last executing test programs: 29.59994619s ago: executing program 1 (id=940): pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = open_tree(0xffffffffffffff9c, 0x0, 0x89901) sendmsg$tipc(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="4c8bd763b9aec4bcfa", 0x9}, {&(0x7f0000000240)="9af3964abcf7e0551df7ef667a0d8f53807d329389d3b7d372835fd10b8c72cdb3757093c5b0182565aee804587356941116c96a21620c6077c92818fb68479fec2be9538596cd4a2ecd08739c969cbe6e122d9875a438f5fc06f2b7ce22568918c5e5570f22db5710d38c10cae98a308e73", 0x72}], 0x2, 0x0, 0x0, 0xe}, 0x4) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r4 = socket(0x400000000010, 0x3, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r6, {0x0, 0x1}, {0xffff, 0xffff}, {0x0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000340)={0x4, 0x4, 0x5, 0x400, 0x8}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYRESDEC=r6, @ANYRES32=r7, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000080)='kfree\x00', r8, 0x0, 0x4}, 0x18) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="200000001000010700000000000000000a0000000c0002006e6c3830323131"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x40050) r10 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) close_range(r10, 0xffffffffffffffff, 0x100000000000000) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newtfilter={0x44, 0x2c, 0xd27, 0x30bd29, 0x25df9bfb, {0x0, 0x0, 0x0, r6, {0xb, 0x6}, {}, {0x7}}, [@filter_kind_options=@f_flower={{0xb}, {0x14, 0x2, [@TCA_FLOWER_KEY_ENC_IP_TOS_MASK={0x5, 0x51, 0x8}, @TCA_FLOWER_KEY_ENC_IP_TOS={0x5, 0x50, 0x2}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000000000)={0x4, 0x9, 0x9, 0x6, 0x7, "49aa54e33d342283c0a8ec4300926823b0d036"}) r11 = epoll_create(0x80000002) epoll_ctl$EPOLL_CTL_ADD(r11, 0x1, r1, &(0x7f0000000040)={0xf6c447fee59251f4}) close_range(r0, r1, 0x0) 29.295857404s ago: executing program 1 (id=944): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r0, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x18) sendmmsg$inet(r1, &(0x7f0000000780)=[{{&(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac1414aaffffffff0000000010000000000000000000000007"], 0x30}}], 0x1, 0x4008804) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) lchown(0x0, 0x0, 0xee01) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x8000c60) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x602, 0x0) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r4, 0xc0a85320, &(0x7f00000003c0)={{0x80}, 'port0\x00', 0x511e36599023629, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f00000004c0)={{0x80, 0xfc}, 'port1\x00', 0x4c, 0x160040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}) writev(r3, &(0x7f0000000480)=[{&(0x7f0000000040)="93d90400000300", 0x7}], 0x1) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), 0xffffffffffffffff) renameat2(r0, &(0x7f0000000000)='./file1\x00', r3, &(0x7f0000000080)='./file1\x00', 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240), r6) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f00000005c0)={[{@noblock_validity}, {}, {@sysvgroups}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@orlov}, {@nogrpid}, {@noauto_da_alloc}, {@nomblk_io_submit}]}, 0x3, 0x56a, &(0x7f00000015c0)="$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") sync() setxattr$trusted_overlay_upper(0x0, &(0x7f00000001c0), &(0x7f0000001400)=ANY=[], 0x835, 0x0) sendmsg$NL80211_CMD_VENDOR(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001b40)={&(0x7f0000000180)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="a1ab00000000000000003200000008001781"], 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) 28.658773813s ago: executing program 1 (id=956): r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000000)={0x0, 0xcc}, 0x8) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000a00)=ANY=[@ANYRESHEX, @ANYBLOB="0000000000000000b702000014000000b7030000000080008500000083000000bf09000000000000550901000000000095000000ea600000bf91000000000000b7020000000000008500000085000000b7000000040000009574f29fcb3d902700a23f6954d360904a3aa5736c17cf7726b21d1842f6658723149ba80ed7123f8fbbd6193b40412b6bd21f3cc881cd9e775d94f356878cd0", @ANYRESOCT=r0, @ANYBLOB="d6ed1b1fc6d1a3e826fcaa505e7fe9a8cf51c71c38b1ca7a216c0420eb9a217d893ca3e5d0b0baee6cf4f2e4a909f388307e67531ffa3d7334a9b8e7e5eefb1b68393011b445aab6b874ad1b70cee0b752c4367697eaaaa112430b2a6243d51165c0f483549a5087de8cbdaaf5b1c5023a432c3fe2034694b72c94767b3f16d4a3ff94189955a06595f489ba15dfb0f7b06bfda46971f5f52a19a3c7f64facdbfc7eafec87ee9ae0ca9ae943c39a9b9f8b6f339de28971acf3ce30ee75f10f3f5f134ad0cf36c7273ffb041d34defb757ffb6ef187701c26150e576666a220f5dd4442e6ddc6524022a8616c23bb51654cad08359c72e9cb4e9c", @ANYRES16], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000200040010000800014004000000", 0x58}], 0x1) r2 = socket$kcm(0x10, 0x2, 0x4) close(r2) socket$kcm(0x10, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f00000006c0)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@dioread_lock}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@data_err_ignore}, {@acl}, {@max_batch_time={'max_batch_time', 0x3d, 0x7}}, {@user_xattr}, {@bh}, {@errors_remount}]}, 0x1, 0x553, &(0x7f0000001080)="$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") r3 = openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x163042, 0xfc) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x8002, 0x2, 0x8, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) getpid() syz_pidfd_open(0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) 27.676764946s ago: executing program 1 (id=964): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000080b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1, 0x0, 0x6}, 0x18) r3 = syz_clone(0x280, &(0x7f0000000180)="06b1af323e2017d1b631bb83e24a1d2953ab94a8d062d376fe9d0db63a879251a1088d49bc460632ae2c4133323c1af5ea22735eb975788550b77fe7304e94d6478f64016396a86b7907982e12a771b359cf7320cdaf742bd88960548b104561fb16b570e7e6f1e4a07f7893", 0x6c, &(0x7f00000002c0), &(0x7f0000000380), &(0x7f00000003c0)="7092b393c1b1f48db48a2f6309408df2c534d31685747299029e2ca33744a8adc66f703a8e804744557c3fa3d177f710ee528777d8c3bbbbe1c939975209c99cb9163cd5bba4ca88776d939361420e68b57861fb1b908e8517363409f6d9bbafa1c5dd122699a3a331354ad972a70fdb") r4 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newqdisc={0x178, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}, {0xa, 0x1}}, [@qdisc_kind_options=@q_choke={{0xa}, {0x124, 0x2, [@TCA_CHOKE_MAX_P={0x8, 0x3, 0x10000}, @TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x5, 0x8000, 0xfb, 0x1a, 0x19, 0x1d, 0x8}}]}}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}, {0x4}}]}]}, 0x178}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_generic(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x18, 0x1, 0x0, 0x0, {0x2}, [@typed={0x8, 0x800, 0x0, 0x0, @u32=0x4}, @nested={0xc, 0x8, 0x0, 0x1, [@typed={0x8, 0xc, 0x0, 0x0, @uid=r7}]}]}, 0x28}}, 0x0) statx(0xffffffffffffffff, &(0x7f0000000940)='./file0\x00', 0x400, 0x200, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000980)={{0x1, 0x1, 0x18, r1, {0x0}}, './file0\x00'}) getresgid(&(0x7f0000000c40), &(0x7f0000000140), &(0x7f0000000240)=0x0) syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000200)='./file0\x00', 0x10814, &(0x7f0000000700)=ANY=[@ANYBLOB='umask=00000000000000000000000,flush,nodots,dots,gid=', @ANYRESHEX=r10, @ANYBLOB="00006b746769643d0092", @ANYRESDEC, @ANYBLOB="1500bba7d41fabba4332de3ca642acf6f8de847e3f21783608008708a887d30aaf0a14b0691d48445fe3b4d1ddde1b81337b2c3b5f88535d7f6fa931b84783704494cebe49ca9f6269b05edde0246c360d0566b4056f0f02ccab035d3d0a5cde0b31bd424949fe23c0a0a25691738006c5c6acdf101fecdb4f79abdfb95c6afaea03dd5903b5240565f31504c207a9a2aa6c8108fb973081e90412a3c6cfa3b2513693727fad9acd8108acb8b90fab033c9dac0dc3e5a61c513e7b5edc5d76320f0e54045ea2b7b8fb1f78d3d346e26ee5ed6926cea1ffe0a1"], 0x1, 0x1fa, &(0x7f0000000500)="$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") ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000bc0)=0x0) stat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@mcast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000000dc0)=0xe8) statx(0xffffffffffffff9c, &(0x7f0000000e00)='./file0\x00', 0x2000, 0x10, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000f40), 0x4) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000f80)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r17 = syz_io_uring_complete(0x0) sendmsg$unix(r4, &(0x7f0000001100)={&(0x7f00000004c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000540)="8213854e09fc7e3b20137807e3e7940fb785c39652d82cb025a4547036fcb190b35116046b65d2152f9b93dfcc94cccd5557b15f5a28b56c48327e0902cf9ca2320cfec32a97bbf095d9aa3f0b5c31b6edf26c0fda9e475f4b237134fe49acd89072acfc139ebac81034b3dfab4adbf79bd76652b7345126bfcd68da17c537497e7595c70938b9b6e324a30245da6aa26f0bc999c1185924a4ab349c5009bdc8d166b898b95a3536962a361e853d9bd99e58f153b60b44bd118ef2f556f59821bc6ef53a1fbd6e3f27ad2d292a", 0xcd}, {&(0x7f0000000640)="086f4ae5ca166ea8c1dc17edda5794c9ecb3ee7e54ec06392d2986a9b1b2fcbe0d9b32e8a0", 0x25}, {&(0x7f0000000680)="037ee43430ee65deec457b0199bad8520ebcf7e69cfda2163e4a6fbfb558db458ebb2e721c301c33e7d55f06da48857da10f19c5beb0f06073c6784cf7d66f0f409a75f6f7a7ef9e4146ed6276f8e994b85475cbf5f726f1f04f928e7ef29bd3372b39966a9611b9c42964b86c87fa15e2299f30f4b1f67b9b28dba8f83d97994583d64ab1ff1857f46caaabfc777fa43da8d2fa907e55fd56b30448bc54392ce65e771ec888e728fbd4686c3260ac4845e02161f6204ef0fb23fadd93df63226a66f342148fe7353002be607b9310aa6dd59775b0e6effb0c01cbf7b37a707c9e2a22c103de", 0xe6}, {&(0x7f00000008c0)="db14f71237bc6de84ccee6cb8b031e30e8ee5eda5b16395f1a9f6f3cba8eea33a891a3e77dbf68a83aa005bf2dcffaef74f304d0b7cdc2bff6d4630be849c6b315801144f7a270178457f0841f7c13dd20ee01fe7dbc5bff5c6325408612ed646eae3b2b47de08e1e3c5660d947ffefb08d8ceea", 0x74}], 0x4, &(0x7f0000000fc0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="00c3920000000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="14000000000000000100000001000000", @ANYRES32=r1, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r1, @ANYRES32, @ANYBLOB="24000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=r11, @ANYRES32=r12, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=r13, @ANYRES32=r14, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r15, @ANYRES32=r16, @ANYRES32=r17], 0x128, 0x40000}, 0x40000) r18 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000200bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r19 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r19}, 0x10) setitimer(0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='sched_switch\x00', r18}, 0x10) r20 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_user(r20, &(0x7f0000000080)=ANY=[@ANYBLOB='system_u:object_r:auth_cache_t r'], 0x27) 27.027700815s ago: executing program 1 (id=971): prctl$PR_SET_NAME(0xf, &(0x7f0000000300)='\x04\x00\x00\x00\x00^\xf6jAc') r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @dev}, 0x10) close(r1) 26.676227339s ago: executing program 1 (id=974): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f0000000640)=0x13) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='#-/&\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@getstats={0x1c, 0x5e, 0x1, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x1c}, 0x1, 0x0, 0x0, 0x4888}, 0x4000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0xfffffffffffffffd, 0x4}, 0xa000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket(0x18, 0xa, 0x9) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000200)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000340)=0x24) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000380)={r3, 0x1, 0x6, 0xfffffff2}, 0x10) syz_open_dev$usbfs(&(0x7f0000000080), 0x76, 0x109301) prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='\x00') r4 = syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000280)='./file0\x00', 0xc0ed000e, &(0x7f00000002c0)={[{@jqfmt_vfsold}, {@nolazytime}, {@debug}, {@noload}, {@lazytime}, {@oldalloc}, {@lazytime}, {@acl}]}, 0xfe, 0x47d, &(0x7f0000000dc0)="$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") r5 = bpf$PROG_LOAD(0x5, &(0x7f00000193c0)={0x11, 0x13, &(0x7f0000019300)=ANY=[@ANYRESDEC=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000080)='xen_mmu_set_pmd\x00', r5, 0x0, 0x2}, 0x3) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) 26.675678909s ago: executing program 32 (id=974): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f0000000640)=0x13) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='#-/&\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@getstats={0x1c, 0x5e, 0x1, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x1c}, 0x1, 0x0, 0x0, 0x4888}, 0x4000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x2000) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0xfffffffffffffffd, 0x4}, 0xa000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket(0x18, 0xa, 0x9) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000200)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000340)=0x24) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000380)={r3, 0x1, 0x6, 0xfffffff2}, 0x10) syz_open_dev$usbfs(&(0x7f0000000080), 0x76, 0x109301) prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='\x00') r4 = syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000280)='./file0\x00', 0xc0ed000e, &(0x7f00000002c0)={[{@jqfmt_vfsold}, {@nolazytime}, {@debug}, {@noload}, {@lazytime}, {@oldalloc}, {@lazytime}, {@acl}]}, 0xfe, 0x47d, &(0x7f0000000dc0)="$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") r5 = bpf$PROG_LOAD(0x5, &(0x7f00000193c0)={0x11, 0x13, &(0x7f0000019300)=ANY=[@ANYRESDEC=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000080)='xen_mmu_set_pmd\x00', r5, 0x0, 0x2}, 0x3) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000) 4.697654847s ago: executing program 0 (id=1272): prctl$PR_SET_NAME(0xf, &(0x7f0000000180)='wg1\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vxcan0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f0000000640)=""/191, 0xbf, 0x0, &(0x7f00000003c0)=""/49, 0x31}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000004c0)={r2, &(0x7f0000000340), 0x0}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000280)=ANY=[@ANYRES16, @ANYRESHEX=0x0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x77, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000240)={0x0, r5}, 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x16, 0x8, &(0x7f00000009c0)=ANY=[@ANYRES16=r0], &(0x7f0000000000)='syzkaller\x00', 0xffffffff, 0x0, 0x0, 0x5da1de4caf0505a, 0x68, '\x00', r0, @fallback=0x33, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6, 0x0, 0xfffffffff7ffffe9}, 0x18) r8 = socket$inet6(0xa, 0x5, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000700)=ANY=[@ANYRES32=r10, @ANYRESOCT, @ANYBLOB="8fe3a8bc34e2486fe4251a3e56c5b2f189b5047686156b7ef8478fdf1c126f0876fd7db3358b525cde7dc51bdf1a0a22696b18f3dd21aa2ce41e88cac85501e1beb65023c69ead0cb2c6a333febc7c6ffba298e8f873b5af7939e3121dca90c65ca833568fbc3c2dd323425ac2563f2fcc8fa9c4437e79f7b5adea47a2981d3742529a7c8da2d3b84dc624d17a6467bf97604edb867050ad30bda5e3abbf8caba9b3972a2165816d203073b26119407ce0696eab2507d6cc73645842", @ANYRES32=r7], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='kmem_cache_free\x00', r11}, 0x18) setrlimit(0x9, &(0x7f0000000000)) io_setup(0x2004, &(0x7f0000000680)) sendmsg$inet(r8, &(0x7f0000000340)={&(0x7f0000000100)={0x2, 0x4e21, @private=0xa010101}, 0x10, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="17000000000000000000000007000000890704ac1414bb0011000000000000000000000001"], 0x30}, 0x0) r12 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r12, 0x107, 0x5, &(0x7f0000000080)=@req3={0x8000, 0x200, 0x80, 0x20000, 0x0, 0x0, 0x8}, 0x1c) mmap(&(0x7f0000568000/0x2000)=nil, 0x1000000, 0x0, 0x11, r12, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000671000/0x3000)=nil) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r13 = timerfd_create(0x0, 0x0) timerfd_settime(r13, 0x3, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_gettime(r13, &(0x7f0000000040)) 4.560614158s ago: executing program 0 (id=1276): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00', r0}, 0x18) lstat(&(0x7f0000001100)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r2, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x2b, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x9b}, @map_val={0x18, 0x4, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0xa}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xffffffff}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x92a3}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffa}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) creat(&(0x7f00000002c0)='./file0\x00', 0x88) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r6}, 0x18) lsm_get_self_attr(0x67, 0x0, &(0x7f0000000080), 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={0x0}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r7}, &(0x7f0000000180)=0x20000, &(0x7f00000001c0)}, 0x20) socket$packet(0x11, 0x2, 0x300) r8 = syz_open_procfs(0x0, &(0x7f0000000280)='stack\x00') r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r9}, 0x10) preadv(r8, &(0x7f0000000440)=[{&(0x7f00000041c0)=""/4096, 0x1000}], 0x1, 0x1e, 0x20704513) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r10}, 0x4) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r11}, 0x10) r12 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r12, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_ct={0x4c, 0x1, 0x0, 0x0, {{0x7}, {0x24, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0xfdb}}, @TCA_CT_NAT_IPV4_MIN={0x8, 0x9, @local}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4004000}, 0x10000000) read(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000002100)={{0x1, 0x1, 0x18, r5, {0x2}}, './cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) epoll_ctl$EPOLL_CTL_ADD(r13, 0x1, r1, &(0x7f00000001c0)={0x3}) 4.078681995s ago: executing program 0 (id=1280): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000006"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r0}, &(0x7f00000008c0), &(0x7f0000000900)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000180)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c00f0ffffff180e000a001400000002801687121f", 0x75}], 0x1}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = socket(0x400000000010, 0x3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='\v\x00\x00\x00\a\x00\x00\x00\b\x00\x00\x00\b\x00'], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) r6 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x25dfdbfc, {0x0, 0x0, 0x0, r7, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0x3}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=@newtfilter={0x8c, 0x2c, 0xd27, 0x70bd2d, 0x25dfdc00, {0x0, 0x0, 0x0, r7, {0x0, 0x3}, {}, {0x3, 0xffe0}}, [@TCA_RATE={0x6, 0x5, {0x4, 0x1}}, @filter_kind_options=@f_matchall={{0xd}, {0x50, 0x2, [@TCA_MATCHALL_ACT={0x4c, 0x2, [@m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x40, 0x6, 0x10000000, 0xea, 0x100004}, 0x1}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x10}, 0x20048880) sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb010511000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x80) 4.045752885s ago: executing program 0 (id=1282): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0x13}, 0x400, 0xffffffff, 0x6, 0x2, 0x0, 0x1, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000fc0)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000780)=""/133, 0x85}, {&(0x7f00000003c0)=""/99, 0x63}, {&(0x7f0000001bc0)=""/4096, 0x1000}], 0x3, 0x5d5c, 0x3) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000240), &(0x7f0000000280)=r1}, 0x20) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000880)={'ip6tnl0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x29, 0x0, 0x7d, 0x6, 0x58, @loopback, @loopback={0x1000000, 0xffff888101827518}, 0x0, 0x0, 0x80000, 0xfffdfffe}}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e0000000800000000001800038014000380"], 0x44}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000a40)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}]}}) (fail_nth: 3) 3.790239339s ago: executing program 0 (id=1285): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x3c7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffc}, 0x8308, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000012000000000000"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r2, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r3, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=@delchain={0x1c, 0x5f, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x5, 0xf}, {0x0, 0x3}}}, 0x24}}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x3000003, 0x8c4b815a5465c2b1, 0xffffffffffffffff, 0x0) r7 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r7, 0x11b, 0x8, &(0x7f0000003140), &(0x7f0000000040)=0x30) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000080b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r9}, 0x10) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r6, &(0x7f0000000200)='asymmetric\x00', &(0x7f00000002c0)=@chain) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x50, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r11}, 0x10) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x88002, 0x0) r12 = socket$key(0xf, 0x3, 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2010008, &(0x7f00000001c0), 0xff, 0x52e, &(0x7f0000000640)="$eJzs3cFvI1cZAPBvnDib7GabFDhApZZCi7IVrJ00tI04lCIhOFVClPsSEieK4sRR7LSbqILsX4CEECBxggsXJP4AJLQSF44IqRKcQSoCIdiCBAfoINvjJDjjxFuceNf5/aTZeW/GM9/3vHnjGc/TOIAr69mIeC0i3k/T9IWImMmWF7IpDttT83XvPXh7pTklkaZv/DWJJFvW2VeSzW9km01GxFe/HPGN5HTc+v7B5nK1WtnN6uXG1k65vn9we2Nreb2yXtleXFx4eemVpZeW5gfSzpsR8eoX//i9b//kS6/+4jNv/eHOn299s5nWdLb+ZDse0vhZK9tNL16b7Npg9wMGexQ121PsVKb62+beBeYDAEBvzXP8D0XEJyPihZiJsbNPZwEAAIDHUPr56fh3EpHmm+ixHAAAAHiMFFpjYJNCKRsLMB2FQqnUHsP7kbheqNbqjU+v1fa2V9tjZWejWFjbqFbms7HCs1FMmvWFVvm4/mJXfTEinoyI785MteqllVp1ddhffgAAAMAVcaPr+v8fM+3rfwAAAGDEzA47AQAAAODCuf4HAACA0ef6HwAAAEbaV15/vTmlnd+/Xn1zf2+z9ubt1Up9s7S1t1Jaqe3ulNZrtfXWM/u2zttftVbb+Wxs790tNyr1Rrm+f3Bnq7a33bizEZOX0iAAAADglCc/fv93SUQcfm6qNTVNDDsp4FKMH5WSbJ7T+3//RHv+7iUlBVyKsT5e8+61/OXOE+DxNt69oEdfB0ZPcdgJAEOXnLO+5+CdX2fzTww2HwAAYPDmPpZ///+864GIw8IlpAdcIJ0Yrq6u+//pzLASAS5d6/5/vwN5nCzASCn2NQIQGGX/9/3/c6XpQyUEAAAM3HRrSgql7Ou96SgUSqWIm62fBSgmaxvVynxEPBERv50pXmvWF1pbJn2MEQAAAAAAAAAAAAAAAAAAAAAAAAAAovVU7iRSAAAAYKRFFP6U/LL9LP+5meenu78fmEj+1fpJ4ImIeOuHb3z/7nKjsbvQXP63o+WNH2TLXxzGNxgAAABAt851emv+z2FnAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMCoee/B2yudqY+XTw0q7l++EBGzefHHY7I1n4xiRFz/exLjJ7ZLImJsAPEP70XER/PiJ820jkLmxR/Em3BO/JjN3oW8+DcGEB+usvvN489ref2vEM+25vn9bzzif+ofVO/jXxwd/8Z69P+bfcZ46p2flXvGvxfx1Hj+8acTP+kR/7k+43/9awcHvdalP4qY63z+tI54JyMcl8qNrZ1yff/g9sbW8nplvbK9uLjw8tIrSy8tzZfXNqqV7N/cGN95+ufvn9X+67mff0mWTe/2P5+zv7zPpP+8c/fBhzuVw9Pxbz2XE/9XP85ecTp+IYvzqazcXD/XKR+2yyc989PfPHNW+1eP2198mP//W7122u1UR3m63z8dAOAC1PcPNper1cruyBaaV+mPQBoKj2DhWwPdYZqmabNP5ay6HxH97CeJAbe0kJ/PcaHnEWDYRyYAAGDQjk/6h50JAAAAAAAAAAAAAAAAAAAAXF2X8ZS17pjHj0BOBvEIbQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAgfhvAAAA//89e9P5") sendmsg$key(r12, &(0x7f0000000400)={0x10000000, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="020e0080150000000000000000000000030005000000000002004e24ac1e00010000000000000000030006003c000000020000fc34000000000000000000000001001800000000000800120000000200fcffffff000000000600330000000000000000000000eafffd8000000000000000000000000000aa000000000000000000000000000000000400"], 0xa8}}, 0x2) 3.72012005s ago: executing program 0 (id=1288): socket$packet(0x11, 0x3, 0x300) (async) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) (async) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) (async) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) (async) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) select(0x40, &(0x7f0000000240)={0x3, 0x5, 0xb96, 0x1, 0x1, 0x9, 0x6, 0x400}, 0x0, &(0x7f0000000340)={0xa, 0x2536, 0xffffffffffff0001, 0x9, 0x1, 0x29e, 0x10000, 0x8}, &(0x7f0000000380)={0x0, 0x2710}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000940)={[{@bsdgroups}, {@nodiscard}, {@noblock_validity}, {@grpjquota}, {@grpjquota}, {@noquota}, {@abort}, {@noload}, {@nodiscard}]}, 