last executing test programs: 2.189316429s ago: executing program 3 (id=316): open(&(0x7f0000000140)='./file0\x00', 0xec40, 0x12) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065fffff530000008003950323030302e75"], 0x15) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) creat(&(0x7f0000000200)='./file0\x00', 0x2) 2.151447921s ago: executing program 3 (id=318): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r0}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x298) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xc, &(0x7f0000000040)=@framed={{0x18, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 2.003722013s ago: executing program 3 (id=325): ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) (async) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) (async, rerun: 64) getrlimit(0xf, &(0x7f0000000340)) (async, rerun: 64) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000080)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="495300000000ffffffff6700000008000300", @ANYRES32=0x0, @ANYBLOB="0c00800007f7"], 0x28}}, 0x4) 1.920567719s ago: executing program 3 (id=329): open(&(0x7f0000000140)='./file0\x00', 0xec40, 0x12) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065fffff530000008003950323030302e75"], 0x15) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) creat(&(0x7f0000000200)='./file0\x00', 0x2) 1.911651499s ago: executing program 3 (id=330): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18de00000000e8ffffffffffffffea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) ftruncate(0xffffffffffffffff, 0xc17a) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x2, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) inotify_init1(0x0) set_mempolicy_home_node(&(0x7f0000349000/0xa000)=nil, 0xa000, 0x0, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1e0000000200000009000000a904000000000000", @ANYRES32, @ANYBLOB="f54f8be6907df6b5241546790cac1c85a224d238ac7ec3ed5754b9b4670d02767b4ff19cdf743267642cc925394592a976ab8edc5bd2d6cec9f45b60dcbed9470a2a9c87c0518c38db8cb90d20dc75993b28dde54db394368cc5c17abfd3b9d8888387ba28f2a7bce8fc0201f9436770d1a32320717d660ef84f4a84c06843cd59bd301db9", @ANYRESOCT=r0, @ANYRES32, @ANYBLOB="0100000003000000050000000d00"/28], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bf2aa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r4}, 0x10) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000001000000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="01000000e5ffdcff6d228e9e000000180000000400000000ac000000"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r5}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="01000000070000000100010009", @ANYBLOB="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", @ANYRES16=r3], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000001865000000000000000000000000000000000000000000000000000000000000609d7cba0f595f83e68b1aa6d670817edb055a239cd7052866386071da481bd96c8b8901c7d9cbb7dc6f3d793d221741c9f0fd0d7d3cb8f1bce4b684189e382c6e9162c091d3983785723d72"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) request_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)='kmem_cache_free\x00', 0xffffffffffffffff) r7 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r7, 0x0, 0x0, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff24, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r10, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) 1.35667345s ago: executing program 2 (id=347): mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x0) 1.35633448s ago: executing program 2 (id=348): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) unshare(0x24040000) setsockopt(r2, 0x4, 0x8000, &(0x7f0000000080)="dc857a22fdfc0a72f6e635a2e9a686e4b137d6a31f678740", 0x18) sendmsg$inet(0xffffffffffffffff, &(0x7f0000002980)={&(0x7f00000003c0)={0x2, 0x0, @dev}, 0x10, &(0x7f0000001400)=[{&(0x7f0000000400)="85", 0x1}], 0x1}, 0x4000000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000), 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="d8000000100081046881f782db44b904021d080b01000000e8fe55a11800150006001400000000120800040043000000a80016000a00034006000d00036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x20008804) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000400)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @loopback}, 0x62) 1.130949117s ago: executing program 0 (id=352): r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}], 0x1}}], 0x48}, 0x0) 1.113929558s ago: executing program 0 (id=353): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) gettid() r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd824498949714ffaac8a6f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb5447000001000000008f2b9000f22425e4097ed62cbc891061017cfa6fa26fa7088c60897d4a6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe6b1b8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3540546bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000280)=ANY=[@ANYRES32=r2, @ANYRES32=r1, @ANYBLOB='&\x00'/12, @ANYRES32, @ANYBLOB="20dcd27c2e2149c247471642d12b673bfdc02a862e214af60b3d28c4ea", @ANYRES64=0x0], 0x10) 1.016337945s ago: executing program 0 (id=354): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00', r2}, 0x18) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a40)=@newtaction={0x488, 0x30, 0xffff, 0x0, 0x0, {}, [{0x474, 0x1, [@m_police={0x470, 0x1, 0x0, 0x0, {{0xb}, {0x444, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x1, 0x0, 0x0, 0xfffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x22, 0x0, 0xfffffffd, 0x1, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7fff, 0x0, 0x10000, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x65, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x7, 0x0, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, {0x4, 0x2, 0x0, 0x0, 0x0, 0xff}}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x2}}}}]}]}, 0x488}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x30, r4, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1=0xac1414aa}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000200)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7040000080000008500000095f5e40ca5390e28991dee3ac9f31a870000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWRULE={0x68, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_EXPRESSIONS={0x40, 0x4, 0x0, 0x1, [{0x3c, 0x1, 0x0, 0x1, @limit={{0xa}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_LIMIT_UNIT={0xc, 0x2, 0x1, 0x0, 0x80000001}, @NFTA_LIMIT_TYPE={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_LIMIT_RATE={0xc, 0x1, 0x1, 0x0, 0x8}, @NFTA_LIMIT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}]}}}]}]}], {0x14}}, 0xf0}}, 0x0) syz_emit_ethernet(0x9a, &(0x7f0000002340)={@local, @empty, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "3000bb", 0x64, 0x2b, 0x0, @private2, @local, {[], {0x0, 0x0, 0x64, 0x0, @wg=@response={0x3a, 0x0, 0x0, "82f63de64f6ce2ee11028289aefdb3449391a823213e6336516748a7949bb108", "402fa83b1d661c18462075368a186092", {"9ddeb8f71aa23d391b8fa99e9816af2d", "040876a663a86d97f46b9665cc18492b"}}}}}}}}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, @perf_config_ext={0x0, 0x1}, 0x15428, 0x0, 0x0, 0x0, 0x5f4d, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') ioctl$sock_inet_tcp_SIOCINQ(r6, 0x541b, &(0x7f00000005c0)) read$nci(r6, &(0x7f0000000280)=""/134, 0x86) pread64(r6, &(0x7f0000000180)=""/15, 0xfffffe9c, 0x358) utimensat(r6, &(0x7f0000000380)='./file0\x00', &(0x7f0000000440)={{0x77359400}, {0x0, 0x2710}}, 0x100) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, 0x0, 0x24040000) openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x2c41, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r7, 0x0, 0x34, 0x0, &(0x7f00000001c0)=0x2) quotactl$Q_QUOTAON(0xffffffff80000201, &(0x7f00000001c0)=@sg0, 0x0, &(0x7f0000000200)='./file0\x00') r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r8}, 0x10) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x161042, 0x0) ioctl$PPPIOCNEWUNIT(r9, 0xc004743e, &(0x7f0000000000)) write$ppp(r9, &(0x7f00000010c0)="1e00", 0x2) r10 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r10, &(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0x8, 0x2) 999.541247ms ago: executing program 1 (id=356): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de85000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x18) getcwd(&(0x7f0000000c80)=""/50, 0x32) 979.485768ms ago: executing program 0 (id=357): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff2e) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, &(0x7f0000000180)={0x80, 0x2a, 0x3}) close(0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket(0x2, 0x80805, 0x0) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) close(0xffffffffffffffff) socket$inet6(0xa, 0x5, 0x7) io_setup(0x9, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000005c0)='./file1\x00', 0x8205, &(0x7f0000000000)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x15}}, {@stripe}, {@jqfmt_vfsold}, {@errors_remount}, {@quota}, {@noblock_validity}, {@minixdf}, {@min_batch_time={'min_batch_time', 0x3d, 0x13}}]}, 0x1, 0x60a, &(0x7f0000001c40)="$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") bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{}, &(0x7f0000000380), 0x0}, 0x20) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="2400000018000900000000000000000002000000ff0000010000000008000500ac1414ff"], 0x24}}, 0x0) 959.1675ms ago: executing program 1 (id=358): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x10, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRESHEX=0x0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x18) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r1}, 0x18) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000180)='./bus\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x42) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000001afc180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b703000000090000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) move_pages(0x0, 0x2064, &(0x7f0000000040)=[&(0x7f0000ff9000/0x2000)=nil], &(0x7f0000001180), &(0x7f0000000000), 0x0) mkdirat(r3, &(0x7f0000000280)='./bus/file0\x00', 0x0) renameat2(r2, &(0x7f0000000240)='./bus/file0\x00', r3, &(0x7f00000001c0)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0a00000004000000fd0f00000700000000000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00e1ff00000000070006141501000000000000000000000000000001000000000000000000000e"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000002540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r7, &(0x7f0000000280)={0x15, 0x110, 0xfa00, {r8, 0x0, 0x0, 0x30, 0x0, @in={0x1b, 0x0, @local}, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}}}}, 0x118) write$RDMA_USER_CM_CMD_QUERY(r7, &(0x7f0000000000)={0x13, 0x10, 0xfa00, {&(0x7f00000006c0), r8, 0x2}}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x10, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x94) open(&(0x7f0000000740)='./bus\x00', 0x143c62, 0x0) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000300)='trans=rdma,') socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_HANDLE(r10, 0x113, 0x3, 0x0, &(0x7f0000000680)) sendmsg$tipc(r9, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="fb", 0x1}], 0x1, 0x0, 0x0, 0x4008800}, 0x24084851) sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="24006472fa560c2d634af744a3030d56ca310000", @ANYRES16=0x0, @ANYBLOB="01002bbd7000fedbdf250500000008000900020000000600010005000000"], 0x24}, 0x1, 0x0, 0x0, 0x20008100}, 0x0) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r11, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="380000000301010400000000000000000200000024000180140001"], 0x38}}, 0x0) 900.548044ms ago: executing program 3 (id=359): stat(&(0x7f00000005c0)='./file1\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f0000000140)='./file1/file0\x00', 0x410c84, &(0x7f0000000240)={[{@noblock_validity}, {@max_dir_size_kb}, {@resuid={'resuid', 0x3d, r0}}]}, 0x1, 0x775, &(0x7f0000001180)="$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") r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x400803, 0x80) r2 = openat(r1, &(0x7f0000000040)='./file1\x00', 0x11d682, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x13) accept4$llc(r2, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, &(0x7f0000000080)=0x10, 0x80800) syz_io_uring_setup(0x3298, &(0x7f00000002c0)={0x0, 0xedfb, 0x10, 0x1, 0x3b5, 0x0, r2}, &(0x7f0000000340), &(0x7f0000000380)) syz_io_uring_setup(0x4057, &(0x7f00000003c0)={0x0, 0x388d, 0x100, 0x3, 0x2b4}, &(0x7f0000000180), &(0x7f0000000480)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)) pipe(&(0x7f00000008c0)={0xffffffffffffffff}) read(r5, &(0x7f0000032440)=""/102364, 0x18fdc) open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x2, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x75e, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 883.866305ms ago: executing program 1 (id=360): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = syz_io_uring_setup(0x24fc, &(0x7f0000000340)={0x0, 0xb943, 0x200, 0x1}, &(0x7f0000000040)=0x0, &(0x7f0000000240)=0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000340)={0x0}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f00000003c0)={r5, 0x2, 0xffffffffffffffff, 0x701, 0x80000}) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, 0x0, 0x8000) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000000ddff00850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r6}, 0x10) r7 = socket$unix(0x1, 0x1, 0x0) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f00000000c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r8, 