0 PID: 23040 Comm: syz.3.7123 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 600.258019][T23040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 600.258034][T23040] Call Trace: [ 600.258040][T23040] [ 600.258048][T23040] dump_stack_lvl+0xf6/0x150 [ 600.258147][T23040] dump_stack+0x15/0x1a [ 600.258168][T23040] should_fail_ex+0x261/0x270 [ 600.258198][T23040] should_fail+0xb/0x10 [ 600.258221][T23040] should_fail_usercopy+0x1a/0x20 [ 600.258328][T23040] _copy_from_user+0x1c/0xa0 [ 600.258361][T23040] vt_ioctl+0x9e1/0x18e0 [ 600.258396][T23040] tty_ioctl+0x813/0xbd0 [ 600.258415][T23040] ? __pfx_tty_ioctl+0x10/0x10 [ 600.258440][T23040] __se_sys_ioctl+0xc9/0x140 [ 600.258583][T23040] __x64_sys_ioctl+0x43/0x50 [ 600.258678][T23040] x64_sys_call+0x168d/0x2e10 [ 600.258705][T23040] do_syscall_64+0xc9/0x1a0 [ 600.258737][T23040] ? clear_bhb_loop+0x25/0x80 [ 600.258761][T23040] ? clear_bhb_loop+0x25/0x80 [ 600.258782][T23040] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 600.258825][T23040] RIP: 0033:0x7f17e7c2e169 [ 600.258843][T23040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 600.258864][T23040] RSP: 002b:00007f17e6297038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 600.258954][T23040] RAX: ffffffffffffffda RBX: 00007f17e7e55fa0 RCX: 00007f17e7c2e169 [ 600.258966][T23040] RDX: 0000200000000080 RSI: 0000000000004b72 RDI: 0000000000000005 [ 600.258981][T23040] RBP: 00007f17e6297090 R08: 0000000000000000 R09: 0000000000000000 [ 600.259013][T23040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 600.259027][T23040] R13: 0000000000000000 R14: 00007f17e7e55fa0 R15: 00007fff842772e8 [ 600.259049][T23040] [ 600.461019][ T29] kauditd_printk_skb: 1182 callbacks suppressed [ 600.461131][ T29] audit: type=1400 audit(1744988708.938:16562): avc: denied { read write } for pid=20760 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 600.495385][ T29] audit: type=1400 audit(1744988708.968:16563): avc: denied { map_create } for pid=23042 comm="syz.1.7125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 600.546619][ T29] audit: type=1400 audit(1744988709.018:16564): avc: denied { read write } for pid=20231 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 600.581358][ T29] audit: type=1400 audit(1744988709.028:16565): avc: denied { read write } for pid=18090 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 600.634605][ T29] audit: type=1400 audit(1744988709.058:16566): avc: denied { map_create } for pid=23044 comm="syz.3.7126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 600.654694][ T29] audit: type=1400 audit(1744988709.088:16567): avc: denied { prog_load } for pid=23046 comm="syz.5.7124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 600.663149][T23043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 600.673995][ T29] audit: type=1400 audit(1744988709.088:16568): avc: denied { open } for pid=23046 comm="syz.5.7124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 600.680553][T23043] audit: audit_lost=13 audit_rate_limit=0 audit_backlog_limit=64 [ 600.680569][T23043] audit: backlog limit exceeded [ 600.830879][T23057] FAULT_INJECTION: forcing a failure. [ 600.830879][T23057] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 600.844017][T23057] CPU: 1 UID: 0 PID: 23057 Comm: syz.1.7131 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 600.844158][T23057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 600.844171][T23057] Call Trace: [ 600.844180][T23057] [ 600.844189][T23057] dump_stack_lvl+0xf6/0x150 [ 600.844218][T23057] dump_stack+0x15/0x1a [ 600.844238][T23057] should_fail_ex+0x261/0x270 [ 600.844276][T23057] should_fail+0xb/0x10 [ 600.844343][T23057] should_fail_usercopy+0x1a/0x20 [ 600.844374][T23057] strncpy_from_user+0x25/0x230 [ 600.844415][T23057] ? getname_flags+0x81/0x3b0 [ 600.844517][T23057] getname_flags+0xb0/0x3b0 [ 600.844545][T23057] __x64_sys_mknod+0x40/0x60 [ 600.844651][T23057] x64_sys_call+0x1713/0x2e10 [ 600.844673][T23057] do_syscall_64+0xc9/0x1a0 [ 600.844703][T23057] ? clear_bhb_loop+0x25/0x80 [ 600.844831][T23057] ? clear_bhb_loop+0x25/0x80 [ 600.844858][T23057] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 600.844883][T23057] RIP: 0033:0x7f4fa0d0e169 [ 600.844900][T23057] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 600.844922][T23057] RSP: 002b:00007f4f9f377038 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 600.844945][T23057] RAX: ffffffffffffffda RBX: 00007f4fa0f35fa0 RCX: 00007f4fa0d0e169 [ 600.844991][T23057] RDX: 0000000000000000 RSI: 0000000008001420 RDI: 0000200000000040 [ 600.845003][T23057] RBP: 00007f4f9f377090 R08: 0000000000000000 R09: 0000000000000000 [ 600.845014][T23057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 600.845027][T23057] R13: 0000000000000000 R14: 00007f4fa0f35fa0 R15: 00007ffe9cd4c7f8 [ 600.845051][T23057] [ 601.124570][T23076] bridge0: port 1(bridge_slave_0) entered disabled state [ 601.148778][T23076] bridge0: port 1(bridge_slave_0) entered blocking state [ 601.155886][T23076] bridge0: port 