0x64, 0x50a, &(0x7f0000000200)="$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") (async) r5 = syz_open_dev$usbfs(&(0x7f0000000000), 0x1ff, 0x402) r6 = dup(r5) ioctl$USBDEVFS_CONTROL(r6, 0xc0185500, &(0x7f0000000240)={0x23, 0x1, 0x12, 0x1, 0x0, 0x40, 0x0}) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000840)={r6, r6, 0x13, 0x0, @val=@kprobe_multi=@syms={0x0, 0x3, &(0x7f0000000800)=[&(0x7f0000000740)='/\x00', &(0x7f0000000780)='\x00', &(0x7f00000007c0)='\x00'], 0x0, 0xffffffffffffb41a}}, 0x30) 2.035016812s ago: executing program 5 (id=1316): mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) read$watch_queue(r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000540)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000100), 0xd79, 0x2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = dup(r4) fsetxattr$security_selinux(r5, &(0x7f0000000000), &(0x7f0000000040)='system_u:object_r:mouse_device_t:s0\x00', 0x20, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x2) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000001040)) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f00000023c0)={@rand_addr, @multicast2}, &(0x7f0000002400)=0xc) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, &(0x7f0000002440), &(0x7f0000002480)=0x4) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000002dc0)={'wg2\x00'}) r6 = syz_open_dev$loop(&(0x7f0000000000), 0x4, 0x321a40) ioctl$LOOP_CONFIGURE(r2, 0x4c0a, &(0x7f0000000140)={r6, 0x9, {0x0, 0x0, 0x0, 0x0, 0x69f9, 0x0, 0x12, 0x19, 0x0, "b8f27f0cd7970a4ddfa76fa06c199ae486819c85e904ab9c68495880d6eabb9c9f7949b08d2227b6b5ad08a17288b646828ddb9fa5c16681df2b2939d122f54e", "331a90f020e9eeb33e26127e74e31beb9686c15252d576c778ba2743e70425d25a57dda979944067b2229f7b3feab01f8c9d7e8ac7dadcc77548da9727dbf0b2", "c07a83c05113257ec52ea6d8a4c769f3532145a4963ee4eb03807fe3087960c4", [0x7, 0x8]}}) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, 0x0) r7 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$SO_BINDTODEVICE_wg(r7, 0x1, 0x19, &(0x7f0000000240)='wg2\x00', 0x4) setsockopt$IP6T_SO_SET_REPLACE(r7, 0x29, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x3c1, 0x3, 0x490, 0x0, 0x150, 0x150, 0x0, 0xf8010000, 0x3c0, 0x238, 0x238, 0x3c0, 0x238, 0x3, 0x0, {[{{@ipv6={@private0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, [0x0, 0x0, 0xffffff00], [], 'bond_slave_1\x00', 'veth0_to_team\x00', {0xff}, {}, 0x84}, 0x0, 0x248, 0x2b0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'batadv0\x00', {0x0, 0x0, 0x4, 0x0, 0x5e96, 0x1, 0x4}}}, @common=@inet=@sctp={{0x148}, {[], [0x4e23], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], 0x0, [], 0x3, 0x0, 0x3}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x4000000, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}, {{@ipv6={@dev={0xfe, 0x80, '\x00', 0x11}, @mcast1, [0x0, 0xff000000, 0x0, 0xff000000], [], 'batadv_slave_0\x00', 'gre0\x00'}, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x1, 0x2, 0x1, 0x9, '\x00', 'syz1\x00', {0x3}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4f0) socket$nl_route(0x10, 0x3, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000020a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f6873720000000058000000160a0101000b000000000000010000000900020073797a32000000000900010073797a30000000002c0003"], 0xf8}, 0x1, 0x0, 0x0, 0xc000}, 0x40) socket$inet6(0xa, 0x1, 0x1) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0xfffffffffffffde1, 0x31, 0x1, 0xfffffffd, 0x25dfdbfb, {0x0, 0x0, 0x11}, [{0x34, 0x1, [@m_police={0x30, 0x1, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc, 0x3, {0x1}}, {0xc}}}, @m_sample={0x0, 0x4, 0x0, 0x0, {{}, {0x0, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PSAMPLE_GROUP={0x0, 0x5, 0x3}, @TCA_SAMPLE_RATE={0x0, 0x3, 0x4}, @TCA_SAMPLE_PARMS={0x0, 0x2, {0xfffffff8, 0x3b9d, 0x0, 0x4, 0x8}}, @TCA_SAMPLE_PSAMPLE_GROUP={0x0, 0x5, 0x8}, @TCA_SAMPLE_PSAMPLE_GROUP={0x0, 0x5, 0x4}, @TCA_SAMPLE_TRUNC_SIZE={0x0, 0x4, 0x8}]}, {0x0, 0x6, "21fa70307f79ca57f57ecdc6ebfc12b17735319fdbfa75abeee38d46aac6b3d9afd9f4041158f70615ea6c78be3a8fd5dad7ed888a8509dd62ca9db0208b2a148c8f1e78632c4fc5281ed80cf53202de96675e0ca565"}, {0x0, 0x7, {0x1}}, {0x0, 0x8, {0x0, 0x1}}}}, @m_sample={0x0, 0x0, 0x0, 0x0, {{}, {0x0, 0x2, 0x0, 0x1, [@TCA_SAMPLE_RATE={0x0, 0x3, 0x2}, @TCA_SAMPLE_PSAMPLE_GROUP={0x0, 0x5, 0x6}, @TCA_SAMPLE_RATE, @TCA_SAMPLE_PSAMPLE_GROUP={0x0, 0x5, 0x4}, @TCA_SAMPLE_RATE={0x0, 0x3, 0x1}, @TCA_SAMPLE_TRUNC_SIZE={0x0, 0x4, 0x1}, @TCA_SAMPLE_RATE={0x0, 0x3, 0x10}]}, {0x0, 0x6, "5212c958b4f24cc19aacc78ffdb8d4dce0dbb8aefba78d8ad3389d279e1c58e604fb2b7448def289715c1a0e4a4df343e4aef0854bd0820c1c429da8bffd15d0ac28c1d87169e8a7bac5e88194cdce2b51ce3775f090d422668597273e8a4f3893a1593f1500d9387657edea154372fb7c97cd53bda17d55c44a65befa65c5ed3cbb481f8bc04da74a921db3515258540f294912eeb12e"}, {}, {0x0, 0x8, {0x2, 0x3}}}}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x8800}, 0x0) 1.985227683s ago: executing program 5 (id=1318): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0xc, &(0x7f0000000480)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000002540), 0x2, 0x0) r4 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r4, &(0x7f0000003540)=[{{&(0x7f0000000000)={0x2, 0xfffc, @rand_addr=0x64010100}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000180)="e1", 0x1}], 0x1}}, {{&(0x7f0000000140)={0x2, 0x4e22, @private=0xa010101}, 0x10, &(0x7f0000003040)=[{&(0x7f00000007c0)='_', 0x1}], 0x1}}], 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000080), &(0x7f0000000100)=0x4) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f00000001c0)={0x2, 0xfff, 0x204, 0x5, 0x104, 0x80, 0x8000, 0x7, r1}, 0x20) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1a, 0x10, &(0x7f0000000b00)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b6dcc95d42db9eb38a100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000080000ff03230000b13a0173d4b841b7999c00d2bedd44ae290003a848b3d0d124e4de53876e80ba3095299b", @ANYRES32=r5, @ANYBLOB="0000000004000000b70300000e000040850000008c0000009594795ec937219ec493c507fe1d74afd63e71023a9976eba6e1f4b8dc71a904b5c9f5dcf7b09f8a343f0e3a841a26f19d5c745c1f9aec803632d9dbe319a064de2ca99a3e9ed8efb7c91cf761e6b1b58d1bfc1cfadfb92394339a27a805560a096ee8801ca67a99eea9c254e658a1e7125f02cb6a23905334422b3070ca6374e69ff8a2b4517f58d168c5e55d72c5b537b2bcdfd771de077bb7caf3e691203a1bdd3bed94bfcf79819a9c1f9c95d350ac8cdd5398"], &(0x7f0000000600)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x11, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='kfree\x00', r6}, 0x18) r7 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r7, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@dev, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@private}, 0x0, @in=@local}}, &(0x7f0000000440)=0xe8) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x21081e, &(0x7f0000000580)={[], [{@smackfsroot={'smackfsroot', 0x3d, '\',O'}}, {@fowner_gt={'fowner>', r8}}, {@hash}]}, 0x1, 0x4f2, &(0x7f0000000600)="$eJzs3U1vG1sZAODXzpeTm97kXu4CENBSCgVVdRK3jaouoKwQQpUQXYLUhsSNothxFDulCV2k/wGJSqxgyQ9g3RV7Ngh2bMoCiY8I1FRiYTTjSeomdpOSNI7i55FGM+eMM+85ieec+nXtE0DfuhQRWxExHBEPI2Iiq89lW9xtbcnjXm0/nd/Zfjqfi2bz/j9z6fmkLtp+JvFRds1CRPzoexE/zR2MW9/YXJ6rVMprWXmqUV2dqm9sXl+qzi2WF8srpdLszOz07Ru3SifW14vV4ezoyy//sPWtnyfNGs9q2vtxklpdH9qLE9nv/AcfIlgPDETEYPb8yVzoZXt4P/mI+DQiLqf3/0QMpH9NAOA8azYnojnRXgYAzrt8mgPL5YtZLmA88vlisZXD+yzG8pVavXHtUW19ZaGVK5uMofyjpUp5OssVTsZQLinPpMdvyqV95RsR8UlE/GJkNC0X52uVhV7+wwcA+thH++b//4y05n8A4Jwr9LoBAMCpM/8DQP8x/wNA/zH/A0D/Mf8DQP8x/wNA/zH/A0Bf+eG9e8nW3Mm+/3rh8cb6cu3x9YVyfblYXZ8vztfWVouLtdpi+p091cOuV6nVVmduxvqTyW+v1htT9Y3NB9Xa+krjQfq93g/KQ6fSKwDgXT65+OLPuYjYujOabtG2loO5Gs63fK8bAPTMQK8bAPSM1b6gfx3jNb70AJwTHZbofUshIkb3VzabzeaHaxLwgV39gvw/9Ku2/L//BQx9Rv4f+lfX/P+BF/vAedNs5o665n8c9YEAwNkmxw90ef//02z/2+zNgZ8s7H/E8/0VPlEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABA/9hd/7eYrdwxHvl8sRhxISImYyj3aKlSno6IjyPiTyNDI0l5psdtBgCOK/+3XLb+19WJK+P7zw7nXo+k+4j42a/u//LJXKOx9sek/l979Y3nWX2pF+0HAA6zO0+n+7YX8q+2n87vbqfZnr9/NyIKrfg728Oxsxd/MAbTfSGGImLs37ms3JJry10cx9aziPh8p/7nYjzNgbRWPt0fP4l94VTj59+Kn0/PtfbJ7+JzJ9AW6DcvkvHnbqf7Lx+X0n3n+7+QjlDHl41/yaXmd9Ix8E383fFvoMv4d+moMW7+/vuto9GD555FfHEwYjf2Ttv4sxs/1yX+lYOX6+gvX/rK5W7nmr+OuBqd47fHmmpUV6fqG5vXl6pzi+XF8kqpNDszO337xq3SVJqjnuo+G/zjzrWPu51L+j/WJX7hkP5//Wjdj9/89+GPv/qO+N/8Wqf4+fjsHfGTOfEbR4w/N/a7QrdzSfyFLv0/7O9/7YjxX/5188Cy4QBA79Q3NpfnKpXymgMHZ/8gecqegWZ0PPjOacUajvf6qWbz/4rVbcQ4iawbcBbs3fQR8brXjQEAAAAAAAAAAAAAADo6jU8s9bqPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAnF//CwAA//8wuNJ1") 1.809458376s ago: executing program 5 (id=1320): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r0, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x18) sendmmsg$inet(r1, &(0x7f0000000780)=[{{&(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac1414aaffffffff0000000010000000000000000000000007"], 0x30}}], 0x1, 0x4008804) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) lchown(0x0, 0x0, 0xee01) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x8000c60) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x602, 0x0) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r4, 0xc0a85320, &(0x7f00000003c0)={{0x80}, 'port0\x00', 0x511e36599023629, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f00000004c0)={{0x80, 0xfc}, 'port1\x00', 0x4c, 0x160040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}) writev(r3, &(0x7f0000000480)=[{&(0x7f0000000040)}, {&(0x7f00000004c0)="f098d9fbd915e7", 0x7}], 0x2) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), 0xffffffffffffffff) renameat2(r0, &(0x7f0000000000)='./file1\x00', r3, &(0x7f0000000080)='./file1\x00', 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240), r6) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f00000005c0)={[{@noblock_validity}, {}, {@sysvgroups}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@orlov}, {@nogrpid}, {@noauto_da_alloc}, {@nomblk_io_submit}]}, 0x3, 0x56a, &(0x7f00000015c0)="$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") sync() setxattr$trusted_overlay_upper(0x0, &(0x7f00000001c0), &(0x7f0000001400)=ANY=[], 0x835, 0x0) sendmsg$NL80211_CMD_VENDOR(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001b40)={&(0x7f0000000180)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="a1ab00000000000000003200000008001781"], 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) 1.452030811s ago: executing program 4 (id=1328): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) iopl(0x3) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x4001) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1000000004000000040000000200000000000000", @ANYRESOCT=r1, @ANYRESDEC=r0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000040000000000000000000000ac86945fcfdf7fdd0000000000"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r3}, &(0x7f0000000a00), &(0x7f0000000a40)=r2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x19, 0x0, 0x41000, 0x18, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0e00000004000000040000000900000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYRESDEC], 0x50) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x22081) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r5, 0xc0505405, &(0x7f00000002c0)={{0x1, 0x2, 0x2, 0x0, 0x5}, 0x8, 0xd, 0x8}) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1000, &(0x7f0000000600)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r6, &(0x7f00000000c0)={0x7, 0x4, 0xfa00, {r7, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_SET_OPTION(r6, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000200), r7, 0x0, 0x2, 0x4}}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r8}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x18) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000006b80)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f0000000340)={0xa, 0x4e24, 0x76, @remote}, 0x1c, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="e8020000000000002900000004000000005a"], 0x2ee}}], 0x2, 0x40040c5) bind$bt_hci(r0, &(0x7f0000000140)={0x1f, 0xffff, 0x2}, 0x6) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000a00), 0x2, 0x0) r9 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000007c0)=ANY=[@ANYBLOB="4400000010003b0c000000002000000000000000", @ANYRES32=0x0, @ANYBLOB="0000000006100000240012800b00010067656e65766500001400028005000d00030000000800010000000000"], 0x44}}, 0x0) bind$bt_hci(r9, &(0x7f0000000000)={0x1f, 0xffff, 0x3}, 0x6) 1.445581171s ago: executing program 5 (id=1329): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="17000000000000001118590d256e82a9dd0d9bf3740485eb66a3909fc7a49aca3d1af4eab29a873378f6ff96e1dffe42ecd0af1ecd6ff556dc38cbd5c1aff8eefd8abb7b40511b4f4db94e83cb3d0bed11f5b5b4f1112bfbd1d437098fc91659f07dce9d94f11c60b4ea9158e55331d37958accd9fb22fb661cba5991406117fc1a3e515428dbd824834bab165b91af90b5c46c55f3a33cdc117b416d9293d389a92971b5a5974699db9f5c5fa", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x8004, &(0x7f0000000080)={[{@discard}, {@journal_dev={'journal_dev', 0x3d, 0x9b}}, {@nobarrier}]}, 0x1, 0x7b9, &(0x7f00000007c0)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143042, 0x0) pwritev2(r1, &(0x7f00000006c0)=[{&(0x7f0000000080)='7', 0x1}], 0x1, 0x6e45, 0x80, 0x0) statfs(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)=""/25) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000010c0)) prctl$PR_SET_SECCOMP(0x3d, 0x1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r3}, 0x3d) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mount$cgroup(0x0, &(0x7f0000000600)='.\x00', &(0x7f0000000640), 0x2008000, &(0x7f0000000a00)={[{@favordynmods}]}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r4}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = creat(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r5, 0xc0189379, &(0x7f0000000380)={{0x1, 0x1, 0x18, r0}, './cgroup.cpu/cpuset.cpus\x00'}) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x2200c12, &(0x7f0000001180)=ANY=[], 0x1, 0x9fb, &(0x7f0000001280)="$eJzs3ctvXNd9B/Dv5UOiaUOSbdV1BdsayZVM2yxFUrVUwYtWIkcSXT4KkgIsdGG5FlUIYuvWagHbKFAZKLqq0QINskh2RlZZGfAm3gTeJbtklUWAwP+CkZWABGBw7wzJoTjkkApF0vLnQ8zMffzuOb/7PJjhzD3h22Xp8JqxpaXq8ZDj1368Cxmzj10a//qzzz8tH5/cy4F0543iJ0lfklrSk+T5pHdsfHZmqkNBd5IbSb5KiiQH03jdkhsp/jdPrY5/leKHZb0bOrDVkulkie+0vT7+AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABgPyrGxoeHR4oDmZi+9natIamtMzY+O1NkaWn9nOVlGr6sev0uvuxYb1KUj/T1LXf1/fzR1dnPJamdzAuNsReqDsnTl4+ffO7Im8/2dC0vv1E2f5SDWy/27kcf33l3cXHhg0eSyP53pT49MTczMXXxSr02MTdTu3Du3PCZq5fnapcnJutz1+fm61O1sdn6xfmZ2drA2Ku1kQsXztbqQ9dnrk1fGR+arC9PPP8Xo8PD52pvDf1d/eLs3Mz0mbeG5sauTkxOTkxfqWLK2WXM+fJA/NuJ+dp8/eJUrXbr9uLC2Qdy6q6OrpYJZdBIpzUpg0Y7BY0Oj46OjIyOjnzS7D17ZcK5Ny68cX54uGf4AVkX8YgOWvaXJzbezTt/EYeH1NVo/5PJTGQ61/J2DqTW5m8s45nNTH53rlxs/fym5fb/1Jn6pvW2tv/NVr6nZfax8ulkXmqO9m3Q/rfNdDf/7uajfJw7eTeLWcxCPtjzjHb370rqmc5E5jKTiUzlYjWl1pxSy4Wcy7kM551czfHMpZbLmchk6pnL9cxlPvVMVUfXbOq5mPnMZDa1DGQsr6aWkVzIhZxNLfUM5Xpmci3TuZLxXKxKuZXb1XY/u0mOK0EjWwka3SRoXWO+7fa/PCl2tR1i39nxazg8rKVm+3+gc+jA2G4kBAAAAOy4P/t5Dh195me/SYq8WH0uf3lisj6812kBAAAAO6j6ut4L5UtvOfRiCu//AQAA4HFTVL+xK5L053hjaPmXUD4EAAAAgMdE9f//l1IcX53g/T8AAAA8ZjrfY79jRDG4fPvf2s3G681mRGOs6L88MVkfGpuZfHMkp6u7DFS/NFhXWndS9FY/P3gtJxpRJ/obr/2rJZZ19pVRI0NvjuS1nGyuyMDL5cvLA20iRxuRrzQiX2mN7M6ayLNlJAA87k5u0h5vtf1/LYONiMFjVZPfc6xNGzysZQWA/eJk7jaHml2atWn/m73wvLRR+/+Xm7z/LyOeya3jja8UDOW9vJ/F3Mxgmt84ON6u1OXeCBpfQxjs8GlAf/MrC78835XBdZ8H9K2sa2vsQkYz2PYTgZZyi/St2VjdO7zxAWCPnNy0Hd5a+z/Y4f3/apt7cI/WEgBotdKD/SMc2Ot1BADW0koDAAAAAAAAAAAAAAAAAAAAAAAAAADAztvSDfx/cTpZXFxIdqGzgJWBvu1kuPlAVzaJ+f3urM7uDHQn2ava/zrbXqrcx/tl0xlYO7DHFyYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB2RZF0t5velRxMMpzkzO5n9ejc2+sEdkrt4RYr7ud+PsyhnU4HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOC7rnn//640Xp9sTEpPV3IqyY0kf7/XOe6k+3udwJ75p+q55f7/XUlvlor0NHZ7it6x8dmZqXL3FwfL+V9/9vmn5aNz2et7VSgLKGtY07lEs4aWKb1rl3q6Wqp/fOHunX97/19q45eqA/PS/OXJ8akrs3+zGvhc8UWjC4RasTpxOd//OPXT/2sp9ECz8i/KNW3vwXovV/WOr6/3T9stvUG9W3B7cWG0rGm+/vb8v//z7Q9bZj2TE8nLA8nA2pr+sXxsUNOJB7fnWsU3xX8Xh/L93Kj2f7k1iqWi3EWHq/V/4tbtxYWh995fvLmS03+uyelIjie5mfRtPafjKTbKpzrqunrLWoeroPLpaIfyNtVS4sgG2/Xp6rDp39Y61DZeh0qH7d7M6GzbjP7/X5/N6W3v6dMdamyr+Kb4dXE1v8p/tfT/0VXu/1Npe3a2KaKKbDlSWuetOb26GpHVmo+2znjnwTI3PCtXPNExgq36n/xD/mpl/3e1XP+b+2p3rkctNbY/L5Ltnxc/OryuRVlVtUhHH2iRmlefjZZp5nm0EbVBnn+S15OeY9u6orze4YryqM7/HxQD+W3u6f8HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADY/4qku930ruRUkiNJDpfjtWTpwZh7D1FfV3/xMGnumIfJ+dun2HBFi/u5nw9zaLczAgAAAAAAAODRuDT+9Weff1o+qv/Hd+fPu5pzaklPkiPF93rHxmdnpjoU1JvcWP6Xft/2crhRPj21Ov5VOfZ8h4X29usDAPCt9ocAAAD//1fHbe0=") rename(&(0x7f0000000000)='./cgroup.cpu/cpuset.cpus\x00', 0x0) r6 = open(&(0x7f00000001c0)='.\x00', 0x0, 0x0) getdents(r6, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000003800000038000000040000000000000000000002"], 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) 1.401889891s ago: executing program 4 (id=1331): r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x2, @perf_bp={0x0, 0xa}, 0x1000, 0x5dd8, 0x0, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ptrace$getregs(0xc, r0, 0x280, &(0x7f0000001400)=""/173) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x7, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bc8900000000000035090100000000009500000000000000b7080000000000007b9a00fe00000000b509000000000000c3aaf0fff1000000bf8600000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018220000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7050000080000004608ebff76000000bf9800000000000056080000000000008500000000000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.400912241s ago: executing program 3 (id=1332): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket(0x10, 0x3, 0x0) sendto$inet6(r2, &(0x7f0000000100)="c10e000018001f06b9409b0dffff110d0207be040205060506100a044300040018000000fac8388827a685a168d9a44604094565360c648dcaaf6c26c291214549932fde4a460c89b6ec0cff3959547f509058ba86c902fc3a10004a320c0400160012000a00000000000000000000080756ede4ccbe5880", 0xec1, 0x0, 0x0, 0x9e5e111c47e3504f) (fail_nth: 3) 968.388427ms ago: executing program 4 (id=1335): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0xa3500, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x10) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) (fail_nth: 5) 968.157187ms ago: executing program 3 (id=1336): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000000340)=0xfffffffffffffff9, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x11, 0x64, &(0x7f0000000100)=[@in={0x2, 0x8, @loopback}, @in6={0xa, 0x0, 0x3, @private0}], 0x2c) 967.769917ms ago: executing program 4 (id=1337): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000006c0f00000a"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='mm_page_alloc\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x7, 0x0, 0x0, 0x0, 0x40008, 0x590, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x4c58, 0x1, 0x0, 0x0, 0x8, 0x4ac, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000003, 0x13, r2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r4}, 0x10) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) accept4$inet(r5, 0x0, &(0x7f0000000180), 0x800) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000c00000009"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xd, &(0x7f0000000280)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x401}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x24, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r7) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2d, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r7, 0x40047451, &(0x7f0000000180)) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r9}, 0x2c, {'wfdno', 0x3d, r10}, 0x2c, {[{@version_u}]}}) 967.132297ms ago: executing program 3 (id=1338): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r0, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) r1 = socket$inet_udp(0x2, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmmsg$inet(r1, &(0x7f0000000780)=[{{&(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac1414aaffffffff0000000010000000000000000000"], 0x30}}], 0x1, 0x4008804) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) lchown(0x0, 0x0, 0xee01) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x8000c60) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x602, 0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r3, 0xc0a85320, &(0x7f00000003c0)={{0x80}, 'port0\x00', 0x511e36599023629, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f00000004c0)={{0x80, 0xfc}, 'port1\x00', 0x4c, 0x160040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}) writev(r2, &(0x7f0000000480)=[{&(0x7f0000000040)="93d90400000300", 0x7}, {&(0x7f00000004c0)="f098d9fbd915e7", 0x7}], 0x2) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), 0xffffffffffffffff) renameat2(r0, &(0x7f0000000000)='./file1\x00', r2, &(0x7f0000000080)='./file1\x00', 0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240), r5) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f00000005c0)={[{@noblock_validity}, {}, {@sysvgroups}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@orlov}, {@nogrpid}, {@noauto_da_alloc}, {@nomblk_io_submit}]}, 0x3, 0x56a, &(0x7f00000015c0)="$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") sync() setxattr$trusted_overlay_upper(0x0, &(0x7f00000001c0), &(0x7f0000001400)=ANY=[], 0x835, 0x0) sendmsg$NL80211_CMD_VENDOR(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001b40)={&(0x7f0000000180)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="a1ab00000000000000003200000008001781"], 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) 690.249541ms ago: executing program 5 (id=1339): sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000008c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x42}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) bind$bt_hci(r3, &(0x7f0000000140)={0x1f, 0xffff, 0x2}, 0x6) bind$bt_hci(r2, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r4 = syz_io_uring_setup(0x10d, &(0x7f0000000980)={0x0, 0x5885, 0x80, 0x10000000}, &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x4004, @fd_index=0x3, 0x0, 0x0}) io_uring_enter(r4, 0x3516, 0x0, 0x0, 0x0, 0x0) 687.422201ms ago: executing program 4 (id=1340): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r0, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x18) sendmmsg$inet(r1, &(0x7f0000000780)=[{{&(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac1414aaffffffff0000000010000000000000000000000007"], 0x30}}], 0x1, 0x4008804) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) lchown(0x0, 0x0, 0xee01) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x8000c60) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x602, 0x0) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r4, 0xc0a85320, &(0x7f00000003c0)={{0x80}, 'port0\x00', 0x511e36599023629, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f00000004c0)={{0x80, 0xfc}, 'port1\x00', 0x4c, 0x160040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}) writev(r3, &(0x7f0000000480)=[{&(0x7f0000000040)="93d90400", 0x4}, {&(0x7f00000004c0)="f098d9fbd915e7", 0x7}], 0x2) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), 0xffffffffffffffff) renameat2(r0, &(0x7f0000000000)='./file1\x00', r3, &(0x7f0000000080)='./file1\x00', 0x1) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240), r6) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f00000005c0)={[{@noblock_validity}, {}, {@sysvgroups}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@orlov}, {@nogrpid}, {@noauto_da_alloc}, {@nomblk_io_submit}]}, 0x3, 