0x0) connect$unix(r7, &(0x7f0000fce000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) accept(r8, 0x0, 0x0) r9 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) r10 = socket$inet6(0xa, 0x5, 0x7) ppoll(&(0x7f0000000280)=[{r4}, {r1, 0x100}, {r4, 0x100}, {r1, 0x40}, {r9, 0xe180}, {r10, 0x21}, {r4, 0x40}, {r0, 0x1}, {0xffffffffffffffff, 0x1544}], 0x9, &(0x7f0000000000)={0x0, 0x3938700}, &(0x7f0000000300)={[0x8f]}, 0x8) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) inotify_init1(0x0) 874.022556ms ago: executing program 0 (id=361): perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0xfffffe11, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000080008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000400000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x82000, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x2a020400) r3 = syz_io_uring_setup(0x5c23, &(0x7f0000000240)={0x0, 0x10, 0x13290, 0x0, 0x3}, &(0x7f0000000440)=0x0, &(0x7f0000000ac0)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000140)=@IORING_OP_RENAMEAT={0x23, 0x2, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000400)='./file0/../file0\x00'}) io_uring_enter(r3, 0x1, 0x0, 0x1, 0x0, 0x1000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r7 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r7, 0x6, 0x0, 0x0, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000d00), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)={0x24, r10, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_FEATURES_WANTED={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r8, &(0x7f0000001180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001140)={&(0x7f00000010c0)={0x5c, r10, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x22000000}, 0x802) r11 = fsmount(r7, 0x0, 0x0) fchdir(r11) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) close_range(r6, 0xffffffffffffffff, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f00000000c0)=""/4096, 0x1000) 830.393259ms ago: executing program 1 (id=362): bpf$TOKEN_CREATE(0x24, &(0x7f0000000280), 0x8) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000000018105e04da07000000000001090224"], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) (async) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) (async) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc08, 0x3, 0x1e8, 0xb8, 0x5002004a, 0xb, 0xb8, 0xea02, 0x150, 0x3c8, 0x3c8, 0x150, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'erspan0\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x1, 'pptp\x00', {0x1000000010000}}}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE2={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x248) 516.969422ms ago: executing program 2 (id=366): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000c40)={{0x80}, 'port0\x00', 0x0, 0x0, 0x0, 0xffdffffe, 0x0, 0x40, 0x2, 0x0, 0x0, 0x9}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x65, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port0\x00', 0x29, 0x60400, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}) close(r0) 481.957385ms ago: executing program 2 (id=367): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r0}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x20, r2, 0x301, 0x0, 0x0, {{0x32}, {@void, @val={0xc}}}}, 0x20}}, 0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r3, 0xc0a85320, &(0x7f0000000c40)={{0x80}, 'port0\x00', 0x0, 0x0, 0x0, 0xffdffffe, 0x0, 0x40, 0x2, 0x0, 0x0, 0x9}) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000300)=0x6e, 0x0) sendmsg$inet(r4, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)="b77cdc0a68768da25e525c55c231dfabdb5f3662f8453302c09339c452c8fa524b3d140de220fc46db77de47062cfabfcc1bee0f63b2a1ba7ebd8bc66fc0ce71ee046b79ea8358bdc17745bf85f0177e1175726c0009b54754d9d218dd531674a6c3db38d440233d0d2088e7976c028da393cb3a40d3393c3c86102ef26dbc84b53598314df9dbc6f2c73704291c9425", 0x90}, {&(0x7f0000000400)="42347800de92dc880b9d080dde49c0952d1308a0312c9f24e4011013e2569c2a0ae0a5f0", 0x24}], 0x2, &(0x7f0000000f80)=ANY=[@ANYBLOB="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"], 0x230}, 0x4000001) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r5}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x65, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0xc0a85320, &(0x7f0000000180)={{0x80}, 'port0\x00', 0x29, 0x60400, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}) close(r3) 447.720437ms ago: executing program 2 (id=369): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r0}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x298) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xc, &(0x7f0000000040)=@framed={{0x18, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 432.074579ms ago: executing program 2 (id=371): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18de00000000e8ffffffffffffffea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) ftruncate(0xffffffffffffffff, 0xc17a) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x2, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) inotify_init1(0x0) set_mempolicy_home_node(&(0x7f0000349000/0xa000)=nil, 0xa000, 0x0, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1e0000000200000009000000a904000000000000", @ANYRES32, @ANYBLOB="f54f8be6907df6b5241546790cac1c85a224d238ac7ec3ed5754b9b4670d02767b4ff19cdf743267642cc925394592a976ab8edc5bd2d6cec9f45b60dcbed9470a2a9c87c0518c38db8cb90d20dc75993b28dde54db394368cc5c17abfd3b9d8888387ba28f2a7bce8fc0201f9436770d1a32320717d660ef84f4a84c06843cd59bd301db9", @ANYRESOCT=r0, @ANYRES32, @ANYBLOB="0100000003000000050000000d00"/28], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bf2aa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r4}, 0x10) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000001000000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="01000000e5ffdcff6d228e9e000000180000000400000000ac000000"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r5}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="01000000070000000100010009", @ANYBLOB="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", @ANYRES16=r3], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x6, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000001865000000000000000000000000000000000000000000000000000000000000609d7cba0f595f83e68b1aa6d670817edb055a239cd7052866386071da481bd96c8b8901c7d9cbb7dc6f3d793d221741c9f0fd0d7d3cb8f1bce4b684189e382c6e9162c091d3983785723d72"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) request_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)='kmem_cache_free\x00', 0xffffffffffffffff) r7 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r7, 0x0, 0x0, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff24, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r9 = ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r9) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r10, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) 335.523346ms ago: executing program 4 (id=373): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={0x2, 0x1, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x20, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2b}}}]}, 0x50}}, 0x4000040) 287.938559ms ago: executing program 4 (id=374): r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000180)='kfree\x00', r2, 0x0, 0xfffffffffffffffc}, 0x18) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) 287.500239ms ago: executing program 4 (id=375): r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r2, 0x0, 0xfffffffffffffffc}, 0x18) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}], 0x1}}], 0x48}, 0x0) 258.639741ms ago: executing program 4 (id=376): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) unshare(0x24040000) setsockopt(r2, 0x4, 0x8000, &(0x7f0000000080)="dc857a22fdfc0a72f6e635a2e9a686e4b137d6a31f678740", 0x18) sendmsg$inet(0xffffffffffffffff, &(0x7f0000002980)={&(0x7f00000003c0)={0x2, 0x0, @dev}, 0x10, &(0x7f0000001400)=[{&(0x7f0000000400)="85", 0x1}], 0x1}, 0x4000000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000), 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="d8000000100081046881f782db44b904021d080b01000000e8fe55a11800150006001400000000120800040043000000a80016000a00034006000d00036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x20008804) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000400)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @loopback}, 0x62) 234.204313ms ago: executing program 4 (id=377): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000f40)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000400028008000a00"], 0x40}, 0x1, 0x0, 0x0, 0x814}, 0x4000) 152.564989ms ago: executing program 1 (id=378): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000280)=ANY=[@ANYRES32=r2, @ANYRES32=r1, @ANYBLOB='&\x00'/12, @ANYRES32, @ANYBLOB="20dcd27c2e2149c247471642d12b673bfdc02a862e214af60b3d28c4ea", @ANYRES64=0x0], 0x10) 147.839709ms ago: executing program 4 (id=379): r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000001afc180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ff"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}]}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x83, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f00000004c0)=0x27) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x32, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="00000becff516a00"/20, @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000002b70400000800f700850000009500000095000000ffffffe4"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r7}, 0x10) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) mount(&(0x7f00000002c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1400, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x2, 0x4, &(0x7f0000000200)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000054850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000680), 0x64, 0x50a, &(0x7f00000009c0)="$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") setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={r3, 0x4}, 0x8) socket$nl_route(0x10, 0x3, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r8}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mlock2(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0) mlock2(&(0x7f0000003000/0xb000)=nil, 0xb000, 0x1) 104.803023ms ago: executing program 1 (id=380): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de85000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x18) getcwd(&(0x7f0000000c80)=""/50, 0x32) 0s ago: executing program 0 (id=381): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r0}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x298) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xc, &(0x7f0000000040)=@framed={{0x18, 0x7}, [@tail_call, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) kernel console output (not intermixed with test programs): [ 21.806598][ T29] audit: type=1400 audit(1739004121.428:81): avc: denied { read } for pid=2981 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.0.156' (ED25519) to the list of known hosts. [ 26.465079][ T29] audit: type=1400 audit(1739004126.078:82): avc: denied { mounton } for pid=3286 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.466097][ T3286] cgroup: Unknown subsys name 'net' [ 26.487914][ T29] audit: type=1400 audit(1739004126.078:83): avc: denied { mount } for pid=3286 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.515402][ T29] audit: type=1400 audit(1739004126.108:84): avc: denied { unmount } for pid=3286 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.690290][ T3286] cgroup: Unknown subsys name 'cpuset' [ 26.696486][ T3286] cgroup: Unknown subsys name 'rlimit' [ 26.806922][ T29] audit: type=1400 audit(1739004126.418:85): avc: denied { setattr } for pid=3286 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.830307][ T29] audit: type=1400 audit(1739004126.418:86): avc: denied { create } for pid=3286 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.850860][ T29] audit: type=1400 audit(1739004126.418:87): avc: denied { write } for pid=3286 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.854783][ T3290] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.871415][ T29] audit: type=1400 audit(1739004126.418:88): avc: denied { read } for pid=3286 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 26.900227][ T29] audit: type=1400 audit(1739004126.418:89): avc: denied { mounton } for pid=3286 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.917664][ T3286] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.925128][ T29] audit: type=1400 audit(1739004126.418:90): avc: denied { mount } for pid=3286 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 26.957024][ T29] audit: type=1400 audit(1739004126.498:91): avc: denied { relabelto } for pid=3290 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.974004][ T3296] chnl_net:caif_netlink_parms(): no params data found [ 28.101570][ T3296] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.108736][ T3296] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.116113][ T3296] bridge_slave_0: entered allmulticast mode [ 28.122726][ T3296] bridge_slave_0: entered promiscuous mode [ 28.132981][ T3309] chnl_net:caif_netlink_parms(): no params data found [ 28.149357][ T3297] chnl_net:caif_netlink_parms(): no params data found [ 28.157862][ T3296] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.165049][ T3296] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.172239][ T3296] bridge_slave_1: entered allmulticast mode [ 28.179174][ T3296] bridge_slave_1: entered promiscuous mode [ 28.209146][ T3296] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.231220][ T3296] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.263377][ T3296] team0: Port device team_slave_0 added [ 28.276033][ T3296] team0: Port device team_slave_1 added [ 28.304663][ T3305] chnl_net:caif_netlink_parms(): no params data found [ 28.326366][ T3296] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.333352][ T3296] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.359293][ T3296] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.375133][ T3309] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.382286][ T3309] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.389515][ T3309] bridge_slave_0: entered allmulticast mode [ 28.395905][ T3309] bridge_slave_0: entered promiscuous mode [ 28.407285][ T3296] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.414319][ T3296] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.440448][ T3296] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 28.456158][ T3309] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.463383][ T3309] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.470518][ T3309] bridge_slave_1: entered allmulticast mode [ 28.476979][ T3309] bridge_slave_1: entered promiscuous mode [ 28.483147][ T3297] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.490328][ T3297] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.497505][ T3297] bridge_slave_0: entered allmulticast mode [ 28.503994][ T3297] bridge_slave_0: entered promiscuous mode [ 28.527944][ T3297] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.535117][ T3297] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.542382][ T3297] bridge_slave_1: entered allmulticast mode [ 28.548833][ T3297] bridge_slave_1: entered promiscuous mode [ 28.555136][ T3300] chnl_net:caif_netlink_parms(): no params data found [ 28.600967][ T3305] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.608096][ T3305] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.615341][ T3305] bridge_slave_0: entered allmulticast mode [ 28.621844][ T3305] bridge_slave_0: entered promiscuous mode [ 28.629408][ T3309] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.638520][ T3305] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.645631][ T3305] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.652854][ T3305] bridge_slave_1: entered allmulticast mode [ 28.659168][ T3305] bridge_slave_1: entered promiscuous mode [ 28.683086][ T3297] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.694120][ T3296] hsr_slave_0: entered promiscuous mode [ 28.700179][ T3296] hsr_slave_1: entered promiscuous mode [ 28.707191][ T3309] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.734449][ T3305] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.744679][ T3297] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.765889][ T3305] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.803184][ T3297] team0: Port device team_slave_0 added [ 28.808914][ T3300] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.816031][ T3300] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.823308][ T3300] bridge_slave_0: entered allmulticast mode [ 28.829934][ T3300] bridge_slave_0: entered promiscuous mode [ 28.838950][ T3309] team0: Port device team_slave_0 added [ 28.850326][ T3297] team0: Port device team_slave_1 added [ 28.856506][ T3305] team0: Port device team_slave_0 added [ 28.863359][ T3305] team0: Port device team_slave_1 added [ 28.869032][ T3300] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.876112][ T3300] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.883408][ T3300] bridge_slave_1: entered allmulticast mode [ 28.889899][ T3300] bridge_slave_1: entered promiscuous mode [ 28.903126][ T3309] team0: Port device team_slave_1 added [ 28.941723][ T3300] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.951912][ T3300] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.968758][ T3297] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.975767][ T3297] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.001847][ T3297] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.013197][ T3305] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.020189][ T3305] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.046141][ T3305] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.057486][ T3305] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.064455][ T3305] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.090355][ T3305] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.112670][ T3309] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.119761][ T3309] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.145945][ T3309] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.163019][ T3297] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.170100][ T3297] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.196145][ T3297] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.216941][ T3300] team0: Port device team_slave_0 added [ 29.223115][ T3309] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.230085][ T3309] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.256090][ T3309] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.279131][ T3300] team0: Port device team_slave_1 added [ 29.312498][ T3297] hsr_slave_0: entered promiscuous mode [ 29.318427][ T3297] hsr_slave_1: entered promiscuous mode [ 29.324343][ T3297] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.332674][ T3297] Cannot create hsr debugfs directory [ 29.349389][ T3300] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.356414][ T3300] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.382361][ T3300] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.394750][ T3305] hsr_slave_0: entered promiscuous mode [ 29.400790][ T3305] hsr_slave_1: entered promiscuous mode [ 29.406643][ T3305] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.414225][ T3305] Cannot create hsr debugfs directory [ 29.430986][ T3309] hsr_slave_0: entered promiscuous mode [ 29.437121][ T3309] hsr_slave_1: entered promiscuous mode [ 29.443029][ T3309] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.450616][ T3309] Cannot create hsr debugfs directory [ 29.456471][ T3300] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.463469][ T3300] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.489415][ T3300] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.567122][ T3300] hsr_slave_0: entered promiscuous mode [ 29.573424][ T3300] hsr_slave_1: entered promiscuous mode [ 29.579337][ T3300] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.586922][ T3300] Cannot create hsr debugfs directory [ 29.610837][ T3296] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 29.632326][ T3296] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 29.654600][ T3296] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 29.678965][ T3296] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 29.730704][ T3297] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 29.742888][ T3297] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 29.758505][ T3297] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 29.772513][ T3297] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 29.790311][ T3309] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 29.799266][ T3309] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 29.809167][ T3309] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 29.828654][ T3309] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 29.837906][ T3305] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 29.864592][ T3305] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 29.873552][ T3300] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 29.886771][ T3305] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 29.896623][ T3305] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 29.905865][ T3300] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 29.914287][ T3300] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 29.924581][ T3300] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 29.998297][ T3296] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.023157][ T3297] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.032475][ T3305] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.059607][ T3296] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.070355][ T3309] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.081401][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.088532][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.098161][ T3297] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.107483][ T3305] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.118464][ T40] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.125585][ T40] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.138649][ T3309] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.149025][ T3300] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.158568][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.165689][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.174964][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.182076][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.193042][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.200117][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.222764][ T11] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.229829][ T11] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.240120][ T11] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.247231][ T11] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.264241][ T11] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.271312][ T11] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.314330][ T3300] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.345372][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.352923][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.372773][ T3297] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.387198][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.394333][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.432317][ T3309] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.447582][ T3296] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.468217][ T3305] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.503437][ T3297] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.604863][ T3296] veth0_vlan: entered promiscuous mode [ 30.611297][ T3309] veth0_vlan: entered promiscuous mode [ 30.629765][ T3300] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.647240][ T3296] veth1_vlan: entered promiscuous mode [ 30.664564][ T3305] veth0_vlan: entered promiscuous mode [ 30.675902][ T3309] veth1_vlan: entered promiscuous mode [ 30.695770][ T3309] veth0_macvtap: entered promiscuous mode [ 30.705118][ T3305] veth1_vlan: entered promiscuous mode [ 30.719264][ T3309] veth1_macvtap: entered promiscuous mode [ 30.726794][ T3296] veth0_macvtap: entered promiscuous mode [ 30.746198][ T3296] veth1_macvtap: entered promiscuous mode [ 30.757171][ T3305] veth0_macvtap: entered promiscuous mode [ 30.774776][ T3305] veth1_macvtap: entered promiscuous mode [ 30.783013][ T3309] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.791485][ T3297] veth0_vlan: entered promiscuous mode [ 30.803514][ T3296] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.814139][ T3296] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.824787][ T3296] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.833528][ T3309] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.847422][ T3296] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 30.857967][ T3296] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.868816][ T3296] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.881329][ T3297] veth1_vlan: entered promiscuous mode [ 30.888109][ T3300] veth0_vlan: entered promiscuous mode [ 30.898568][ T3296] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.907440][ T3296] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.916206][ T3296] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.925051][ T3296] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.936762][ T3309] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.945517][ T3309] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.954298][ T3309] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.963048][ T3309] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.974442][ T3305] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.984958][ T3305] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.994848][ T3305] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.005409][ T3305] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.016102][ T3305] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.030640][ T3305] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.041233][ T3305] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.051072][ T3305] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.061784][ T3305] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.072391][ T3305] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.082082][ T3300] veth1_vlan: entered promiscuous mode [ 31.094478][ T3305] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.103295][ T3305] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.112030][ T3305] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.120756][ T3305] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.135428][ T3297] veth0_macvtap: entered promiscuous mode [ 31.151471][ T3297] veth1_macvtap: entered promiscuous mode [ 31.177893][ T3300] veth0_macvtap: entered promiscuous mode [ 31.185049][ T3297] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.195610][ T3297] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.205526][ T3297] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.216028][ T3297] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.225878][ T3297] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.236436][ T3297] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.248930][ T3296] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 31.250245][ T3297] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.273286][ T3297] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.283851][ T3297] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.293903][ T3297] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.304460][ T3297] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.314377][ T3297] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.324807][ T3297] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.335803][ T3297] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.349212][ T3297] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.357988][ T3297] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.366733][ T3297] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.375607][ T3297] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.403769][ T3438] Zero length message leads to an empty skb [ 31.405088][ T3300] veth1_macvtap: entered promiscuous mode [ 31.434913][ T3439] wireguard0: entered promiscuous mode [ 31.440575][ T3439] wireguard0: entered allmulticast mode [ 31.491398][ T3300] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.501970][ T3300] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.511883][ T3300] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.522344][ T3300] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.532290][ T3300] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.542781][ T3300] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.552635][ T3300] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.563165][ T3300] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.588470][ T29] kauditd_printk_skb: 43 callbacks suppressed [ 31.588484][ T29] audit: type=1400 audit(1739004131.198:135): avc: denied { create } for pid=3446 comm="syz.3.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 31.613932][ T29] audit: type=1400 audit(1739004131.198:136): avc: denied { bind } for pid=3446 comm="syz.3.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 31.635158][ T3300] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.645022][ T3300] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.655602][ T3300] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.665450][ T3300] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.675919][ T3300] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.685824][ T3300] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.696362][ T3300] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.706289][ T3300] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.716945][ T3300] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.727099][ T29] audit: type=1400 audit(1739004131.338:137): avc: denied { read write } for pid=3449 comm="syz.3.7" name="rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 31.730016][ T3453] netlink: 12 bytes leftover after parsing attributes in process `syz.3.7'. [ 31.750079][ T29] audit: type=1400 audit(1739004131.338:138): avc: denied { open } for pid=3449 comm="syz.3.7" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 31.758755][ T3453] netlink: 16 bytes leftover after parsing attributes in process `syz.3.7'. [ 31.782631][ T29] audit: type=1400 audit(1739004131.338:139): avc: denied { create } for pid=3449 comm="syz.3.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.800289][ T3452] loop4: detected capacity change from 0 to 2048 [ 31.810822][ T29] audit: type=1400 audit(1739004131.338:140): avc: denied { create } for pid=3449 comm="syz.3.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 31.836330][ T29] audit: type=1400 audit(1739004131.338:141): avc: denied { getopt } for pid=3449 comm="syz.3.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 31.855747][ T29] audit: type=1400 audit(1739004131.338:142): avc: denied { write } for pid=3449 comm="syz.3.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 31.876009][ T3300] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.884280][ T3300] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.893342][ T3300] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.902130][ T3300] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.911002][ T3300] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.921405][ T29] audit: type=1400 audit(1739004131.448:143): avc: denied { create } for pid=3437 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 31.940744][ T29] audit: type=1400 audit(1739004131.478:144): avc: denied { ioctl } for pid=3437 comm="syz.2.3" path="socket:[3628]" dev="sockfs" ino=3628 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 32.088868][ T3466] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 32.088868][ T3466] The task syz.0.9 (3466) triggered the difference, watch for misbehavior. [ 32.131837][ T3466] netlink: 20 bytes leftover after parsing attributes in process `syz.0.9'. [ 32.382649][ T3486] loop3: detected capacity change from 0 to 512 [ 32.398973][ T3486] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 32.412289][ T3486] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 32.440338][ T3486] EXT4-fs warning (device loop3): ext4_expand_extra_isize_ea:2863: Unable to expand inode 11. Delete some EAs or run e2fsck. [ 32.453870][ T3486] EXT4-fs (loop3): 1 truncate cleaned up [ 32.468608][ T3486] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 32.542077][ T3305] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 32.612214][ T3494] loop1: detected capacity change from 0 to 2048 [ 32.624318][ T3493] loop3: detected capacity change from 0 to 512 [ 32.631734][ T3493] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 32.645779][ T3493] EXT4-fs (loop3): 1 truncate cleaned up [ 32.667610][ T3493] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 32.701247][ T3499] loop4: detected capacity change from 0 to 512 [ 32.709106][ T3499] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 32.722950][ T3305] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 32.723824][ T3499] EXT4-fs (loop4): 1 truncate cleaned up [ 32.738011][ T3499] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 32.778628][ T3297] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 32.837009][ T3507] netlink: 12 bytes leftover after parsing attributes in process `syz.3.26'. [ 32.845874][ T3507] netlink: 16 bytes leftover after parsing attributes in process `syz.3.26'. [ 32.921495][ T3515] loop4: detected capacity change from 0 to 512 [ 32.933724][ T3515] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 32.947539][ T3515] ext4 filesystem being mounted at /4/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 32.991649][ T3297] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 33.040569][ T3524] netlink: 12 bytes leftover after parsing attributes in process `syz.4.32'. [ 33.049429][ T3524] netlink: 16 bytes leftover after parsing attributes in process `syz.4.32'. [ 33.120421][ T3529] x_tables: ip_tables: REDIRECT target: used from hooks INPUT, but only usable from PREROUTING/OUTPUT [ 33.140185][ T3529] 9pnet_fd: Insufficient options for proto=fd [ 33.157393][ T3529] sch_tbf: peakrate 2 is lower than or equals to rate 512 ! [ 33.263158][ T3541] FAULT_INJECTION: forcing a failure. [ 33.263158][ T3541] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 33.276346][ T3541] CPU: 0 UID: 0 PID: 3541 Comm: syz.3.39 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 33.276454][ T3541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 33.276470][ T3541] Call Trace: [ 33.276477][ T3541] [ 33.276484][ T3541] dump_stack_lvl+0xf2/0x150 [ 33.276677][ T3541] dump_stack+0x15/0x1a [ 33.276702][ T3541] should_fail_ex+0x24a/0x260 [ 33.276741][ T3541] should_fail+0xb/0x10 [ 33.276883][ T3541] should_fail_usercopy+0x1a/0x20 [ 33.276903][ T3541] _copy_from_user+0x1c/0xa0 [ 33.276927][ T3541] copy_msghdr_from_user+0x54/0x2a0 [ 33.276948][ T3541] ? __fget_files+0x17c/0x1c0 [ 33.276981][ T3541] __sys_sendmmsg+0x1e8/0x4b0 [ 33.277071][ T3541] __x64_sys_sendmmsg+0x57/0x70 [ 33.277102][ T3541] x64_sys_call+0x29aa/0x2dc0 [ 33.277129][ T3541] do_syscall_64+0xc9/0x1c0 [ 33.277189][ T3541] ? clear_bhb_loop+0x55/0xb0 [ 33.277217][ T3541] ? clear_bhb_loop+0x55/0xb0 [ 33.277332][ T3541] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 33.277364][ T3541] RIP: 0033:0x7fc861bccde9 [ 33.277382][ T3541] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 33.277399][ T3541] RSP: 002b:00007fc860237038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 33.277417][ T3541] RAX: ffffffffffffffda RBX: 00007fc861de5fa0 RCX: 00007fc861bccde9 [ 33.277429][ T3541] RDX: 0000000000000001 RSI: 0000400000007180 RDI: 0000000000000003 [ 33.277441][ T3541] RBP: 00007fc860237090 R08: 0000000000000000 R09: 0000000000000000 [ 33.277530][ T3541] R10: 0000000000010014 R11: 0000000000000246 R12: 0000000000000001 [ 33.277541][ T3541] R13: 0000000000000000 R14: 00007fc861de5fa0 R15: 00007fff54d8b6f8 [ 33.277558][ T3541] [ 33.489185][ T3545] mmap: syz.2.41 (3545) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 33.525891][ T3552] sch_tbf: peakrate 2 is lower than or equals to rate 512 ! [ 33.621685][ T3566] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 33.645835][ T3565] loop3: detected capacity change from 0 to 1024 [ 33.657798][ T3565] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 33.672692][ T3565] EXT4-fs (loop3): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 33.685039][ T3565] EXT4-fs (loop3): revision level too high, forcing read-only mode [ 33.685112][ T3572] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 33.693951][ T3565] EXT4-fs (loop3): orphan cleanup on readonly fs [ 33.708857][ T3572] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 33.710189][ T3565] EXT4-fs error (device loop3): __ext4_get_inode_loc:4435: comm syz.3.49: Invalid inode table block 0 in block_group 0 [ 33.732135][ T3570] loop2: detected capacity change from 0 to 2048 [ 33.743585][ T3565] EXT4-fs (loop3): Remounting filesystem read-only [ 33.770264][ T3565] EXT4-fs (loop3): 1 truncate cleaned up [ 33.778738][ T3565] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 33.792457][ T3565] SELinux: (dev loop3, type ext4) getxattr errno 5 [ 33.799368][ T3565] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 33.819909][ T3572] serio: Serial port ttyS3 [ 33.828741][ T3576] xt_TPROXY: Can be used only with -p tcp or -p udp [ 33.852677][ T3580] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 33.943178][ T3583] xt_TPROXY: Can be used only with -p tcp or -p udp [ 33.991424][ T3586] loop3: detected capacity change from 0 to 2048 [ 34.002742][ T3586] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 34.052330][ T3590] loop4: detected capacity change from 0 to 512 [ 34.072039][ T3590] EXT4-fs (loop4): Cannot turn on journaled quota: type 1: error -2 [ 34.091451][ T3590] EXT4-fs (loop4): 1 truncate cleaned up [ 34.103565][ T3590] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 34.171265][ T3590] EXT4-fs error (device loop4): ext4_map_blocks:671: inode #2: block 4: comm syz.4.57: lblock 0 mapped to illegal pblock 4 (length 1) [ 34.199771][ T3297] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 34.248720][ T3593] FAULT_INJECTION: forcing a failure. [ 34.248720][ T3593] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 34.262061][ T3593] CPU: 1 UID: 0 PID: 3593 Comm: syz.0.58 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 34.262088][ T3593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 34.262102][ T3593] Call Trace: [ 34.262110][ T3593] [ 34.262119][ T3593] dump_stack_lvl+0xf2/0x150 [ 34.262149][ T3593] dump_stack+0x15/0x1a [ 34.262170][ T3593] should_fail_ex+0x24a/0x260 [ 34.262223][ T3593] should_fail_alloc_page+0xfd/0x110 [ 34.262270][ T3593] __alloc_frozen_pages_noprof+0x109/0x340 [ 34.262304][ T3593] alloc_pages_mpol+0xb4/0x260 [ 34.262339][ T3593] folio_alloc_mpol_noprof+0x36/0x80 [ 34.262377][ T3593] shmem_get_folio_gfp+0x3d1/0xd90 [ 34.262441][ T3593] shmem_write_begin+0xa2/0x180 [ 34.262471][ T3593] generic_perform_write+0x1a8/0x4a0 [ 34.262497][ T3593] shmem_file_write_iter+0xc2/0xe0 [ 34.262594][ T3593] do_iter_readv_writev+0x403/0x4b0 [ 34.262620][ T3593] vfs_writev+0x2d9/0x880 [ 34.262704][ T3593] ? proc_fail_nth_write+0x12a/0x150 [ 34.262735][ T3593] __se_sys_pwritev2+0x100/0x1c0 [ 34.262798][ T3593] __x64_sys_pwritev2+0x78/0x90 [ 34.262840][ T3593] x64_sys_call+0x2afe/0x2dc0 [ 34.262872][ T3593] do_syscall_64+0xc9/0x1c0 [ 34.262903][ T3593] ? clear_bhb_loop+0x55/0xb0 [ 34.262937][ T3593] ? clear_bhb_loop+0x55/0xb0 [ 34.262999][ T3593] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 34.263031][ T3593] RIP: 0033:0x7f52b284cde9 [ 34.263048][ T3593] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.263116][ T3593] RSP: 002b:00007f52b0eb1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000148 [ 34.263139][ T3593] RAX: ffffffffffffffda RBX: 00007f52b2a65fa0 RCX: 00007f52b284cde9 [ 34.263153][ T3593] RDX: 0000000000000002 RSI: 0000400000000240 RDI: 0000000000000003 [ 34.263167][ T3593] RBP: 00007f52b0eb1090 R08: 0000000000041001 R09: 0000000000000003 [ 34.263178][ T3593] R10: 0000000000001200 R11: 0000000000000246 R12: 0000000000000001 [ 34.263191][ T3593] R13: 0000000000000000 R14: 00007f52b2a65fa0 R15: 00007fff54f35b98 [ 34.263211][ T3593] [ 34.293987][ T3597] loop4: detected capacity change from 0 to 2048 [ 34.340103][ T3305] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 