1(bridge_slave_0) entered forwarding state [ 601.247863][T23091] FAULT_INJECTION: forcing a failure. [ 601.247863][T23091] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 601.261023][T23091] CPU: 0 UID: 0 PID: 23091 Comm: syz.2.7141 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 601.261052][T23091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 601.261067][T23091] Call Trace: [ 601.261075][T23091] [ 601.261084][T23091] dump_stack_lvl+0xf6/0x150 [ 601.261112][T23091] dump_stack+0x15/0x1a [ 601.261185][T23091] should_fail_ex+0x261/0x270 [ 601.261212][T23091] should_fail+0xb/0x10 [ 601.261235][T23091] should_fail_usercopy+0x1a/0x20 [ 601.261272][T23091] _copy_from_user+0x1c/0xa0 [ 601.261381][T23091] tcp_v6_parse_md5_keys+0x92/0x440 [ 601.261509][T23091] do_tcp_setsockopt+0xf6c/0x1710 [ 601.261547][T23091] ? selinux_socket_setsockopt+0x1d9/0x210 [ 601.261583][T23091] tcp_setsockopt+0x50/0xb0 [ 601.261620][T23091] sock_common_setsockopt+0x64/0x80 [ 601.261753][T23091] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 601.261789][T23091] __sys_setsockopt+0x187/0x200 [ 601.261815][T23091] __x64_sys_setsockopt+0x66/0x80 [ 601.261841][T23091] x64_sys_call+0x2a09/0x2e10 [ 601.261891][T23091] do_syscall_64+0xc9/0x1a0 [ 601.261921][T23091] ? clear_bhb_loop+0x25/0x80 [ 601.261945][T23091] ? clear_bhb_loop+0x25/0x80 [ 601.262002][T23091] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 601.262029][T23091] RIP: 0033:0x7fccd059e169 [ 601.262048][T23091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 601.262071][T23091] RSP: 002b:00007fcccec07038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 601.262091][T23091] RAX: ffffffffffffffda RBX: 00007fccd07c5fa0 RCX: 00007fccd059e169 [ 601.262108][T23091] RDX: 000000000000000e RSI: 0000000000000006 RDI: 0000000000000003 [ 601.262119][T23091] RBP: 00007fcccec07090 R08: 00000000000000d8 R09: 0000000000000000 [ 601.262131][T23091] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 601.262143][T23091] R13: 0000000000000000 R14: 00007fccd07c5fa0 R15: 00007ffebc1d5b68 [ 601.262161][T23091] [ 601.843208][T23128] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=23128 comm=syz.2.7156 [ 601.982361][T23143] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 601.982361][T23143] The task syz.3.7161 (23143) triggered the difference, watch for misbehavior. [ 602.402554][T23161] FAULT_INJECTION: forcing a failure. [ 602.402554][T23161] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 602.415834][T23161] CPU: 1 UID: 0 PID: 23161 Comm: syz.5.7170 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 602.415869][T23161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 602.415885][T23161] Call Trace: [ 602.415893][T23161] [ 602.415900][T23161] dump_stack_lvl+0xf6/0x150 [ 602.415931][T23161] dump_stack+0x15/0x1a [ 602.415948][T23161] should_fail_ex+0x261/0x270 [ 602.416026][T23161] should_fail+0xb/0x10 [ 602.416052][T23161] should_fail_usercopy+0x1a/0x20 [ 602.416093][T23161] _copy_from_user+0x1c/0xa0 [ 602.416122][T23161] kstrtouint_from_user+0x84/0x100 [ 602.416151][T23161] ? 0xffffffff81000000 [ 602.416166][T23161] ? selinux_file_permission+0x22d/0x360 [ 602.416194][T23161] proc_fail_nth_write+0x54/0x160 [ 602.416301][T23161] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 602.416343][T23161] vfs_write+0x295/0x950 [ 602.416386][T23161] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 602.416421][T23161] ? __fget_files+0x186/0x1c0 [ 602.416445][T23161] ksys_write+0xeb/0x1b0 [ 602.416489][T23161] __x64_sys_write+0x42/0x50 [ 602.416514][T23161] x64_sys_call+0x2a45/0x2e10 [ 602.416541][T23161] do_syscall_64+0xc9/0x1a0 [ 602.416571][T23161] ? clear_bhb_loop+0x25/0x80 [ 602.416597][T23161] ? clear_bhb_loop+0x25/0x80 [ 602.416641][T23161] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 602.416667][T23161] RIP: 0033:0x7fd6464bcc1f [ 602.416680][T23161] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 602.416700][T23161] RSP: 002b:00007fd644b27030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 602.416723][T23161] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd6464bcc1f [ 602.416782][T23161] RDX: 0000000000000001 RSI: 00007fd644b270a0 RDI: 0000000000000006 [ 602.416797][T23161] RBP: 00007fd644b27090 R08: 0000000000000000 R09: 0000000000000000 [ 602.416812][T23161] R10: 0000200000000980 R11: 0000000000000293 R12: 0000000000000001 [ 602.416825][T23161] R13: 0000000000000000 R14: 00007fd6466e5fa0 R15: 00007ffe1d1d7068 [ 602.416842][T23161] [ 603.779762][T23218] FAULT_INJECTION: forcing a failure. [ 603.779762][T23218] name failslab, interval 1, probability 0, space 0, times 0 [ 603.792533][T23218] CPU: 0 UID: 0 PID: 23218 Comm: syz.3.7194 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 603.792562][T23218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 603.792576][T23218] Call Trace: [ 603.792585][T23218] [ 603.792594][T23218] dump_stack_lvl+0xf6/0x150 [ 603.792622][T23218] dump_stack+0x15/0x1a [ 603.792643][T23218] should_fail_ex+0x261/0x270 [ 