0x56a, &(0x7f00000015c0)="$eJzs3c9rHFUcAPDvbJL+1qZQinqQQA9WajdN4o8KQutRtFjQe12SaSjZdEt2U5pYaHuwFy9SBBEL4h/g3WPxH/CvKGihSAl68BKZzWy7TbL5uXW3zucD0743M5s3b998335nZ5cNoLBGsn9KEa9GxDdJxOG2bYORbxxZ2W/p8Y3JbEliefmzP5NI8nWt/ZP8/4N55ZWI+PWriJOlte3WFxZnKtVqOpfXRxuzV0frC4unLs9WptPp9Mr4xMSZdybG33/v3a719c0Lf3//6f2Pznx9fOm7nx8euZvEuTiUb2vvxy7caq+MxEj+nAzFuVU7jnWhsX6S9PoA2JGBPM6HIpsDDsdAHvXA/9/NiFgGCioR/1BQrTygdW3fpevgF8ajD1cugNb2f3DlvZHY17w2OrCUPHNllF3vDneh/ayNX/64dzdbYpP3IW52oT2Allu3I+L04ODa+S/J57+dO91883hjq9so2usP9NL9LP95a738p/Qk/4l18p+D68TuTmwe/6WHXWimoyz/+2Dd/PfJ1DU8kNdeauZ8Q8mly9X0dES8HBEnYmhvVt/ofs6ZpQfLnba153/ZkrXfygXz43g4uPfZx0xVGpXd9Lndo9sRrz3Nf5NYM//va+a6q8c/ez4ubLGNY+m91ztt27z/7bqfAS//FPHGuuP/9I5WsvH9ydHm+TDaOivW+uvOsd86tb+9/ndfNv4HNu7/cNJ+v7a+/TZ+3PdP2mnbTs//PcnnzfKefN31SqMxNxaxJ/lk7frxp49t1Vv7Z/0/cXzj+W+9839/RHyxxf7fOXqn4679MP5T2xr/7RcefPzlD53a39r4v90sncjXbGX+2+oB7ua5AwAAAAAAgH5TiohDkZTKT8qlUrm88vmOo3GgVK3VGycv1eavTEXzu7LDMVRq3ek+3PZ5iLH887Ct+viq+kREHImIbwf2N+vlyVp1qtedBwAAAAAAAAAAAAAAAAAAgD5xsMP3/zO/D/T66IDnzk9+Q3FtGv/d+KUnoC95/YfiEv9QXOIfikv8Q3GJfygu8Q/FJf6huMQ/AAAAAAAAAAAAAAAAAAAAAAAAAAAAdNWF8+ezZXnp8Y3JrD51bWF+pnbt1FRanynPzk+WJ2tzV8vTtdp0NS1P1mY3+3vVWu3q2HjMXx9tpPXGaH1h8eJsbf5K4+Ll2cp0ejEd+k96BQAAAAAAAAAAAAAAAAAAAC+W+sLiTKVaTecUOhbORl8cxo4LyWajfDY/GXbUxGDvO6jwHAo9npgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoM2/AQAA///fKTPH") sync() setxattr$trusted_overlay_upper(0x0, &(0x7f00000001c0), &(0x7f0000001400)=ANY=[], 0x835, 0x0) sendmsg$NL80211_CMD_VENDOR(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001b40)={&(0x7f0000000180)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="a1ab00000000000000003200000008001781"], 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) 686.603051ms ago: executing program 5 (id=1341): syz_io_uring_setup(0x7da1, &(0x7f0000000180)={0x0, 0xfffffffd, 0x8000, 0xfffffffe, 0x10a}, &(0x7f0000000000), &(0x7f0000000000)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kmem_cache_free\x00', r2, 0x0, 0xf7}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000240)=0x2, 0x4) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080), 0x1c0002, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x2000410, &(0x7f00000000c0), 0x7f, 0x7a5, &(0x7f0000000f80)="$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") r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143042, 0x0) pwritev2(r3, &(0x7f0000000100)=[{&(0x7f0000000380)="ff1d61752d53ecdad75c71d52f58a842b0096d1cec2a99b72116238d541b2c7ed0000000000000412eb2c84208bba919bffc71cb47e5c973c9a8ea931367b7e1eb482c77fcedb55032adb91f64aad2c605a3790cd9134137e57c2a9b09ffe6dfce619e1b7f0300000000000000db37d0cfe3ee83c402d1b25444c396be18bab666eb600ba57eda28e7c841b761b76d", 0x8f}], 0x1, 0x5c12, 0x0, 0x0) sendfile(r3, r3, 0x0, 0x7a680000) 539.516183ms ago: executing program 3 (id=1342): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000000340)=0xfffffffffffffff9, 0x4) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="3400000021000100000000000000000002000000faff000000000000080018004e"], 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="240000001d00070f000200000000000007000000", @ANYRES32=r2, @ANYBLOB='\x00\x00w\x00\b\x00\b'], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000100)=[@in={0x2, 0x8, @loopback}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x35}}], 0x20) 253.144827ms ago: executing program 2 (id=1345): getsockopt$inet_mptcp_buf(0xffffffffffffffff, 0x11c, 0x2, &(0x7f0000000000)=""/245, &(0x7f0000000100)=0xf5) vmsplice(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="e9", 0x1}], 0x1, 0x1) socket$inet6(0xa, 0x800000000000002, 0x0) r0 = syz_open_dev$rtc(&(0x7f0000000140), 0x0, 0x0) socket$isdn(0x22, 0x3, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0}, 0x18) r1 = socket$kcm(0xa, 0x1, 0x106) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="8b82b1a169d1e4058eee230f2133c245a061ae28da2588c0a0cd70de13ef2dc902e20b99bbc9a86001c459ff8c064ef5a3d133552d465950caa64ed5fc7fca14d4e270b2a7d8c8e6616949356caeba140600a41f2d601b4f360b575a55a69f145e1c8afcb42e2dfe6f0c28037a3dfa54391dbbd56a50110a4468a9959a191b39ce6ad3dd979b3d6248", @ANYRES16, @ANYBLOB="fce385f9256fb13bb41371a431667cf8fc270d4496065dce6b253717246c70b1ca63561b015f68862c6b21c9ce5a74ec5f09431de490cad892e5cb1b8c28bea6cc755e4918ce3b0e9dbb3da5b6f3ba87a4dd4106f927e111e7d633524ffa0269edcc44a52bb5e5bbfbea4742309bb1853366fe5657c1e730ae59ac884643ed33de0a6ea2e815048d4ff0f2dcd4107ac50c3ba8f796781c87801c003f80749f"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) fcntl$lock(r1, 0x7, &(0x7f0000000200)={0x1, 0x2, 0x7fff, 0x8, 0xffffffffffffffff}) close(r1) ioctl$RTC_WKALM_SET(r0, 0x4028700f, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) getsockopt$llc_int(r4, 0x10c, 0x6, &(0x7f0000002940), &(0x7f0000000000)=0x4) getsockopt$sock_buf(r4, 0x1, 0x1c, 0x0, &(0x7f0000000200)) close(0xffffffffffffffff) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x41, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10500, 0x0) 252.009796ms ago: executing program 4 (id=1346): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="01000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000002a00000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2, 0x0, 0xfffffffffffffffc}, 0x18) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0006}]}) r4 = syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x8401) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$USBDEVFS_SUBMITURB(r5, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x0, 0xb, 0x0, 0x0, 0x7995}, 0xfcb5, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) syz_usb_connect$printer(0x3, 0x36, &(0x7f0000000080)=ANY=[], 0x0) close_range(r3, 0xffffffffffffffff, 0x0) r7 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x80002) ioctl$SNDRV_TIMER_IOCTL_TREAD(r7, 0x40045402, &(0x7f0000000240)=0x1) 193.447988ms ago: executing program 2 (id=1347): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000440)='rseq_update\x00', r2}, 0x18) pwrite64(r1, &(0x7f0000000000)="1fa225acf03dfbef959bd5e53a28ffcc4630ee3050d67fe69c1f52eb0161b831e91fac845d841a4cde", 0x29, 0xf) rseq(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x6}, 0x20, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x2800490, &(0x7f0000000680)={[], [{@smackfsdef={'smackfsdef', 0x3d, '/dev/bsg\x00'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@hash}, {@subj_type={'subj_type', 0x3d, '}[-}'}}, {@subj_role={'subj_role', 0x3d, '\x84'}}, {@dont_appraise}, {@seclabel}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@pcr={'pcr', 0x3d, 0x2a}}]}, 0x81, 0x7ba, &(0x7f0000001740)="$eJzs3c9rXNUeAPDvnfxq0r6XPHjwXt8q8OC9QOnE1NgquKi4EMFCQdc2YTINNZNMyUxKEwJtEcGNoOJC0E3X/qg7t/7YKvhHuJCWqmmx4kJG7mQmmTQzaVIzM8F8PnBzz7n3TM75zrn3zpm5h5kADq3R9E8m4nhEvJ1EDNe2JxHRV031RpxdL/dgbTWXLklUKi//lFTL3F9bzUXDY1JHa5l/R8RXb0ScyGyvt7S8MjddKOQXa/nx8vzl8dLyyslL89Oz+dn8wumJyclTZ546c3r/Yv3l25Vjd9554f+fnv3t9X/deuvrJM7Gsdq+xjj2y2iM1p6TvvQp3OL5/a6sy5JuN4DHkp6aPetneRyP4eipploY7GTLAIB2uRYRFQDgkEm8/gPAIVP/HOD+2mquvnT3E4nOuvtcRBxZj79+f3N9T2/tnt2R6n3QofvJljsjSUSM7EP9oxHx4eevfpwu0ab7kADNXL8REVMjo9uv/8m2OQt79cROOysD1dXoQ5td/6BzvkjHP09vjP8iNs6/zMb4J5qMfwaanLuP49Hnf+b2PlTTUjr+e7ZhbtuDhvhrRnpqub9Vx3x9ycVLhXx6bft7RIxF30Can6gWbT4Lauze7/da1d84/vv53dc+SutP15slMrd7B7Y+Zma6PP1n4667eyPiP73N4k82+j9pMf49v8s6XnzmzQ9a7UvjT+OtL9vjb6/KzYj/Ne3/zb5MdpyfOF49HMbrB0UTn33//lCr+jf7f6C6TuuvvxfohLT/h3aOfyRpnK9Z2nsd39wc/rLVvsbjv3n8zY///uSVarq/tu3qdLm8OBHRn7y0ffupzcfW8/Xyafxj/21+/rc6/jO1ubFTG7md9d758ZPav2oaf9X1VvG3Vxr/zJ76f3uiXrJUqaUeKnPrwVxPq/p31/+T1dRYbcturn/NW7o98VhPGgAAAAAAAAAAAAAAAAAAAAAAAADsUSYijkWSyW6kM5lsdv03vP8ZQ5lCsVQ+cbG4tDAT1d/KHom+TP2rLocbvg91ovZ9+PX8qYfyT0bEPyLivYHBaj6bKxZmuh08AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANQc3fr7/9fSVTa7vu+HgW63DgBomyPdbgAA0HG7ff2f+q7NDQEAOmZv7/8H29YOAKBz9vz5fyVpT0MAgI7Z9ev/VHvbAQB0jvl/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAtNn5c+fSpfLr2mouzc9cWV6aK145OZMvzWXnl3LZXHHxcna2WJwt5LO54nzLf3R9fVUoFi9PxsLS1fFyvlQeLy2vXJgvLi2UL1yan57NX8j3dSwyAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANi90vLK3HShkF88xIn+eHSZwYPR1AOT6I0D0Yy/fKK/a7U3XiUGu3eBAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADjg/ggAAP//Gn0g0A==") bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000440)='rseq_update\x00', r2}, 0x18) (async) pwrite64(r1, &(0x7f0000000000)="1fa225acf03dfbef959bd5e53a28ffcc4630ee3050d67fe69c1f52eb0161b831e91fac845d841a4cde", 0x29, 0xf) (async) rseq(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x6}, 0x20, 0x0, 0x0) (async) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x2800490, &(0x7f0000000680)={[], [{@smackfsdef={'smackfsdef', 0x3d, '/dev/bsg\x00'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@hash}, {@subj_type={'subj_type', 0x3d, '}[-}'}}, {@subj_role={'subj_role', 0x3d, '\x84'}}, {@dont_appraise}, {@seclabel}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@pcr={'pcr', 0x3d, 0x2a}}]}, 0x81, 0x7ba, &(0x7f0000001740)="$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") (async) 192.846457ms ago: executing program 3 (id=1348): perf_event_open(&(0x7f00000008c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2040400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@mangle={'mangle\x00', 0x2, 0x6, 0x518, 0x3e0, 0x1b0, 0x0, 0xd0, 0x3e0, 0x500, 0x500, 0x500, 0x500, 0x500, 0x6, 0x0, {[{{@ipv6={@mcast2, @private1, [], [0x0, 0xff], 'macvlan1\x00', 'veth1_to_bridge\x00', {0xff}, {}, 0x73}, 0x0, 0xa8, 0xd0, 0x0, {0x7a00000000000000}}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffffffffffffffff, 0xfd}, {0xffffffffffffffff}, {}, 0xf3d9, 0x2}}}, {{@ipv6={@mcast1, @remote, [0x0, 0xff000000], [0xff, 0x0, 0x0, 0xff], '\x00', 'dummy0\x00', {0xff}}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x1000, 0x6, 0x3}}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x8}}]}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r1, 0x0, 0x4000001) bpf$MAP_CREATE(0x0, 0x0, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x2, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000100)={0x42, 0x82, 0x3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="2e00000011008188040f80ec59acbc0413a1810031000000000f000000028002002d1f00"/46, 0x2e}], 0x1}, 0x0) 190.464017ms ago: executing program 3 (id=1349): r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20400, 0x189) statx(r0, &(0x7f0000000040)='./file0\x00', 0x1000, 0x10, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)="05b17691ba569e1376b8f0abffba", 0xe, r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r1, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000600)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0xbd60, '\x00', 0x0, r1, 0x4, 0x5, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x9, 0x13, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x19271476, 0x0, 0x0, 0x0, 0xffffff01}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@ldst={0x2, 0x1, 0x4, 0x3, 0x8, 0xfffffffffffffffe, 0xffffffffffffffff}, @exit, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000003c0)='syzkaller\x00', 0x74b, 0x4f, &(0x7f0000000400)=""/79, 0x40f00, 0x4, '\x00', r3, 0x0, r1, 0x8, &(0x7f0000000540)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x1, 0x9, 0x9a, 0x100}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000680)=[r1, r4, r1, r1, r5, r1], &(0x7f00000006c0)=[{0x0, 0x3, 0xf}, {0x2, 0x1, 0xe, 0xb}, {0x0, 0x3, 0x9, 0x1}, {0x1, 0x2, 0xd, 0x8}, {0x1, 0x5, 0xb, 0x3}], 0x10, 0x6, @void, @value}, 0x94) sendmsg$IPSET_CMD_TYPE(r4, &(0x7f00000008c0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x34, 0xd, 0x6, 0x101, 0x0, 0x0, {0x1, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x3}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x2404c000}, 0x4000001) clock_gettime(0x0, &(0x7f0000000940)={0x0, 0x0}) ppoll(&(0x7f0000000900)=[{r1, 0x13c0}, {r1, 0x4200}, {r1, 0x8}, {r1, 0x440c}, {r1, 0x40b0}, {r4, 0x2400}, {r1, 0x100}], 0x7, &(0x7f0000000980)={r6, r7+60000000}, &(0x7f00000009c0), 0x8) r8 = syz_genetlink_get_family_id$devlink(&(0x7f0000000a40), r1) sendmsg$DEVLINK_CMD_RATE_GET(r1, &(0x7f0000000b40)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a80)={0x58, r8, 0x800, 0x70bd29, 0x25dfdbfe, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}, @handle=@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x2) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x40010, r1, 0x8000000) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000b80)='rxrpc_s\x00', &(0x7f0000000bc0)=@secondary) write$binfmt_script(r1, &(0x7f0000000c00)={'#! ', './file0', [{0x20, ')-'}], 0xa, "5ee6a6c6db7c68051b61697fd7a60f59ec9e08aa81aae8d18783ff40552c45685dd5c284d8baa7210140454cb55cf0f65d75fa3ed01b742902bcad2e8164a9bbfd79c8c4b6d35ba0ad3867"}, 0x59) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000c80)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000001240)=[{&(0x7f0000000d00)=""/10, 0xa}, {&(0x7f0000000d40)=""/81, 0x51}, {&(0x7f0000000dc0)=""/179, 0xb3}, {&(0x7f0000000e80)=""/185, 0xb9}, {&(0x7f0000000f40)=""/85, 0x55}, {&(0x7f0000000fc0)=""/136, 0x88}, {&(0x7f0000001080)=""/175, 0xaf}, {&(0x7f0000001140)=""/137, 0x89}, {&(0x7f0000001200)=""/24, 0x18}], 0x9, &(0x7f0000001300)=""/32, 0x20}, 0x0) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f00000013c0), r4) sendmsg$TIPC_NL_KEY_FLUSH(r4, &(0x7f0000001500)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001400)={0xac, r9, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_BEARER={0x64, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7bc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5d4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f14}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x13, 0x1, @l2={'eth', 0x3a, 'ip6erspan0\x00'}}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1a17b25b}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffc}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x80d5}, 0x4000000) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001580), r4) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000001640)={&(0x7f0000001540)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001600)={&(0x7f00000015c0)={0x30, r10, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x80000001}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}]}, 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x90) syz_clone3(&(0x7f0000001800)={0x28381c000, &(0x7f0000001680), &(0x7f00000016c0), &(0x7f0000001700), {0x26}, &(0x7f0000001740)=""/24, 0x18, &(0x7f0000001780)=""/21, &(0x7f00000017c0)=[0xffffffffffffffff], 0x1, {r1}}, 0x58) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r4, &(0x7f0000001940)={&(0x7f0000001880)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000001900)={&(0x7f00000018c0)={0x28, 0x0, 0x400, 0x70bd2a, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x9, 0x14}}}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x40004}, 0x48044) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x30, r4, 0xb8cd7000) sendmsg$NFT_BATCH(r1, &(0x7f0000001a80)={&(0x7f0000001980), 0xc, &(0x7f0000001a40)={&(0x7f00000019c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_DELOBJ={0x3c, 0x14, 0xa, 0x3, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x5}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x5}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x64}, 0x1, 0x0, 0x0, 0x40040}, 0x24000800) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000001ac0)=0x0) sched_rr_get_interval(r11, &(0x7f0000001b00)) bpf$PROG_LOAD(0x5, &(0x7f0000002ec0)={0xf, 0xe, &(0x7f0000001b40)=@raw=[@cb_func={0x18, 0x2, 0x4, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8000}, @jmp={0x5, 0x0, 0xa, 0x8, 0x3, 0x100, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @jmp={0x5, 0x1, 0x4, 0xa, 0x9, 0x8}], &(0x7f0000001bc0)='GPL\x00', 0x8, 0x21, &(0x7f0000001c00)=""/33, 0x40f00, 0x48, '\x00', r3, @cgroup_device, r4, 0x8, &(0x7f0000001c40)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000001c80)={0x4, 0xa, 0x1, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x4, &(0x7f0000002e40)=[r1], &(0x7f0000002e80)=[{0x1, 0x1, 0x3, 0xa}, {0x5, 0x1, 0x6, 0x2}, {0x3, 0x3, 0x4, 0x7}, {0x3, 0x5, 0xf, 0x9}], 0x10, 0x31, @void, @value}, 0x94) 135.293878ms ago: executing program 2 (id=1350): r0 = io_uring_setup(0x4ffd, &(0x7f0000000700)={0x0, 0x694a, 0x2, 0x0, 0x1e5}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) r1 = socket$inet6(0xa, 0x806, 0x0) capset(&(0x7f0000000080)={0x20080522}, &(0x7f00000000c0)={0x200000, 0x200000, 0x7}) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r2, 0x5609, 0x0) listen(r1, 0x2) r3 = syz_clone(0x308000, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x8, r3) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000400)=0x0) r5 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x0, @tid=r5}, &(0x7f0000000300)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x9, 0xf, &(0x7f0000000780)=ANY=[@ANYBLOB="180000000200000000000000f200000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b703000000000000850000008300090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000580)='GPL\x00', 0x59, 0x66, &(0x7f0000000800)=""/102, 0x40f00, 0x8, '\x00', 0x0, @cgroup_sock=0x22, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000980)={0x1, 0x0, 0x1, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x5, &(0x7f0000000e80)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000ec0)=[{0x5, 0x3, 0x2, 0x5}, {0x1, 0x5, 0xd, 0x2}, {0x0, 0x5, 0x2, 0x1}, {0x4, 0x1, 0x8, 0x7}, {0x1, 0x2, 0x4, 0xa}], 0x10, 0x200, @void, @value}, 0x94) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000480), 0xc0000, 0x0) syz_clone3(&(0x7f00000004c0)={0x8000, &(0x7f0000000040)=0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), {0x34}, &(0x7f0000000280)=""/36, 0x24, &(0x7f0000000340)=""/187, &(0x7f0000000440)=[r3, r4, r5], 0x3, {r7}}, 0x58) r9 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r9, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) recvmmsg(r1, &(0x7f0000000e40)=[{{0x0, 0x0, &(0x7f0000002180)=[{&(0x7f00000008c0)=""/67, 0x43}, {&(0x7f00000009c0)=""/68, 0x44}, {&(0x7f0000000c40)=""/221, 0xdd}, {&(0x7f0000002200)=""/229, 0xe5}, {&(0x7f0000000a40)=""/107, 0x6b}, {&(0x7f0000001000)=""/4096, 0x1000}, {&(0x7f0000002000)=""/142, 0x8e}, {&(0x7f00000020c0)=""/135, 0x87}], 0x8}, 0x41f}], 0x1, 0x2031, 0x0) io_uring_setup(0x278e, &(0x7f0000000140)={0x0, 0xfffffffe, 0x20, 0xfffffffe, 0x1c2, 0x0, r0}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000d40)=ANY=[@ANYRESDEC, @ANYRESHEX=r2, @ANYRESOCT=r8, @ANYRES8=r2, @ANYRES64=r6], 0x48) socket$packet(0x11, 0x3, 0x300) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x3, 0x67, &(0x7f0000000ac0)=ANY=[@ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYBLOB="180000000000000000000000000001b518110000", @ANYBLOB="8ae69664880d1536ce1af82c48fe0eaba50670370b11eaeec9d9a6f231125e821d8f5242b74d3027c3e3a8b0c9c2c7ee983145c75d94a27c5069c2f115847e704142e8b6296d8392f2c4b2158d3c1494634024f2ad904ab345fd12634fb7d71a24bda39e814fc328d34186066a2cc83dc7eeeadba735f862109fcdb57f949b44301f24a3e043fb16c1c6cf4ec4429c949c79113bc14f20bb7744d13e3b20783f6b41e05e56f5a57e246f304e5210bea4249e9d020f11176149d592f40dc5831c4da1dc8d77870ee7fcef49f569d9eb98ea1655c4303349f71aabf528122d0637e3", @ANYRESDEC=r8], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls=0x19, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r10, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000005c0)=r11}, 0x20) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYRES64=r12, @ANYRES16], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000880)='fsi_slave_init\x00', r13}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000100)=ANY=[@ANYRESOCT], 0x0) r14 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x121880, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x68, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800004, 0x1, @perf_bp={0x0, 0x6}, 0x117a20, 0x2, 0x840000, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$TCSETS(r14, 0x40045431, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x4, 0x0, "7e12ddc5a89047bf00"}) 134.248628ms ago: executing program 2 (id=1351): r0 = socket(0x200000000000011, 0x2, 0xd) r1 = socket(0x200000000000011, 0x2, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r1) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r2, 0x200, 0x70bc27, 0x25dfdbfb, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xab}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20008800}, 0xc001) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x400, &(0x7f00000002c0)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@resgid}]}, 0x1, 0x4a6, &(0x7f0000000a40)="$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") bind$packet(r0, &(0x7f0000000080)={0x11, 0x800, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) syz_emit_ethernet(0x2e, &(0x7f00000001c0)=ANY=[@ANYBLOB="06000000ffff0180c20036030800458000e0870000000000014e20000c907c011d4fcbae8cd8ab656c222d1d118438ebf14caf38c66e000000"], 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r3) sendmsg$IEEE802154_LLSEC_ADD_DEV(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x1c, r4, 0x852dd6c070cd7e4d, 0x70bd2b, 0x0, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x1c}, 0x4, 0x700000000000000, 0x0, 0x24048081}, 0x40000) r5 = syz_genetlink_get_family_id$nfc(&(0x7f0000000200), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0x0) r7 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r7, 0x0, &(0x7f00000000c0)=0x0) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r9) sendmsg$NFC_CMD_DEV_UP(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x1c, r10, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x8004) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000280)=0x0) r12 = syz_io_uring_setup(0x26da, &(0x7f0000000880)={0x0, 0xf952, 0x2, 0x0, 0x200010c}, &(0x7f00000003c0), &(0x7f0000000300)) io_uring_register$IORING_REGISTER_IOWQ_AFF(r12, 0x11, &(0x7f0000000900)='\fx', 0x2) io_uring_register$IORING_UNREGISTER_PBUF_RING(r12, 0x17, &(0x7f0000000640)={&(0x7f0000001000)={[{&(0x7f0000000540)="a8a09de042a87a328a327fe663e9501a452819e9c5ba8ae32d70bb6d303eee9ab54ba20ce8be024756260ebdc42dd3d587a2331304bc4943eb0bcef268298ab331065d71d69c1cb81f9a215848aefb7ab126bcc612b662140414d543fa8f7f20f720018dff58405f12d1cfc5fcc8d1b1a8c7a83eb65f1c67dedf76239c52113e809a3034830d1942db946686c7080689186a0137d4ad0c636397e3c9918ee68f91657f801e655e1224dffafa2feaf232d59ad7e322e51d8d26d1de55a1a0fd8ac1327583ac153875109a4d23", 0xcc, 0x3}, {&(0x7f0000000400)="6cb96f4aa0aabbde1376e437685b4ae5aadd7f16948d79fb105240ab36fe532e284e302a95fd97ef43f8c4b5c791d85f2034b4281a6ff0e11712bae7fb71b5430824fcafaeaa2b13440d83c7921a24578fe25a0a9485b2a0730a5c451d21cd5aafbb7a9d16dc23b9d79c58df1018e7a0a05afb89913729c4ef60308fd398d1b03eb16f8b21833dbe16827064b0ee6878253508a72224563a70fcecc6d771e07d80b1730a3c7034ce246199a38cfc2f5b0699ab0c822c9ada", 0xb8, 0x1}]}, 0x2, 0x3}, 0x1) sendmsg$NFC_CMD_ACTIVATE_TARGET(r3, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x5c, r5, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r6}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x4}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x5}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x7}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x6}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r11}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x5}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10}, 0x0) 128.567289ms ago: executing program 2 (id=1352): socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xe, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x38, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0x13}, 0x400, 0xffffffff, 0x6, 0x6, 0x0, 0x1, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000400)="89000000120081ae08060cdc03a6000000000002000000006ee2ffca1b1f0000000004c00e72f750375ed08a563319bf9ed720000000d6e747033a0093b837dc6cc01e32efaec8c7a6ec0012100002400d0c0c00bdad446b9bbc7a46e3988285dcdf12f21308f868fece0195b49e33538afa8af92347514f0b56a20ff27fff00"/137, 0x89}], 0x1}, 0x4080) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2, 0x0, 0x2}, 0x18) brk(0x20ffc004) symlinkat(0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) getpid() r3 = msgget$private(0x0, 0x10c) msgctl$IPC_SET(r3, 0x1, &(0x7f0000258f88)) msgsnd(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="0300"], 0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0x3, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f0000258f88)={{0x1}, 0x0, 0x0, 0x800000000000000, 0x7, 0x2, 0x0, 0x3, 0xe8, 0x0, 0x0, 0x0, 0xffffffffffffffff}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setreuid(0x0, 0xee00) 0s ago: executing program 2 (id=1353): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002340)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000000)='./bus\x00', 