34.429441][ T3604] FAULT_INJECTION: forcing a failure. [ 34.429441][ T3604] name failslab, interval 1, probability 0, space 0, times 1 [ 34.436855][ T3597] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 34.441774][ T3604] CPU: 0 UID: 0 PID: 3604 Comm: syz.0.62 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 34.441807][ T3604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 34.441833][ T3604] Call Trace: [ 34.441841][ T3604] [ 34.441850][ T3604] dump_stack_lvl+0xf2/0x150 [ 34.441912][ T3604] dump_stack+0x15/0x1a [ 34.441990][ T3604] should_fail_ex+0x24a/0x260 [ 34.442056][ T3604] should_failslab+0x8f/0xb0 [ 34.442087][ T3604] kmem_cache_alloc_node_noprof+0x59/0x320 [ 34.442129][ T3604] ? __alloc_skb+0x10b/0x310 [ 34.442160][ T3604] __alloc_skb+0x10b/0x310 [ 34.442250][ T3604] ? audit_log_start+0x34c/0x6b0 [ 34.442289][ T3604] audit_log_start+0x368/0x6b0 [ 34.442328][ T3604] audit_seccomp+0x4b/0x130 [ 34.442362][ T3604] __seccomp_filter+0x6fa/0x1180 [ 34.442458][ T3604] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 34.442489][ T3604] ? vfs_write+0x644/0x920 [ 34.442513][ T3604] ? __schedule+0x75b/0x990 [ 34.442553][ T3604] __secure_computing+0x9f/0x1c0 [ 34.442654][ T3604] syscall_trace_enter+0xd1/0x1f0 [ 34.442683][ T3604] do_syscall_64+0xaa/0x1c0 [ 34.442712][ T3604] ? clear_bhb_loop+0x55/0xb0 [ 34.442763][ T3604] ? clear_bhb_loop+0x55/0xb0 [ 34.442796][ T3604] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 34.442840][ T3604] RIP: 0033:0x7f52b284cde9 [ 34.442858][ T3604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.442879][ T3604] RSP: 002b:00007f52b0eb1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 34.442902][ T3604] RAX: ffffffffffffffda RBX: 00007f52b2a65fa0 RCX: 00007f52b284cde9 [ 34.442916][ T3604] RDX: 00004000000002c0 RSI: 0000000000005423 RDI: 000000000000000a [ 34.442931][ T3604] RBP: 00007f52b0eb1090 R08: 0000000000000000 R09: 0000000000000000 [ 34.442945][ T3604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 34.442959][ T3604] R13: 0000000000000000 R14: 00007f52b2a65fa0 R15: 00007fff54f35b98 [ 34.442979][ T3604] [ 34.585040][ T3611] xt_TPROXY: Can be used only with -p tcp or -p udp [ 34.588224][ T3608] wireguard0: entered promiscuous mode [ 34.730151][ T3608] wireguard0: entered allmulticast mode [ 34.811250][ T3597] xt_hashlimit: max too large, truncated to 1048576 [ 34.818907][ T3597] Cannot find set identified by id 0 to match [ 34.908423][ T3633] vhci_hcd: default hub control req: 0000 v0000 i0000 l31125 [ 34.911481][ T3629] netlink: 12 bytes leftover after parsing attributes in process `syz.1.71'. [ 34.924780][ T3629] netlink: 16 bytes leftover after parsing attributes in process `syz.1.71'. [ 34.966600][ T3297] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 34.978373][ T3639] loop3: detected capacity change from 0 to 512 [ 34.990173][ T3639] EXT4-fs error (device loop3): ext4_orphan_get:1415: comm syz.3.72: bad orphan inode 4 [ 35.014537][ T3639] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 35.031947][ T3644] netlink: 88 bytes leftover after parsing attributes in process `syz.4.75'. [ 35.045069][ T3633] 9p: Unknown access argument ²: -22 [ 35.118467][ T3305] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.203830][ T3654] loop4: detected capacity change from 0 to 512 [ 35.214897][ T3654] EXT4-fs: Ignoring removed i_version option [ 35.226238][ T3654] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 35.238734][ T3654] EXT4-fs (loop4): 1 truncate cleaned up [ 35.246960][ T3654] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 35.275461][ T3663] wireguard0: entered promiscuous mode [ 35.281029][ T3663] wireguard0: entered allmulticast mode [ 35.353373][ T3297] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.380552][ T3669] loop4: detected capacity change from 0 to 512 [ 35.412612][ T3669] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 35.425381][ T3669] ext4 filesystem being mounted at /15/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 35.455123][ T3297] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.536470][ T3678] FAULT_INJECTION: forcing a failure. [ 35.536470][ T3678] name failslab, interval 1, probability 0, space 0, times 0 [ 35.549252][ T3678] CPU: 0 UID: 0 PID: 3678 Comm: syz.4.86 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 35.549311][ T3678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 35.549326][ T3678] Call Trace: [ 35.549376][ T3678] [ 35.549382][ T3678] dump_stack_lvl+0xf2/0x150 [ 35.549406][ T3678] dump_stack+0x15/0x1a [ 35.549424][ T3678] should_fail_ex+0x24a/0x260 [ 35.549453][ T3678] ? nh_notifier_info_init+0xc8/0x4b0 [ 35.549514][ T3678] should_failslab+0x8f/0xb0 [ 35.549546][ T3678] __kmalloc_cache_noprof+0x4e/0x320 [ 35.549663][ T3678] nh_notifier_info_init+0xc8/0x4b0 [ 35.549700][ T3678] call_nexthop_notifiers+0xa7/0x230 [ 35.549771][ T3678] rtm_new_nexthop+0x3985/0x4ad0 [ 35.549865][ T3678] ? __kfree_skb+0x102/0x150 [ 35.549888][ T3678] ? __kfree_skb+0x102/0x150 [ 35.549928][ T3678] ? security_capable+0x81/0x90 [ 35.549959][ T3678] ? ns_capable+0x7d/0xb0 [ 35.550060][ T3678] ? __pfx_rtm_new_nexthop+0x10/0x10 [ 35.550150][ T3678] rtnetlink_rcv_msg+0x6aa/0x710 [ 35.550235][ T3678] ? ref_tracker_free+0x3a5/0x410 [ 35.550262][ T3678] ? __dev_queue_xmit+0x186/0x2090 [ 35.550344][ T3678] netlink_rcv_skb+0x12c/0x230 [ 35.550371][ T3678] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 35.550401][ T3678] rtnetlink_rcv+0x1c/0x30 [ 35.550424][ T3678] netlink_unicast+0x599/0x670 [ 35.550473][ T3678] netlink_sendmsg+0x5cc/0x6e0 [ 35.550504][ T3678] ? __pfx_netlink_sendmsg+0x10/0x10 [ 35.550532][ T3678] __sock_sendmsg+0x140/0x180 [ 35.550548][ T3678] ____sys_sendmsg+0x312/0x410 [ 35.550630][ T3678] __sys_sendmmsg+0x227/0x4b0 [ 35.550675][ T3678] __x64_sys_sendmmsg+0x57/0x70 [ 35.550702][ T3678] x64_sys_call+0x29aa/0x2dc0 [ 35.550728][ T3678] do_syscall_64+0xc9/0x1c0 [ 35.550749][ T3678] ? clear_bhb_loop+0x55/0xb0 [ 35.550789][ T3678] ? clear_bhb_loop+0x55/0xb0 [ 35.550812][ T3678] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 35.550835][ T3678] RIP: 0033:0x7f6b8b04cde9 [ 35.550894][ T3678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 35.550909][ T3678] RSP: 002b:00007f6b896b1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 35.550925][ T3678] RAX: ffffffffffffffda RBX: 00007f6b8b265fa0 RCX: 00007f6b8b04cde9 [ 35.550935][ T3678] RDX: 04000000000001f2 RSI: 0000400000000000 RDI: 0000000000000007 [ 35.550945][ T3678] RBP: 00007f6b896b1090 R08: 0000000000000000 R09: 0000000000000000 [ 35.550955][ T3678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 35.550977][ T3678] R13: 0000000000000000 R14: 00007f6b8b265fa0 R15: 00007ffc0b1f9488 [ 35.550994][ T3678] [ 35.885674][ T3682] netem: incorrect ge model size [ 35.890750][ T3682] netem: change failed [ 35.963708][ T3684] loop4: detected capacity change from 0 to 512 [ 35.972553][ T3684] ======================================================= [ 35.972553][ T3684] WARNING: The mand mount option has been deprecated and [ 35.972553][ T3684] and is ignored by this kernel. Remove the mand [ 35.972553][ T3684] option from the mount to silence this warning. [ 35.972553][ T3684] ======================================================= [ 36.227517][ T3684] xt_recent: Unsupported userspace flags (000000da) [ 36.323983][ T3700] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35 sclass=netlink_route_socket pid=3700 comm=syz.0.93 [ 36.380856][ T3705] xt_policy: output policy not valid in PREROUTING and INPUT [ 36.419844][ T3710] FAULT_INJECTION: forcing a failure. [ 36.419844][ T3710] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 36.433055][ T3710] CPU: 0 UID: 0 PID: 3710 Comm: syz.2.96 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 36.433128][ T3710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 36.433140][ T3710] Call Trace: [ 36.433145][ T3710] [ 36.433153][ T3710] dump_stack_lvl+0xf2/0x150 [ 36.433186][ T3710] dump_stack+0x15/0x1a [ 36.433261][ T3710] should_fail_ex+0x24a/0x260 [ 36.433301][ T3710] should_fail+0xb/0x10 [ 36.433343][ T3710] should_fail_usercopy+0x1a/0x20 [ 36.433361][ T3710] _copy_to_user+0x20/0xa0 [ 36.433382][ T3710] rng_dev_read+0x3cf/0x6f0 [ 36.433495][ T3710] vfs_readv+0x3e2/0x660 [ 36.433531][ T3710] ? __pfx_rng_dev_read+0x10/0x10 [ 36.433607][ T3710] __x64_sys_preadv+0xf4/0x1c0 [ 36.433636][ T3710] x64_sys_call+0x2680/0x2dc0 [ 36.433668][ T3710] do_syscall_64+0xc9/0x1c0 [ 36.433695][ T3710] ? clear_bhb_loop+0x55/0xb0 [ 36.433738][ T3710] ? clear_bhb_loop+0x55/0xb0 [ 36.433764][ T3710] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 36.433813][ T3710] RIP: 0033:0x7f692d4ccde9 [ 36.433830][ T3710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 36.433869][ T3710] RSP: 002b:00007f692bb37038 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 36.433886][ T3710] RAX: ffffffffffffffda RBX: 00007f692d6e5fa0 RCX: 00007f692d4ccde9 [ 36.433926][ T3710] RDX: 0000000000000002 RSI: 0000400000000580 RDI: 0000000000000004 [ 36.433941][ T3710] RBP: 00007f692bb37090 R08: 0000000000000000 R09: 0000000000000000 [ 36.433954][ T3710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 36.433968][ T3710] R13: 0000000000000000 R14: 00007f692d6e5fa0 R15: 00007ffc8728d848 [ 36.433988][ T3710] [ 36.617096][ T29] kauditd_printk_skb: 1694 callbacks suppressed [ 36.617113][ T29] audit: type=1400 audit(1739004136.228:1835): avc: denied { read write } for pid=3297 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 36.647727][ T29] audit: type=1400 audit(1739004136.228:1836): avc: denied { open } for pid=3297 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 36.692415][ T29] audit: type=1400 audit(1739004136.228:1837): avc: denied { ioctl } for pid=3297 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=104 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 36.718096][ T29] audit: type=1400 audit(1739004136.288:1838): avc: denied { create } for pid=3699 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 36.737462][ T29] audit: type=1400 audit(1739004136.288:1839): avc: denied { write } for pid=3699 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 36.756696][ T29] audit: type=1400 audit(1739004136.308:1840): avc: denied { create } for pid=3715 comm="syz.4.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 36.776230][ T29] audit: type=1400 audit(1739004136.308:1841): avc: denied { bind } for pid=3715 comm="syz.4.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 36.795475][ T29] audit: type=1400 audit(1739004136.308:1842): avc: denied { listen } for pid=3715 comm="syz.4.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 36.815725][ T29] audit: type=1400 audit(1739004136.308:1843): avc: denied { write } for pid=3715 comm="syz.4.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 36.837389][ T29] audit: type=1400 audit(1739004136.318:1844): avc: denied { append } for pid=2981 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 36.862718][ T3720] 9pnet: Could not find request transport: fd0x0000000000000004 [ 37.032279][ T3748] __nla_validate_parse: 4 callbacks suppressed [ 37.032337][ T3748] netlink: 8 bytes leftover after parsing attributes in process `syz.1.109'. [ 37.252638][ T3761] wireguard0: entered promiscuous mode [ 37.258154][ T3761] wireguard0: entered allmulticast mode [ 37.405093][ T3768] loop3: detected capacity change from 0 to 512 [ 37.457110][ T3768] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 37.490076][ T3768] ext4 filesystem being mounted at /32/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 37.584415][ T3305] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 37.672315][ T3777] netem: incorrect gi model size [ 37.677343][ T3777] netem: change failed [ 37.722976][ T3779] loop4: detected capacity change from 0 to 512 [ 37.732509][ T3779] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 37.761863][ T3779] EXT4-fs (loop4): 1 truncate cleaned up [ 37.767855][ T3779] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 37.816722][ T3297] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 38.027878][ T3797] wireguard0: entered promiscuous mode [ 38.033612][ T3797] wireguard0: entered allmulticast mode [ 38.143872][ T3802] FAULT_INJECTION: forcing a failure. [ 38.143872][ T3802] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 38.157015][ T3802] CPU: 0 UID: 0 PID: 3802 Comm: syz.0.131 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 38.157043][ T3802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 38.157167][ T3802] Call Trace: [ 38.157175][ T3802] [ 38.157184][ T3802] dump_stack_lvl+0xf2/0x150 [ 38.157211][ T3802] dump_stack+0x15/0x1a [ 38.157231][ T3802] should_fail_ex+0x24a/0x260 [ 38.157271][ T3802] should_fail+0xb/0x10 [ 38.157307][ T3802] should_fail_usercopy+0x1a/0x20 [ 38.157383][ T3802] _copy_to_user+0x20/0xa0 [ 38.157410][ T3802] simple_read_from_buffer+0xa0/0x110 [ 38.157439][ T3802] proc_fail_nth_read+0xf9/0x140 [ 38.157471][ T3802] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 38.157568][ T3802] vfs_read+0x19b/0x6f0 [ 38.157592][ T3802] ? __rcu_read_unlock+0x4e/0x70 [ 38.157618][ T3802] ? __fget_files+0x17c/0x1c0 [ 38.157658][ T3802] ksys_read+0xe8/0x1b0 [ 38.157683][ T3802] __x64_sys_read+0x42/0x50 [ 38.157706][ T3802] x64_sys_call+0x2874/0x2dc0 [ 38.157734][ T3802] do_syscall_64+0xc9/0x1c0 [ 38.157828][ T3802] ? clear_bhb_loop+0x55/0xb0 [ 38.157860][ T3802] ? clear_bhb_loop+0x55/0xb0 [ 38.157892][ T3802] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 38.157992][ T3802] RIP: 0033:0x7f52b284b7fc [ 38.158010][ T3802] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 38.158030][ T3802] RSP: 002b:00007f52b0eb1030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 