603.792672][T23218] should_failslab+0x8f/0xb0 [ 603.792694][T23218] kmem_cache_alloc_noprof+0x59/0x340 [ 603.792730][T23218] ? vm_area_alloc+0x2c/0xb0 [ 603.792747][T23218] ? vma_merge_new_range+0x2df/0x340 [ 603.792771][T23218] vm_area_alloc+0x2c/0xb0 [ 603.792792][T23218] mmap_region+0x83e/0x1490 [ 603.792839][T23218] do_mmap+0x9ef/0xc80 [ 603.792867][T23218] vm_mmap_pgoff+0x16d/0x2d0 [ 603.792909][T23218] ksys_mmap_pgoff+0xd0/0x340 [ 603.792928][T23218] ? fpregs_assert_state_consistent+0x83/0xa0 [ 603.792963][T23218] x64_sys_call+0x1945/0x2e10 [ 603.792989][T23218] do_syscall_64+0xc9/0x1a0 [ 603.793014][T23218] ? clear_bhb_loop+0x25/0x80 [ 603.793035][T23218] ? clear_bhb_loop+0x25/0x80 [ 603.793055][T23218] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 603.793085][T23218] RIP: 0033:0x7f17e7c2e1a3 [ 603.793102][T23218] Code: f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 41 89 ca 41 f7 c1 ff 0f 00 00 75 14 b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 25 c3 0f 1f 40 00 48 c7 c0 a8 ff ff ff 64 c7 [ 603.793124][T23218] RSP: 002b:00007f17e6275e18 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 603.793146][T23218] RAX: ffffffffffffffda RBX: 000000000000046c RCX: 00007f17e7c2e1a3 [ 603.793161][T23218] RDX: 0000000000000003 RSI: 0000000008400000 RDI: 0000000000000000 [ 603.793172][T23218] RBP: 00002000000007c2 R08: 00000000ffffffff R09: 0000000000000000 [ 603.793184][T23218] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000006 [ 603.793195][T23218] R13: 00007f17e6275ef0 R14: 00007f17e6275eb0 R15: 0000200000000100 [ 603.793212][T23218] [ 604.501922][T23239] x_tables: duplicate underflow at hook 2 [ 604.998689][T23268] FAULT_INJECTION: forcing a failure. [ 604.998689][T23268] name failslab, interval 1, probability 0, space 0, times 0 [ 605.011476][T23268] CPU: 0 UID: 0 PID: 23268 Comm: syz.3.7216 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 605.011508][T23268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 605.011520][T23268] Call Trace: [ 605.011527][T23268] [ 605.011534][T23268] dump_stack_lvl+0xf6/0x150 [ 605.011557][T23268] dump_stack+0x15/0x1a [ 605.011578][T23268] should_fail_ex+0x261/0x270 [ 605.011607][T23268] should_failslab+0x8f/0xb0 [ 605.011635][T23268] kmem_cache_alloc_noprof+0x59/0x340 [ 605.011667][T23268] ? vm_area_alloc+0x2c/0xb0 [ 605.011687][T23268] ? vma_merge_new_range+0x2df/0x340 [ 605.011724][T23268] vm_area_alloc+0x2c/0xb0 [ 605.011746][T23268] mmap_region+0x83e/0x1490 [ 605.011800][T23268] do_mmap+0x9ef/0xc80 [ 605.011825][T23268] vm_mmap_pgoff+0x16d/0x2d0 [ 605.011862][T23268] ksys_mmap_pgoff+0xd0/0x340 [ 605.011885][T23268] ? fpregs_assert_state_consistent+0x83/0xa0 [ 605.011920][T23268] x64_sys_call+0x1945/0x2e10 [ 605.011947][T23268] do_syscall_64+0xc9/0x1a0 [ 605.011978][T23268] ? clear_bhb_loop+0x25/0x80 [ 605.012000][T23268] ? clear_bhb_loop+0x25/0x80 [ 605.012027][T23268] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 605.012053][T23268] RIP: 0033:0x7f17e7c2e1a3 [ 605.012071][T23268] Code: f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 41 89 ca 41 f7 c1 ff 0f 00 00 75 14 b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 25 c3 0f 1f 40 00 48 c7 c0 a8 ff ff ff 64 c7 [ 605.012093][T23268] RSP: 002b:00007f17e6275e18 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 605.012115][T23268] RAX: ffffffffffffffda RBX: 000000000000046c RCX: 00007f17e7c2e1a3 [ 605.012127][T23268] RDX: 0000000000000003 RSI: 0000000008400000 RDI: 0000000000000000 [ 605.012139][T23268] RBP: 00002000000007c2 R08: 00000000ffffffff R09: 0000000000000000 [ 605.012154][T23268] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000006 [ 605.012169][T23268] R13: 00007f17e6275ef0 R14: 00007f17e6275eb0 R15: 0000200000000100 [ 605.012191][T23268] [ 605.254745][ T1701] bridge_slave_1: left allmulticast mode [ 605.260458][ T1701] bridge_slave_1: left promiscuous mode [ 605.266826][ T1701] bridge0: port 2(bridge_slave_1) entered disabled state [ 605.301198][ T1701] bridge_slave_0: left allmulticast mode [ 605.306949][ T1701] bridge_slave_0: left promiscuous mode [ 605.312737][ T1701] bridge0: port 1(bridge_slave_0) entered disabled state [ 605.388077][T23278] FAULT_INJECTION: forcing a failure. [ 605.388077][T23278] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 605.401303][T23278] CPU: 0 UID: 0 PID: 23278 Comm: syz.1.7221 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 605.401337][T23278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 605.401353][T23278] Call Trace: [ 605.401360][T23278] [ 605.401370][T23278] dump_stack_lvl+0xf6/0x150 [ 605.401396][T23278] dump_stack+0x15/0x1a [ 605.401412][T23278] should_fail_ex+0x261/0x270 [ 605.401495][T23278] should_fail+0xb/0x10 [ 605.401520][T23278] should_fail_usercopy+0x1a/0x20 [ 605.401615][T23278] _copy_from_user+0x1c/0xa0 [ 605.401691][T23278] kstrtouint_from_user+0x84/0x100 [ 605.401720][T23278] ? 