0x280008a, &(0x7f0000000240)=ANY=[@ANYBLOB='shortname=lower,shortname=win95,rodir,iocharset=default,uni_xlate=0,nonumtail=1,utf8=0,flush,rodir,shortname=win95,shortname=winnt,shortname=win95,showexec,uni_xlate=0,utf8=0,utf8=0,uni_xlate=0,shortname=mixed,\x00'], 0x97, 0x2ad, &(0x7f00000007c0)="$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") (async) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) (async) r2 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r2, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @private=0x4000000}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}, 0x0) (async) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x400}}, 0x24) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340), r1) sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000480)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x50, r3, 0x78252e11fda3fc00, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8001}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xf}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}]}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x40000d4}, 0x2004a810) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000004c0)=r0, 0x4) (async) sendmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[{0x18, 0x110, 0x1, '$'}], 0x18, 0xe000}, 0x5}], 0x1, 0x0) (async) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x105042, 0x189) pwrite64(r4, &(0x7f00000003c0)='\x00\x00', 0xfffffe97, 0x1) kernel console output (not intermixed with test programs): 000000000 RDI: 0000000000000003 [ 86.589146][ T6162] RBP: 00007fcef3317090 R08: 0000000000001000 R09: 0000000000000000 [ 86.589161][ T6162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 86.589182][ T6162] R13: 0000000000000000 R14: 00007fcef4ed5fa0 R15: 00007ffc431b7cc8 [ 86.589205][ T6162] [ 86.906207][ T6174] loop3: detected capacity change from 0 to 1024 [ 86.913149][ T6174] EXT4-fs: Ignoring removed orlov option [ 86.918892][ T6174] EXT4-fs: Ignoring removed nomblk_io_submit option [ 86.944871][ T6172] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1020'. [ 86.954292][ T6172] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1020'. [ 86.966725][ T6174] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 87.061488][ T6174] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 87.167793][ T6174] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1018'. [ 87.220930][ T6197] loop5: detected capacity change from 0 to 512 [ 87.254891][ T6197] EXT4-fs warning (device loop5): ext4_enable_quotas:7170: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 87.272880][ T6198] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 87.301321][ T6197] EXT4-fs (loop5): mount failed [ 87.302849][ T6198] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 87.376497][ T6203] loop3: detected capacity change from 0 to 512 [ 87.386265][ T6207] program syz.2.1030 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 87.432090][ T6203] EXT4-fs warning (device loop3): ext4_enable_quotas:7170: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 87.448590][ T6203] EXT4-fs (loop3): mount failed [ 87.513677][ T6215] SELinux: failed to load policy [ 87.534139][ T6214] FAULT_INJECTION: forcing a failure. [ 87.534139][ T6214] name failslab, interval 1, probability 0, space 0, times 0 [ 87.547024][ T6214] CPU: 1 UID: 0 PID: 6214 Comm: syz.3.1031 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 87.547059][ T6214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 87.547072][ T6214] Call Trace: [ 87.547077][ T6214] [ 87.547085][ T6214] __dump_stack+0x1d/0x30 [ 87.547110][ T6214] dump_stack_lvl+0xe8/0x140 [ 87.547141][ T6214] dump_stack+0x15/0x1b [ 87.547157][ T6214] should_fail_ex+0x265/0x280 [ 87.547244][ T6214] should_failslab+0x8c/0xb0 [ 87.547273][ T6214] kmem_cache_alloc_noprof+0x50/0x310 [ 87.547311][ T6214] ? security_inode_alloc+0x37/0x100 [ 87.547339][ T6214] security_inode_alloc+0x37/0x100 [ 87.547391][ T6214] inode_init_always_gfp+0x4b7/0x500 [ 87.547420][ T6214] ? __pfx_hugetlbfs_alloc_inode+0x10/0x10 [ 87.547451][ T6214] alloc_inode+0x58/0x170 [ 87.547482][ T6214] new_inode+0x1d/0xe0 [ 87.547513][ T6214] hugetlbfs_get_inode+0x7b/0x370 [ 87.547534][ T6214] hugetlb_file_setup+0x192/0x3d0 [ 87.547554][ T6214] ksys_mmap_pgoff+0x157/0x310 [ 87.547614][ T6214] x64_sys_call+0x1602/0x2fb0 [ 87.547634][ T6214] do_syscall_64+0xd0/0x1a0 [ 87.547659][ T6214] ? clear_bhb_loop+0x25/0x80 [ 87.547685][ T6214] ? clear_bhb_loop+0x25/0x80 [ 87.547762][ T6214] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 87.547784][ T6214] RIP: 0033:0x7fcef4cae969 [ 87.547872][ T6214] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 87.547891][ T6214] RSP: 002b:00007fcef3317038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 87.547914][ T6214] RAX: ffffffffffffffda RBX: 00007fcef4ed5fa0 RCX: 00007fcef4cae969 [ 87.547929][ T6214] RDX: 0000000000000002 RSI: 0000000000ff5000 RDI: 0000200000000000 [ 87.547944][ T6214] RBP: 00007fcef3317090 R08: ffffffffffffffff R09: 0000000006000000 [ 87.547960][ T6214] R10: 000000000004c831 R11: 0000000000000246 R12: 0000000000000001 [ 87.548052][ T6214] R13: 0000000000000000 R14: 00007fcef4ed5fa0 R15: 00007ffc431b7cc8 [ 87.548070][ T6214] [ 87.896013][ T6224] loop3: detected capacity change from 0 to 512 [ 87.983015][ T6224] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 88.030377][ T6224] ext4 filesystem being mounted at /187/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 88.202605][ T3305] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 88.317035][ T6247] loop0: detected capacity change from 0 to 1024 [ 88.325102][ T6248] loop3: detected capacity change from 0 to 1024 [ 88.331914][ T6247] EXT4-fs: Ignoring removed orlov option [ 88.337661][ T6247] EXT4-fs: Ignoring removed nomblk_io_submit option [ 88.348895][ T6248] EXT4-fs: Ignoring removed orlov option [ 88.354678][ T6248] EXT4-fs: Ignoring removed nomblk_io_submit option [ 88.466238][ T6248] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 88.474690][ T6249] Falling back ldisc for ttyS3. [ 88.570954][ T6247] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 88.804036][ T6248] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 88.868686][ T6247] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 88.901473][ T6258] netlink: 12 bytes leftover after parsing attributes in process `syz.5.1043'. [ 88.914106][ T6248] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1040'. [ 89.080300][ T6242] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1041'. [ 89.138871][ T6264] can0: slcan on ttyS3. [ 89.198995][ T6269] syzkaller0: entered promiscuous mode [ 89.204556][ T6269] syzkaller0: entered allmulticast mode [ 89.388389][ T6282] loop3: detected capacity change from 0 to 512 [ 89.404407][ T6284] loop5: detected capacity change from 0 to 512 [ 89.419751][ T6282] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 89.433143][ T6282] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 89.449448][ T6284] EXT4-fs (loop5): encrypted files will use data=ordered instead of data journaling mode [ 89.473793][ T6282] EXT4-fs (loop3): 1 truncate cleaned up [ 89.479974][ T6282] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 89.517156][ T6284] EXT4-fs (loop5): 1 truncate cleaned up [ 89.528790][ T6284] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 89.644360][ T6294] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 89.657972][ T6296] loop2: detected capacity change from 0 to 1024 [ 89.666797][ T3305] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 89.671902][ T6296] EXT4-fs: Ignoring removed orlov option [ 89.682053][ T6296] EXT4-fs: Ignoring removed nomblk_io_submit option [ 89.689977][ T5998] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 89.706367][ T6294] loop0: detected capacity change from 0 to 512 [ 89.736715][ T6298] FAULT_INJECTION: forcing a failure. [ 89.736715][ T6298] name failslab, interval 1, probability 0, space 0, times 0 [ 89.749705][ T6298] CPU: 0 UID: 0 PID: 6298 Comm: syz.3.1057 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 89.749738][ T6298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 89.749753][ T6298] Call Trace: [ 89.749760][ T6298] [ 89.749768][ T6298] __dump_stack+0x1d/0x30 [ 89.749794][ T6298] dump_stack_lvl+0xe8/0x140 [ 89.749817][ T6298] dump_stack+0x15/0x1b [ 89.749837][ T6298] should_fail_ex+0x265/0x280 [ 89.749877][ T6298] should_failslab+0x8c/0xb0 [ 89.749921][ T6298] kmem_cache_alloc_noprof+0x50/0x310 [ 89.749962][ T6298] ? mas_alloc_nodes+0x265/0x520 [ 89.749993][ T6298] mas_alloc_nodes+0x265/0x520 [ 89.750023][ T6298] mas_preallocate+0x456/0x680 [ 89.750055][ T6298] __split_vma+0x239/0x610 [ 89.750098][ T6298] vms_gather_munmap_vmas+0x172/0x7a0 [ 89.750136][ T6298] ? mas_find+0x515/0x610 [ 89.750156][ T6298] ? put_dec+0xd3/0xe0 [ 89.750184][ T6298] mmap_region+0x44f/0x1470 [ 89.750216][ T6298] ? vsnprintf+0x829/0x890 [ 89.750264][ T6298] do_mmap+0x9de/0xc20 [ 89.750299][ T6298] __se_sys_remap_file_pages+0x55e/0x600 [ 89.750345][ T6298] __x64_sys_remap_file_pages+0x67/0x80 [ 89.750382][ T6298] x64_sys_call+0x2c64/0x2fb0 [ 89.750402][ T6298] do_syscall_64+0xd0/0x1a0 [ 89.750421][ T6298] ? clear_bhb_loop+0x25/0x80 [ 89.750441][ T6298] ? clear_bhb_loop+0x25/0x80 [ 89.750468][ T6298] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 89.750492][ T6298] RIP: 0033:0x7fcef4cae969 [ 89.750510][ T6298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 89.750528][ T6298] RSP: 002b:00007fcef3317038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d8 [ 89.750546][ T6298] RAX: ffffffffffffffda RBX: 00007fcef4ed5fa0 RCX: 00007fcef4cae969 [ 89.750557][ T6298] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000800000 [ 89.750568][ T6298] RBP: 00007fcef3317090 R08: 0000000000000000 R09: 0000000000000000 [ 89.750579][ T6298] R10: 0000000000000600 R11: 0000000000000246 R12: 0000000000000001 [ 89.750591][ T6298] R13: 0000000000000000 R14: 00007fcef4ed5fa0 R15: 00007ffc431b7cc8 [ 89.750610][ T6298] [ 89.822406][ T6294] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 89.953322][ T6296] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 90.009515][ T6294] EXT4-fs (loop0): 1 truncate cleaned up [ 90.040821][ T6294] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 90.121281][ T6296] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 90.132098][ T6311] can0 (unregistered): slcan off ttyS3. [ 90.203992][ T6316] can0: slcan on ttyS3. [ 90.223292][ T6294] pimreg: entered allmulticast mode [ 90.242756][ T6296] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1055'. [ 90.350121][ T6323] loop3: detected capacity change from 0 to 2048 [ 90.363356][ T3304] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 90.408835][ T6323] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 90.433596][ T6328] loop0: detected capacity change from 0 to 512 [ 90.452118][ T6333] loop2: detected capacity change from 0 to 8192 [ 90.454475][ T6323] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 90.491548][ T6328] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 90.497363][ T6333] netlink: 44 bytes leftover after parsing attributes in process `syz.2.1068'. [ 90.559513][ T6328] ext4 filesystem being mounted at /229/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 90.577247][ T6333] serio: Serial port pts1 [ 90.592438][ T6328] EXT4-fs error (device loop0): ext4_empty_dir:3077: inode #12: comm syz.0.1067: invalid size [ 90.603368][ T6328] EXT4-fs (loop0): Remounting filesystem read-only [ 90.622946][ T3304] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 90.632614][ T31] EXT4-fs (loop0): Quota write (off=5120, len=1024) cancelled because transaction is not started [ 90.643479][ T31] __quota_error: 371 callbacks suppressed [ 90.643491][ T31] Quota error (device loop0): write_blk: dquota write failed [ 90.656893][ T31] Quota error (device loop0): free_dqentry: Can't write quota data block 5 [ 90.677619][ T29] audit: type=1400 audit(1745802409.334:11698): avc: denied { create } for pid=6341 comm="syz.0.1069" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 90.697695][ T29] audit: type=1400 audit(1745802409.364:11699): avc: denied { write } for pid=6341 comm="syz.0.1069" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 90.746737][ T29] audit: type=1400 audit(1745802409.404:11700): avc: denied { create } for pid=6347 comm="syz.0.1071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 90.774805][ T29] audit: type=1400 audit(1745802409.434:11701): avc: denied { ioctl } for pid=6352 comm="syz.0.1072" path="socket:[13915]" dev="sockfs" ino=13915 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 90.775681][ T6353] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 90.800264][ T29] audit: type=1400 audit(1745802409.434:11702): avc: denied { setopt } for pid=6352 comm="syz.0.1072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 90.806321][ T6353] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 90.826404][ T29] audit: type=1400 audit(1745802409.434:11703): avc: denied { write } for pid=6352 comm="syz.0.1072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 90.853547][ T29] audit: type=1326 audit(1745802409.514:11704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6332 comm="syz.2.1068" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f69cebce969 code=0x7ffc0000 [ 90.877286][ T29] audit: type=1326 audit(1745802409.514:11705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6332 comm="syz.2.1068" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f69cebce969 code=0x7ffc0000 [ 90.948735][ T6360] loop0: detected capacity change from 0 to 2048 [ 90.958067][ T6360] EXT4-fs (loop0): Invalid log block size: 524290 [ 90.994220][ T6361] loop2: detected capacity change from 0 to 1024 [ 91.003769][ T6361] EXT4-fs: Ignoring removed orlov option [ 91.009660][ T6361] EXT4-fs: Ignoring removed nomblk_io_submit option [ 91.025462][ T6361] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 91.104285][ T6361] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 91.122050][ T6367] can0 (unregistered): slcan off ttyS3. [ 91.188117][ T6358] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1073'. [ 91.226316][ T6363] can0: slcan on ttyS3. [ 91.244248][ T6374] FAULT_INJECTION: forcing a failure. [ 91.244248][ T6374] name failslab, interval 1, probability 0, space 0, times 0 [ 91.257118][ T6374] CPU: 1 UID: 0 PID: 6374 Comm: syz.4.1078 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 91.257160][ T6374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 91.257176][ T6374] Call Trace: [ 91.257183][ T6374] [ 91.257191][ T6374] __dump_stack+0x1d/0x30 [ 91.257216][ T6374] dump_stack_lvl+0xe8/0x140 [ 91.257251][ T6374] dump_stack+0x15/0x1b [ 91.257269][ T6374] should_fail_ex+0x265/0x280 [ 91.257307][ T6374] should_failslab+0x8c/0xb0 [ 91.257336][ T6374] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 91.257415][ T6374] ? shmem_alloc_inode+0x34/0x50 [ 91.257448][ T6374] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 91.257474][ T6374] shmem_alloc_inode+0x34/0x50 [ 91.257502][ T6374] alloc_inode+0x3d/0x170 [ 91.257567][ T6374] new_inode+0x1d/0xe0 [ 91.257598][ T6374] shmem_get_inode+0x244/0x750 [ 91.257700][ T6374] __shmem_file_setup+0x122/0x1f0 [ 91.257732][ T6374] shmem_file_setup+0x3b/0x50 [ 91.257759][ T6374] __se_sys_memfd_create+0x2c3/0x590 [ 91.257851][ T6374] __x64_sys_memfd_create+0x31/0x40 [ 91.257873][ T6374] x64_sys_call+0x122f/0x2fb0 [ 91.257893][ T6374] do_syscall_64+0xd0/0x1a0 [ 91.257943][ T6374] ? clear_bhb_loop+0x25/0x80 [ 91.257963][ T6374] ? clear_bhb_loop+0x25/0x80 [ 91.257987][ T6374] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 91.258048][ T6374] RIP: 0033:0x7f43399fe969 [ 91.258066][ T6374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.258129][ T6374] RSP: 002b:00007f4338066e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 91.258147][ T6374] RAX: ffffffffffffffda RBX: 000000000000046f RCX: 00007f43399fe969 [ 91.258186][ T6374] RDX: 00007f4338066ef0 RSI: 0000000000000000 RDI: 00007f4339a81444 [ 91.258201][ T6374] RBP: 0000200000000580 R08: 00007f4338066bb7 R09: 00007f4338066e40 [ 91.258215][ T6374] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000480 [ 91.258230][ T6374] R13: 00007f4338066ef0 R14: 00007f4338066eb0 R15: 0000200000000b80 [ 91.258252][ T6374] [ 91.567121][ T6385] SET target dimension over the limit! [ 91.619247][ T6391] FAULT_INJECTION: forcing a failure. [ 91.619247][ T6391] name failslab, interval 1, probability 0, space 0, times 0 [ 91.632130][ T6391] CPU: 1 UID: 0 PID: 6391 Comm: syz.4.1085 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 91.632184][ T6391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 91.632199][ T6391] Call Trace: [ 91.632207][ T6391] [ 91.632215][ T6391] __dump_stack+0x1d/0x30 [ 91.632241][ T6391] dump_stack_lvl+0xe8/0x140 [ 91.632331][ T6391] dump_stack+0x15/0x1b [ 91.632353][ T6391] should_fail_ex+0x265/0x280 [ 91.632393][ T6391] should_failslab+0x8c/0xb0 [ 91.632447][ T6391] kmem_cache_alloc_noprof+0x50/0x310 [ 91.632513][ T6391] ? getname_kernel+0x3c/0x1f0 [ 91.632553][ T6391] getname_kernel+0x3c/0x1f0 [ 91.632591][ T6391] kern_path+0x23/0x130 [ 91.632630][ T6391] create_local_trace_uprobe+0x53/0x2c0 [ 91.632764][ T6391] perf_uprobe_init+0xc0/0x150 [ 91.632803][ T6391] perf_uprobe_event_init+0xea/0x150 [ 91.632846][ T6391] perf_try_init_event+0xd0/0x540 [ 91.632896][ T6391] ? perf_event_alloc+0xab1/0x15c0 [ 91.632925][ T6391] perf_event_alloc+0xabc/0x15c0 [ 91.632962][ T6391] __se_sys_perf_event_open+0x5a8/0x1170 [ 91.633065][ T6391] ? __rcu_read_unlock+0x4f/0x70 [ 91.633153][ T6391] __x64_sys_perf_event_open+0x67/0x80 [ 91.633183][ T6391] x64_sys_call+0x27ec/0x2fb0 [ 91.633206][ T6391] do_syscall_64+0xd0/0x1a0 [ 91.633284][ T6391] ? clear_bhb_loop+0x25/0x80 [ 91.633311][ T6391] ? clear_bhb_loop+0x25/0x80 [ 91.633338][ T6391] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 91.633413][ T6391] RIP: 0033:0x7f43399fe969 [ 91.633430][ T6391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.633452][ T6391] RSP: 002b:00007f4338067038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 91.633475][ T6391] RAX: ffffffffffffffda RBX: 00007f4339c25fa0 RCX: 00007f43399fe969 [ 91.633491][ T6391] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000000 [ 91.633507][ T6391] RBP: 00007f4338067090 R08: 0000000000000000 R09: 0000000000000000 [ 91.633523][ T6391] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 91.633566][ T6391] R13: 0000000000000000 R14: 00007f4339c25fa0 R15: 00007fffcd8311c8 [ 91.633585][ T6391] [ 91.861425][ T6385] tipc: Started in network mode [ 91.868515][ T6385] tipc: Node identity ac1414aa, cluster identity 4711 [ 91.880314][ T6385] tipc: Enabled bearer , priority 10 [ 91.908097][ T6393] syzkaller0: entered promiscuous mode [ 91.913947][ T6393] syzkaller0: entered allmulticast mode [ 91.953888][ T6399] FAULT_INJECTION: forcing a failure. [ 91.953888][ T6399] name failslab, interval 1, probability 0, space 0, times 0 [ 91.966697][ T6399] CPU: 0 UID: 0 PID: 6399 Comm: syz.0.1088 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 91.966757][ T6399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 91.966770][ T6399] Call Trace: [ 91.966775][ T6399] [ 91.966785][ T6399] __dump_stack+0x1d/0x30 [ 91.966808][ T6399] dump_stack_lvl+0xe8/0x140 [ 91.966833][ T6399] dump_stack+0x15/0x1b [ 91.966852][ T6399] should_fail_ex+0x265/0x280 [ 91.966950][ T6399] ? alloc_netdev_mqs+0x86a/0xab0 [ 91.966985][ T6399] should_failslab+0x8c/0xb0 [ 91.967098][ T6399] __kmalloc_cache_noprof+0x4c/0x320 [ 91.967127][ T6399] alloc_netdev_mqs+0x86a/0xab0 [ 91.967211][ T6399] ip6_tnl_locate+0x37e/0x4a0 [ 91.967247][ T6399] ip6_tnl_siocdevprivate+0x550/0x920 [ 91.967295][ T6399] dev_ifsioc+0x8f5/0xaa0 [ 91.967322][ T6399] dev_ioctl+0x78d/0x960 [ 91.967398][ T6399] sock_ioctl+0x593/0x610 [ 91.967422][ T6399] ? __pfx_sock_ioctl+0x10/0x10 [ 91.967443][ T6399] __se_sys_ioctl+0xcb/0x140 [ 91.967469][ T6399] __x64_sys_ioctl+0x43/0x50 [ 91.967547][ T6399] x64_sys_call+0x19a8/0x2fb0 [ 91.967574][ T6399] do_syscall_64+0xd0/0x1a0 [ 91.967618][ T6399] ? clear_bhb_loop+0x25/0x80 [ 91.967643][ T6399] ? clear_bhb_loop+0x25/0x80 [ 91.967663][ T6399] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 91.967686][ T6399] RIP: 0033:0x7fbecde7e969 [ 91.967753][ T6399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.967775][ T6399] RSP: 002b:00007fbecc4e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 91.967797][ T6399] RAX: ffffffffffffffda RBX: 00007fbece0a5fa0 RCX: 00007fbecde7e969 [ 91.967808][ T6399] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000006 [ 91.967852][ T6399] RBP: 00007fbecc4e7090 R08: 0000000000000000 R09: 0000000000000000 [ 91.967863][ T6399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 91.967902][ T6399] R13: 0000000000000000 R14: 00007fbece0a5fa0 R15: 00007ffddb400798 [ 91.967922][ T6399] [ 92.310143][ T6413] loop5: detected capacity change from 0 to 512 [ 92.321669][ T6411] can0 (unregistered): slcan off ttyS3. [ 92.329032][ T6414] loop0: detected capacity change from 0 to 1024 [ 92.336006][ T6414] EXT4-fs: Ignoring removed orlov option [ 92.342075][ T6414] EXT4-fs: Ignoring removed nomblk_io_submit option [ 92.383212][ T6414] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 92.418844][ T6403] can0: slcan on ttyS3. [ 92.465162][ T6424] loop3: detected capacity change from 0 to 256 [ 92.473818][ T6413] EXT4-fs warning (device loop5): ext4_enable_quotas:7170: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 92.512388][ T6426] syzkaller0: entered promiscuous mode [ 92.518145][ T6426] syzkaller0: entered allmulticast mode [ 92.528131][ T6413] EXT4-fs (loop5): mount failed [ 92.540353][ T6424] FAT-fs (loop3): Directory bread(block 64) failed [ 92.549463][ T6424] FAT-fs (loop3): Directory bread(block 65) failed [ 92.571830][ T6424] FAT-fs (loop3): Directory bread(block 66) failed [ 92.583643][ T6424] FAT-fs (loop3): Directory bread(block 67) failed [ 92.600416][ T6424] FAT-fs (loop3): Directory bread(block 68) failed [ 92.617730][ T6429] FAULT_INJECTION: forcing a failure. [ 92.617730][ T6429] name failslab, interval 1, probability 0, space 0, times 0 [ 92.630671][ T6429] CPU: 0 UID: 0 PID: 6429 Comm: syz.4.1097 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 92.630702][ T6429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 92.630761][ T6429] Call Trace: [ 92.630769][ T6429] [ 92.630776][ T6429] __dump_stack+0x1d/0x30 [ 92.630797][ T6429] dump_stack_lvl+0xe8/0x140 [ 92.630856][ T6429] dump_stack+0x15/0x1b [ 92.630883][ T6429] should_fail_ex+0x265/0x280 [ 92.630941][ T6429] ? __pfx_cond_bools_destroy+0x10/0x10 [ 92.630960][ T6429] should_failslab+0x8c/0xb0 [ 92.630988][ T6429] kmem_cache_alloc_noprof+0x50/0x310 [ 92.631106][ T6429] ? hashtab_duplicate+0xfe/0x360 [ 92.631138][ T6429] ? __pfx_cond_bools_destroy+0x10/0x10 [ 92.631156][ T6429] hashtab_duplicate+0xfe/0x360 [ 92.631221][ T6429] ? __pfx_cond_bools_copy+0x10/0x10 [ 92.631246][ T6429] cond_policydb_dup+0xd2/0x4e0 [ 92.631285][ T6429] security_set_bools+0xa0/0x340 [ 92.631321][ T6429] sel_commit_bools_write+0x1ea/0x270 [ 92.631342][ T6429] vfs_writev+0x3eb/0x870 [ 92.631378][ T6429] ? __pfx_sel_commit_bools_write+0x10/0x10 [ 92.631472][ T6429] ? mutex_lock+0xd/0x30 [ 92.631510][ T6429] do_writev+0xe7/0x210 [ 92.631707][ T6429] __x64_sys_writev+0x45/0x50 [ 92.631733][ T6429] x64_sys_call+0x2006/0x2fb0 [ 92.631760][ T6429] do_syscall_64+0xd0/0x1a0 [ 92.631787][ T6429] ? clear_bhb_loop+0x25/0x80 [ 92.631894][ T6429] ? clear_bhb_loop+0x25/0x80 [ 92.631920][ T6429] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 92.631942][ T6429] RIP: 0033:0x7f43399fe969 [ 92.631961][ T6429] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 92.631983][ T6429] RSP: 002b:00007f4338067038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 92.632083][ T6429] RAX: ffffffffffffffda RBX: 00007f4339c25fa0 RCX: 00007f43399fe969 [ 92.632098][ T6429] RDX: 0000000000000002 RSI: 00002000000025c0 RDI: 0000000000000003 [ 92.632137][ T6429] RBP: 00007f4338067090 R08: 0000000000000000 R09: 0000000000000000 [ 92.632153][ T6429] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.632167][ T6429] R13: 0000000000000000 R14: 00007f4339c25fa0 R15: 00007fffcd8311c8 [ 92.632186][ T6429] [ 92.651541][ T6424] FAT-fs (loop3): Directory bread(block 69) failed [ 92.733347][ T6414] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 92.741381][ T6424] FAT-fs (loop3): Directory bread(block 70) failed [ 92.857789][ T6431] FAULT_INJECTION: forcing a failure. [ 92.857789][ T6431] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 92.891836][ T6431] CPU: 0 UID: 0 PID: 6431 Comm: syz.4.1098 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 92.891929][ T6431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 92.891945][ T6431] Call Trace: [ 92.891953][ T6431] [ 92.891964][ T6431] __dump_stack+0x1d/0x30 [ 92.891986][ T6431] dump_stack_lvl+0xe8/0x140 [ 92.892120][ T6431] dump_stack+0x15/0x1b [ 92.892137][ T6431] should_fail_ex+0x265/0x280 [ 92.892172][ T6431] should_fail+0xb/0x20 [ 92.892254][ T6431] should_fail_usercopy+0x1a/0x20 [ 92.892272][ T6431] _copy_from_user+0x1c/0xb0 [ 92.892293][ T6431] __se_sys_capset+0x1f4/0x450 [ 92.892313][ T6431] ? __secure_computing+0x82/0x150 [ 92.892358][ T6431] __x64_sys_capset+0x31/0x40 [ 92.892425][ T6431] x64_sys_call+0x1426/0x2fb0 [ 92.892527][ T6431] do_syscall_64+0xd0/0x1a0 [ 92.892551][ T6431] ? clear_bhb_loop+0x25/0x80 [ 92.892586][ T6431] ? clear_bhb_loop+0x25/0x80 [ 92.892609][ T6431] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 92.892708][ T6431] RIP: 0033:0x7f43399fe969 [ 92.892724][ T6431] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 92.892742][ T6431] RSP: 002b:00007f4338067038 EFLAGS: 00000246 ORIG_RAX: 000000000000007e [ 92.892761][ T6431] RAX: ffffffffffffffda RBX: 00007f4339c25fa0 RCX: 00007f43399fe969 [ 92.892773][ T6431] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000200000000080 [ 92.892785][ T6431] RBP: 00007f4338067090 R08: 0000000000000000 R09: 0000000000000000 [ 92.892807][ T6431] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.892820][ T6431] R13: 0000000000000000 R14: 00007f4339c25fa0 R15: 00007fffcd8311c8 [ 92.892841][ T6431] [ 93.073102][ T6424] FAT-fs (loop3): Directory bread(block 71) failed [ 93.079634][ T3361] tipc: Node number set to 2886997162 [ 93.087926][ T6424] FAT-fs (loop3): Directory bread(block 72) failed [ 93.154778][ T6424] FAT-fs (loop3): Directory bread(block 73) failed [ 93.186436][ T6407] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1092'. [ 93.187369][ T6424] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1095'. [ 93.312927][ T6443] loop2: detected capacity change from 0 to 8192 [ 93.329092][ T6445] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1103'. [ 93.340039][ T6445] netlink: 'syz.0.1103': attribute type 1 has an invalid length. [ 93.714906][ T6467] FAULT_INJECTION: forcing a failure. [ 93.714906][ T6467] name failslab, interval 1, probability 0, space 0, times 0 [ 93.730387][ T6467] CPU: 0 UID: 0 PID: 6467 Comm: syz.3.1111 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 93.730417][ T6467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 93.730431][ T6467] Call Trace: [ 93.730439][ T6467] [ 93.730447][ T6467] __dump_stack+0x1d/0x30 [ 93.730472][ T6467] dump_stack_lvl+0xe8/0x140 [ 93.730514][ T6467] dump_stack+0x15/0x1b [ 93.730537][ T6467] should_fail_ex+0x265/0x280 [ 93.730577][ T6467] should_failslab+0x8c/0xb0 [ 93.730614][ T6467] __kmalloc_noprof+0xa5/0x3e0 [ 93.730764][ T6467] ? copy_splice_read+0xc2/0x5f0 [ 93.730791][ T6467] copy_splice_read+0xc2/0x5f0 [ 93.730865][ T6467] ? __pfx_copy_splice_read+0x10/0x10 [ 93.730887][ T6467] splice_direct_to_actor+0x26c/0x680 [ 93.730912][ T6467] ? __pfx_direct_splice_actor+0x10/0x10 [ 93.731004][ T6467] do_splice_direct+0xda/0x150 [ 93.731030][ T6467] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 93.731069][ T6467] do_sendfile+0x380/0x640 [ 93.731135][ T6467] __x64_sys_sendfile64+0x105/0x150 [ 93.731175][ T6467] x64_sys_call+0xb39/0x2fb0 [ 93.731202][ T6467] do_syscall_64+0xd0/0x1a0 [ 93.731260][ T6467] ? clear_bhb_loop+0x25/0x80 [ 93.731287][ T6467] ? clear_bhb_loop+0x25/0x80 [ 93.731314][ T6467] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 93.731340][ T6467] RIP: 0033:0x7fcef4cae969 [ 93.731359][ T6467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 93.731404][ T6467] RSP: 002b:00007fcef3317038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 93.731426][ T6467] RAX: ffffffffffffffda RBX: 00007fcef4ed5fa0 RCX: 00007fcef4cae969 [ 93.731446][ T6467] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 93.731460][ T6467] RBP: 00007fcef3317090 R08: 0000000000000000 R09: 0000000000000000 [ 93.731473][ T6467] R10: 0000000000000457 R11: 0000000000000246 R12: 0000000000000001 [ 93.731485][ T6467] R13: 0000000000000000 R14: 00007fcef4ed5fa0 R15: 00007ffc431b7cc8 [ 93.731508][ T6467] [ 94.027059][ T6460] loop2: detected capacity change from 0 to 512 [ 94.118435][ T6460] EXT4-fs: Ignoring removed i_version option [ 94.139609][ T6480] loop3: detected capacity change from 0 to 1024 [ 94.146450][ T6480] EXT4-fs: Ignoring removed orlov option [ 94.149652][ T6479] syzkaller0: entered promiscuous mode [ 94.152207][ T6480] EXT4-fs: Ignoring removed nomblk_io_submit option [ 94.157687][ T6479] syzkaller0: entered allmulticast mode [ 94.186621][ T6460] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 94.224114][ T6480] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 94.251899][ T6460] EXT4-fs (loop2): 1 truncate cleaned up [ 94.285954][ T6460] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 94.310287][ T6489] FAULT_INJECTION: forcing a failure. [ 94.310287][ T6489] name failslab, interval 1, probability 0, space 0, times 0 [ 94.323294][ T6489] CPU: 1 UID: 0 PID: 6489 Comm: syz.0.1117 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 94.323324][ T6489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 94.323339][ T6489] Call Trace: [ 94.323346][ T6489] [ 94.323355][ T6489] __dump_stack+0x1d/0x30 [ 94.323379][ T6489] dump_stack_lvl+0xe8/0x140 [ 94.323429][ T6489] dump_stack+0x15/0x1b [ 94.323444][ T6489] should_fail_ex+0x265/0x280 [ 94.323479][ T6489] should_failslab+0x8c/0xb0 [ 94.323515][ T6489] __kmalloc_node_noprof+0xa9/0x410 [ 94.323548][ T6489] ? __vmalloc_node_range_noprof+0x3c5/0xdf0 [ 94.323580][ T6489] __vmalloc_node_range_noprof+0x3c5/0xdf0 [ 94.323611][ T6489] ? mod_objcg_state+0x40e/0x530 [ 94.323640][ T6489] ? copy_process+0x399/0x1f90 [ 94.323725][ T6489] __vmalloc_node_noprof+0x63/0x80 [ 94.323747][ T6489] ? copy_process+0x399/0x1f90 [ 94.323771][ T6489] dup_task_struct+0x449/0x6a0 [ 94.323793][ T6489] ? _parse_integer+0x27/0x40 [ 94.323836][ T6489] copy_process+0x399/0x1f90 [ 94.323870][ T6489] ? kstrtouint+0x76/0xc0 [ 94.323897][ T6489] ? kstrtouint_from_user+0x9f/0xf0 [ 94.323946][ T6489] ? __rcu_read_unlock+0x4f/0x70 [ 94.324021][ T6489] kernel_clone+0x16c/0x5b0 [ 94.324045][ T6489] ? vfs_write+0x75e/0x8d0 [ 94.324071][ T6489] __x64_sys_clone+0xe6/0x120 [ 94.324185][ T6489] x64_sys_call+0x2c59/0x2fb0 [ 94.324211][ T6489] do_syscall_64+0xd0/0x1a0 [ 94.324237][ T6489] ? clear_bhb_loop+0x25/0x80 [ 94.324259][ T6489] ? clear_bhb_loop+0x25/0x80 [ 94.324359][ T6489] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 94.324410][ T6489] RIP: 0033:0x7fbecde7e969 [ 94.324424][ T6489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 94.324441][ T6489] RSP: 002b:00007fbecc4e6fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 94.324522][ T6489] RAX: ffffffffffffffda RBX: 00007fbece0a5fa0 RCX: 00007fbecde7e969 [ 94.324610][ T6489] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000004000 [ 94.324622][ T6489] RBP: 00007fbecc4e7090 R08: 0000000000000000 R09: 0000000000000000 [ 94.324633][ T6489] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 94.324645][ T6489] R13: 0000000000000001 R14: 00007fbece0a5fa0 R15: 00007ffddb400798 [ 94.324668][ T6489] [ 94.324677][ T6489] syz.0.1117: vmalloc error: size 16384, failed to allocated page array size 32, mode:0xdc2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 94.573767][ T6489] CPU: 1 UID: 0 PID: 6489 Comm: syz.0.1117 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 94.573795][ T6489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 94.573882][ T6489] Call Trace: [ 94.573890][ T6489] [ 94.573897][ T6489] __dump_stack+0x1d/0x30 [ 94.573945][ T6489] dump_stack_lvl+0xe8/0x140 [ 94.574023][ T6489] dump_stack+0x15/0x1b [ 94.574095][ T6489] warn_alloc+0x12b/0x1a0 [ 94.574181][ T6489] __vmalloc_node_range_noprof+0x455/0xdf0 [ 94.574220][ T6489] ? copy_process+0x399/0x1f90 [ 94.574300][ T6489] __vmalloc_node_noprof+0x63/0x80 [ 94.574322][ T6489] ? copy_process+0x399/0x1f90 [ 94.574457][ T6489] dup_task_struct+0x449/0x6a0 [ 94.574500][ T6489] ? _parse_integer+0x27/0x40 [ 94.574612][ T6489] copy_process+0x399/0x1f90 [ 94.574638][ T6489] ? kstrtouint+0x76/0xc0 [ 94.574737][ T6489] ? kstrtouint_from_user+0x9f/0xf0 [ 94.574814][ T6489] ? __rcu_read_unlock+0x4f/0x70 [ 94.574878][ T6489] kernel_clone+0x16c/0x5b0 [ 94.574907][ T6489] ? vfs_write+0x75e/0x8d0 [ 94.574939][ T6489] __x64_sys_clone+0xe6/0x120 [ 94.575001][ T6489] x64_sys_call+0x2c59/0x2fb0 [ 94.575059][ T6489] do_syscall_64+0xd0/0x1a0 [ 94.575085][ T6489] ? clear_bhb_loop+0x25/0x80 [ 94.575111][ T6489] ? clear_bhb_loop+0x25/0x80 [ 94.575135][ T6489] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 94.575174][ T6489] RIP: 0033:0x7fbecde7e969 [ 94.575192][ T6489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 94.575213][ T6489] RSP: 002b:00007fbecc4e6fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 94.575236][ T6489] RAX: ffffffffffffffda RBX: 00007fbece0a5fa0 RCX: 00007fbecde7e969 [ 94.575265][ T6489] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000004000 [ 94.575280][ T6489] RBP: 00007fbecc4e7090 R08: 0000000000000000 R09: 0000000000000000 [ 94.575293][ T6489] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 94.575304][ T6489] R13: 0000000000000001 R14: 00007fbece0a5fa0 R15: 00007ffddb400798 [ 94.575321][ T6489] [ 94.575327][ T6489] Mem-Info: [ 94.771071][ T6494] FAULT_INJECTION: forcing a failure. [ 94.771071][ T6494] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 94.774123][ T6489] active_anon:15000 inactive_anon:2 isolated_anon:0 [ 94.774123][ T6489] active_file:10950 inactive_file:12346 isolated_file:0 [ 94.774123][ T6489] unevictable:0 dirty:128 writeback:0 [ 94.774123][ T6489] slab_reclaimable:2932 slab_unreclaimable:13910 [ 94.774123][ T6489] mapped:28998 shmem:4569 pagetables:1029 [ 94.774123][ T6489] sec_pagetables:0 bounce:0 [ 94.774123][ T6489] kernel_misc_reclaimable:0 [ 94.774123][ T6489] free:1860277 free_pcp:20270 free_cma:0 [ 94.774186][ T6489] Node 0 active_anon:60000kB inactive_anon:8kB active_file:43800kB inactive_file:49384kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:115992kB dirty:512kB writeback:0kB shmem:18276kB writeback_tmp:0kB kernel_stack:2880kB pagetables:4116kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 94.782306][ T6494] CPU: 0 UID: 0 PID: 6494 Comm: syz.5.1119 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 94.782339][ T6494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 94.782356][ T6494] Call Trace: [ 94.782365][ T6494] [ 94.782376][ T6494] __dump_stack+0x1d/0x30 [ 94.782430][ T6494] dump_stack_lvl+0xe8/0x140 [ 94.782457][ T6494] dump_stack+0x15/0x1b [ 94.782485][ T6494] should_fail_ex+0x265/0x280 [ 94.782526][ T6494] should_fail_alloc_page+0xf2/0x100 [ 94.782639][ T6494] __alloc_frozen_pages_noprof+0xff/0x360 [ 94.782747][ T6494] alloc_pages_mpol+0xb3/0x250 [ 94.782828][ T6494] alloc_pages_noprof+0x90/0x130 [ 94.782857][ T6494] alloc_skb_with_frags+0x193/0x470 [ 94.782899][ T6494] ? should_fail_ex+0xdb/0x280 [ 94.782990][ T6494] sock_alloc_send_pskb+0x43a/0x4f0 [ 94.783040][ T6494] tun_get_user+0x8c0/0x24d0 [ 94.783078][ T6494] ? ref_tracker_alloc+0x1f2/0x2f0 [ 94.783199][ T6494] ? avc_policy_seqno+0x15/0x30 [ 94.783242][ T6494] tun_chr_write_iter+0x15e/0x210 [ 94.783273][ T6494] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 94.783363][ T6494] vfs_write+0x49d/0x8d0 [ 94.783400][ T6494] ksys_write+0xda/0x1a0 [ 94.783433][ T6494] __x64_sys_write+0x40/0x50 [ 94.783492][ T6494] x64_sys_call+0x2cdd/0x2fb0 [ 94.783519][ T6494] do_syscall_64+0xd0/0x1a0 [ 94.783546][ T6494] ? clear_bhb_loop+0x25/0x80 [ 94.783582][ T6494] ? clear_bhb_loop+0x25/0x80 [ 94.783610][ T6494] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 94.783637][ T6494] RIP: 0033:0x7f37aaede969 [ 94.783657][ T6494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 94.783680][ T6494] RSP: 002b:00007f37a9547038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 94.783774][ T6494] RAX: ffffffffffffffda RBX: 00007f37ab105fa0 RCX: 00007f37aaede969 [ 94.783791][ T6494] RDX: 0000000000000ffe RSI: 0000200000000240 RDI: 0000000000000003 [ 94.783808][ T6494] RBP: 00007f37a9547090 R08: 0000000000000000 R09: 0000000000000000 [ 94.783824][ T6494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 94.783840][ T6494] R13: 0000000000000000 R14: 00007f37ab105fa0 R15: 00007ffc300cf8c8 [ 94.783865][ T6494] [ 94.790947][ T6480] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 94.801813][ T6489] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 95.138764][ T6489] lowmem_reserve[]: 0 2884 7863 7863 [ 95.144290][ T6489] Node 0 DMA32 free:2949936kB boost:0kB min:4132kB low:7064kB high:9996kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2953568kB mlocked:0kB bounce:0kB free_pcp:3632kB local_pcp:3532kB free_cma:0kB [ 95.173058][ T6489] lowmem_reserve[]: 0 0 4978 4978 [ 95.178233][ T6489] Node 0 Normal free:4475580kB boost:0kB min:7184kB low:12280kB high:17376kB reserved_highatomic:0KB active_anon:60348kB inactive_anon:8kB active_file:43800kB inactive_file:49384kB unevictable:0kB writepending:628kB present:5242880kB managed:5098244kB mlocked:0kB bounce:0kB free_pcp:77052kB local_pcp:1116kB free_cma:0kB [ 95.208679][ T6489] lowmem_reserve[]: 0 0 0 0 [ 95.213311][ T6489] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 95.226146][ T6489] Node 0 DMA32: 4*4kB (M) 2*8kB (M) 1*16kB (M) 4*32kB (M) 2*64kB (M) 2*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (M) 3*2048kB (M) 717*4096kB (M) = 2949936kB [ 95.242386][ T6489] Node 0 Normal: 490*4kB (UM) 520*8kB (UME) 301*16kB (UE) 291*32kB (UME) 389*64kB (UME) 204*128kB (UME) 224*256kB (UM) 116*512kB (UME) 35*1024kB (UME) 12*2048kB (UME) 1032*4096kB (UM) = 4475480kB [ 95.262248][ T6489] Node 0 hugepages_total=7 hugepages_free=1 hugepages_surp=3 hugepages_size=2048kB [ 95.271716][ T6489] 27866 total pagecache pages [ 95.276443][ T6489] 2 pages in swap cache [ 95.280705][ T6489] Free swap = 124988kB [ 95.284998][ T6489] Total swap = 124996kB [ 95.289206][ T6489] 2097051 pages RAM [ 95.293145][ T6489] 0 pages HighMem/MovableOnly [ 95.297922][ T6489] 80258 pages reserved [ 95.369347][ T3313] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 95.381007][ T6501] SET target dimension over the limit! [ 95.403672][ T6480] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1114'. [ 95.472378][ T6506] tipc: Enabling of bearer rejected, already enabled [ 95.480321][ T6503] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(7) [ 95.486915][ T6503] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 95.494857][ T6503] vhci_hcd vhci_hcd.0: Device attached [ 95.512731][ T6508] FAULT_INJECTION: forcing a failure. [ 95.512731][ T6508] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 95.526019][ T6508] CPU: 1 UID: 0 PID: 6508 Comm: syz.5.1123 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 95.526053][ T6508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 95.526068][ T6508] Call Trace: [ 95.526077][ T6508] [ 95.526088][ T6508] __dump_stack+0x1d/0x30 [ 95.526204][ T6508] dump_stack_lvl+0xe8/0x140 [ 95.526250][ T6508] dump_stack+0x15/0x1b [ 95.526314][ T6508] should_fail_ex+0x265/0x280 [ 95.526345][ T6508] should_fail+0xb/0x20 [ 95.526428][ T6508] should_fail_usercopy+0x1a/0x20 [ 95.526450][ T6508] strncpy_from_user+0x25/0x230 [ 95.526505][ T6508] ? kmem_cache_alloc_noprof+0x186/0x310 [ 95.526560][ T6508] ? getname_flags+0x80/0x3b0 [ 95.526590][ T6508] getname_flags+0xae/0x3b0 [ 95.526630][ T6508] __se_sys_newlstat+0x4b/0x270 [ 95.526715][ T6508] ? fput+0x8f/0xc0 [ 95.526736][ T6508] ? ksys_write+0x16e/0x1a0 [ 95.526770][ T6508] __x64_sys_newlstat+0x31/0x40 [ 95.526805][ T6508] x64_sys_call+0x1c47/0x2fb0 [ 95.526899][ T6508] do_syscall_64+0xd0/0x1a0 [ 95.527002][ T6508] ? clear_bhb_loop+0x25/0x80 [ 95.527029][ T6508] ? clear_bhb_loop+0x25/0x80 [ 95.527056][ T6508] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 95.527083][ T6508] RIP: 0033:0x7f37aaede969 [ 95.527171][ T6508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 95.527194][ T6508] RSP: 002b:00007f37a9547038 EFLAGS: 00000246 ORIG_RAX: 0000000000000006 [ 95.527215][ T6508] RAX: ffffffffffffffda RBX: 00007f37ab105fa0 RCX: 00007f37aaede969 [ 95.527231][ T6508] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000000 [ 95.527246][ T6508] RBP: 00007f37a9547090 R08: 0000000000000000 R09: 0000000000000000 [ 95.527261][ T6508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 95.527304][ T6508] R13: 0000000000000000 R14: 00007f37ab105fa0 R15: 00007ffc300cf8c8 [ 95.527327][ T6508] [ 95.753005][ T29] kauditd_printk_skb: 182 callbacks suppressed [ 95.753018][ T29] audit: type=1326 audit(1745802414.404:11887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6502 comm="syz.2.1122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f69cebce969 code=0x7ffc0000 [ 95.782872][ T29] audit: type=1326 audit(1745802414.404:11888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6502 comm="syz.2.1122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f69cebce969 code=0x7ffc0000 [ 95.851589][ T6504] vhci_hcd: connection closed [ 95.851855][ T51] vhci_hcd: stop threads [ 95.860929][ T51] vhci_hcd: release socket [ 95.865525][ T51] vhci_hcd: disconnect device [ 95.881990][ T3361] usb 5-1: new high-speed USB device number 2 using vhci_hcd [ 95.899940][ T29] audit: type=1326 audit(1745802414.474:11889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6502 comm="syz.2.1122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f69cebce969 code=0x7ffc0000 [ 95.911522][ T3361] usb 5-1: enqueue for inactive port 0 [ 95.923646][ T29] audit: type=1326 audit(1745802414.474:11890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6502 comm="syz.2.1122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f69cebce969 code=0x7ffc0000 [ 95.952882][ T29] audit: type=1326 audit(1745802414.474:11891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6502 comm="syz.2.1122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f69cebce969 code=0x7ffc0000 [ 95.976553][ T29] audit: type=1326 audit(1745802414.474:11892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6502 comm="syz.2.1122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f69cebce969 code=0x7ffc0000 [ 96.000303][ T29] audit: type=1326 audit(1745802414.474:11893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6502 comm="syz.2.1122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=216 compat=0 ip=0x7f69cebce969 code=0x7ffc0000 [ 96.005173][ T3361] usb 5-1: enqueue for inactive port 0 [ 96.023893][ T29] audit: type=1326 audit(1745802414.474:11894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6502 comm="syz.2.1122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f69cebce969 code=0x7ffc0000 [ 96.052862][ T29] audit: type=1326 audit(1745802414.474:11895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6502 comm="syz.2.1122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=216 compat=0 ip=0x7f69cebce969 code=0x7ffc0000 [ 96.076475][ T29] audit: type=1326 audit(1745802414.474:11896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6502 comm="syz.2.1122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f69cebce969 code=0x7ffc0000 [ 96.096303][ T3361] usb 5-1: enqueue for inactive port 0 [ 96.256249][ T3361] vhci_hcd: vhci_device speed not set [ 96.297431][ T6525] loop3: detected capacity change from 0 to 8192 [ 96.421308][ T6525] xt_hashlimit: size too large, truncated to 1048576 [ 96.479151][ T6535] FAULT_INJECTION: forcing a failure. [ 96.479151][ T6535] name failslab, interval 1, probability 0, space 0, times 0 [ 96.492140][ T6535] CPU: 0 UID: 0 PID: 6535 Comm: syz.5.1131 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 96.492222][ T6535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 96.492234][ T6535] Call Trace: [ 96.492240][ T6535] [ 96.492249][ T6535] __dump_stack+0x1d/0x30 [ 96.492269][ T6535] dump_stack_lvl+0xe8/0x140 [ 96.492287][ T6535] dump_stack+0x15/0x1b [ 96.492307][ T6535] should_fail_ex+0x265/0x280 [ 96.492444][ T6535] should_failslab+0x8c/0xb0 [ 96.492477][ T6535] kmem_cache_alloc_noprof+0x50/0x310 [ 96.492509][ T6535] ? security_inode_alloc+0x37/0x100 [ 96.492593][ T6535] security_inode_alloc+0x37/0x100 [ 96.492614][ T6535] inode_init_always_gfp+0x4b7/0x500 [ 96.492645][ T6535] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 96.492674][ T6535] alloc_inode+0x58/0x170 [ 96.492723][ T6535] new_inode+0x1d/0xe0 [ 96.492747][ T6535] shmem_get_inode+0x244/0x750 [ 96.492781][ T6535] __shmem_file_setup+0x122/0x1f0 [ 96.492866][ T6535] shmem_file_setup+0x3b/0x50 [ 96.492911][ T6535] __se_sys_memfd_create+0x2c3/0x590 [ 96.492942][ T6535] __x64_sys_memfd_create+0x31/0x40 [ 96.492972][ T6535] x64_sys_call+0x122f/0x2fb0 [ 96.492993][ T6535] do_syscall_64+0xd0/0x1a0 [ 96.493085][ T6535] ? clear_bhb_loop+0x25/0x80 [ 96.493108][ T6535] ? clear_bhb_loop+0x25/0x80 [ 96.493128][ T6535] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 96.493151][ T6535] RIP: 0033:0x7f37aaede969 [ 96.493166][ T6535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 96.493186][ T6535] RSP: 002b:00007f37a9546e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 96.493208][ T6535] RAX: ffffffffffffffda RBX: 00000000000005ad RCX: 00007f37aaede969 [ 96.493220][ T6535] RDX: 00007f37a9546ef0 RSI: 0000000000000000 RDI: 00007f37aaf61444 [ 96.493233][ T6535] RBP: 0000200000000180 R08: 00007f37a9546bb7 R09: 00007f37a9546e40 [ 96.493248][ T6535] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000040 [ 96.493293][ T6535] R13: 00007f37a9546ef0 R14: 00007f37a9546eb0 R15: 0000200000000940 [ 96.493311][ T6535] [ 96.718727][ T6543] netlink: 20 bytes leftover after parsing attributes in process `+}[@'. [ 96.868424][ T6548] netlink: 'syz.0.1134': attribute type 1 has an invalid length. [ 96.871549][ T6539] can0 (unregistered): slcan off ttyS3. [ 96.929530][ T6545] loop5: detected capacity change from 0 to 8192 [ 96.945859][ T6545] vfat: Unknown parameter 'ÿÿú•CÁ“¥æäh9ÅÙs–³Ø}ÛÔªîí§n#þîK ¨@ß‹ïù¶uOö.vãèµÒ×Náùâ@w3iÔÜqñÝÅPhª? E:œFA±Ðl>% åm7<£_–ä•y‡½¾2Ìiv‘® ÷ €¨ Û6F™qñø ½' [ 96.963743][ T6549] Falling back ldisc for ttyS3. [ 97.035114][ T6545] syz.5.1133: attempt to access beyond end of device [ 97.035114][ T6545] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 97.089863][ T6545] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 97.131335][ T6545] infiniband srz1: RDMA CMA: cma_listen_on_dev, error -98 [ 97.170553][ T6555] loop0: detected capacity change from 0 to 8192 [ 97.362193][ T6562] loop5: detected capacity change from 0 to 512 [ 97.391139][ T6562] EXT4-fs: Ignoring removed oldalloc option [ 97.433713][ T6562] EXT4-fs error (device loop5): ext4_quota_enable:7126: inode #4: comm syz.5.1139: unexpected EA_INODE flag [ 97.455981][ T6565] syzkaller0: entered promiscuous mode [ 97.461587][ T6565] syzkaller0: entered allmulticast mode [ 97.497707][ T6562] EXT4-fs error (device loop5): ext4_quota_enable:7129: comm syz.5.1139: Bad quota inode: 4, type: 1 [ 97.533206][ T6562] EXT4-fs warning (device loop5): ext4_enable_quotas:7170: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 97.583067][ T6562] EXT4-fs (loop5): mount failed [ 97.805513][ T6582] loop3: detected capacity change from 0 to 1024 [ 97.831589][ T6580] sd 0:0:1:0: device reset [ 97.853852][ T6582] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 97.865051][ T6582] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 97.916651][ T6582] JBD2: no valid journal superblock found [ 97.917679][ T6588] loop0: detected capacity change from 0 to 512 [ 97.922605][ T6582] EXT4-fs (loop3): Could not load journal inode [ 97.942344][ T6590] FAULT_INJECTION: forcing a failure. [ 