38.158050][ T3802] RAX: ffffffffffffffda RBX: 00007f52b2a65fa0 RCX: 00007f52b284b7fc [ 38.158061][ T3802] RDX: 000000000000000f RSI: 00007f52b0eb10a0 RDI: 000000000000000a [ 38.158115][ T3802] RBP: 00007f52b0eb1090 R08: 0000000000000000 R09: 0000000000000000 [ 38.158128][ T3802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 38.158142][ T3802] R13: 0000000000000000 R14: 00007f52b2a65fa0 R15: 00007fff54f35b98 [ 38.158163][ T3802] [ 38.425570][ T3813] process 'syz.4.133' launched '/dev/fd/3' with NULL argv: empty string added [ 38.571617][ T3820] capability: warning: `syz.0.136' uses 32-bit capabilities (legacy support in use) [ 38.967865][ T3860] hsr_slave_0: left promiscuous mode [ 38.973740][ T3860] hsr_slave_1: left promiscuous mode [ 39.021192][ T3863] ref_tracker: memory allocation failure, unreliable refcount tracker. [ 39.023725][ T3865] capability: warning: `syz.0.155' uses deprecated v2 capabilities in a way that may be insecure [ 39.081352][ T3872] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 39.123572][ T3872] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 39.134288][ T3874] FAULT_INJECTION: forcing a failure. [ 39.134288][ T3874] name failslab, interval 1, probability 0, space 0, times 0 [ 39.147040][ T3874] CPU: 1 UID: 0 PID: 3874 Comm: syz.1.159 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 39.147068][ T3874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 39.147100][ T3874] Call Trace: [ 39.147107][ T3874] [ 39.147116][ T3874] dump_stack_lvl+0xf2/0x150 [ 39.147147][ T3874] dump_stack+0x15/0x1a [ 39.147172][ T3874] should_fail_ex+0x24a/0x260 [ 39.147272][ T3874] should_failslab+0x8f/0xb0 [ 39.147303][ T3874] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 39.147356][ T3874] ? shmem_alloc_inode+0x34/0x50 [ 39.147445][ T3874] shmem_alloc_inode+0x34/0x50 [ 39.147533][ T3874] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 39.147603][ T3874] alloc_inode+0x3c/0x160 [ 39.147628][ T3874] new_inode+0x1e/0x100 [ 39.147659][ T3874] shmem_get_inode+0x24e/0x730 [ 39.147766][ T3874] shmem_mknod+0x44/0x180 [ 39.147785][ T3874] shmem_create+0x34/0x40 [ 39.147808][ T3874] vfs_create+0x19c/0x2b0 [ 39.147829][ T3874] do_mknodat+0x299/0x420 [ 39.147857][ T3874] __x64_sys_mknod+0x51/0x60 [ 39.147917][ T3874] x64_sys_call+0x16be/0x2dc0 [ 39.147945][ T3874] do_syscall_64+0xc9/0x1c0 [ 39.147966][ T3874] ? clear_bhb_loop+0x55/0xb0 [ 39.147997][ T3874] ? clear_bhb_loop+0x55/0xb0 [ 39.148070][ T3874] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.148130][ T3874] RIP: 0033:0x7f0e859fcde9 [ 39.148145][ T3874] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 39.148160][ T3874] RSP: 002b:00007f0e84061038 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 39.148176][ T3874] RAX: ffffffffffffffda RBX: 00007f0e85c15fa0 RCX: 00007f0e859fcde9 [ 39.148186][ T3874] RDX: 0000000000000703 RSI: 0000000000000000 RDI: 0000400000000240 [ 39.148197][ T3874] RBP: 00007f0e84061090 R08: 0000000000000000 R09: 0000000000000000 [ 39.148210][ T3874] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 39.148223][ T3874] R13: 0000000000000000 R14: 00007f0e85c15fa0 R15: 00007fffb03e8128 [ 39.148243][ T3874] [ 39.377907][ T3872] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 39.392378][ T3877] netem: change failed [ 39.395314][ T3879] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 39.405326][ T3879] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 39.464565][ T3872] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 39.493925][ T3886] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 39.528573][ T3872] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.543237][ T3872] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.555187][ T3872] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.567828][ T3872] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.607473][ T3888] FAULT_INJECTION: forcing a failure. [ 39.607473][ T3888] name failslab, interval 1, probability 0, space 0, times 0 [ 39.620323][ T3888] CPU: 1 UID: 0 PID: 3888 Comm: syz.1.164 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 39.620350][ T3888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 39.620373][ T3888] Call Trace: [ 39.620381][ T3888] [ 39.620389][ T3888] dump_stack_lvl+0xf2/0x150 [ 39.620424][ T3888] dump_stack+0x15/0x1a [ 39.620523][ T3888] should_fail_ex+0x24a/0x260 [ 39.620588][ T3888] should_failslab+0x8f/0xb0 [ 39.620620][ T3888] kmem_cache_alloc_noprof+0x52/0x320 [ 39.620660][ T3888] ? copy_pid_ns+0x183/0x630 [ 39.620689][ T3888] copy_pid_ns+0x183/0x630 [ 39.620729][ T3888] create_new_namespaces+0x188/0x430 [ 39.620756][ T3888] ? security_capable+0x81/0x90 [ 39.620788][ T3888] unshare_nsproxy_namespaces+0xe6/0x120 [ 39.620818][ T3888] ksys_unshare+0x3c9/0x6e0 [ 39.620880][ T3888] __x64_sys_unshare+0x1f/0x30 [ 39.620913][ T3888] x64_sys_call+0x1a3e/0x2dc0 [ 39.620938][ T3888] do_syscall_64+0xc9/0x1c0 [ 39.620963][ T3888] ? clear_bhb_loop+0x55/0xb0 [ 39.620996][ T3888] ? clear_bhb_loop+0x55/0xb0 [ 39.621065][ T3888] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.621094][ T3888] RIP: 0033:0x7f0e859fcde9 [ 39.621117][ T3888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 39.621215][ T3888] RSP: 002b:00007f0e84061038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 39.621236][ T3888] RAX: ffffffffffffffda RBX: 00007f0e85c15fa0 RCX: 00007f0e859fcde9 [ 39.621248][ T3888] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000064000600 [ 39.621259][ T3888] RBP: 00007f0e84061090 R08: 0000000000000000 R09: 0000000000000000 [ 39.621381][ T3888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 39.621396][ T3888] R13: 0000000000000000 R14: 00007f0e85c15fa0 R15: 00007fffb03e8128 [ 39.621504][ T3888] [ 39.924352][ T3900] netlink: 40 bytes leftover after parsing attributes in process `syz.0.169'. [ 40.044822][ T3895] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 40.055524][ T3895] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 40.726305][ T3944] netlink: 68 bytes leftover after parsing attributes in process `syz.4.182'. [ 40.735388][ T3944] netlink: 68 bytes leftover after parsing attributes in process `syz.4.182'. [ 40.870161][ T3958] FAULT_INJECTION: forcing a failure. [ 40.870161][ T3958] name failslab, interval 1, probability 0, space 0, times 0 [ 40.882873][ T3958] CPU: 1 UID: 0 PID: 3958 Comm: syz.4.186 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 40.882904][ T3958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 40.882917][ T3958] Call Trace: [ 40.882924][ T3958] [ 40.882931][ T3958] dump_stack_lvl+0xf2/0x150 [ 40.883020][ T3958] dump_stack+0x15/0x1a [ 40.883109][ T3958] should_fail_ex+0x24a/0x260 [ 40.883146][ T3958] should_failslab+0x8f/0xb0 [ 40.883177][ T3958] kmem_cache_alloc_noprof+0x52/0x320 [ 40.883273][ T3958] ? getname_flags+0x81/0x3b0 [ 40.883306][ T3958] getname_flags+0x81/0x3b0 [ 40.883369][ T3958] getname+0x17/0x20 [ 40.883399][ T3958] __se_sys_acct+0x3e/0x420 [ 40.883428][ T3958] __x64_sys_acct+0x1f/0x30 [ 40.883456][ T3958] x64_sys_call+0x273e/0x2dc0 [ 40.883521][ T3958] do_syscall_64+0xc9/0x1c0 [ 40.883548][ T3958] ? clear_bhb_loop+0x55/0xb0 [ 40.883581][ T3958] ? clear_bhb_loop+0x55/0xb0 [ 40.883648][ T3958] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 40.883727][ T3958] RIP: 0033:0x7f6b8b04cde9 [ 40.883744][ T3958] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.883765][ T3958] RSP: 002b:00007f6b896b1038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a3 [ 40.883809][ T3958] RAX: ffffffffffffffda RBX: 00007f6b8b265fa0 RCX: 00007f6b8b04cde9 [ 40.883835][ T3958] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00004000000001c0 [ 40.883848][ T3958] RBP: 00007f6b896b1090 R08: 0000000000000000 R09: 0000000000000000 [ 40.883861][ T3958] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 40.883874][ T3958] R13: 0000000000000000 R14: 00007f6b8b265fa0 R15: 00007ffc0b1f9488 [ 40.883895][ T3958] [ 41.105439][ T3961] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 41.114632][ T3961] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 41.235520][ T3967] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 41.270141][ T3967] syz.0.189 (3967) used greatest stack depth: 10280 bytes left [ 41.295365][ T3982] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(7) [ 41.301931][ T3982] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 41.309737][ T3982] vhci_hcd vhci_hcd.0: Device attached [ 41.320591][ T3984] vhci_hcd: connection closed [ 41.321501][ T152] vhci_hcd: stop threads [ 41.330595][ T152] vhci_hcd: release socket [ 41.335206][ T152] vhci_hcd: disconnect device [ 41.384008][ T3995] netlink: 72 bytes leftover after parsing attributes in process `syz.3.200'. [ 41.411822][ T3995] Invalid ELF header magic: != ELF [ 41.506383][ T4002] FAULT_INJECTION: forcing a failure. [ 41.506383][ T4002] name failslab, interval 1, probability 0, space 0, times 0 [ 41.519119][ T4002] CPU: 1 UID: 0 PID: 4002 Comm: syz.0.203 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 41.519144][ T4002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 41.519155][ T4002] Call Trace: [ 41.519162][ T4002] [ 41.519169][ T4002] dump_stack_lvl+0xf2/0x150 [ 41.519248][ T4002] dump_stack+0x15/0x1a [ 41.519281][ T4002] should_fail_ex+0x24a/0x260 [ 41.519335][ T4002] should_failslab+0x8f/0xb0 [ 41.519365][ T4002] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 41.519398][ T4002] ? shmem_alloc_inode+0x34/0x50 [ 41.519435][ T4002] shmem_alloc_inode+0x34/0x50 [ 41.519519][ T4002] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 41.519563][ T4002] alloc_inode+0x3c/0x160 [ 41.519624][ T4002] new_inode+0x1e/0x100 [ 41.519650][ T4002] shmem_get_inode+0x24e/0x730 [ 41.519744][ T4002] shmem_mknod+0x44/0x180 [ 41.519767][ T4002] ? __pfx_shmem_create+0x10/0x10 [ 41.519790][ T4002] shmem_create+0x34/0x40 [ 41.519812][ T4002] path_openat+0xea3/0x1fc0 [ 41.519839][ T4002] do_filp_open+0x107/0x230 [ 41.519881][ T4002] do_sys_openat2+0xab/0x120 [ 41.519920][ T4002] __x64_sys_openat+0xf3/0x120 [ 41.520008][ T4002] x64_sys_call+0x2b30/0x2dc0 [ 41.520039][ T4002] do_syscall_64+0xc9/0x1c0 [ 41.520069][ T4002] ? clear_bhb_loop+0x55/0xb0 [ 41.520172][ T4002] ? clear_bhb_loop+0x55/0xb0 [ 41.520205][ T4002] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 41.520236][ T4002] RIP: 0033:0x7f52b284cde9 [ 41.520251][ T4002] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 41.520335][ T4002] RSP: 002b:00007f52b0eb1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 41.520357][ T4002] RAX: ffffffffffffffda RBX: 00007f52b2a65fa0 RCX: 00007f52b284cde9 [ 41.520371][ T4002] RDX: 0000000000000042 RSI: 0000400000000040 RDI: ffffffffffffff9c [ 41.520383][ T4002] RBP: 00007f52b0eb1090 R08: 0000000000000000 R09: 0000000000000000 [ 41.520394][ T4002] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 41.520459][ T4002] R13: 0000000000000000 R14: 00007f52b2a65fa0 R15: 00007fff54f35b98 [ 41.520480][ T4002] [ 41.626003][ T29] kauditd_printk_skb: 1319 callbacks suppressed [ 41.626019][ T29] audit: type=1326 audit(1739004141.238:3164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3978 comm="syz.2.196" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f692d4c3da7 code=0x7ffc0000 [ 41.762205][ T29] audit: type=1326 audit(1739004141.238:3165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3978 comm="syz.2.196" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f692d468fb9 code=0x7ffc0000 [ 41.785484][ T29] audit: type=1326 audit(1739004141.238:3166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3978 comm="syz.2.196" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f692d4ccde9 code=0x7ffc0000 [ 41.808686][ T29] audit: type=1326 audit(1739004141.248:3167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3978 comm="syz.2.196" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f692d4c3da7 code=0x7ffc0000 [ 41.831964][ T29] audit: type=1326 audit(1739004141.248:3168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3978 comm="syz.2.196" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f692d468fb9 code=0x7ffc0000 [ 41.855380][ T29] audit: type=1326 audit(1739004141.248:3169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3978 comm="syz.2.196" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f692d4ccde9 code=0x7ffc0000 [ 41.878619][ T29] audit: type=1326 audit(1739004141.258:3170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3978 comm="syz.2.196" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f692d4c3da7 code=0x7ffc0000 [ 41.901937][ T29] audit: type=1326 audit(1739004141.258:3171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3978 comm="syz.2.196" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f692d468fb9 code=0x7ffc0000 [ 41.925382][ T29] audit: type=1326 audit(1739004141.258:3172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3978 comm="syz.2.196" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f692d4ccde9 code=0x7ffc0000 [ 41.948997][ T29] audit: type=1326 audit(1739004141.268:3173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3978 comm="syz.2.196" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f692d4c3da7 code=0x7ffc0000 [ 41.972960][ T4011] wireguard0: entered promiscuous mode [ 41.978500][ T4011] wireguard0: entered allmulticast mode [ 42.064968][ T4018] netlink: 4 bytes leftover after parsing attributes in process `syz.4.209'. [ 42.079189][ T4018] netdevsim netdevsim4: loading /lib/firmware/. failed with error -22 [ 42.087495][ T4018] netdevsim netdevsim4: Direct firmware load for . failed with error -22 [ 42.151820][ T4033] 9pnet_fd: Insufficient options for proto=fd [ 42.160556][ T4031] netlink: 12 bytes leftover after parsing attributes in process `syz.1.213'. [ 42.169490][ T4031] netlink: 16 bytes leftover after parsing attributes in process `syz.1.213'. [ 42.586317][ T4042] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 42.673588][ T4059] FAULT_INJECTION: forcing a failure. [ 42.673588][ T4059] name failslab, interval 1, probability 0, space 0, times 0 [ 42.686383][ T4059] CPU: 1 UID: 0 PID: 4059 Comm: syz.4.224 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 42.686489][ T4059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 42.686504][ T4059] Call Trace: [ 42.686511][ T4059] [ 42.686518][ T4059] dump_stack_lvl+0xf2/0x150 [ 42.686566][ T4059] dump_stack+0x15/0x1a [ 42.686585][ T4059] should_fail_ex+0x24a/0x260 [ 42.686697][ T4059] should_failslab+0x8f/0xb0 [ 42.686720][ T4059] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 42.686850][ T4059] ? sidtab_sid2str_get+0xb8/0x140 [ 42.686872][ T4059] kmemdup_noprof+0x2a/0x60 [ 42.686898][ T4059] sidtab_sid2str_get+0xb8/0x140 [ 42.686985][ T4059] security_sid_to_context_core+0x1eb/0x2f0 [ 42.687023][ T4059] security_sid_to_context+0x27/0x30 [ 42.687073][ T4059] avc_audit_post_callback+0x9d/0x530 [ 42.687109][ T4059] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 42.687141][ T4059] common_lsm_audit+0x95e/0x1020 [ 42.687216][ T4059] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 42.687276][ T4059] ? _raw_spin_unlock_irqrestore+0x2b/0x60 [ 42.687316][ T4059] slow_avc_audit+0xf9/0x140 [ 42.687342][ T4059] audit_inode_permission+0x111/0x150 [ 42.687441][ T4059] selinux_inode_permission+0x3d9/0x410 [ 42.687488][ T4059] security_inode_permission+0x76/0xc0 [ 42.687528][ T4059] inode_permission+0xbf/0x300 [ 42.687592][ T4059] ? may_open+0x1c8/0x350 [ 42.687616][ T4059] may_open+0x252/0x350 [ 42.687634][ T4059] path_openat+0x19ca/0x1fc0 [ 42.687738][ T4059] do_filp_open+0x107/0x230 [ 42.687773][ T4059] do_sys_openat2+0xab/0x120 [ 42.687820][ T4059] __x64_sys_openat+0xf3/0x120 [ 42.687852][ T4059] x64_sys_call+0x2b30/0x2dc0 [ 42.687892][ T4059] do_syscall_64+0xc9/0x1c0 [ 42.687934][ T4059] ? clear_bhb_loop+0x55/0xb0 [ 42.687968][ T4059] ? clear_bhb_loop+0x55/0xb0 [ 42.688001][ T4059] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 42.688096][ T4059] RIP: 0033:0x7f6b8b04b750 [ 42.688119][ T4059] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 42.688136][ T4059] RSP: 002b:00007f6b896b0b70 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 42.688154][ T4059] RAX: ffffffffffffffda RBX: 0000000000000501 RCX: 00007f6b8b04b750 [ 42.688169][ T4059] RDX: 0000000000000501 RSI: 00007f6b896b0c10 RDI: 00000000ffffff9c [ 42.688221][ T4059] RBP: 00007f6b896b0c10 R08: 0000000000000000 R09: 002367732f766564 [ 42.688233][ T4059] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 42.688244][ T4059] R13: 0000000000000000 R14: 00007f6b8b265fa0 R15: 00007ffc0b1f9488 [ 42.688333][ T4059] [ 43.078631][ T4064] netlink: 12 bytes leftover after parsing attributes in process `syz.3.227'. [ 43.087590][ T4064] netlink: 16 bytes leftover after parsing attributes in process `syz.3.227'. [ 43.148836][ T4084] FAULT_INJECTION: forcing a failure. [ 43.148836][ T4084] name failslab, interval 1, probability 0, space 0, times 0 [ 43.161602][ T4084] CPU: 0 UID: 0 PID: 4084 Comm: syz.0.236 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 43.161644][ T4084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 43.161700][ T4084] Call Trace: [ 43.161707][ T4084] [ 43.161714][ T4084] dump_stack_lvl+0xf2/0x150 [ 43.161741][ T4084] dump_stack+0x15/0x1a [ 43.161765][ T4084] should_fail_ex+0x24a/0x260 [ 43.161856][ T4084] should_failslab+0x8f/0xb0 [ 43.161885][ T4084] kmem_cache_alloc_noprof+0x52/0x320 [ 43.161927][ T4084] ? skb_clone+0x154/0x1f0 [ 43.161982][ T4084] skb_clone+0x154/0x1f0 [ 43.162014][ T4084] __netlink_deliver_tap+0x2bd/0x4f0 [ 43.162057][ T4084] netlink_sendskb+0x126/0x150 [ 43.162107][ T4084] netlink_unicast+0x291/0x670 [ 43.162141][ T4084] netlink_ack+0x4bb/0x4f0 [ 43.162246][ T4084] netlink_rcv_skb+0x19c/0x230 [ 43.162387][ T4084] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 43.162420][ T4084] nfnetlink_rcv+0x16c/0x15d0 [ 43.162449][ T4084] ? kmem_cache_free+0xdc/0x2d0 [ 43.162597][ T4084] ? nlmon_xmit+0x51/0x60 [ 43.162629][ T4084] ? __kfree_skb+0x102/0x150 [ 43.162657][ T4084] ? consume_skb+0x49/0x160 [ 43.162681][ T4084] ? nlmon_xmit+0x51/0x60 [ 43.162744][ T4084] ? dev_hard_start_xmit+0x3c1/0x3f0 [ 43.162773][ T4084] ? __dev_queue_xmit+0xb6e/0x2090 [ 43.162809][ T4084] ? ref_tracker_free+0x3a5/0x410 [ 43.162910][ T4084] ? __dev_queue_xmit+0x186/0x2090 [ 43.162952][ T4084] ? __netlink_deliver_tap+0x4c6/0x4f0 [ 43.163026][ T4084] netlink_unicast+0x599/0x670 [ 43.163109][ T4084] netlink_sendmsg+0x5cc/0x6e0 [ 43.163152][ T4084] ? __pfx_netlink_sendmsg+0x10/0x10 [ 43.163191][ T4084] __sock_sendmsg+0x140/0x180 [ 43.163214][ T4084] ____sys_sendmsg+0x312/0x410 [ 43.163287][ T4084] __sys_sendmsg+0x19d/0x230 [ 43.163331][ T4084] __x64_sys_sendmsg+0x46/0x50 [ 43.163367][ T4084] x64_sys_call+0x2734/0x2dc0 [ 43.163399][ T4084] do_syscall_64+0xc9/0x1c0 [ 43.163449][ T4084] ? clear_bhb_loop+0x55/0xb0 [ 43.163500][ T4084] ? clear_bhb_loop+0x55/0xb0 [ 43.163533][ T4084] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 43.163602][ T4084] RIP: 0033:0x7f52b284cde9 [ 43.163619][ T4084] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 43.163641][ T4084] RSP: 002b:00007f52b0eb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 43.163712][ T4084] RAX: ffffffffffffffda RBX: 00007f52b2a65fa0 RCX: 00007f52b284cde9 [ 43.163727][ T4084] RDX: 0000000000000000 RSI: 0000400000000040 RDI: 0000000000000007 [ 43.163741][ T4084] RBP: 00007f52b0eb1090 R08: 0000000000000000 R09: 0000000000000000 [ 43.163817][ T4084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 43.163905][ T4084] R13: 0000000000000000 R14: 00007f52b2a65fa0 R15: 00007fff54f35b98 [ 43.163922][ T4084] [ 43.511838][ T4087] Cannot find del_set index 2 as target [ 43.518772][ T4087] netlink: 20 bytes leftover after parsing attributes in process `syz.3.237'. [ 43.530330][ T4087] vlan2: entered promiscuous mode [ 43.535386][ T4087] bridge0: entered promiscuous mode [ 43.579977][ T4095] pim6reg: entered allmulticast mode [ 43.596362][ T4095] FAULT_INJECTION: forcing a failure. [ 43.596362][ T4095] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 43.609482][ T4095] CPU: 0 UID: 0 PID: 4095 Comm: syz.3.240 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 43.609558][ T4095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 43.609574][ T4095] Call Trace: [ 43.609582][ T4095] [ 43.609590][ T4095] dump_stack_lvl+0xf2/0x150 [ 43.609684][ T4095] dump_stack+0x15/0x1a [ 43.609704][ T4095] should_fail_ex+0x24a/0x260 [ 43.609804][ T4095] should_fail+0xb/0x10 [ 43.609838][ T4095] should_fail_usercopy+0x1a/0x20 [ 43.609878][ T4095] _copy_to_user+0x20/0xa0 [ 43.609982][ T4095] simple_read_from_buffer+0xa0/0x110 [ 43.610016][ T4095] proc_fail_nth_read+0xf9/0x140 [ 43.610045][ T4095] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 43.610084][ T4095] vfs_read+0x19b/0x6f0 [ 43.610107][ T4095] ? __rcu_read_unlock+0x4e/0x70 [ 43.610133][ T4095] ? __fget_files+0x17c/0x1c0 [ 43.610162][ T4095] ksys_read+0xe8/0x1b0 [ 43.610255][ T4095] __x64_sys_read+0x42/0x50 [ 43.610281][ T4095] x64_sys_call+0x2874/0x2dc0 [ 43.610313][ T4095] do_syscall_64+0xc9/0x1c0 [ 43.610340][ T4095] ? clear_bhb_loop+0x55/0xb0 [ 43.610372][ T4095] ? clear_bhb_loop+0x55/0xb0 [ 43.610444][ T4095] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 43.610474][ T4095] RIP: 0033:0x7fc861bcb7fc [ 43.610490][ T4095] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 43.610511][ T4095] RSP: 002b:00007fc860237030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 43.610534][ T4095] RAX: ffffffffffffffda RBX: 00007fc861de5fa0 RCX: 00007fc861bcb7fc [ 43.610548][ T4095] RDX: 000000000000000f RSI: 00007fc8602370a0 RDI: 000000000000000a [ 43.610561][ T4095] RBP: 00007fc860237090 R08: 0000000000000000 R09: 0000000000000000 [ 43.610572][ T4095] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 43.610617][ T4095] R13: 0000000000000000 R14: 00007fc861de5fa0 R15: 00007fff54d8b6f8 [ 43.610634][ T4095] [ 43.934157][ T4110] netlink: 12 bytes leftover after parsing attributes in process `syz.3.245'. [ 43.943146][ T4110] netlink: 16 bytes leftover after parsing attributes in process `syz.3.245'. [ 44.158428][ T3374] IPVS: starting estimator thread 0... [ 44.203006][ T4129] netlink: 'syz.2.252': attribute type 3 has an invalid length. [ 44.210731][ T4129] netlink: 12 bytes leftover after parsing attributes in process `syz.2.252'. [ 44.250477][ T4127] IPVS: using max 2400 ests per chain, 120000 per kthread [ 44.274955][ T4141] netlink: 12 bytes leftover after parsing attributes in process `syz.3.257'. [ 44.335388][ T4154] FAULT_INJECTION: forcing a failure. [ 44.335388][ T4154] name failslab, interval 1, probability 0, space 0, times 0 [ 44.348108][ T4154] CPU: 1 UID: 0 PID: 4154 Comm: syz.3.261 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 44.348182][ T4154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 44.348197][ T4154] Call Trace: [ 44.348205][ T4154] [ 44.348214][ T4154] dump_stack_lvl+0xf2/0x150 [ 44.348247][ T4154] dump_stack+0x15/0x1a [ 44.348348][ T4154] should_fail_ex+0x24a/0x260 [ 44.348388][ T4154] should_failslab+0x8f/0xb0 [ 44.348419][ T4154] kmem_cache_alloc_noprof+0x52/0x320 [ 44.348469][ T4154] ? audit_log_start+0x34c/0x6b0 [ 44.348557][ T4154] ? __dequeue_entity+0x22/0x310 [ 44.348600][ T4154] audit_log_start+0x34c/0x6b0 [ 44.348675][ T4154] audit_seccomp+0x4b/0x130 [ 44.348745][ T4154] __seccomp_filter+0x6fa/0x1180 [ 44.348772][ T4154] ? fput+0x1c4/0x200 [ 44.348801][ T4154] ? do_mq_timedsend+0x5b8/0x680 [ 44.348849][ T4154] __secure_computing+0x9f/0x1c0 [ 44.348875][ T4154] syscall_trace_enter+0xd1/0x1f0 [ 44.348906][ T4154] do_syscall_64+0xaa/0x1c0 [ 44.348932][ T4154] ? clear_bhb_loop+0x55/0xb0 [ 44.348968][ T4154] ? clear_bhb_loop+0x55/0xb0 [ 44.349036][ T4154] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 44.349086][ T4154] RIP: 0033:0x7fc861bcb7fc [ 44.349104][ T4154] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 44.349126][ T4154] RSP: 002b:00007fc860237030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 44.349148][ T4154] RAX: ffffffffffffffda RBX: 00007fc861de5fa0 RCX: 00007fc861bcb7fc [ 44.349160][ T4154] RDX: 000000000000000f RSI: 00007fc8602370a0 RDI: 0000000000000006 [ 44.349172][ T4154] RBP: 00007fc860237090 R08: 0000000000000000 R09: 0000000000000000 [ 44.349183][ T4154] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000000000002 [ 44.349194][ T4154] R13: 0000000000000000 R14: 00007fc861de5fa0 R15: 00007fff54d8b6f8 [ 44.349237][ T4154] [ 44.626926][ T4172] FAULT_INJECTION: forcing a failure. [ 44.626926][ T4172] name failslab, interval 1, probability 0, space 0, times 0 [ 44.639807][ T4172] CPU: 1 UID: 0 PID: 4172 Comm: syz.4.268 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 44.639885][ T4172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 44.639896][ T4172] Call Trace: [ 44.639902][ T4172] [ 44.639908][ T4172] dump_stack_lvl+0xf2/0x150 [ 44.639941][ T4172] dump_stack+0x15/0x1a [ 44.639977][ T4172] should_fail_ex+0x24a/0x260 [ 44.640063][ T4172] should_failslab+0x8f/0xb0 [ 44.640088][ T4172] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 44.640123][ T4172] ? shmem_alloc_inode+0x34/0x50 [ 44.640164][ T4172] shmem_alloc_inode+0x34/0x50 [ 44.640219][ T4172] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 44.640259][ T4172] alloc_inode+0x3c/0x160 [ 44.640294][ T4172] new_inode+0x1e/0x100 [ 44.640388][ T4172] shmem_get_inode+0x24e/0x730 [ 44.640422][ T4172] __shmem_file_setup+0x127/0x1f0 [ 44.640487][ T4172] shmem_kernel_file_setup+0x3e/0x50 [ 44.640535][ T4172] newseg+0x2ee/0x690 [ 44.640574][ T4172] ipcget+0x391/0x4c0 [ 44.640633][ T4172] __x64_sys_shmget+0xa6/0xd0 [ 44.640668][ T4172] x64_sys_call+0x28ec/0x2dc0 [ 44.640719][ T4172] do_syscall_64+0xc9/0x1c0 [ 44.640768][ T4172] ? clear_bhb_loop+0x55/0xb0 [ 44.640799][ T4172] ? clear_bhb_loop+0x55/0xb0 [ 44.640837][ T4172] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 44.640869][ T4172] RIP: 0033:0x7f6b8b04cde9 [ 44.640886][ T4172] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 44.640903][ T4172] RSP: 002b:00007f6b896b1038 EFLAGS: 00000246 ORIG_RAX: 000000000000001d [ 44.640921][ T4172] RAX: ffffffffffffffda RBX: 00007f6b8b265fa0 RCX: 00007f6b8b04cde9 [ 44.640934][ T4172] RDX: 0000000000000200 RSI: 0000000000004000 RDI: 00000000798dd826 [ 44.641079][ T4172] RBP: 00007f6b896b1090 R08: 0000000000000000 R09: 0000000000000000 [ 44.641093][ T4172] R10: 0000400000ff9000 R11: 0000000000000246 R12: 0000000000000001 [ 44.641109][ T4172] R13: 0000000000000000 R14: 00007f6b8b265fa0 R15: 00007ffc0b1f9488 [ 44.641126][ T4172] [ 44.901598][ T4188] gre1: entered allmulticast mode [ 44.975577][ T4193] lo speed is unknown, defaulting to 1000 [ 44.992504][ T4193] lo speed is unknown, defaulting to 1000 [ 45.041906][ T4201] siw: device registration error -23 [ 45.057054][ T4193] lo speed is unknown, defaulting to 1000 [ 45.066258][ T4193] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 45.101455][ T4193] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 45.150904][ T4193] lo speed is unknown, defaulting to 1000 [ 45.159645][ T4193] lo speed is unknown, defaulting to 1000 [ 45.166651][ T4193] lo speed is unknown, defaulting to 1000 [ 45.216398][ T4193] lo speed is unknown, defaulting to 1000 [ 45.222982][ T4193] lo speed is unknown, defaulting to 1000 [ 45.290851][ T4219] FAULT_INJECTION: forcing a failure. [ 45.290851][ T4219] name failslab, interval 1, probability 0, space 0, times 0 [ 45.303594][ T4219] CPU: 0 UID: 0 PID: 4219 Comm: syz.3.285 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 45.303621][ T4219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 45.303632][ T4219] Call Trace: [ 45.303685][ T4219] [ 45.303693][ T4219] dump_stack_lvl+0xf2/0x150 [ 45.303792][ T4219] dump_stack+0x15/0x1a [ 45.303817][ T4219] should_fail_ex+0x24a/0x260 [ 45.303849][ T4219] should_failslab+0x8f/0xb0 [ 45.303874][ T4219] kmem_cache_alloc_noprof+0x52/0x320 [ 45.303917][ T4219] ? getname_flags+0x81/0x3b0 [ 45.304008][ T4219] getname_flags+0x81/0x3b0 [ 45.304036][ T4219] getname+0x17/0x20 [ 45.304068][ T4219] io_symlinkat_prep+0x148/0x1c0 [ 45.304094][ T4219] io_submit_sqes+0x5d0/0x1090 [ 45.304191][ T4219] __se_sys_io_uring_enter+0x1c0/0x1b00 [ 45.304220][ T4219] ? 