0xffffffff81000000 [ 605.401736][T23278] ? selinux_file_permission+0x22d/0x360 [ 605.401763][T23278] proc_fail_nth_write+0x54/0x160 [ 605.401799][T23278] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 605.401852][T23278] vfs_write+0x295/0x950 [ 605.401868][T23278] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 605.401980][T23278] ? __fget_files+0x186/0x1c0 [ 605.402005][T23278] ksys_write+0xeb/0x1b0 [ 605.402088][T23278] __x64_sys_write+0x42/0x50 [ 605.402106][T23278] x64_sys_call+0x2a45/0x2e10 [ 605.402131][T23278] do_syscall_64+0xc9/0x1a0 [ 605.402212][T23278] ? clear_bhb_loop+0x25/0x80 [ 605.402234][T23278] ? clear_bhb_loop+0x25/0x80 [ 605.402279][T23278] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 605.402305][T23278] RIP: 0033:0x7f4fa0d0cc1f [ 605.402323][T23278] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 605.402343][T23278] RSP: 002b:00007f4f9f377030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 605.402361][T23278] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4fa0d0cc1f [ 605.402376][T23278] RDX: 0000000000000001 RSI: 00007f4f9f3770a0 RDI: 0000000000000003 [ 605.402391][T23278] RBP: 00007f4f9f377090 R08: 0000000000000000 R09: 0000000000000000 [ 605.402419][T23278] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 605.402430][T23278] R13: 0000000000000000 R14: 00007f4fa0f35fa0 R15: 00007ffe9cd4c7f8 [ 605.402483][T23278] [ 605.635862][ T29] kauditd_printk_skb: 1018 callbacks suppressed [ 605.635876][ T29] audit: type=1400 audit(1744988714.118:17584): avc: denied { read write } for pid=20760 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 605.707117][ T29] audit: type=1400 audit(1744988714.158:17585): avc: denied { create } for pid=23279 comm="syz.1.7222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 605.727885][ T29] audit: type=1400 audit(1744988714.158:17586): avc: denied { create } for pid=23279 comm="syz.1.7222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 605.748665][ T29] audit: type=1400 audit(1744988714.158:17587): avc: denied { create } for pid=23279 comm="syz.1.7222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 605.769313][ T29] audit: type=1400 audit(1744988714.158:17588): avc: denied { open } for pid=23279 comm="syz.1.7222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 605.788862][ T29] audit: type=1400 audit(1744988714.158:17589): avc: denied { map_create } for pid=23279 comm="syz.1.7222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 605.808198][ T29] audit: type=1400 audit(1744988714.158:17590): avc: denied { prog_load } for pid=23279 comm="syz.1.7222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 605.827444][ T29] audit: type=1400 audit(1744988714.158:17591): avc: denied { prog_load } for pid=23279 comm="syz.1.7222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 605.846749][ T29] audit: type=1400 audit(1744988714.158:17592): avc: denied { prog_load } for pid=23279 comm="syz.1.7222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 605.866062][ T29] audit: type=1400 audit(1744988714.158:17593): avc: denied { create } for pid=23279 comm="syz.1.7222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 605.887180][ T1701] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 605.909158][ T1701] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 605.937691][ T1701] bond0 (unregistering): Released all slaves [ 605.953617][ T1701] bond1 (unregistering): Released all slaves [ 606.088774][ T1701] hsr_slave_0: left promiscuous mode [ 606.094419][ T1701] hsr_slave_1: left promiscuous mode [ 606.102662][ T1701] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 606.110876][ T1701] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 606.145120][ T1701] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 606.152624][ T1701] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 606.163986][ T1701] veth1_macvtap: left promiscuous mode [ 606.170298][ T1701] veth0_macvtap: left promiscuous mode [ 606.176037][ T1701] veth1_vlan: left promiscuous mode [ 606.181388][ T1701] veth0_vlan: left promiscuous mode [ 606.339098][ T1701] team0 (unregistering): Port device team_slave_1 removed [ 606.353151][ T1701] team0 (unregistering): Port device team_slave_0 removed [ 607.264503][T23351] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23351 comm=syz.1.7248 [ 607.964849][T23371] FAULT_INJECTION: forcing a failure. [ 607.964849][T23371] name failslab, interval 1, probability 0, space 0, times 0 [ 607.977662][T23371] CPU: 0 UID: 0 PID: 23371 Comm: syz.2.7256 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 607.977697][T23371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 607.977711][T23371] Call Trace: [ 607.977718][T23371] [ 607.977726][T23371] dump_stack_lvl+0xf6/0x150 [ 607.977751][T23371] dump_stack+0x15/0x1a [ 607.977784][T23371] should_fail_ex+0x261/0x270 [ 607.977813][T23371] should_failslab+0x8f/0xb0 [ 607.977840][T23371] __kmalloc_cache_node_noprof+0x58/0x340 [ 607.977882][T23371] ? __get_vm_area_node+0xfb/0x1c0 [ 607.977989][T23371] ? cgroup_rstat_updated+0xa4/0x590 [ 607.978083][T23371] __get_vm_area_node+0xfb/0x1c0 [ 607.978115][T23371] __vmalloc_node_range_noprof+0x285/0xe80 [ 607.978203][T23371] ? copy_process+0x39e/0x1f60 [ 607.978228][T23371] ? mod_objcg_state+0x3f6/0x530 [ 607.978303][T23371] ? __memcg_slab_post_alloc_hook+0x473/0x5a0 [ 607.978338][T23371] ? copy_process+0x39e/0x1f60 [ 607.978359][T23371] __vmalloc_node_noprof+0x65/0x80 [ 607.978425][T23371] ? copy_process+0x39e/0x1f60 [ 607.978447][T23371] dup_task_struct+0x46d/0x6e0 [ 607.978468][T23371] ? kstrtoull+0x115/0x140 [ 607.978561][T23371] copy_process+0x39e/0x1f60 [ 607.978584][T23371] ? __rcu_read_unlock+0x4e/0x70 [ 607.978608][T23371] kernel_clone+0x168/0x5d0 [ 607.978647][T23371] __x64_sys_clone+0xe9/0x120 [ 607.978679][T23371] x64_sys_call+0x2dc9/0x2e10 [ 607.978701][T23371] do_syscall_64+0xc9/0x1a0 [ 607.978779][T23371] ? clear_bhb_loop+0x25/0x80 [ 607.978800][T23371] ? clear_bhb_loop+0x25/0x80 [ 607.978821][T23371] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 607.978842][T23371] RIP: 0033:0x7fccd059e169 [ 607.978857][T23371] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 607.978875][T23371] RSP: 002b:00007fcccebe5fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 607.978934][T23371] RAX: ffffffffffffffda RBX: 00007fccd07c6080 RCX: 00007fccd059e169 [ 607.978947][T23371] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000042164000 [ 607.978958][T23371] RBP: 00007fcccebe6090 R08: 0000000000000000 R09: 0000000000000000 [ 607.978970][T23371] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 607.978982][T23371] R13: 0000000000000000 R14: 00007fccd07c6080 R15: 00007ffebc1d5b68 [ 607.978999][T23371] [ 607.979072][T23371] syz.2.7256: vmalloc error: size 16384, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 608.226952][T23371] CPU: 0 UID: 0 PID: 23371 Comm: syz.2.7256 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 608.227047][T23371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 608.227062][T23371] Call Trace: [ 608.227071][T23371] [ 608.227080][T23371] dump_stack_lvl+0xf6/0x150 [ 608.227108][T23371] dump_stack+0x15/0x1a [ 608.227197][T23371] warn_alloc+0x145/0x1b0 [ 608.227239][T23371] __vmalloc_node_range_noprof+0x2aa/0xe80 [ 608.227435][T23371] ? mod_objcg_state+0x3f6/0x530 [ 608.227474][T23371] ? __memcg_slab_post_alloc_hook+0x473/0x5a0 [ 608.227531][T23371] ? copy_process+0x39e/0x1f60 [ 608.227558][T23371] __vmalloc_node_noprof+0x65/0x80 [ 608.227662][T23371] ? copy_process+0x39e/0x1f60 [ 608.227689][T23371] dup_task_struct+0x46d/0x6e0 [ 608.227716][T23371] ? kstrtoull+0x115/0x140 [ 608.227789][T23371] copy_process+0x39e/0x1f60 [ 608.227818][T23371] ? __rcu_read_unlock+0x4e/0x70 [ 608.227842][T23371] kernel_clone+0x168/0x5d0 [ 608.227873][T23371] __x64_sys_clone+0xe9/0x120 [ 608.227909][T23371] x64_sys_call+0x2dc9/0x2e10 [ 608.227932][T23371] do_syscall_64+0xc9/0x1a0 [ 608.228068][T23371] ? clear_bhb_loop+0x25/0x80 [ 608.228095][T23371] ? clear_bhb_loop+0x25/0x80 [ 608.228122][T23371] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 608.228148][T23371] RIP: 0033:0x7fccd059e169 [ 608.228166][T23371] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 608.228226][T23371] RSP: 002b:00007fcccebe5fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 608.228248][T23371] RAX: ffffffffffffffda RBX: 00007fccd07c6080 RCX: 00007fccd059e169 [ 608.228264][T23371] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000042164000 [ 608.228278][T23371] RBP: 00007fcccebe6090 R08: 0000000000000000 R09: 0000000000000000 [ 608.228291][T23371] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 608.228302][T23371] R13: 0000000000000000 R14: 00007fccd07c6080 R15: 00007ffebc1d5b68 [ 608.228322][T23371] [ 608.228560][T23371] Mem-Info: [ 608.434696][T23371] active_anon:14872 inactive_anon:2 isolated_anon:0 [ 608.434696][T23371] active_file:19971 inactive_file:2283 isolated_file:0 [ 608.434696][T23371] unevictable:2048 dirty:585 writeback:0 [ 608.434696][T23371] slab_reclaimable:3068 slab_unreclaimable:21608 [ 608.434696][T23371] mapped:28862 shmem:6927 pagetables:971 [ 608.434696][T23371] sec_pagetables:0 bounce:0 [ 608.434696][T23371] kernel_misc_reclaimable:0 [ 608.434696][T23371] free:1791064 free_pcp:1623 free_cma:0 [ 608.479894][T23371] Node 0 active_anon:59488kB inactive_anon:8kB active_file:79884kB inactive_file:9132kB unevictable:8192kB isolated(anon):0kB isolated(file):0kB mapped:115448kB dirty:2340kB writeback:0kB shmem:27708kB writeback_tmp:0kB kernel_stack:3088kB pagetables:3884kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 608.509488][T23371] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 608.536387][T23371] lowmem_reserve[]: 0 2882 7860 7860 [ 608.541757][T23371] Node 0 DMA32 free:2947684kB boost:0kB min:4132kB low:7060kB high:9988kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2951312kB mlocked:0kB bounce:0kB free_pcp:3628kB local_pcp:100kB free_cma:0kB [ 608.570567][T23371] lowmem_reserve[]: 0 0 4978 4978 [ 608.575802][T23371] Node 0 Normal free:4201904kB boost:0kB min:7188kB low:12284kB high:17380kB reserved_highatomic:0KB active_anon:59604kB inactive_anon:8kB