97.942344][ T6590] name failslab, interval 1, probability 0, space 0, times 0 [ 97.955018][ T6590] CPU: 0 UID: 0 PID: 6590 Comm: +}[@ Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 97.955051][ T6590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 97.955144][ T6590] Call Trace: [ 97.955151][ T6590] [ 97.955160][ T6590] __dump_stack+0x1d/0x30 [ 97.955185][ T6590] dump_stack_lvl+0xe8/0x140 [ 97.955210][ T6590] dump_stack+0x15/0x1b [ 97.955231][ T6590] should_fail_ex+0x265/0x280 [ 97.955272][ T6590] should_failslab+0x8c/0xb0 [ 97.955352][ T6590] kmem_cache_alloc_node_noprof+0x57/0x320 [ 97.955391][ T6590] ? __alloc_skb+0x101/0x320 [ 97.955423][ T6590] __alloc_skb+0x101/0x320 [ 97.955476][ T6590] netlink_alloc_large_skb+0xba/0xf0 [ 97.955513][ T6590] netlink_sendmsg+0x3cf/0x6b0 [ 97.955611][ T6590] ? __pfx_netlink_sendmsg+0x10/0x10 [ 97.955650][ T6590] __sock_sendmsg+0x142/0x180 [ 97.955734][ T6590] ____sys_sendmsg+0x31e/0x4e0 [ 97.955778][ T6590] ___sys_sendmsg+0x17b/0x1d0 [ 97.955817][ T6590] __x64_sys_sendmsg+0xd4/0x160 [ 97.955847][ T6590] x64_sys_call+0x2999/0x2fb0 [ 97.955925][ T6590] do_syscall_64+0xd0/0x1a0 [ 97.955952][ T6590] ? clear_bhb_loop+0x25/0x80 [ 97.955995][ T6590] ? clear_bhb_loop+0x25/0x80 [ 97.956017][ T6590] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 97.956042][ T6590] RIP: 0033:0x7f37aaede969 [ 97.956107][ T6590] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 97.956131][ T6590] RSP: 002b:00007f37a9547038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 97.956150][ T6590] RAX: ffffffffffffffda RBX: 00007f37ab105fa0 RCX: 00007f37aaede969 [ 97.956162][ T6590] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000004 [ 97.956174][ T6590] RBP: 00007f37a9547090 R08: 0000000000000000 R09: 0000000000000000 [ 97.956188][ T6590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 97.956203][ T6590] R13: 0000000000000000 R14: 00007f37ab105fa0 R15: 00007ffc300cf8c8 [ 97.956271][ T6590] [ 98.221828][ T6584] Falling back ldisc for ttyS3. [ 98.232361][ T6588] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 98.263445][ T6598] FAULT_INJECTION: forcing a failure. [ 98.263445][ T6598] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 98.270692][ T6588] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 98.276907][ T6598] CPU: 0 UID: 0 PID: 6598 Comm: syz.3.1149 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 98.276945][ T6598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 98.276962][ T6598] Call Trace: [ 98.276971][ T6598] [ 98.276992][ T6598] __dump_stack+0x1d/0x30 [ 98.277026][ T6598] dump_stack_lvl+0xe8/0x140 [ 98.277055][ T6598] dump_stack+0x15/0x1b [ 98.277077][ T6598] should_fail_ex+0x265/0x280 [ 98.277126][ T6598] should_fail_alloc_page+0xf2/0x100 [ 98.277166][ T6598] __alloc_frozen_pages_noprof+0xff/0x360 [ 98.277298][ T6598] alloc_pages_mpol+0xb3/0x250 [ 98.277328][ T6598] alloc_pages_noprof+0x90/0x130 [ 98.277356][ T6598] pte_alloc_one+0x2a/0x110 [ 98.277441][ T6598] __pte_alloc+0x32/0x290 [ 98.277484][ T6598] handle_mm_fault+0x1d74/0x2ae0 [ 98.277514][ T6598] ? __rcu_read_unlock+0x4f/0x70 [ 98.277552][ T6598] do_user_addr_fault+0x3fe/0x1090 [ 98.277662][ T6598] exc_page_fault+0x54/0xc0 [ 98.277704][ T6598] asm_exc_page_fault+0x26/0x30 [ 98.277731][ T6598] RIP: 0010:__put_user_4+0xd/0x20 [ 98.277758][ T6598] Code: 66 89 01 31 c9 0f 01 ca c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 89 cb 48 c1 fb 3f 48 09 d9 0f 01 cb <89> 01 31 c9 0f 01 ca c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 [ 98.277804][ T6598] RSP: 0018:ffffc90001317eb0 EFLAGS: 00050206 [ 98.277825][ T6598] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00002000000002c0 [ 98.277841][ T6598] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000ffffffff [ 98.277856][ T6598] RBP: 0000000000000000 R08: 0001ffff8685d513 R09: 0000000000000000 [ 98.277871][ T6598] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 98.277886][ T6598] R13: ffffffff8685d4d0 R14: 0000000000000000 R15: 0000200000000340 [ 98.277910][ T6598] __se_sys_getresgid+0xb9/0x130 [ 98.278036][ T6598] __x64_sys_getresgid+0x43/0x50 [ 98.278104][ T6598] x64_sys_call+0x26fa/0x2fb0 [ 98.278131][ T6598] do_syscall_64+0xd0/0x1a0 [ 98.278165][ T6598] ? clear_bhb_loop+0x25/0x80 [ 98.278197][ T6598] ? clear_bhb_loop+0x25/0x80 [ 98.278261][ T6598] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 98.278288][ T6598] RIP: 0033:0x7fcef4cae969 [ 98.278308][ T6598] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 98.278331][ T6598] RSP: 002b:00007fcef3317038 EFLAGS: 00000246 ORIG_RAX: 0000000000000078 [ 98.278451][ T6598] RAX: ffffffffffffffda RBX: 00007fcef4ed5fa0 RCX: 00007fcef4cae969 [ 98.278475][ T6598] RDX: 0000200000000340 RSI: 0000200000000300 RDI: 00002000000002c0 [ 98.278492][ T6598] RBP: 00007fcef3317090 R08: 0000000000000000 R09: 0000000000000000 [ 98.278507][ T6598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 98.278522][ T6598] R13: 0000000000000001 R14: 00007fcef4ed5fa0 R15: 00007ffc431b7cc8 [ 98.278546][ T6598] [ 98.965840][ T6636] Falling back ldisc for ttyS3. Apr 28 01:06:57 syzkaller kern.warn kernel: [ 98.965840][ T6636] Falling back ldisc for ttyS3. [ 99.059027][ T6652] FAULT_INJECTION: forcing a failure. [ 99.059027][ T6652] name failslab, interval 1, probability 0, space 0, times 0 [ 99.071775][ T6652] CPU: 1 UID: 0 PID: 6652 Comm: syz.3.1169 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 99.071807][ T6652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 99.071819][ T6652] Call Trace: [ 99.071827][ T6652] [ 99.071834][ T6652] __dump_stack+0x1d/0x30 [ 99.071937][ T6652] dump_stack_lvl+0xe8/0x140 [ 99.071991][ T6652] dump_stack+0x15/0x1b [ 99.072006][ T6652] should_fail_ex+0x265/0x280 [ 99.072038][ T6652] should_failslab+0x8c/0xb0 [ 99.072075][ T6652] kmem_cache_alloc_noprof+0x50/0x310 [ 99.072231][ T6652] ? security_inode_alloc+0x37/0x100 [ 99.072312][ T6652] security_inode_alloc+0x37/0x100 [ 99.072343][ T6652] inode_init_always_gfp+0x4b7/0x500 [ 99.072368][ T6652] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 99.072400][ T6652] alloc_inode+0x58/0x170 [ 99.072554][ T6652] new_inode+0x1d/0xe0 [ 99.072586][ T6652] shmem_get_inode+0x244/0x750 [ 99.072623][ T6652] __shmem_file_setup+0x122/0x1f0 [ 99.072725][ T6652] shmem_file_setup+0x3b/0x50 [ 99.072768][ T6652] __se_sys_memfd_create+0x2c3/0x590 [ 99.072833][ T6652] __x64_sys_memfd_create+0x31/0x40 [ 99.072862][ T6652] x64_sys_call+0x122f/0x2fb0 [ 99.072883][ T6652] do_syscall_64+0xd0/0x1a0 [ 99.072928][ T6652] ? clear_bhb_loop+0x25/0x80 [ 99.072952][ T6652] ? clear_bhb_loop+0x25/0x80 [ 99.072979][ T6652] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 99.073005][ T6652] RIP: 0033:0x7fcef4cae969 [ 99.073020][ T6652] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 99.073088][ T6652] RSP: 002b:00007fcef3316e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 99.073111][ T6652] RAX: ffffffffffffffda RBX: 00000000000005ad RCX: 00007fcef4cae969 [ 99.073123][ T6652] RDX: 00007fcef3316ef0 RSI: 0000000000000000 RDI: 00007fcef4d31444 [ 99.073135][ T6652] RBP: 0000200000000180 R08: 00007fcef3316bb7 R09: 00007fcef3316e40 [ 99.073146][ T6652] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000040 [ 99.073158][ T6652] R13: 00007fcef3316ef0 R14: 00007fcef3316eb0 R15: 0000200000000940 [ 99.073175][ T6652] Apr 28 01:06:57 syzkaller kern.notice kernel: [ 99.059027][ T6652] FAULT_INJECTION: forcing a failure. Apr 28 01:06:57 syzkaller kern.notice kernel: [ 99.059027][ T6652] name failslab, interval 1, probability 0, space 0, times 0 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.071775][ T6652] CPU: 1 UID: 0 PID: 6652 Comm: syz.3.1169 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.071807][ T6652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.071819][ T6652] Call Trace: Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.071827][ T6652] Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.071834][ T6652] __dump_stack+0x1d/0x30 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.071937][ T6652] dump_stack_lvl+0xe8/0x140 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.071991][ T6652] dump_stack+0x15/0x1b Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.072006][ T6652] should_fail_ex+0x265/0x280 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.072038][ T6652] should_failslab+0x8c/0xb0 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.072075][ T6652] kmem_cache_alloc_noprof+0x50/0x310 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.072231][ T6652] ? security_inode_alloc+0x37/0x100 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.072312][ T6652] security_inode_alloc+0x37/0x100 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.072343][ T6652] inode_init_always_gfp+0x4b7/0x500 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.072368][ T6652] ? __pfx_shmem_alloc_inode+0x10/0x10 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.072400][ T6652] alloc_inode+0x58/0x170 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.072554][ T6652] new_inode+0x1d/0xe0 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.072586][ T6652] shmem_get_inode+0x244/0x750 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.072623][ T6652] __shmem_file_setup+0x122/0x1f0 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.072725][ T6652] shmem_file_setup+0x3b/0x50 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.072768][ T6652] __se_sys_memfd_create+0x2c3/0x590 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.072833][ T6652] __x64_sys_memfd_create+0x31/0x40 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.072862][ T6652] x64_sys_call+0x122f/0x2fb0 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.072883][ T6652] do_syscall_64+0xd0/0x1a0 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.072928][ T6652] ? clear_bhb_loop+0x25/0x80 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.072952][ T6652] ? clear_bhb_loop+0x25/0x80 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.072979][ T6652] entry_SYSCALL_64_after_hwframe+0x77/0x7f Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.073005][ T6652] RIP: 0033:0x7fcef4cae969 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.073020][ T6652] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.073088][ T6652] RSP: 002b:00007fcef3316e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.073111][ T6652] RAX: ffffffffffffffda RBX: 00000000000005ad RCX: 00007fcef4cae969 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.073123][ T6652] RDX: 00007fcef3316ef0 RSI: 0000000000000000 RDI: 00007fcef4d31444 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.073135][ T6652] RBP: 0000200000000180 R08: 00007fcef3316bb7 R09: 00007fcef3316e40 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.073146][ T6652] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000040 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.073158][ T6652] R13: 00007fcef3316ef0 R14: 00007fcef3316eb0 R15: 0000200000000940 Apr 28 01:06:57 syzkaller kern.warn kernel: [ 99.073175[ 99.663900][ T6677] Falling back ldisc for ttyS3. ][ T6652] Apr 28 01:06:58 syzkaller kern.warn kernel: [ 99.663900][ T6677] Falling back ldisc for ttyS3. [ 99.740810][ T6689] FAULT_INJECTION: forcing a failure. [ 99.740810][ T6689] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 99.754149][ T6689] CPU: 1 UID: 0 PID: 6689 Comm: syz.5.1186 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 99.754180][ T6689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 99.754201][ T6689] Call Trace: [ 99.754210][ T6689] [ 99.754221][ T6689] __dump_stack+0x1d/0x30 [ 99.754244][ T6689] dump_stack_lvl+0xe8/0x140 [ 99.754268][ T6689] dump_stack+0x15/0x1b [ 99.754356][ T6689] should_fail_ex+0x265/0x280 [ 99.754387][ T6689] should_fail+0xb/0x20 [ 99.754483][ T6689] should_fail_usercopy+0x1a/0x20 [ 99.754507][ T6689] _copy_from_iter+0xcf/0xdd0 [ 99.754530][ T6689] ? __build_skb_around+0x1a0/0x200 [ 99.754560][ T6689] ? __alloc_skb+0x223/0x320 [ 99.754675][ T6689] netlink_sendmsg+0x471/0x6b0 [ 99.754762][ T6689] ? __pfx_netlink_sendmsg+0x10/0x10 [ 99.754799][ T6689] __sock_sendmsg+0x142/0x180 [ 99.754837][ T6689] ____sys_sendmsg+0x31e/0x4e0 [ 99.754878][ T6689] ___sys_sendmsg+0x17b/0x1d0 [ 99.754912][ T6689] __x64_sys_sendmsg+0xd4/0x160 [ 99.754940][ T6689] x64_sys_call+0x2999/0x2fb0 [ 99.755023][ T6689] do_syscall_64+0xd0/0x1a0 [ 99.755043][ T6689] ? clear_bhb_loop+0x25/0x80 [ 99.755077][ T6689] ? clear_bhb_loop+0x25/0x80 [ 99.755143][ T6689] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 99.755167][ T6689] RIP: 0033:0x7f37aaede969 [ 99.755185][ T6689] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 99.755207][ T6689] RSP: 002b:00007f37a9547038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 99.755232][ T6689] RAX: ffffffffffffffda RBX: 00007f37ab105fa0 RCX: 00007f37aaede969 [ 99.755244][ T6689] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000003 [ 99.755311][ T6689] RBP: 00007f37a9547090 R08: 0000000000000000 R09: 0000000000000000 [ 99.755327][ T6689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 99.755342][ T6689] R13: 0000000000000000 R14: 00007f37ab105fa0 R15: 00007ffc300cf8c8 [ 99.755363][ T6689] [ 99.996741][ T6693] FAULT_INJECTION: forcing a failure. [ 99.996741][ T6693] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 100.010054][ T6693] CPU: 1 UID: 0 PID: 6693 Comm: syz.2.1183 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 100.010088][ T6693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 100.010104][ T6693] Call Trace: [ 100.010111][ T6693] [ 100.010119][ T6693] __dump_stack+0x1d/0x30 [ 100.010157][ T6693] dump_stack_lvl+0xe8/0x140 [ 100.010182][ T6693] dump_stack+0x15/0x1b [ 100.010199][ T6693] should_fail_ex+0x265/0x280 [ 100.010256][ T6693] should_fail+0xb/0x20 [ 100.010348][ T6693] should_fail_usercopy+0x1a/0x20 [ 100.010370][ T6695] FAULT_INJECTION: forcing a failure. [ 100.010370][ T6695] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 100.010372][ T6693] _copy_to_user+0x20/0xa0 [ 100.010438][ T6693] simple_read_from_buffer+0xb5/0x130 [ 100.010538][ T6693] proc_fail_nth_read+0x100/0x140 [ 100.010573][ T6693] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 100.010671][ T6693] vfs_read+0x19d/0x6f0 [ 100.010701][ T6693] ? __rcu_read_unlock+0x4f/0x70 [ 100.010799][ T6693] ? __fget_files+0x184/0x1c0 [ 100.010837][ T6693] ksys_read+0xda/0x1a0 [ 100.010870][ T6693] __x64_sys_read+0x40/0x50 [ 100.010901][ T6693] x64_sys_call+0x2d77/0x2fb0 [ 100.010943][ T6693] do_syscall_64+0xd0/0x1a0 [ 100.011039][ T6693] ? clear_bhb_loop+0x25/0x80 [ 100.011065][ T6693] ? clear_bhb_loop+0x25/0x80 [ 100.011093][ T6693] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 100.011162][ T6693] RIP: 0033:0x7f69cebcd37c [ 100.011182][ T6693] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 100.011213][ T6693] RSP: 002b:00007f69cd237030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 100.011237][ T6693] RAX: ffffffffffffffda RBX: 00007f69cedf5fa0 RCX: 00007f69cebcd37c [ 100.011253][ T6693] RDX: 000000000000000f RSI: 00007f69cd2370a0 RDI: 0000000000000003 [ 100.011268][ T6693] RBP: 00007f69cd237090 R08: 0000000000000000 R09: 0000000000000000 [ 100.011284][ T6693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.011299][ T6693] R13: 0000000000000000 R14: 00007f69cedf5fa0 R15: 00007ffcef190438 [ 100.011322][ T6693] [ 100.222031][ T6695] CPU: 0 UID: 0 PID: 6695 Comm: syz.3.1188 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 100.222062][ T6695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 100.222079][ T6695] Call Trace: [ 100.222088][ T6695] [ 100.222178][ T6695] __dump_stack+0x1d/0x30 [ 100.222278][ T6695] dump_stack_lvl+0xe8/0x140 [ 100.222305][ T6695] dump_stack+0x15/0x1b [ 100.222328][ T6695] should_fail_ex+0x265/0x280 [ 100.222369][ T6695] should_fail+0xb/0x20 [ 100.222434][ T6695] should_fail_usercopy+0x1a/0x20 [ 100.222532][ T6695] _copy_to_user+0x20/0xa0 [ 100.222561][ T6695] simple_read_from_buffer+0xb5/0x130 [ 100.222617][ T6695] proc_fail_nth_read+0x100/0x140 [ 100.222651][ T6695] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 100.222753][ T6695] vfs_read+0x19d/0x6f0 [ 100.222852][ T6695] ? __rcu_read_unlock+0x4f/0x70 [ 100.222912][ T6695] ? __fget_files+0x184/0x1c0 [ 100.222950][ T6695] ksys_read+0xda/0x1a0 [ 100.223016][ T6695] __x64_sys_read+0x40/0x50 [ 100.223057][ T6695] x64_sys_call+0x2d77/0x2fb0 [ 100.223084][ T6695] do_syscall_64+0xd0/0x1a0 [ 100.223126][ T6695] ? clear_bhb_loop+0x25/0x80 [ 100.223154][ T6695] ? clear_bhb_loop+0x25/0x80 [ 100.223195][ T6695] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 100.223222][ T6695] RIP: 0033:0x7fcef4cad37c [ 100.223242][ T6695] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 100.223271][ T6695] RSP: 002b:00007fcef3317030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 100.223321][ T6695] RAX: ffffffffffffffda RBX: 00007fcef4ed5fa0 RCX: 00007fcef4cad37c [ 100.223337][ T6695] RDX: 000000000000000f RSI: 00007fcef33170a0 RDI: 0000000000000004 [ 100.223353][ T6695] RBP: 00007fcef3317090 R08: 0000000000000000 R09: 0000000000000000 [ 100.223368][ T6695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.223384][ T6695] R13: 0000000000000000 R14: 00007fcef4ed5fa0 R15: 00007ffc431b7cc8 [ 100.223408][ T6695] [ 100.572909][ T6726] @0ÿ: renamed from bond_slave_0 (while UP) Apr 28 01:06:58 syzkaller kern.notice kernel: [ 99.740810][ T6689] FAULT_INJECTION: forcing a failure. Apr 28 01:06:58 syzkaller kern.notice kernel: [ 99.740810][ T6689] name fail_usercopy, interval 1, probability 0, space 0, times 0 Apr 28 01:06:58 syzkaller kern.warn kernel: [ 99.754149][ T6689] CPU: 1 UID: 0 PID: 6689 Comm: syz.5.1186 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) Apr 28 01:06:58 syzkaller kern.warn kernel: [ 99.754180][ T6689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 28 01:06:[ 100.762006][ T29] kauditd_printk_skb: 843 callbacks suppressed 58 syzkaller ker[ 100.762024][ T29] audit: type=1400 audit(1745802419.424:12740): avc: denied { read } for pid=2987 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 n.warn kernel: [ 99.754201][ T6689] Call Trace: Apr 28 01:06:58 syzkaller kern.warn kernel: [ 99.754210][ T6689] Apr 28 01:06:58 syzkaller kern.warn kernel: [ 99.754221][ T6689] __dump_stack+0x1d/0x30 Apr 28 01:06:58 syzkaller kern.warn kernel: [ 99.754244][ T6689] dump_stack_lvl+0xe8/0x140 Apr 28 01:06:58 syzkaller kern.warn kernel: [ 99.754268][ T6689] dump_stack+0x15/0x1b Apr 28 01:06:58 syzkaller kern.warn kernel: [ 100.831186][ T6740] audit: audit_lost=41 audit_rate_limit=0 audit_backlog_limit=64 [ 99.754356][ [ 100.839778][ T6740] audit: out of memory in audit_log_start T6689] should_fail_ex+0x265/0x280 Apr 28 01:06:58 syzkaller kern.warn kernel: [ 99.754387][ T6689] should_fail+0xb/0x20 Apr 28 01:06:58 syzkaller kern.warn kernel: [ 99.754483][ T6689] should_fail_usercopy+0x1a/0x20 Apr 28 01:06:58 syzkaller kern.warn kernel: [ 99.754507][ T6689] _copy_from_iter+0xcf/0xdd0 Apr 28 01:06:59 syzkaller kern.warn kernel: [ [ 100.878355][ T29] audit: type=1400 audit(1745802419.424:12741): avc: denied { prog_load } for pid=6737 comm="syz.3.1206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 99.754530][ T6[ 100.898306][ T29] audit: type=1400 audit(1745802419.424:12742): avc: denied { map_create } for pid=6737 comm="syz.3.1206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 689] ? __build_[ 100.919046][ T29] audit: type=1400 audit(1745802419.424:12743): avc: denied { prog_load } for pid=6737 comm="syz.3.1206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 skb_around+0x1a0[ 100.939638][ T29] audit: type=1400 audit(1745802419.424:12744): avc: denied { map_create } for pid=6737 comm="syz.3.1206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 /0x200 Apr 28 0[ 100.961358][ T29] audit: type=1400 audit(1745802419.424:12745): avc: denied { prog_load } for pid=6737 comm="syz.3.1206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 1:06:59 syzkalle[ 100.981775][ T29] audit: type=1400 audit(1745802419.424:12746): avc: denied { prog_load } for pid=6737 comm="syz.3.1206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 r kern.warn kern[ 101.002426][ T29] audit: type=1400 audit(1745802419.424:12747): avc: denied { map_create } for pid=6737 comm="syz.3.1206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 el: [ 99.754560][ T6689] ? __alloc_skb+0x223/0x320 Apr 28 01:06:59 syzkaller kern.warn kernel: [ 99.754675][ T6689] netlink_sendmsg+0x471/0x6b0 Apr 28 01:06:59 syzkaller kern.warn kernel: [ 99.754762][ T6689] ? __pfx_netlink_sendmsg+0x10/0x10 Apr 28 01:06:59 syzkaller kern.warn kernel: [ 99.754799][ T6689] __sock_sendmsg+0x142/0x180 Apr 28 01:06:59 syzkaller kern.warn kernel: [ 99.754837][ T6689] ____sys_sendmsg+0x31e/0x4e0 Apr 28 01:06:59 syzkaller kern.warn kernel: [ 99.754878][ T6689] ___sys_sendmsg+0x17b/0x1d0 Apr 28 01:06:59 syzkaller kern.warn kernel: [ 99.754912][ T6689] __x64_sys_sendmsg+0xd4/0x160 Apr 28 01:06:59 syzkaller kern.warn kernel: [ 99.754940][ T6689] x64_sys_call+0x2999/0x2fb0 Apr 28 01:06:59 syzkaller kern.warn kernel: [ 99.755023][ T6689] do_syscall_64+0xd0/0x1a0 Apr 28 01:06:59 syzkaller kern.warn kernel: [ 99.755043][ T6689] ? clear_bhb_loop+0x25/0x80 Apr 28 01:06:59 syzkaller kern.warn kernel: [ 99.755077][ T6689] ? clear_bhb_loop+0x25/0x80 Apr 28 01:06:59 syzkaller kern.warn kernel: [ 99.755143][ T6689] entry_SYSCALL_64_after_hwframe+0x77/0x7f Apr 28 01:06:59 syzkaller kern.warn kernel: [ 99.755167][ T6689] RIP: 0033:0x7f37aaede969 Apr 28 01:06:59 syzkaller kern.warn kernel: [ 99.755185][ T6689] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f[ 101.140510][ T6753] SET target dimension over the limit! 