0xffffffff81000000 [ 45.304236][ T4219] ? __rcu_read_unlock+0x4e/0x70 [ 45.304261][ T4219] ? get_pid_task+0x8e/0xc0 [ 45.304287][ T4219] ? proc_fail_nth_write+0x12a/0x150 [ 45.304385][ T4219] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 45.304413][ T4219] ? vfs_write+0x644/0x920 [ 45.304433][ T4219] ? __fget_files+0x17c/0x1c0 [ 45.304524][ T4219] ? fput+0x1c4/0x200 [ 45.304559][ T4219] ? ksys_write+0x176/0x1b0 [ 45.304579][ T4219] __x64_sys_io_uring_enter+0x78/0x90 [ 45.304603][ T4219] x64_sys_call+0xb5e/0x2dc0 [ 45.304737][ T4219] do_syscall_64+0xc9/0x1c0 [ 45.304761][ T4219] ? clear_bhb_loop+0x55/0xb0 [ 45.304866][ T4219] ? clear_bhb_loop+0x55/0xb0 [ 45.304918][ T4219] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 45.304950][ T4219] RIP: 0033:0x7fc861bccde9 [ 45.304965][ T4219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 45.305036][ T4219] RSP: 002b:00007fc860237038 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 45.305057][ T4219] RAX: ffffffffffffffda RBX: 00007fc861de5fa0 RCX: 00007fc861bccde9 [ 45.305068][ T4219] RDX: 0000000000000000 RSI: 00000000000047f8 RDI: 0000000000000008 [ 45.305079][ T4219] RBP: 00007fc860237090 R08: 0000000000000000 R09: 0000000000000000 [ 45.305147][ T4219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 45.305158][ T4219] R13: 0000000000000000 R14: 00007fc861de5fa0 R15: 00007fff54d8b6f8 [ 45.305191][ T4219] [ 45.591547][ T4225] FAULT_INJECTION: forcing a failure. [ 45.591547][ T4225] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 45.604816][ T4225] CPU: 0 UID: 0 PID: 4225 Comm: syz.1.282 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 45.604840][ T4225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 45.604861][ T4225] Call Trace: [ 45.604868][ T4225] [ 45.604876][ T4225] dump_stack_lvl+0xf2/0x150 [ 45.604910][ T4225] dump_stack+0x15/0x1a [ 45.604971][ T4225] should_fail_ex+0x24a/0x260 [ 45.605005][ T4225] should_fail+0xb/0x10 [ 45.605042][ T4225] should_fail_usercopy+0x1a/0x20 [ 45.605062][ T4225] _copy_from_user+0x1c/0xa0 [ 45.605084][ T4225] copy_msghdr_from_user+0x54/0x2a0 [ 45.605131][ T4225] ? __fget_files+0x17c/0x1c0 [ 45.605249][ T4225] __sys_sendmmsg+0x1e8/0x4b0 [ 45.605313][ T4225] __x64_sys_sendmmsg+0x57/0x70 [ 45.605345][ T4225] x64_sys_call+0x29aa/0x2dc0 [ 45.605453][ T4225] do_syscall_64+0xc9/0x1c0 [ 45.605527][ T4225] ? clear_bhb_loop+0x55/0xb0 [ 45.605582][ T4225] ? clear_bhb_loop+0x55/0xb0 [ 45.605609][ T4225] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 45.605634][ T4225] RIP: 0033:0x7f0e859fcde9 [ 45.605650][ T4225] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 45.605671][ T4225] RSP: 002b:00007f0e84061038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 45.605722][ T4225] RAX: ffffffffffffffda RBX: 00007f0e85c15fa0 RCX: 00007f0e859fcde9 [ 45.605733][ T4225] RDX: 040000000000009f RSI: 00004000000002c0 RDI: 0000000000000006 [ 45.605747][ T4225] RBP: 00007f0e84061090 R08: 0000000000000000 R09: 0000000000000000 [ 45.605761][ T4225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 45.605775][ T4225] R13: 0000000000000000 R14: 00007f0e85c15fa0 R15: 00007fffb03e8128 [ 45.605797][ T4225] [ 45.857083][ T4236] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 45.865499][ T4236] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 46.828051][ T29] kauditd_printk_skb: 274 callbacks suppressed [ 46.828065][ T29] audit: type=1400 audit(1739004146.438:3446): avc: denied { unmount } for pid=3309 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 46.911447][ T29] audit: type=1326 audit(1739004146.518:3447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4285 comm="syz.0.306" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f52b284cde9 code=0x7ffc0000 [ 46.934960][ T29] audit: type=1326 audit(1739004146.518:3448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4285 comm="syz.0.306" exe="/root/syz-executor" sig=0 arch=c000003e syscall=334 compat=0 ip=0x7f52b284cde9 code=0x7ffc0000 [ 46.958313][ T29] audit: type=1326 audit(1739004146.518:3449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4285 comm="syz.0.306" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f52b284cde9 code=0x7ffc0000 [ 47.021425][ T4296] FAULT_INJECTION: forcing a failure. [ 47.021425][ T4296] name failslab, interval 1, probability 0, space 0, times 0 [ 47.034112][ T4296] CPU: 1 UID: 0 PID: 4296 Comm: syz.1.312 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 47.034157][ T4296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 47.034171][ T4296] Call Trace: [ 47.034179][ T4296] [ 47.034187][ T4296] dump_stack_lvl+0xf2/0x150 [ 47.034220][ T4296] dump_stack+0x15/0x1a [ 47.034243][ T4296] should_fail_ex+0x24a/0x260 [ 47.034328][ T4296] ? selinux_bpf_prog_load+0x35/0xe0 [ 47.034348][ T4296] should_failslab+0x8f/0xb0 [ 47.034447][ T4296] __kmalloc_cache_noprof+0x4e/0x320 [ 47.034489][ T4296] selinux_bpf_prog_load+0x35/0xe0 [ 47.034515][ T4296] security_bpf_prog_load+0x47/0x80 [ 47.034540][ T4296] bpf_prog_load+0xe80/0x1070 [ 47.034619][ T4296] ? __rcu_read_unlock+0x4e/0x70 [ 47.034656][ T4296] __sys_bpf+0x463/0x7a0 [ 47.034762][ T4296] __x64_sys_bpf+0x43/0x50 [ 47.034784][ T4296] x64_sys_call+0x2914/0x2dc0 [ 47.034808][ T4296] do_syscall_64+0xc9/0x1c0 [ 47.034835][ T4296] ? clear_bhb_loop+0x55/0xb0 [ 47.034889][ T4296] ? clear_bhb_loop+0x55/0xb0 [ 47.034914][ T4296] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 47.034939][ T4296] RIP: 0033:0x7f0e859fcde9 [ 47.034955][ T4296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 47.035022][ T4296] RSP: 002b:00007f0e84061038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 47.035041][ T4296] RAX: ffffffffffffffda RBX: 00007f0e85c15fa0 RCX: 00007f0e859fcde9 [ 47.035054][ T4296] RDX: 0000000000000094 RSI: 0000400000000440 RDI: 0000000000000005 [ 47.035068][ T4296] RBP: 00007f0e84061090 R08: 0000000000000000 R09: 0000000000000000 [ 47.035152][ T4296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 47.035165][ T4296] R13: 0000000000000001 R14: 00007f0e85c15fa0 R15: 00007fffb03e8128 [ 47.035187][ T4296] [ 47.069590][ T29] audit: type=1400 audit(1739004146.608:3450): avc: denied { write } for pid=4287 comm="syz.2.309" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 47.080668][ T4294] __nla_validate_parse: 7 callbacks suppressed [ 47.080681][ T4294] netlink: 12 bytes leftover after parsing attributes in process `syz.3.310'. [ 47.085153][ T29] audit: type=1400 audit(1739004146.648:3451): avc: denied { prog_load } for pid=4291 comm="syz.0.311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 47.089772][ T4294] netlink: 16 bytes leftover after parsing attributes in process `syz.3.310'. [ 47.290662][ T29] audit: type=1400 audit(1739004146.648:3452): avc: denied { bpf } for pid=4291 comm="syz.0.311" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 47.311188][ T29] audit: type=1400 audit(1739004146.648:3453): avc: denied { perfmon } for pid=4291 comm="syz.0.311" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 47.332008][ T29] audit: type=1326 audit(1739004146.648:3454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4291 comm="syz.0.311" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f52b284cde9 code=0x7ffc0000 [ 47.355321][ T29] audit: type=1326 audit(1739004146.648:3455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4291 comm="syz.0.311" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f52b284cde9 code=0x7ffc0000 [ 47.450916][ T4308] netlink: 'syz.1.317': attribute type 13 has an invalid length. [ 47.469106][ T4308] gretap0: refused to change device tx_queue_len [ 47.475531][ T4308] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 47.542687][ T4314] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4314 comm=syz.4.321 [ 47.651697][ T4335] netlink: 12 bytes leftover after parsing attributes in process `syz.0.327'. [ 47.660655][ T4335] netlink: 16 bytes leftover after parsing attributes in process `syz.0.327'. [ 47.699660][ T4340] FAULT_INJECTION: forcing a failure. [ 47.699660][ T4340] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 47.712875][ T4340] CPU: 0 UID: 0 PID: 4340 Comm: syz.2.332 Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 47.712975][ T4340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 47.712989][ T4340] Call Trace: [ 47.713010][ T4340] [ 47.713017][ T4340] dump_stack_lvl+0xf2/0x150 [ 47.713068][ T4340] dump_stack+0x15/0x1a [ 47.713091][ T4340] should_fail_ex+0x24a/0x260 [ 47.713187][ T4340] should_fail+0xb/0x10 [ 47.713223][ T4340] should_fail_usercopy+0x1a/0x20 [ 47.713246][ T4340] _copy_to_user+0x20/0xa0 [ 47.713270][ T4340] do_getxattr+0x1c4/0x270 [ 47.713296][ T4340] path_getxattrat+0x220/0x290 [ 47.713345][ T4340] __x64_sys_fgetxattr+0x5b/0x70 [ 47.713448][ T4340] x64_sys_call+0xbc6/0x2dc0 [ 47.713474][ T4340] do_syscall_64+0xc9/0x1c0 [ 47.713497][ T4340] ? clear_bhb_loop+0x55/0xb0 [ 47.713586][ T4340] ? clear_bhb_loop+0x55/0xb0 [ 47.713654][ T4340] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 47.713703][ T4340] RIP: 0033:0x7f692d4ccde9 [ 47.713717][ T4340] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 47.713732][ T4340] RSP: 002b:00007f692bb37038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c1 [ 47.713749][ T4340] RAX: ffffffffffffffda RBX: 00007f692d6e5fa0 RCX: 00007f692d4ccde9 [ 47.713760][ T4340] RDX: 0000400000000340 RSI: 0000400000000300 RDI: 0000000000000003 [ 47.713770][ T4340] RBP: 00007f692bb37090 R08: 0000000000000000 R09: 0000000000000000 [ 47.713840][ T4340] R10: 00000000000000be R11: 0000000000000246 R12: 0000000000000001 [ 47.713853][ T4340] R13: 0000000000000000 R14: 00007f692d6e5fa0 R15: 00007ffc8728d848 [ 47.713873][ T4340] [ 47.715462][ T4339] netlink: 12 bytes leftover after parsing attributes in process `syz.0.331'. [ 47.894379][ T4339] netlink: 40 bytes leftover after parsing attributes in process `syz.0.331'. [ 48.013509][ T4357] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 48.025164][ T4357] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 48.082362][ T4367] netlink: 12 bytes leftover after parsing attributes in process `syz.0.341'. [ 48.091422][ T4367] netlink: 16 bytes leftover after parsing attributes in process `syz.0.341'. [ 48.235426][ C0] dccp_v6_rcv: dropped packet with invalid checksum [ 48.242109][ C0] dccp_v6_rcv: dropped packet with invalid checksum [ 48.503742][ C0] hrtimer: interrupt took 36623 ns [ 48.653106][ T4407] netlink: 12 bytes leftover after parsing attributes in process `syz.1.358'. [ 48.662205][ T4407] netlink: 16 bytes leftover after parsing attributes in process `syz.1.358'. [ 48.768990][ T4419] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 48.779745][ T4419] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 49.373184][ T4458] wireguard0: entered promiscuous mode [ 49.378731][ T4458] wireguard0: entered allmulticast mode [ 49.592184][ T3296] ================================================================== [ 49.600317][ T3296] BUG: KCSAN: data-race in shmem_add_to_page_cache / shmem_getattr [ 49.608241][ T3296] [ 49.610573][ T3296] read-write to 0xffff8881191c1988 of 8 bytes by task 4425 on cpu 1: [ 49.618647][ T3296] shmem_add_to_page_cache+0x3b9/0x4b0 [ 49.624148][ T3296] shmem_get_folio_gfp+0x4f6/0xd90 [ 49.629296][ T3296] shmem_write_begin+0xa2/0x180 [ 49.634216][ T3296] generic_perform_write+0x1a8/0x4a0 [ 49.639525][ T3296] shmem_file_write_iter+0xc2/0xe0 [ 49.644664][ T3296] __kernel_write_iter+0x247/0x4c0 [ 49.649806][ T3296] dump_user_range+0x3ac/0x550 [ 49.654588][ T3296] elf_core_dump+0x1bf4/0x1cf0 [ 49.659387][ T3296] do_coredump+0x171e/0x1c90 [ 49.664008][ T3296] get_signal+0xd4f/0x1000 [ 49.668447][ T3296] arch_do_signal_or_restart+0x95/0x4b0 [ 49.674016][ T3296] irqentry_exit_to_user_mode+0xa7/0x120 [ 49.679661][ T3296] irqentry_exit+0x12/0x50 [ 49.684087][ T3296] asm_exc_page_fault+0x26/0x30 [ 49.688947][ T3296] [ 49.691271][ T3296] read to 0xffff8881191c1988 of 8 bytes by task 3296 on cpu 0: [ 49.698816][ T3296] shmem_getattr+0x69/0x200 [ 49.703323][ T3296] vfs_statx_path+0x178/0x2f0 [ 49.708006][ T3296] vfs_statx+0xe1/0x170 [ 49.712172][ T3296] __se_sys_newfstatat+0xdc/0x300 [ 49.717211][ T3296] __x64_sys_newfstatat+0x55/0x70 [ 49.722257][ T3296] x64_sys_call+0x236d/0x2dc0 [ 49.726941][ T3296] do_syscall_64+0xc9/0x1c0 [ 49.731450][ T3296] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 49.737354][ T3296] [ 49.739769][ T3296] value changed: 0x0000000000002755 -> 0x0000000000002756 [ 49.746887][ T3296] [ 49.749210][ T3296] Reported by Kernel Concurrency Sanitizer on: [ 49.755373][ T3296] CPU: 0 UID: 0 PID: 3296 Comm: syz-executor Not tainted 6.14.0-rc1-syzkaller-00181-g7ee983c850b4 #0 [ 49.766233][ T3296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 49.776311][ T3296] ================================================================== [ 49.795187][ T4466] sctp: [Deprecated]: syz.4.379 (pid 4466) Use of struct sctp_assoc_value in delayed_ack socket option. [ 49.795187][ T4466] Use struct sctp_sack_info instead