active_file:79884kB inactive_file:9132kB unevictable:8192kB writepending:2340kB present:5242880kB managed:5098244kB mlocked:0kB bounce:0kB free_pcp:1760kB local_pcp:32kB free_cma:0kB [ 608.591427][T23385] FAULT_INJECTION: forcing a failure. [ 608.591427][T23385] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 608.606368][T23371] lowmem_reserve[]: 0 0 0 0 [ 608.606406][T23371] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 608.606630][T23371] Node 0 DMA32: 3*4kB (M) 1*8kB (M) 3*16kB (M) 3*32kB (M) 3*64kB (M) 4*128kB [ 608.619820][T23385] CPU: 1 UID: 0 PID: 23385 Comm: syz.3.7263 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 608.619860][T23385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 608.619876][T23385] Call Trace: [ 608.619887][T23385] [ 608.619897][T23385] dump_stack_lvl+0xf6/0x150 [ 608.619981][T23385] dump_stack+0x15/0x1a [ 608.620077][T23385] should_fail_ex+0x261/0x270 [ 608.620110][T23385] should_fail+0xb/0x10 [ 608.620136][T23385] should_fail_usercopy+0x1a/0x20 [ 608.620251][T23385] strncpy_from_user+0x25/0x230 [ 608.620292][T23385] ? __se_sys_memfd_create+0x1ea/0x5a0 [ 608.620339][T23385] __se_sys_memfd_create+0x218/0x5a0 [ 608.620482][T23385] __x64_sys_memfd_create+0x31/0x40 [ 608.620524][T23385] x64_sys_call+0x1163/0x2e10 [ 608.620552][T23385] do_syscall_64+0xc9/0x1a0 [ 608.620586][T23385] ? clear_bhb_loop+0x25/0x80 [ 608.620613][T23385] ? clear_bhb_loop+0x25/0x80 [ 608.620670][T23385] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 608.620738][T23385] RIP: 0033:0x7f17e7c2e169 [ 608.620756][T23385] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 608.620774][T23385] RSP: 002b:00007f17e6296e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 608.620792][T23385] RAX: ffffffffffffffda RBX: 000000000000046f RCX: 00007f17e7c2e169 [ 608.620804][T23385] RDX: 00007f17e6296ef0 RSI: 0000000000000000 RDI: 00007f17e7cb1404 [ 608.620820][T23385] RBP: 0000200000000940 R08: 00007f17e6296bb7 R09: 00007f17e6296e40 [ 608.620832][T23385] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000040 [ 608.620848][T23385] R13: 00007f17e6296ef0 R14: 00007f17e6296eb0 R15: 00002000000010c0 [ 608.620922][T23385] [ 608.819505][T23371] (M) 3*256kB (M) 4*512kB (M) 3*1024kB (M) 2*2048kB (M) 717*4096kB (M) = 2947684kB [ 608.829005][T23371] Node 0 Normal: 1177*4kB (UME) 1399*8kB (UME) 960*16kB (UME) 575*32kB (UME) 265*64kB (UME) 104*128kB (UME) 54*256kB (UME) 157*512kB (UME) 135*1024kB (UM) 97*2048kB (UME) 901*4096kB (UM) = 4201532kB [ 608.848797][T23371] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 608.858131][T23371] 29502 total pagecache pages [ 608.862814][T23371] 2 pages in swap cache [ 608.867002][T23371] Free swap = 124988kB [ 608.871183][T23371] Total swap = 124996kB [ 608.875378][T23371] 2097051 pages RAM [ 608.879203][T23371] 0 pages HighMem/MovableOnly [ 608.883885][T23371] 80822 pages reserved [ 608.922802][T23401] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23401 comm=syz.3.7267 [ 609.478415][T23421] pim6reg1: entered promiscuous mode [ 609.483788][T23421] pim6reg1: entered allmulticast mode [ 609.536733][T23425] FAULT_INJECTION: forcing a failure. [ 609.536733][T23425] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 609.550081][T23425] CPU: 0 UID: 0 PID: 23425 Comm: syz.3.7280 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 609.550115][T23425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 609.550140][T23425] Call Trace: [ 609.550147][T23425] [ 609.550155][T23425] dump_stack_lvl+0xf6/0x150 [ 609.550185][T23425] dump_stack+0x15/0x1a [ 609.550206][T23425] should_fail_ex+0x261/0x270 [ 609.550316][T23425] should_fail_alloc_page+0xfd/0x110 [ 609.550347][T23425] __alloc_frozen_pages_noprof+0x11d/0x360 [ 609.550431][T23425] alloc_pages_mpol+0xb6/0x260 [ 609.550470][T23425] folio_alloc_mpol_noprof+0x36/0x80 [ 609.550504][T23425] shmem_get_folio_gfp+0x3c1/0xd30 [ 609.550575][T23425] shmem_write_begin+0xa7/0x190 [ 609.550602][T23425] generic_perform_write+0x189/0x4b0 [ 609.550634][T23425] shmem_file_write_iter+0xc2/0xe0 [ 609.550665][T23425] vfs_write+0x79b/0x950 [ 609.550688][T23425] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 609.550726][T23425] ksys_write+0xeb/0x1b0 [ 609.550829][T23425] __x64_sys_write+0x42/0x50 [ 609.550854][T23425] x64_sys_call+0x2a45/0x2e10 [ 609.550927][T23425] do_syscall_64+0xc9/0x1a0 [ 609.550954][T23425] ? clear_bhb_loop+0x25/0x80 [ 609.550979][T23425] ? clear_bhb_loop+0x25/0x80 [ 609.551005][T23425] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 609.551042][T23425] RIP: 0033:0x7f17e7c2e169 [ 609.551057][T23425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 609.551074][T23425] RSP: 002b:00007f17e6297038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 609.551122][T23425] RAX: ffffffffffffffda RBX: 00007f17e7e55fa0 RCX: 00007f17e7c2e169 [ 609.551138][T23425] RDX: 000000000208e24b RSI: 0000200000000040 RDI: 0000000000000006 [ 609.551153][T23425] RBP: 00007f17e6297090 R08: 0000000000000000 R09: 0000000000000000 [ 