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Apr 28 01:06:59 syzkaller kern.warn kernel: [ 99.755207][ T6689] RSP: 002b:00007f37a9547038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e Apr 28 01:06:59 syzkaller kern.warn kernel: [ 99.755232][ T6689] RAX: ffffffffffffffda RBX: 00007f37ab105fa0 RCX: 00007f37aaede969 Apr 28 01:06:59 syzkaller kern.warn kernel: [ 99.755244][ T6689] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000003 Apr 28 01:06:59 syzkaller kern.warn kernel: [ 99.755311][ T6689] RBP: 00007f37a9547090 R08: 0000000000000000 R09: 0000000000000000 Apr 28 01:06:59 syzkaller kern.warn kernel: [ 99.755327][ T6689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 Apr 28 01:06:59 syzkaller kern.warn kernel: [ 99.755342][ T6689] R13: 0000000000000000 R14: 00007f37ab105fa0 R15: 00007ffc300cf8c8 Apr 28 01:06:59 syzkaller kern.warn kernel: [ 99.755363][ T6689] Apr 28 01:06:59 syzkaller kern.notice kernel: [ 99.996741][ T6693] FAULT_INJECTION: forcing a failure. Apr 28 01:06:59 syzkaller kern.notice kernel: [ 99.996741][ T6693] name fail_usercopy, interval 1, probability 0, space 0, times 0 Apr 28 01:06:59 syzkaller kern.warn kernel: [ 100.010054][ T6693] CPU: 1 UID: 0 PID: 6693 Comm: syz.2.1183 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) Apr 28 01:06:59 syzkaller kern.warn kernel: [ 100.010088][ T6693] Hardware name: Google GooglApr 28 01:06:59 Apr 28 01:06:59 Apr 28 01:06:59 Apr 28 01:06:59 Apr 28 01:06:59 Apr 28 01:06:59 Apr 28 01:06:59 Apr 28 01:06:59 Apr 28 01:06:59 Apr 28 01:06:59 Apr 28 01:06:59 Apr 28 01:06:59 Apr 28 01:06:59 Apr 28 01:06:59 Apr 28 01:06:59 Apr 28 01:06:59 Apr 28 01:06:59 Apr 28 01:06:59 syzkaller kern.warn kernel: [ 100.222912][ T6695] ? __fget_filApr 28 01:06:59 syzkaller kern.warn kernel: [ 1Apr 28 01:06:59 Apr 28 01:06:59 syzkaller kern.warn kernel: [ 100.223337][ T6695] RDX: 000000000000000f RSI: 00007fcef33170a0 RDI: 0000000000000004 Apr 28 01:06:59 syzkaller [ 101.330125][ T6771] FAULT_INJECTION: forcing a failure. [ 101.330125][ T6771] name failslab, interval 1, probability 0, space 0, times 0 kern.warn kernel: [ 100.223353][ T6695] RBP: 00007fcef3317090 R08: 000000000000[ 101.344259][ T6771] CPU: 1 UID: 0 PID: 6771 Comm: syz.5.1221 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 101.344294][ T6771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 101.344380][ T6771] Call Trace: [ 101.344388][ T6771] [ 101.344398][ T6771] __dump_stack+0x1d/0x30 [ 101.344425][ T6771] dump_stack_lvl+0xe8/0x140 [ 101.344526][ T6771] dump_stack+0x15/0x1b [ 101.344547][ T6771] should_fail_ex+0x265/0x280 [ 101.344587][ T6771] should_failslab+0x8c/0xb0 [ 101.344626][ T6771] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 101.344654][ T6771] ? security_context_to_sid_core+0x69/0x3b0 [ 101.344691][ T6771] kmemdup_nul+0x36/0xc0 [ 101.344767][ T6771] security_context_to_sid_core+0x69/0x3b0 [ 101.344864][ T6771] ? avc_has_perm_noaudit+0x1b1/0x200 [ 101.344912][ T6771] security_context_to_sid+0x2e/0x40 [ 101.344967][ T6771] selinux_lsm_setattr+0x2dc/0x660 [ 101.345009][ T6771] selinux_setprocattr+0x4f/0x70 [ 101.345034][ T6771] security_setprocattr+0x1a4/0x1d0 [ 101.345060][ T6771] proc_pid_attr_write+0x1eb/0x220 [ 101.345149][ T6771] ? __pfx_proc_pid_attr_write+0x10/0x10 [ 101.345175][ T6771] vfs_write+0x266/0x8d0 [ 101.345204][ T6771] ? __rcu_read_unlock+0x4f/0x70 [ 101.345283][ T6771] ? __fget_files+0x184/0x1c0 [ 101.345315][ T6771] ksys_write+0xda/0x1a0 [ 101.345347][ T6771] __x64_sys_write+0x40/0x50 [ 101.345406][ T6771] x64_sys_call+0x2cdd/0x2fb0 [ 101.345433][ T6771] do_syscall_64+0xd0/0x1a0 [ 101.345461][ T6771] ? clear_bhb_loop+0x25/0x80 [ 101.345520][ T6771] ? clear_bhb_loop+0x25/0x80 [ 101.345548][ T6771] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 101.345646][ T6771] RIP: 0033:0x7f37aaede969 [ 101.345665][ T6771] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 101.345687][ T6771] RSP: 002b:00007f37a9547038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 101.345711][ T6771] RAX: ffffffffffffffda RBX: 00007f37ab105fa0 RCX: 00007f37aaede969 [ 101.345726][ T6771] RDX: 000000000000001d RSI: 0000200000000100 RDI: 0000000000000003 [ 101.345742][ T6771] RBP: 00007f37a9547090 R08: 0000000000000000 R09: 0000000000000000 [ 101.345758][ T6771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 101.345774][ T6771] R13: 0000000000000000 R14: 00007f37ab105fa0 R15: 00007ffc300cf8c8 [ 101.345875][ T6771] 0000 R09: 0000000000000000 Apr 28 01:06:59 syzkaller kern.warn kernel: [ 100.223368][ T6695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 Apr 28 01:06:59 syzkaller kern.warn kernel: [ Apr 28 01:06:59 Apr 28 01:06:59 syzkaller kern.notice kernel: [ 100.878355][ T29] audit: type=1400 audit(1745802419.424:12741): avc: denied { prog_load } for pid=6737 comm="syz.3.1206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Apr 28 01:06:59 syzkaller kern.notice kernel: [ 100.898306][ T29] audit: type=1400 audit(1745802419.424:12742): avc: Apr 28 01:06:59 syzkaller kern.info kernel: [ 101.140510][ T6753] SET target dimension over the limit! Apr 28 01:07:00 syzkaller kern.notice kernel: [ 101.330125][ T6771] FAULT_INJECTION: forcing a failure. Apr 28 01:07:00 syzkaller kern.notice kernel: [ 101.330125][ T6771] name failslab, interval 1, probability 0, space 0, times 0 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.344259][ T6771] CPU: 1 UID: 0 PID: 6771 Comm: syz.5.1221 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.344294][ T6771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.344380][ T6771] Call Trace: Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.344388][ T6771] Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.344398][ T6771] __dump_stack+0x1d/0x30 Apr 28 01:07:00 syzkaller kern.wa[ 101.718952][ T6781] syzkaller0: entered promiscuous mode rn kernel: [ 10[ 101.725816][ T6781] syzkaller0: entered allmulticast mode 1.344425][ T6771] dump_stack_lvl+0xe8/0x140 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.344526][ T6771] dump_stack+0x15/0x1b Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.344547][ T6771] should_fail_ex+0x265/0x280 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.344587][ T6771] should_failslab+0x8c/0xb0 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.344626][ T6771] __kmalloc_node_track_caller_noprof+0xa4/0x410 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.344654][ T6771] ? security_context_to_sid_core+0x69/0x3b0 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.344691][ T6771] kmemdup_nul+0x36/0xc0 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.344767][ T6771] security_context_to_sid_core+0x69/0x3b0 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.344864][ T6771] ? avc_has_perm_noaudit+0x1b1/0x200 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.344912][ T6771] security_context_to_sid+0x2e/0x40 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.344967][ T6771] selinux_lsm_setattr+0x2dc/0x660 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.345009][ T6771] selinux_setprocattr+0x4f/0x70 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.345034][ T6771] security_setprocattr+0x1a4/0x1d0 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.345060][ T6771] proc_pid_attr_write+0x1eb/0x220 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.345149][ T6771] ? __pfx_proc_pid_attr_write+0x10/0x10 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.345175][ T6771] vfs_write+0x266/0x8d0 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.345204][ T6771] ? __rcu_read_unlock+0x4f/0x70 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.345283][ T6771] ? __fget_files+0x184/0x1c0 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.345315][ T6771] ksys_write+0xda/0x1a0 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.345347][ T6771] __x64_sys_write+0x40/0x50 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.345406][ T6771] x64_sys_call+0x2cdd/0x2fb0 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.345433][ T6771] do_syscall_64+0xd0/0x1a0 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.345461][ T6771] ? clear_bhb_loop+0x25/0x80 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.345520][ [ 101.932531][ T6814] FAULT_INJECTION: forcing a failure. [ 101.932531][ T6814] name fail_usercopy, interval 1, probability 0, space 0, times 0 T6771] ? clear_bhb_loop+0x25/0x80 Apr 28 01:07:00 syzkaller ke[ 101.947058][ T6814] CPU: 0 UID: 0 PID: 6814 Comm: syz.5.1237 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) rn.warn kernel: [ 101.947084][ T6814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 101.345548][ [ 101.947097][ T6814] Call Trace: [ 101.947102][ T6814] T6771] entry_SY[ 101.947115][ T6814] __dump_stack+0x1d/0x30 SCALL_64_after_h[ 101.947159][ T6814] dump_stack_lvl+0xe8/0x140 wframe+0x77/0x7f[ 101.947183][ T6814] dump_stack+0x15/0x1b Apr 28 01:07:0[ 101.947203][ T6814] should_fail_ex+0x265/0x280 0 syzkaller kern[ 101.947308][ T6814] should_fail+0xb/0x20 .warn kernel: [ [ 101.947392][ T6814] should_fail_usercopy+0x1a/0x20 101.345646][ T6[ 101.947413][ T6814] _copy_to_user+0x20/0xa0 771] RIP: 0033:0[ 101.947469][ T6814] simple_read_from_buffer+0xb5/0x130 x7f37aaede969 A[ 101.947499][ T6814] proc_fail_nth_read+0x100/0x140 pr 28 01:07:00 s[ 101.947531][ T6814] ? __pfx_proc_fail_nth_read+0x10/0x10 yzkaller kern.wa[ 101.947611][ T6814] vfs_read+0x19d/0x6f0 rn kernel: [ 10[ 101.947633][ T6814] ? __rcu_read_unlock+0x4f/0x70 1.345665][ T6771[ 101.947652][ T6814] ? __fget_files+0x184/0x1c0 ] Code: ff ff c3[ 101.947759][ T6814] ksys_read+0xda/0x1a0 66 2e 0f 1f 84 [ 101.947789][ T6814] __x64_sys_read+0x40/0x50 00 00 00 00 00 0[ 101.947814][ T6814] x64_sys_call+0x2d77/0x2fb0 f 1f 40 00 48 89[ 101.947840][ T6814] do_syscall_64+0xd0/0x1a0 f8 48 89 f7 48 [ 101.947866][ T6814] ? clear_bhb_loop+0x25/0x80 89 d6 48 89 ca 4[ 101.947931][ T6814] ? clear_bhb_loop+0x25/0x80 d 89 c2 4d 89 c8[ 101.947954][ T6814] entry_SYSCALL_64_after_hwframe+0x77/0x7f 4c 8b 4c 24 08 [ 101.947973][ T6814] RIP: 0033:0x7f37aaedd37c Apr 28 01:07:00 [ 101.947988][ T6814] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 syzkaller kern.i[ 101.948005][ T6814] RSP: 002b:00007f37a9547030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 nfo kernel: [ 1[ 101.948027][ T6814] RAX: ffffffffffffffda RBX: 00007f37ab105fa0 RCX: 00007f37aaedd37c 01.718952][ T678[ 101.948043][ T6814] RDX: 000000000000000f RSI: 00007f37a95470a0 RDI: 0000000000000005 1] syzkaller0: e[ 101.948058][ T6814] RBP: 00007f37a9547090 R08: 0000000000000000 R09: 0000000000000000 [ 101.948069][ T6814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 ntered promiscuo[ 101.948080][ T6814] R13: 0000000000000000 R14: 00007f37ab105fa0 R15: 00007ffc300cf8c8 us mode Apr 28 [ 101.948098][ T6814] 01:07:00 syzkaller kern.info kernel: [ 101.725816][ T6781] syzkaller0: entered allmulticast mode Apr 28 01:07:00 syzkaller kern.notice kernel: [ 101.932531][ T6814] FAULT_INJECTION: forcing a failure. Apr 28 01:07:00 syzkaller kern.notice kernel: [ 101.932531][ T6814] name fail_usercopy, interval 1, probability 0, space 0, times 0 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947058][ T6814] CPU: 0 UID: 0 PID: 6814 Comm: syz.5.1237 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947084][ T6814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS [ 102.291892][ T6828] FAULT_INJECTION: forcing a failure. [ 102.291892][ T6828] name fail_usercopy, interval 1, probability 0, space 0, times 0 Google 02/12/2025 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947097][ T[ 102.305461][ T6828] CPU: 1 UID: 0 PID: 6828 Comm: syz.3.1245 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 102.305551][ T6828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 102.305568][ T6828] Call Trace: [ 102.305576][ T6828] [ 102.305586][ T6828] __dump_stack+0x1d/0x30 [ 102.305612][ T6828] dump_stack_lvl+0xe8/0x140 [ 102.305635][ T6828] dump_stack+0x15/0x1b [ 102.305655][ T6828] should_fail_ex+0x265/0x280 [ 102.305714][ T6828] should_fail+0xb/0x20 [ 102.305808][ T6828] should_fail_usercopy+0x1a/0x20 [ 102.305842][ T6828] _copy_from_iter+0xcf/0xdd0 [ 102.305861][ T6828] ? __build_skb_around+0x1a0/0x200 [ 102.305890][ T6828] ? __build_skb+0x59/0x70 [ 102.305973][ T6828] netlink_sendmsg+0x471/0x6b0 [ 102.306078][ T6828] ? __pfx_netlink_sendmsg+0x10/0x10 [ 102.306109][ T6828] __sock_sendmsg+0x142/0x180 [ 102.306142][ T6828] __sys_sendto+0x268/0x330 [ 102.306221][ T6828] __x64_sys_sendto+0x76/0x90 [ 102.306280][ T6828] x64_sys_call+0x2eb6/0x2fb0 [ 102.306301][ T6828] do_syscall_64+0xd0/0x1a0 [ 102.306322][ T6828] ? clear_bhb_loop+0x25/0x80 [ 102.306424][ T6828] ? clear_bhb_loop+0x25/0x80 [ 102.306448][ T6828] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 102.306469][ T6828] RIP: 0033:0x7fcef4cae969 [ 102.306488][ T6828] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 102.306552][ T6828] RSP: 002b:00007fcef3317038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 102.306576][ T6828] RAX: ffffffffffffffda RBX: 00007fcef4ed5fa0 RCX: 00007fcef4cae969 [ 102.306589][ T6828] RDX: 0000000000000ec1 RSI: 0000200000000100 RDI: 0000000000000003 [ 102.306600][ T6828] RBP: 00007fcef3317090 R08: 0000000000000000 R09: 9e5e111c47e3504f [ 102.306612][ T6828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 102.306623][ T6828] R13: 0000000000000000 R14: 00007fcef4ed5fa0 R15: 00007ffc431b7cc8 [ 102.306640][ T6828] 6814] Call Trace: Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947102][ T6814] Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947115][ T6814] __dump_stack+0x1d/0x30 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947159][ T6814] dump_stack_lvl+0xe8/0x140 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947183][ T6814] dump_stack+0x15/0x1b Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947203][ T6814] should_fail_ex+0x265/0x280 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947308][ T6814] should_fail+0xb/0x20 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947392][ T6814] should_fail_usercopy+0x1a/0x20 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947413][ T6814] _copy_to_user+0x20/0xa0 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947469][ T6814] simple_read_from_buffer+0xb5/0x130 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947499][ T6814] proc_fail_nth_read+0x100/0x140 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947531][ T6814] ? __pfx_proc_fail_nth_read+0x10/0[ 102.597652][ T6835] syzkaller0: entered promiscuous mode x10 Apr 28 01:0[ 102.604145][ T6835] syzkaller0: entered allmulticast mode 7:00 syzkaller kern.warn kernel: [ 101.947611][ T6814] vfs_read+0x19d/0x6f0 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947633][ T6814] ? __rcu_read_unlock+0x4f/0x70 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947652][ T6814] ? __fget_files+0x184/0x1c0 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947759][ T6814] ksys_read+0xda/0x1a0 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947789][ T6814] __x64_sys_read+0x40/0x50 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947814][ T6814] x64_sys_call+0x2d77/0x2fb0 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947840][ T6814] do_syscall_64+0xd0/0x1a0 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947866][ T6814] ? clear_bhb_loop+0x25/0x80 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947931][ T6814] ? clear_bhb_loop+0x25/0x80 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947954][ T6814] entry_SYSCALL_64_after_hwframe+0x77/0x7f Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947973][ T6814] RIP: 0033:0x7f37aaedd37c Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.947988][ T6814] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.948005][ T6814] RSP: 002b:00007f37a9547030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.948027][ T6814] RAX: ffffffffffffffda RBX: 00007f37ab105fa0 RCX: 00007f37aaedd37c Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.948043][ T6814] RDX: 000000000000000f RSI: 00007f37a95470a0 RDI: 0000000000000005 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.948058][ T6814] RBP: 00007f37a9547090 R08: 0000000000000000 R09: 0000000000000000 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.948069][ T6814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.948080][ T6814] R13: 0000000000000000 R14: 00007f37ab105fa0 R15: 00007ffc300cf8c8 Apr 28 01:07:00 syzkaller kern.warn kernel: [ 101.948098][ T6814] Apr 28 01:07:01 syzkaller kern.notice kernel: [ 102.291892][ T6828] FAULT_INJECTION: forcing a failure. Apr 28 01:07:01 syzkaller kern.notice kernel: [ 102.291892][ T6828] name fail_usercopy, interval 1, probability 0, space 0, times 0 Apr 28 01:07:01 syzkaller kern.warn kernel: [ 102.305461][ T6828] CPU: 1 UID: 0 PID: 6828 Comm: syz.3.1245 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) Apr 28 01:07:01 syzkaller kern.warn kernel: [ 102.305551][ T6828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 28 01:07:01 syzkaller kern.warn kernel: [ 102.305568][ T6828] Call Trace: Apr 28 01:07:01 syzkaller kern.warn kernel: [ 102.305576][ T6828] Apr 28 01:07:01 syzkaller kern.warn kernel: [ 102.305586][ T6828] __dump_stack+0x1d/0x30 Apr 28 01:07:01 syzkaller kern.warn kernel: [ 102.305612][ T6828] dump_stack_lvl+0xe8/0x140 Apr 28 01:07:01 syzkaller kern.warn kernel: [ 102.305635][ T6828] dump_stack+0x15/0x1b Apr 28 01:07:01 syzkaller kern.warn kernel: [ 102.305655][ T6828] should_fail_ex+0x265/0x280 Apr 28 01:07:01 syzkaller kern.warn kernel: [ 102.305714][ T6828] should_fail+0xb/0x20 Apr 28 01:07:01 syzkaller kern.warn kernel: [ 102.305808][ T6828] should_fail_usercopy+0x1a/0x20 Apr 28 01:07:01 syzkaller kern.warn kernel: [ 102.305842][ T6828] _copy_from_iter+0xcf/0xdd0 Apr 28 01:07:01 syzkaller kern.warn kernel: [ 102.305861][ T6828] ? __build_skb_around+0x1a0/0x200 Apr 28 01:07:01 syzkaller kern.warnApr 28 01:07:01 Apr 28 01:07:01 Apr 28 01:07:01 Apr 28 01:07:01 syzkaller kern.warn kernel: [ 102.306589][ T6828] RDX: 0000000000000ec1 RSI: 0000200000000100 RApr 28 01:07:01 syzkaller kern.info kernel: [ 102.597652][ T6835] syzkaller0: entered promiscuous mode Apr 28 01:07:01 syzkaller kern.info kernel: [ 102.604145][ T6835] syzkaller0: entered allmulticast mode [ 103.774558][ T6904] FAULT_INJECTION: forcing a failure. [ 103.774558][ T6904] name failslab, interval 1, probability 0, space 0, times 0 [ 103.787460][ T6904] CPU: 1 UID: 0 PID: 6904 Comm: syz.2.1277 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 103.787493][ T6904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 103.787509][ T6904] Call Trace: [ 103.787536][ T6904] [ 103.787545][ T6904] __dump_stack+0x1d/0x30 [ 103.787614][ T6904] dump_stack_lvl+0xe8/0x140 [ 103.787639][ T6904] dump_stack+0x15/0x1b [ 103.787660][ T6904] should_fail_ex+0x265/0x280 [ 103.787696][ T6904] should_failslab+0x8c/0xb0 [ 103.787803][ T6904] __kmalloc_noprof+0xa5/0x3e0 [ 103.787827][ T6904] ? sel_write_relabel+0x177/0x360 [ 103.787852][ T6904] sel_write_relabel+0x177/0x360 [ 103.787938][ T6904] selinux_transaction_write+0xc3/0x110 [ 103.788024][ T6904] ? __pfx_selinux_transaction_write+0x10/0x10 [ 103.788110][ T6904] vfs_write+0x266/0x8d0 [ 103.788140][ T6904] ? __rcu_read_unlock+0x4f/0x70 [ 103.788166][ T6904] ? __fget_files+0x184/0x1c0 [ 103.788239][ T6904] ksys_write+0xda/0x1a0 [ 103.788271][ T6904] __x64_sys_write+0x40/0x50 [ 103.788329][ T6904] x64_sys_call+0x2cdd/0x2fb0 [ 103.788355][ T6904] do_syscall_64+0xd0/0x1a0 [ 103.788382][ T6904] ? clear_bhb_loop+0x25/0x80 [ 103.788410][ T6904] ? clear_bhb_loop+0x25/0x80 [ 103.788502][ T6904] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 103.788529][ T6904] RIP: 0033:0x7f69cebce969 [ 103.788547][ T6904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 103.788565][ T6904] RSP: 002b:00007f69cd237038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 103.788588][ T6904] RAX: ffffffffffffffda RBX: 00007f69cedf5fa0 RCX: 00007f69cebce969 [ 103.788642][ T6904] RDX: 0000000000000056 RSI: 00002000000004c0 RDI: 0000000000000003 [ 103.788657][ T6904] RBP: 00007f69cd237090 R08: 0000000000000000 R09: 0000000000000000 [ 103.788672][ T6904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 103.788688][ T6904] R13: 0000000000000000 R14: 00007f69cedf5fa0 R15: 00007ffcef190438 [ 103.788711][ T6904] Apr 28 01:07:02 syzkaller kern.notice kernel: [ 103.774558][ T6904] FAULT_INJECTION: forcing a failure. Apr 28 01:07:02 syzkaller kern.notice kernel: [ 103.774558][ T6904] name failslab, interval 1, probability 0, space 0, times 0 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.787460][ T6904] CPU: 1 UID: 0 PID: 6904 Comm: syz.2.1277 Not tainted 6.15.0-rc4-sy[ 104.028777][ T6907] FAULT_INJECTION: forcing a failure. [ 104.028777][ T6907] name fail_usercopy, interval 1, probability 0, space 0, times 0 zkaller #0 PREEMPT(voluntary) Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.787493][ T6904] Hardware name[ 104.042820][ T6907] CPU: 1 UID: 0 PID: 6907 Comm: syz.5.1267 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 104.042888][ T6907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 104.042902][ T6907] Call Trace: [ 104.042908][ T6907] [ 104.042917][ T6907] __dump_stack+0x1d/0x30 [ 104.042943][ T6907] dump_stack_lvl+0xe8/0x140 [ 104.043010][ T6907] dump_stack+0x15/0x1b [ 104.043031][ T6907] should_fail_ex+0x265/0x280 [ 104.043069][ T6907] should_fail+0xb/0x20 [ 104.043184][ T6907] should_fail_usercopy+0x1a/0x20 [ 104.043208][ T6907] strncpy_from_user+0x25/0x230 [ 104.043238][ T6907] ? kmem_cache_alloc_noprof+0x186/0x310 [ 104.043298][ T6907] ? getname_flags+0x80/0x3b0 [ 104.043398][ T6907] getname_flags+0xae/0x3b0 [ 104.043433][ T6907] do_sys_openat2+0x60/0x110 [ 104.043455][ T6907] __x64_sys_openat+0xf2/0x120 [ 104.043481][ T6907] x64_sys_call+0x1af/0x2fb0 [ 104.043526][ T6907] do_syscall_64+0xd0/0x1a0 [ 104.043554][ T6907] ? clear_bhb_loop+0x25/0x80 [ 104.043581][ T6907] ? clear_bhb_loop+0x25/0x80 [ 104.043608][ T6907] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 104.043749][ T6907] RIP: 0033:0x7f37aaedd2d0 [ 104.043768][ T6907] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 104.043791][ T6907] RSP: 002b:00007f37a9544ef0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 104.043815][ T6907] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f37aaedd2d0 [ 104.043831][ T6907] RDX: 0000000000000002 RSI: 00007f37aaf6078c RDI: 00000000ffffff9c [ 104.043847][ T6907] RBP: 00007f37aaf6078c R08: 0000000000000000 R09: 0000000000000000 [ 104.043862][ T6907] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 104.043936][ T6907] R13: 000000000000006e R14: 00002000000008c0 R15: 00007ffc300cf8c8 [ 104.043955][ T6907] : Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.787509][ T6904] Call Trace: Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.787536][ T6904] Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.787545][ T6904] __dump_stack+0x1d/0x30 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.787614][ T6904] dump_stack_lvl+0xe8/0x140 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.787639][ T6904] dump_stack+0x15/0x1b Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.787660][ T6904] should_fail_ex+0x265/0x280 A[ 104.290136][ T6917] FAULT_INJECTION: forcing a failure. [ 104.290136][ T6917] name failslab, interval 1, probability 0, space 0, times 0 pr 28 01:07:02 syzkaller kern.warn kernel: [ 103.787696][ T6904] should_failslab+0x8c/0xb0 Ap[ 104.302990][ T6917] CPU: 0 UID: 0 PID: 6917 Comm: syz.0.1282 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) r 28 01:07:02 sy[ 104.303026][ T6917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 104.303048][ T6917] Call Trace: zkaller kern.war[ 104.303072][ T6917] [ 104.303081][ T6917] __dump_stack+0x1d/0x30 n kernel: [ 103[ 104.303171][ T6917] dump_stack_lvl+0xe8/0x140 .787803][ T6904][ 104.303197][ T6917] dump_stack+0x15/0x1b [ 104.303217][ T6917] should_fail_ex+0x265/0x280 __kmalloc_nopr[ 104.303257][ T6917] ? __se_sys_mount+0xef/0x2e0 [ 104.303350][ T6917] should_failslab+0x8c/0xb0 of+0xa5/0x3e0 A[ 104.303413][ T6917] __kmalloc_cache_noprof+0x4c/0x320 [ 104.303517][ T6917] ? memdup_user+0x99/0xd0 [ 104.303538][ T6917] __se_sys_mount+0xef/0x2e0 [ 104.303604][ T6917] ? fput+0x8f/0xc0 [ 104.303625][ T6917] ? ksys_write+0x16e/0x1a0 [ 104.303664][ T6917] __x64_sys_mount+0x67/0x80 [ 104.303731][ T6917] x64_sys_call+0xd36/0x2fb0 [ 104.303759][ T6917] do_syscall_64+0xd0/0x1a0 [ 104.303787][ T6917] ? clear_bhb_loop+0x25/0x80 pr 28 01:07:02 s[ 104.303814][ T6917] ? clear_bhb_loop+0x25/0x80 [ 104.303888][ T6917] entry_SYSCALL_64_after_hwframe+0x77/0x7f yzkaller kern.wa[ 104.303992][ T6917] RIP: 0033:0x7fbecde7e969 [ 104.304011][ T6917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 104.304035][ T6917] RSP: 002b:00007fbecc4e7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 rn kernel: [ 10[ 104.304059][ T6917] RAX: ffffffffffffffda RBX: 00007fbece0a5fa0 RCX: 00007fbecde7e969 [ 104.304075][ T6917] RDX: 0000200000000100 RSI: 0000200000000500 RDI: 0000000000000000 [ 104.304088][ T6917] RBP: 00007fbecc4e7090 R08: 0000200000000a40 R09: 0000000000000000 3.787827][ T6904[ 104.304099][ T6917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 104.304141][ T6917] R13: 0000000000000000 R14: 00007fbece0a5fa0 R15: 00007ffddb400798 ] ? sel_write_r[ 104.304164][ T6917] elabel+0x177/0x360 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.787852][ T6904] sel_write_relabel+0x177/0x360 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.787938][ T6904] selinux_transaction_write+0xc3/0x110 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.788024][ T6904] ? __pfx_selinux_transaction_write+0x10/0x10 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.788110][ T6904] vfs_write+0x266/0x8d0 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.788140][ T6904] ? __rcu_read_unlock+0x4f/0x70 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.788166][ T6904] ? __fget_files+0x184/0x1c0 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.788239][ T6904] ksys_write+0xda/0x1a0 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.788271][ T6904] __x64_sys_write+0x40/0x50 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.788329][ T6904] x64_sys_call+0x2cdd/0x2fb0 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.788355][ T6904] do_syscall_64+0xd0/0x1a0 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.788382][ T6904] ? clear_bhb_loop+0x25/0x80 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.788410][ T6904] ? clear_bhb_loop+0x25/0x80 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.788502][ T6904] entry_SYSCALL_64_after_hwframe+0x77/0x7f Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.788529][ T6904] RIP: 0033:0x7f69cebce969 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.788547][ T6904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.788565][ T6904] RSP: 002b:00007f69cd237038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.788588][ T6904] RAX: ffffffffffffffda RBX: 00007f69cedf5fa0 RCX: 00007f69cebce969 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.788642][ T6904] RDX: 0000000000000056 RSI: 00002000000004c0 RDI: 0000000000000003 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.788657][ T6904] RBP: 00007f69cd237090 R08: 0000000000000000 R09: 0000000000000000 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.788672][ T6904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.788688][ T6904] R13: 0000000000000000 R14: 00007f69cedf5fa0 R15: 00007ffcef190438 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 103.788711][ T6904] Apr 28 01:07:02 syzkaller kern.notice kernel: [ 104.028777][ T6907] FAULT_INJECTION: forcing a failure. Apr 28 01:07:02 syzkaller kern.notice kernel: [ 104.028777][ T6907] name fail_usercopy, interval 1, probability 0, space 0, times 0 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 104.042820][ T6907] CPU: 1 UID: 0 PID: 6907 Comm: syz.5.1267 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) Apr 28 01:07:02 syzkaller kern.warn kernel: [ 104.042888][ T6907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 104.042902][ T6907] Call Trace: Apr 28 01:07:02 syzkaller kern.warn kernel: [ 104.042908][ T6907] Apr 28 01:07Apr 28 01:07:02 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 104.043184][ T690Apr 28 01:07:02 Apr 28 01:07:02 syzkaller kern.warn kernel: [ 1Apr 28 01:07:02 Apr 28 01:07:03 syzkaller kern.notice kernel: [ 104.290136][ T6917] FAULT_INJECTION: forcing a failure. Apr 28 01:07:03 syzkaller kern.notice kernel: [ 104.290136][ T6917] name failslab, interval 1, probability 0, space 0, times 0 Apr 28 01:07:03 syzkaller kern.warn kernel: [ 104.302990][ T6917] CPU: 0 UID: 0 PID: 6917 Comm: syz.0.1282 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) Apr 28 01:07:03 syzkaller kern.warn kernel: [ 104.303026][ T6917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 28 01:07:03 syzkaller kern.warn kernel: [ 104.303048][ T6917] Call Trace: Apr 28 01:07:03 syzkaller kern.warn kernel: [ 104Apr 28 01:07:03 Apr 28 01:07:03 Apr 28 01:07:03 Apr 28 01:07:03 [ 105.501921][ T6981] SET target dimension over the limit! Apr 28 01:07:04 syzkaller kern.info kernel: [ 105.501921][ T6981] SET target dimension over the limit! [ 105.602342][ T6986] SELinux: syz.3.1308 (6986) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. Apr 28 01:07:04 syzkaller kern.warn kernel: [ 105.602342][ T6986] SELinux: syz.3.1308 (6986) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 105.796813][ T6993] syzkaller0: entered promiscuous mode [ 105.802369][ T6993] syzkaller0: entered allmulticast mode Apr 28 01:07:04 syzkaller kern.info kernel: [ 105.796813][ T699[ 105.818222][ T29] kauditd_printk_skb: 1321 callbacks suppressed 3] syzkaller0: e[ 105.818240][ T29] audit: type=1400 audit(1745802424.474:14067): avc: denied { read } for pid=2987 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ntered promiscuo[ 105.848939][ T29] audit: type=1400 audit(1745802424.474:14068): avc: denied { read } for pid=2987 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 us mode Apr 28 01:07:04 syzkaller kern.info kernel: [ 105.802369][ T6993] syzkaller0: entered allmulticast mode [ 105.875300][ T6990] can0: slcan on ttyS3. Apr 28 01:07:04 [ 105.932044][ T29] audit: type=1400 audit(1745802424.484:14069): avc: denied { read } for pid=2987 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 105.954393][ T29] audit: type=1400 audit(1745802424.504:14070): avc: denied { read write } for pid=5998 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 arn kernel: [ 1[ 105.980339][ T29] audit: type=1400 audit(1745802424.544:14071): avc: denied { create } for pid=6999 comm="syz.5.1312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 05.818222][ T2[ 106.002387][ T29] audit: type=1400 audit(1745802424.544:14072): avc: denied { create } for pid=6999 comm="syz.5.1312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 9] kauditd_print[ 106.024534][ T29] audit: type=1400 audit(1745802424.544:14073): avc: denied { map_create } for pid=6999 comm="syz.5.1312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 k_skb: 1321 call[ 106.045383][ T29] audit: type=1400 audit(1745802424.544:14074): avc: denied { prog_load } for pid=6999 comm="syz.5.1312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 backs suppressed[ 106.066715][ T29] audit: type=1400 audit(1745802424.544:14075): avc: denied { create } for pid=6999 comm="syz.5.1312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 Apr 28 01:07:0[ 106.087940][ T29] audit: type=1400 audit(1745802424.544:14076): avc: denied { create } for pid=6999 comm="syz.5.1312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 4 syzkaller kern.notice kernel: [ 105.818240][ T29] audit: type=1400 audit(1745802424.474:14067): avc: denied { read } for pid=2987 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Apr 28 01:07:04 syzkaller kern.notice kernel: [ 105.848939][ T29] audit: type=1400 audit(1745802424.474:14068): avc: denied { read } for pid=2987 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Apr 28 01:07:04 syzkaller kern.info kernel: [ 105.875300][ T6990] can0: slcan on ttyS3. Apr 28 01:07:04 syzkaller kern.notice kernel: [ 105.932044][ T29] audit: type=1400 audit(1745802424.484:14069): avc: denied { read } for pid=2987 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass Apr 28 01:07:04 syzkaller kern.notice kernel: [ 105.954393][ T29] audit: type=1400 audit(1745802424.504:14070): avc: denied { read write } for pid=5998 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:f Apr 28 01:07:04 syzkaller kern.notic[ 106.214532][ T7007] can0 (unregistered): slcan off ttyS3. e kernel: [ 105.980339][ T29] audit: type=1400 audit(1745802424.544:14071): avc: denied { create } for pid=6999 comm="syz.5.1312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis Apr 28 01:07:04 syzkaller kern.notice kernel: [ 106.002387][ T29] audit: type=1400 audit(1745802424.544:14072): avc: denied { create } for pid=6999 comm="syz.5.1312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permis Apr 28 01:07:04 syzkaller kern.notice kernel: [ 106.024534][ T29] audit: type=1400 audit(1745802424.544:14073): avc: denied { map_create } for pid=6999 comm="syz.5.1312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Apr 28 01:07:04 syzkaller kern.notice kernel: [ 106.045383][ T29] audit: type=1400 audit(1745802424.544:14074): avc: denied { prog_load } for pid=6999 comm="syz.5.1312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissiv[ 106.311704][ T7009] Falling back ldisc for ttyS3. e=0 Apr 28 01:0[ 106.317832][ T7017] SET target dimension over the limit! 7:04 syzkaller kern.notice kernel: [ 106.066715][ T29] audit: type=1400 audit(1745802424.544:14075): avc: denied { create } for pid=6999 comm="syz.5.1312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 Apr 28 01:07:04 syzkaller kern.notice kernel: [ 106.087940][ T29] audit: type=1400 audit(1745802424.544:14076): avc: denied { create } for pid=6999 comm="syz.5.1312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 Apr 28 01:07:04 syzkaller kern.info kernel: [[ 106.374568][ T7019] sctp: [Deprecated]: syz.5.1318 (pid 7019) Use of int in max_burst socket option. [ 106.374568][ T7019] Use struct sctp_assoc_value instead 106.214532][ T7007] can0 (unregistered): slcan off ttyS3. Apr 28 01:07:04 syzkaller kern.warn kernel: [ 106.311704][ T7009] Falling back ldisc for ttyS3. Apr 28 01:07:04 syzkaller kern.info kernel: [ 106.317832][ T7017] SET target dimension over the limit! Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.374568][ T7019] sctp: [Deprecated]: syz.5.1318 (pid 7019) Use of int in max_burst socket option. Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.374568][ T7019] Use struct sctp_assoc_value instead [ 106.614925][ T7030] SET target dimension over the limit! Apr 28 01:07:05 syzkaller kern.info kernel: [ 106.614925][ T7030] SET target dimension over the limit! [ 106.735268][ T7034] syzkaller0: entered promiscuous mode [ 106.740853][ T7034] syzkaller0: entered allmulticast mode Apr 28 01:07:05 syzkaller kern.info kernel: [ 106.735268][ T7034] syzkaller0: entered promiscuous mode Apr 28 01:07:05 syzkaller kern.info kernel: [ 106.740853][ T7034] syzkaller0: entered allmulticast mode [ 106.929804][ T7047] FAULT_INJECTION: forcing a failure. [ 106.929804][ T7047] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 106.943051][ T7047] CPU: 1 UID: 0 PID: 7047 Comm: syz.3.1332 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 106.943097][ T7047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 106.943111][ T7047] Call Trace: [ 106.943117][ T7047] [ 106.943169][ T7047] __dump_stack+0x1d/0x30 [ 106.943192][ T7047] dump_stack_lvl+0xe8/0x140 [ 106.943214][ T7047] dump_stack+0x15/0x1b [ 106.943260][ T7047] should_fail_ex+0x265/0x280 [ 106.943299][ T7047] should_fail+0xb/0x20 [ 106.943389][ T7047] should_fail_usercopy+0x1a/0x20 [ 106.943436][ T7047] _copy_from_iter+0xcf/0xdd0 [ 106.943462][ T7047] ? __build_skb_around+0x1a0/0x200 [ 106.943520][ T7047] ? __build_skb+0x59/0x70 [ 106.943606][ T7047] netlink_sendmsg+0x471/0x6b0 [ 106.943659][ T7047] ? __pfx_netlink_sendmsg+0x10/0x10 [ 106.943763][ T7047] __sock_sendmsg+0x142/0x180 [ 106.943795][ T7047] __sys_sendto+0x268/0x330 [ 106.943857][ T7047] __x64_sys_sendto+0x76/0x90 [ 106.943895][ T7047] x64_sys_call+0x2eb6/0x2fb0 [ 106.943921][ T7047] do_syscall_64+0xd0/0x1a0 [ 106.943948][ T7047] ? clear_bhb_loop+0x25/0x80 [ 106.944086][ T7047] ? clear_bhb_loop+0x25/0x80 [ 106.944113][ T7047] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 106.944139][ T7047] RIP: 0033:0x7fcef4cae969 [ 106.944228][ T7047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 106.944250][ T7047] RSP: 002b:00007fcef3317038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 106.944273][ T7047] RAX: ffffffffffffffda RBX: 00007fcef4ed5fa0 RCX: 00007fcef4cae969 [ 106.944289][ T7047] RDX: 0000000000000ec1 RSI: 0000200000000100 RDI: 0000000000000003 [ 106.944305][ T7047] RBP: 00007fcef3317090 R08: 0000000000000000 R09: 9e5e111c47e3504f [ 106.944320][ T7047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 106.944334][ T7047] R13: 0000000000000000 R14: 00007fcef4ed5fa0 R15: 00007ffc431b7cc8 [ 106.944395][ T7047] Apr 28 01:07:05 syzkaller kern.notice kernel: [ 106.929804][ T7047] FAULT_INJECTION: forcing a failure. Apr 28 01:07:05 syzkaller kern.notice kernel: [ 106.929804][ T7047] name fail_usercopy, interval 1, probability 0, space 0, times 0 Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.943051][ T7047] CPU: 1 UID: 0 PID: 7047 Comm: syz.3.1332 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.943097][[ 107.228204][ T7057] FAULT_INJECTION: forcing a failure. [ 107.228204][ T7057] name failslab, interval 1, probability 0, space 0, times 0 T7047] Hardware[ 107.241882][ T7057] CPU: 0 UID: 0 PID: 7057 Comm: syz.4.1335 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 28 01:07:05 syzkaller kern.warn kernel: [[ 107.241953][ T7057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 106.943111][ T7047] Call Trace: Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.943117][ T[ 107.242043][ T7057] Call Trace: 7047] A[ 107.242051][ T7057] pr 28 01:07:05 s[ 107.242061][ T7057] __dump_stack+0x1d/0x30 yzkaller kern.warn kernel: [ 106.943169][ T7047] __dump_stack+0x1d/0x30 Apr 2[ 107.242086][ T7057] dump_stack_lvl+0xe8/0x140 8 01:07:05 syzkaller kern.warn kernel: [ 106.94[ 107.242110][ T7057] dump_stack+0x15/0x1b 3192][ T7047] d[ 107.242131][ T7057] should_fail_ex+0x265/0x280 ump_stack_lvl+0xe8/0x140 Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.943214][ T7047] dump_stack+0x15/0x1b Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.943260][ T7047] should_fail_ex+0x265/0x280 Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.943299][ T7047] should_fail+0xb/0x20 Apr 28 01:07:05 syzkaller kern.war[ 107.242227][ T7057] should_failslab+0x8c/0xb0 n kernel: [ 106.943389][ T7047] should_fail_usercopy+0x1a/0x20[ 107.242264][ T7057] kmem_cache_alloc_lru_noprof+0x55/0x310 Apr 28 01:07:0[ 107.242382][ T7057] ? __d_alloc+0x3d/0x350 5 syzkaller kern.warn kernel: [ [ 107.242433][ T7057] __d_alloc+0x3d/0x350 106.943436][ T7047] _copy_from_iter+0xcf/0xdd0 Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.943462][ T7047] ? __build_[ 107.242469][ T7057] ? from_vfsgid+0x70/0xa0 skb_around+0x1a0[ 107.242584][ T7057] d_alloc_pseudo+0x1e/0x80 /0x200 Apr 28 0[ 107.242669][ T7057] alloc_file_pseudo+0x71/0x160 1:07:05 syzkalle[ 107.242702][ T7057] ? hugetlbfs_get_inode+0x267/0x370 r kern.warn kernel: [ 106.94352[ 107.242731][ T7057] hugetlb_file_setup+0x298/0x3d0 0][ T7047] ? __build_skb+0x59/0x70 Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.943606][[ 107.242861][ T7057] ksys_mmap_pgoff+0x157/0x310 T7047] netlink[ 107.242902][ T7057] x64_sys_call+0x1602/0x2fb0 _sendmsg+0x471/0x6b0 Apr 28 01:07:05 syzkaller [ 107.242930][ T7057] do_syscall_64+0xd0/0x1a0 kern.warn kernel[ 107.242959][ T7057] ? clear_bhb_loop+0x25/0x80 : [ 106.943659][ T7047] ? __pfx_netlink_sendmsg+0x10/0x10 Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.943763][ T7047] [ 107.242994][ T7057] ? clear_bhb_loop+0x25/0x80 __sock_sendmsg+0x142/0x180 Apr[ 107.243021][ T7057] entry_SYSCALL_64_after_hwframe+0x77/0x7f 28 01:07:05 syzkaller kern.warn kernel: [ 106.943795][ T7047] [ 107.243049][ T7057] RIP: 0033:0x7f43399fe969 __sys_sendto+0x268/0x330 Apr 2[ 107.243069][ T7057] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 8 01:07:05 syzkaller kern.warn kernel: [ 106.943857][ T7047] __x64_sys_sendto+0x76/0x90 Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.943895][ T7047] x64_sys_call+0x2eb6/0x2fb0 Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.943921][ T7047] do_syscall_64+0xd0/0x1a0 Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.943948][ T7047] ? clear_bhb_loop+0x25/0x80 Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.944086][ T7047] ? clear_bhb_loop+0x25/0x80 Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.944113][ T7047] entry_SYSCALL_64_after_hwframe+0x77/0x7f Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.944139][ T7047] RIP: 0033:0x7fcef4cae969 Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.944228][ T7047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.944250][ T7047] RSP: 002b:00007fcef3317038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.944273][ T7047] RAX: ffffffffffffffda RBX: 00007fcef4ed5fa0 RCX: 00007fcef4cae969 Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.944289][ T7047] RDX: 0000000000000ec1 RSI: 0000200000000100 RDI: 0000000000000003 Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.944305][ T7047] RBP: 00007fcef3317090 R08: 0000000000000000 R09: 9e5e111c47e3504f Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.944320][ T7047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.944334][ T7047] R13: 0000000000000000 R14: 00007fcef4ed5fa0 R15: 00007ffc431b7cc8 [ 107.243097][ T7057] RSP: 002b:00007f4338067038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 107.243121][ T7057] RAX: ffffffffffffffda RBX: 00007f4339c25fa0 RCX: 00007f43399fe969 [ 107.243137][ T7057] RDX: 0000000000000000 RSI: 0000000001400000 RDI: 0000200000000000 [ 107.243155][ T7057] RBP: 00007f4338067090 R08: ffffffffffffffff R09: 0000000000000000 [ 107.243205][ T7057] R10: 00000000000c3072 R11: 0000000000000246 R12: 0000000000000001 [ 107.243222][ T7057] R13: 0000000000000000 R14: 00007f4339c25fa0 R15: 00007fffcd8311c8 [ 107.243246][ T7057] Apr 28 01:07:05 syzkaller kern.warn kernel: [ 106.944395][ T7047] Apr 28 01:07:05 syzkaller kern.notice kernel: [ 107.228204][ T7057] FAULT_INJECTION: forcing a failure. Apr 28 01:07:05 syzkaller kern.notice kernel: [ 107.228204][ T7057] name failslab, interval 1, probability 0, space 0, times 0 Apr 28 01:07:05 syzkaller kern.warn kernel: [ 107.241882][ T7057] CPU: 0 UID: 0 PID: 7057 Comm: syz.4.1335 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) Apr 28 01:07:05 syzkaller kern.warn kernel: [ 107.241953][ T7057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 28 01:07:05 syzkaller kern.warn kernel: [ 107.242043][ T7057] Call Trace: Apr 28 01:07:05 syzkaller kern.warn kernel: [ 107.242051][ T7057] Apr 28 01:07:05 syzkaller kern.warn kernel: [ 107.242061][ T7057] __dump_stack+0x1d/0x30 Apr 28 01:07:05 syzkaller kern.warn kernel: [ 107.242086][ T7057] dump_stack_lvl+0xe8/0x140 Apr 28 01:07:05 syzkaller kern.warn kernel: [ 107.242110][ T7057] dump_stack+0x15/0x1b Apr 28 01:07:05 syzkaller kern.warn kernel: [ 107.242131][ T7057] should_fail_ex+0x265/0x280 Apr 28 01:07:05 syzkaller kern.warn kernel: [ 107.242227][ T7057] should_failslab+0x8c/0xb0 Apr 28 01:07:05 syzkaller kern.warn kernel: [ 107.242264][ T7057] kmem_cache_alloc_lru_noprof+0x55/0x310 Apr 28 01:07:06 syzkaller kern.warn kernel: [ 107.242382][ T7057] ? __d_alloc+0x3d/0x350 Apr 28 01:07:06 syzkaller kern.warn kernel: [ 107.242433][ T7057] __d_alloc+0x3d/0x350 Apr 28 01:07:06 syzkaller kern.warn kernel: [ 107.242469][ T7057] ? from_vfsgid+0x70/0xa0 Apr 28 01:07:06 syzkaller kern.warn kernel: [ 107.242584][ T7057] d_alloc_pseudo+0x1e/0x80 Apr 28 01:07:06 syzkaller kern.warn kernel: [ 107.242669][ T7057] alloc_file_pseudo+0x71/0x160 Apr 28 01:07:06 syzkaller kern.warn kernel: [ 107.242702][ T7057] ? hugetlbfs_get_inode+0x267/0x370 Apr 28 01:07:06 syzkaller kern.warn kernel: [ 107.242731][ T7057] hugetlb_file_setup+0x298/0x3d0 Apr 28 01:07:06 syzkaller kern.warn kernel: [ 107.242861][ T7057] ksys_mmap_pgoff+0x157/0x310 Apr 28 01:07:06 syzkaller kern.warn kernel: [ 107.242902][ T7057] x64_sys_call+0x1602/0x2fb0 Apr 28 01:07:06 syzkaller kern.warn kernel: [ 107.242930][ T7057] do_syscall_64+0xd0/0x1a0 Apr 28 01:07:06 syzkaller kern.warn kernel: [ 107.242959][ T7057] ? clear_bhb_loop+0x25/0x80 Apr 28 01:07:06 syzkaller kern.warn kernel: [ 107.242994][ T7057] ? clear_bhb_loop+0x25/0x80 Apr 28 01:07:06 syzkaller kern.warn kernel: [ 107.243021][ T7057] entry_SYSCALL_64_after_hwframe+0x77/0x7f Apr 28 01:07:06 syzkaller kern.warn kernel: [ 107.243049][ T7057] RIP: 0033:0x7f43399fe969 Apr 28 01:07:06 syzkaller kern.warn kernel: [ 107.243069][ T7057] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Apr 28 01:07:06 syzkaller kern.warn kernel: [ 107.243097][ T7057] RSP: 002b:00007f4338067038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 Apr 28 01:07:06 syzkaller kern.warn kernel: [ 107.243121][ T7057] RAX: ffffffffffffffda RBX: 00007f4339c25fa0 RCX: 00007f43399fe969 Apr 28 01:07:06 syzkaller kern.warn kernel: [ 107.243137][ T7057] RDX: 0000000000000000 RSI: 0000000001400000 RDI: 0000200000000000 Apr 28 01:07:06 syzkaller kern.warn kernel: [ 107.243155][ T7057] RBP: 00007f4338067090 R08: ffffffffffffffff R09: 0000000000000000 Apr 28 01:07:06 syzkaller kern.warn kernel: [ 107.243205][ T7057] R10: 00000000000c3072 R11: 0000000000000246 R12: 0000000000000001 Apr 28 01:07:06 syzkaller kern.warn kernel: [ 107.243222][ T7057] R13: 0000000000000000 R14: 00007f4339c25fa0 R15: 00007fffcd8311c8 Apr 28 01:07:06 syzkaller kern.warn kernel: [ 107.243246][ T7057] [ 108.332493][ T7111] ================================================================== [ 108.340632][ T7111] BUG: KCSAN: data-race in call_rcu / mas_state_walk [ 108.347331][ T7111] [ 108.349707][ T7111] write to 0xffff888104985708 of 8 bytes by task 7113 on cpu 0: [ 108.357340][ T7111] call_rcu+0x48/0x3e0 [ 108.361433][ T7111] mas_replace_node+0x30b/0x440 [ 108.366310][ T7111] mas_wr_store_entry+0x2425/0x2b60 [ 108.371518][ T7111] mas_store_prealloc+0x74d/0x9e0 [ 108.376551][ T7111] vma_iter_store_new+0x1c5/0x200 [ 108.381595][ T7111] mmap_region+0xdc1/0x1470 [ 108.386143][ T7111] do_mmap+0x9de/0xc20 [ 108.390252][ T7111] vm_mmap_pgoff+0x17a/0x2e0 [ 108.394850][ T7111] ksys_mmap_pgoff+0xc2/0x310 [ 108.399546][ T7111] x64_sys_call+0x1602/0x2fb0 [ 108.404232][ T7111] do_syscall_64+0xd0/0x1a0 [ 108.408744][ T7111] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 108.414647][ T7111] [ 108.416973][ T7111] read to 0xffff888104985708 of 8 bytes by task 7111 on cpu 1: [ 108.424518][ T7111] mas_state_walk+0x28f/0x650 [ 108.429231][ T7111] mas_walk+0x30/0x120 [ 108.433339][ T7111] lock_vma_under_rcu+0xa2/0x2f0 [ 108.438298][ T7111] do_user_addr_fault+0x233/0x1090 [ 108.443453][ T7111] exc_page_fault+0x54/0xc0 [ 108.447979][ T7111] asm_exc_page_fault+0x26/0x30 [ 108.452845][ T7111] [ 108.455170][ T7111] value changed: 0x000000110c22ffff -> 0x0000000000000000 [ 108.462278][ T7111] [ 108.464607][ T7111] Reported by Kernel Concurrency Sanitizer on: [ 108.470758][ T7111] CPU: 1 UID: 0 PID: 7111 Comm: syz.2.1353 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) [ 108.481441][ T7111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 108.491513][ T7111] ================================================================== Apr 28 01:07:07 syzkaller kern.err kernel: [ 108.332493][ T7111] ================================================================== Apr 28 01:07:07 syzkaller kern.err kernel: [ 108.340632][ T7111] BUG: KCSAN: data-race in call_rcu / mas_state_walk Apr 28 01:07:07 syzkaller kern.err kernel: [ 108.347331][ T7111] Apr 28 01:07:07 syzkaller kern.err kernel: [ 108.349707][ T7111] write to 0xffff888104985708 of 8 bytes by task 7113 on cpu 0: Apr 28 01:07:07 syzkaller kern.warn kernel: [ 108.357340][ T7111] call_rcu+0x48/0x3e0 Apr 28 01:07:07 syzkaller kern.warn kernel: [ 108.361433][ T7111] mas_replace_node+0x30b/0x440 Apr 28 01:07:07 syzkaller kern.warn kernel: [ 108.366310][ T7111] mas_wr_store_entry+0x2425/0x2b60 Apr 28 01:07:07 syzkaller kern.warn kernel: [ 108.371518][ T7111] mas_store_prealloc+0x74d/0x9e0 Apr 28 01:07:07 syzkaller kern.warn kernel: [ 108.376551][ T7111] vma_iter_store_new+0x1c5/0x200 Apr 28 01:07:07 syzkaller kern.warn kernel: [ 108.381595][ T7111] mmap_region+0xdc1/0x1470 Apr 28 01:07:07 syzkaller kern.warn kernel: [ 108.386143][ T7111] do_mmap+0x9de/0xc20 Apr 28 01:07:07 syzkaller kern.warn kernel: [ 108.390252][ T7111] vm_mmap_pgoff+0x17a/0x2e0 Apr 28 01:07:07 syzkaller kern.warn kernel: [ 108.394850][ T7111] ksys_mmap_pgoff+0xc2/0x310 Apr 28 01:07:07 syzkaller kern.warn kernel: [ 108.399546][ T7111] x64_sys_call+0x1602/0x2fb0 Apr 28 01:07:07 syzkaller kern.warn kernel: [ 108.404232][ T7111] do_syscall_64+0xd0/0x1a0 Apr 28 01:07:07 syzkaller kern.warn kernel: [ 108.408744][ T7111] entry_SYSCALL_64_after_hwframe+0x77/0x7f Apr 28 01:07:07 syzkaller kern.err kernel: [ 108.414647][ T7111] Apr 28 01:07:07 syzkaller kern.err kernel: [ 108.416973][ T7111] read to 0xffff888104985708 of 8 bytes by task 7111 on cpu 1: Apr 28 01:07:07 syzkaller kern.warn kernel: [ 108.424518][ T7111] mas_state_walk+0x28f/0x650 Apr 28 01:07:07 syzkaller kern.warn kernel: [ 108.429231][ T7111] mas_walk+0x30/0x120 Apr 28 01:07:07 syzkaller kern.warn kernel: [ 108.433339][ T7111] lock_vma_under_rcu+0xa2/0x2f0 Apr 28 01:07:07 syzkaller kern.warn kernel: [ 108.438298][ T7111] do_user_addr_fault+0x233/0x1090 Apr 28 01:07:07 syzkaller kern.warn kernel: [ 108.443453][ T7111] exc_page_fault+0x54/0xc0 Apr 28 01:07:07 syzkaller kern.warn kernel: [ 108.447979][ T7111] asm_exc_page_fault+0x26/0x30 Apr 28 01:07:07 syzkaller kern.err kernel: [ 108.452845][ T7111] Apr 28 01:07:07 syzkaller kern.err kernel: [ 108.455170][ T7111] value changed: 0x000000110c22ffff -> 0x0000000000000000 Apr 28 01:07:07 syzkaller kern.err kernel: [ 108.462278][ T7111] Apr 28 01:07:07 syzkaller kern.err kernel: [ 108.464607][ T7111] Reported by Kernel Concurrency Sanitizer on: Apr 28 01:07:07 syzkaller kern.warn kernel: [ 108.470758][ T7111] CPU: 1 UID: 0 PID: 7111 Comm: syz.2.1353 Not tainted 6.15.0-rc4-syzkaller #0 PREEMPT(voluntary) Apr 28 01:07:07 syzkaller kern.warn kernel: [ 108.481441][ T7111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Apr 28 01:07:07 syzkaller kern.err kernel: [ 108.491513][ T7111] ==================================================================