609.551168][T23425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 609.551183][T23425] R13: 0000000000000000 R14: 00007f17e7e55fa0 R15: 00007fff842772e8 [ 609.551205][T23425] [ 609.949897][T23442] Cannot find set identified by id 0 to match [ 609.973776][T23445] FAULT_INJECTION: forcing a failure. [ 609.973776][T23445] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 609.987623][T23445] CPU: 1 UID: 0 PID: 23445 Comm: syz.2.7289 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 609.987719][T23445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 609.987803][T23445] Call Trace: [ 609.987811][T23445] [ 609.987820][T23445] dump_stack_lvl+0xf6/0x150 [ 609.987848][T23445] dump_stack+0x15/0x1a [ 609.987869][T23445] should_fail_ex+0x261/0x270 [ 609.987899][T23445] should_fail+0xb/0x10 [ 609.987967][T23445] should_fail_usercopy+0x1a/0x20 [ 609.988028][T23445] _copy_from_user+0x1c/0xa0 [ 609.988058][T23445] copy_msghdr_from_user+0x54/0x2b0 [ 609.988096][T23445] ? __fget_files+0x186/0x1c0 [ 609.988119][T23445] __sys_sendmsg+0x141/0x240 [ 609.988234][T23445] __x64_sys_sendmsg+0x46/0x50 [ 609.988263][T23445] x64_sys_call+0x26f3/0x2e10 [ 609.988302][T23445] do_syscall_64+0xc9/0x1a0 [ 609.988328][T23445] ? clear_bhb_loop+0x25/0x80 [ 609.988404][T23445] ? clear_bhb_loop+0x25/0x80 [ 609.988498][T23445] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 609.988525][T23445] RIP: 0033:0x7fccd059e169 [ 609.988543][T23445] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 609.988642][T23445] RSP: 002b:00007fcccec07038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 609.988661][T23445] RAX: ffffffffffffffda RBX: 00007fccd07c5fa0 RCX: 00007fccd059e169 [ 609.988674][T23445] RDX: 000000000004c800 RSI: 0000200000000000 RDI: 0000000000000003 [ 609.988686][T23445] RBP: 00007fcccec07090 R08: 0000000000000000 R09: 0000000000000000 [ 609.988699][T23445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 609.988711][T23445] R13: 0000000000000000 R14: 00007fccd07c5fa0 R15: 00007ffebc1d5b68 [ 609.988729][T23445] [ 610.463224][T23464] FAULT_INJECTION: forcing a failure. [ 610.463224][T23464] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 610.477109][T23464] CPU: 1 UID: 0 PID: 23464 Comm: syz.5.7298 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 610.477144][T23464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 610.477159][T23464] Call Trace: [ 610.477168][T23464] [ 610.477177][T23464] dump_stack_lvl+0xf6/0x150 [ 610.477209][T23464] dump_stack+0x15/0x1a [ 610.477226][T23464] should_fail_ex+0x261/0x270 [ 610.477250][T23464] should_fail+0xb/0x10 [ 610.477325][T23464] should_fail_usercopy+0x1a/0x20 [ 610.477357][T23464] _copy_from_user+0x1c/0xa0 [ 610.477418][T23464] io_submit_one+0x56/0x1230 [ 610.477442][T23464] ? __rcu_read_unlock+0x4e/0x70 [ 610.477469][T23464] __se_sys_io_submit+0xf7/0x280 [ 610.477575][T23464] __x64_sys_io_submit+0x43/0x50 [ 610.477686][T23464] x64_sys_call+0xa8b/0x2e10 [ 610.477711][T23464] do_syscall_64+0xc9/0x1a0 [ 610.477737][T23464] ? clear_bhb_loop+0x25/0x80 [ 610.477762][T23464] ? clear_bhb_loop+0x25/0x80 [ 610.477852][T23464] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 610.477874][T23464] RIP: 0033:0x7fd6464be169 [ 610.477889][T23464] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 610.477936][T23464] RSP: 002b:00007fd644b27038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 610.477955][T23464] RAX: ffffffffffffffda RBX: 00007fd6466e5fa0 RCX: 00007fd6464be169 [ 610.477971][T23464] RDX: 0000200000000800 RSI: 0000000000000001 RDI: 00007fd647221000 [ 610.477986][T23464] RBP: 00007fd644b27090 R08: 0000000000000000 R09: 0000000000000000 [ 610.478028][T23464] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 610.478040][T23464] R13: 0000000000000000 R14: 00007fd6466e5fa0 R15: 00007ffe1d1d7068 [ 610.478057][T23464] [ 610.662486][ T29] kauditd_printk_skb: 1065 callbacks suppressed [ 610.662570][ T29] audit: type=1400 audit(1744988720.142:18659): avc: denied { prog_load } for pid=23465 comm="syz.3.7299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 610.745956][ T29] audit: type=1400 audit(1744988720.142:18660): avc: denied { read write } for pid=23465 comm="syz.3.7299" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 610.770356][ T29] audit: type=1400 audit(1744988720.142:18661): avc: denied { map_create } for pid=23465 comm="syz.3.7299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 610.790176][ T29] audit: type=1400 audit(1744988720.142:18662): avc: denied { prog_load } for pid=23465 comm="syz.3.7299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 610.809462][ T29] audit: type=1400 audit(1744988720.142:18663): avc: denied { prog_load } for pid=23465 comm="syz.3.7299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 610.828761][ T29] audit: type=1400 audit(1744988720.152:18664): avc: denied { read write } for pid=23465 comm="syz.3.7299" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 610.853057][ T29] audit: type=1400 audit(1744988720.202:18665): avc: denied { read write } for pid=20330 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 610.877610][ T29] audit: type=1400 audit(1744988720.212:18666): avc: denied { read write } for pid=20760 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 610.908549][ T29] audit: type=1400 audit(1744988720.302:18667): avc: denied { map_create } for pid=23477 comm="syz.1.7301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 610.928121][ T29] audit: type=1400 audit(1744988720.302:18668): avc: denied { map_create } for pid=23477 comm="syz.1.7301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 612.495362][T23594] FAULT_INJECTION: forcing a failure. [ 612.495362][T23594] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 612.508496][T23594] CPU: 0 UID: 0 PID: 23594 Comm: syz.4.7347 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 612.508591][T23594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 612.508607][T23594] Call Trace: [ 612.508616][T23594] [ 612.508625][T23594] dump_stack_lvl+0xf6/0x150 [ 612.508727][T23594] dump_stack+0x15/0x1a [ 612.508749][T23594] should_fail_ex+0x261/0x270 [ 612.508779][T23594] should_fail+0xb/0x10 [ 612.508861][T23594] should_fail_usercopy+0x1a/0x20 [ 612.508893][T23594] _copy_from_user+0x1c/0xa0 [ 612.508929][T23594] kstrtouint_from_user+0x84/0x100 [ 612.508959][T23594] ? 0xffffffff81000000 [ 612.508975][T23594] ? selinux_file_permission+0x22d/0x360 [ 612.509002][T23594] proc_fail_nth_write+0x54/0x160 [ 612.509060][T23594] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 612.509121][T23594] vfs_write+0x295/0x950 [ 612.509138][T23594] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 612.509176][T23594] ? __fget_files+0x186/0x1c0 [ 612.509200][T23594] ksys_write+0xeb/0x1b0 [ 612.509219][T23594] __x64_sys_write+0x42/0x50 [ 612.509238][T23594] x64_sys_call+0x2a45/0x2e10 [ 612.509265][T23594] do_syscall_64+0xc9/0x1a0 [ 612.509343][T23594] ? clear_bhb_loop+0x25/0x80 [ 612.509365][T23594] ? clear_bhb_loop+0x25/0x80 [ 612.509418][T23594] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 612.509439][T23594] RIP: 0033:0x7fcc2d59cc1f [ 612.509453][T23594] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 612.509484][T23594] RSP: 002b:00007fcc2bc07030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 612.509502][T23594] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fcc2d59cc1f [ 612.509514][T23594] RDX: 0000000000000001 RSI: 00007fcc2bc070a0 RDI: 0000000000000003 [ 612.509526][T23594] RBP: 00007fcc2bc07090 R08: 0000000000000000 R09: 0000000000000000 [ 612.509538][T23594] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 612.509552][T23594] R13: 0000000000000000 R14: 00007fcc2d7c5fa0 R15: 00007ffe505ee288 [ 612.509573][T23594] [ 612.743163][T23596] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=23596 comm=syz.4.7349 [ 613.097592][T23630] tun0: tun_chr_ioctl cmd 1074025675 [ 613.103069][T23630] tun0: persist enabled [ 613.123764][T23630] tun0: tun_chr_ioctl cmd 1074025675 [ 613.129135][T23630] tun0: persist enabled [ 613.146380][ T3495] IPVS: starting estimator thread 0... [ 613.147018][T23629] IPVS: wlc: UDP 224.0.0.2:0 - no destination available [ 613.254930][T23634] IPVS: using max 2064 ests per chain, 103200 per kthread [ 614.195813][T23699] ================================================================== [ 614.203965][T23699] BUG: KCSAN: data-race in mas_replace_node / mtree_range_walk [ 614.211578][T23699] [ 614.213906][T23699] write to 0xffff8881034b8600 of 8 bytes by task 23698 on cpu 1: [ 614.221642][T23699] mas_replace_node+0x1b8/0x430 [ 614.226515][T23699] mas_wr_store_entry+0x1e80/0x2460 [ 614.231723][T23699] mas_store_prealloc+0x6d5/0x960 [ 614.236759][T23699] vma_iter_store_new+0x1d3/0x210 [ 614.241858][T23699] vma_complete+0x12b/0x570 [ 614.246370][T23699] __split_vma+0x56c/0x630 [ 614.250816][T23699] vma_modify+0x105/0x200 [ 614.255163][T23699] vma_modify_flags+0x10a/0x140 [ 614.260030][T23699] mprotect_fixup+0x30f/0x5d0 [ 614.264718][T23699] do_mprotect_pkey+0x6ce/0x9a0 [ 614.269585][T23699] __x64_sys_mprotect+0x48/0x60 [ 614.274449][T23699] x64_sys_call+0x272f/0x2e10 [ 614.279138][T23699] do_syscall_64+0xc9/0x1a0 [ 614.283652][T23699] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 614.289554][T23699] [ 614.291879][T23699] read to 0xffff8881034b8600 of 8 bytes by task 23699 on cpu 0: [ 614.299512][T23699] mtree_range_walk+0x347/0x460 [ 614.304374][T23699] mas_walk+0x16e/0x320 [ 614.308535][T23699] lock_vma_under_rcu+0xa7/0x340 [ 614.313484][T23699] exc_page_fault+0x150/0x6a0 [ 614.318169][T23699] asm_exc_page_fault+0x26/0x30 [ 614.323027][T23699] [ 614.325357][T23699] value changed: 0xffff8881034b8d06 -> 0xffff8881034b8600 [ 614.332466][T23699] [ 614.334811][T23699] Reported by Kernel Concurrency Sanitizer on: [ 614.340975][T23699] CPU: 0 UID: 0 PID: 23699 Comm: syz.4.7393 Not tainted 6.15.0-rc2-syzkaller-00278-gfc96b232f8e7 #0 PREEMPT(voluntary) [ 614.353480][T23699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 614.363543][T23699] ==================================================================