last executing test programs: 6.677799487s ago: executing program 3 (id=6861): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000180)={'wpan0\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xa8}}, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r3, 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000640)={@ipv4={""/10, ""/2, @loopback}}, &(0x7f0000000740)=0x14) r4 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00'}) 6.677351658s ago: executing program 3 (id=6862): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x2, @perf_config_ext={0xf60, 0xffffffff}, 0x1100, 0xf8, 0x3a65, 0x9, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x8000001f) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x8000003d) close_range(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000240)={0x0, 0x80, 0x6, 0x2, 0xf, 0x4, 0x0, 0x7, 0x50080, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0x9, 0x2, 0x2, 0x7, 0x3, 0x3ff, 0x0, 0x800}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000a80)='kfree\x00', r1, 0x0, 0x68f}, 0x18) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) socket$key(0xf, 0x3, 0x2) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x80201, 0x0) write$rfkill(r6, &(0x7f0000000000)={0x0, 0x8, 0x2, 0x1}, 0x8) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010600000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff1b000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r7, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a05000000000000000000020000000900020073797a310008000008000440000000000900010073797a30000000000800034000000009"], 0x64}, 0x1, 0x0, 0x0, 0x20048801}, 0x10) syz_mount_image$ext4(&(0x7f0000000540)='ext4\x00', &(0x7f0000000b40)='./file1\x00', 0x88, &(0x7f0000000b80), 0x3, 0x438, &(0x7f0000000d80)="$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") seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000002c0)={0x6, &(0x7f00000001c0)=[{0x743, 0xfc, 0x9, 0x8}, {0xfff9, 0x9, 0x8, 0x6}, {0x7ff, 0x5, 0x2, 0x1ff}, {0x2, 0x2, 0x9c, 0x9}, {0x6, 0x1, 0x80}, {0x9, 0x7, 0xf, 0x5b5a14f4}]}) rename(&(0x7f0000000000)='./file2\x00', &(0x7f0000000040)='./file1\x00') 6.566853199s ago: executing program 3 (id=6865): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='mm_page_alloc\x00', r3}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r4, 0x4b72, &(0x7f0000000000)={0x1, 0x0, 0x16, 0x12, 0xc9, &(0x7f0000000740)}) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='netfs_rreq\x00', r0, 0x0, 0x1}, 0x18) r6 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000006c0)='sched_switch\x00', r7}, 0x18) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newtfilter={0x24, 0x11, 0x1, 0x691522eb, 0x0, {0x0, 0x0, 0x74, r2, {0x10, 0x4}, {}, {0x5}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) 6.4843488s ago: executing program 3 (id=6867): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000900)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x4, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0x8}}, @typedef={0x9, 0x0, 0x0, 0x8, 0x3}, @func={0xf, 0x0, 0x0, 0xc, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x3, 0xb608}}]}, {0x0, [0x5f, 0x61]}}, &(0x7f0000000780)=""/224, 0x64, 0xe0, 0x0, 0xff, 0x10000, @value}, 0x28) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000280)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x16, '\x00', 0x0, @fallback=0xe, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002640)={0x11, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x41100, 0x50, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x3, 0x7, 0x54540e96, 0xdc4}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc, @void, @value}, 0x94) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x42002) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, 0x0) write$sndseq(r4, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32}], 0xffc8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f0000000140)={0x16f, @tick=0x7}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$packet(0x11, 0xa, 0x300) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000200000000"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x5, 0xb68, 0x560b0007, &(0x7f0000000000)="259a53f271a76d2688f54c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r6, 0x0, 0x1, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0, 0x4051031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x3e, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) 3.437236542s ago: executing program 3 (id=6918): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x500, 0x0) close(r1) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x800, 0x0) ioctl$TUNSETDEBUG(r2, 0x400454c9, &(0x7f00000001c0)=0xb) ioctl$TUNGETVNETLE(r1, 0x40047452, &(0x7f00000017c0)) syz_io_uring_setup(0x106, &(0x7f0000000140)={0x0, 0x2ef3, 0x80, 0x2, 0x2000088}, &(0x7f0000000040)=0x0, &(0x7f0000000200)) getsockopt$inet_mptcp_buf(0xffffffffffffffff, 0x11c, 0x4, &(0x7f0000000300)=""/162, &(0x7f00000003c0)=0xa2) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x0, &(0x7f0000000200)=0x401, 0x0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x2, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4, 0x0, 0x400000000}, 0x18) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000) r5 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r5, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xf0}}, 0x0) 3.387203713s ago: executing program 3 (id=6920): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x19, 0xc, &(0x7f0000000380)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3e, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffc000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000040)=')\xd4\xcc\xae\xd8\xa4k\x1e\xdb\x94\x00', 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYRESOCT=r2], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r5}, 0x18) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000300)='./file1\x00', 0x10, &(0x7f0000000680), 0x1, 0x254, &(0x7f00000006c0)="$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") 2.750808332s ago: executing program 4 (id=6933): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000f00)='kfree\x00', r1}, 0x18) creat(&(0x7f00000000c0)='./file0\x00', 0x48) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r4 = dup(r3) write$P9_RLERRORu(r4, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r4, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB, @ANYRESHEX=r4]) creat(&(0x7f0000000480)='./file0\x00', 0x80) 2.750476902s ago: executing program 4 (id=6934): r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) r1 = getpid() r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), r0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/oops_count', 0x200, 0x10) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x3c, r2, 0x1, 0x70bd26, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r1}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040010}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000640)=0x1800, 0x4) 1.909650034s ago: executing program 4 (id=6946): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r2 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r4 = syz_open_dev$usbfs(&(0x7f0000000040), 0x400000001fc, 0x301) ioctl$USBDEVFS_REAPURB(r4, 0x4004550c, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r5}, 0x10) r6 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = syz_open_dev$tty1(0xc, 0x4, 0x3) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000010000000800000008"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0x14, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641c00000000002008007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r9, 0x0, 0x7}, 0x18) ioctl$KDSKBENT(r7, 0x4b47, &(0x7f0000000400)={0x0, 0xa, 0x8001}) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r12}, 0x10) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r10, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x1018, 0xffffffffffffffff, {0x29}}, './file0\x00'}) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xf, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESDEC=r6, @ANYBLOB="0000000000000000b70200001400000000bf19000000000000550901000000000095000000000074e03c7560c4b23a0bbdfae4c5db470000bf91000000000000b70200000126cb90bf9d69fc9d050000008500000085000000b7000000000000379c7afc149b416610e3c234fc8d446ac378a3d3d2e4c7ffda51b5a1a824ebdddcc48e7b260f0d0ccd519a6f96f4e5725fce6984eee7ec9d2420940dd83c9d5ee7b22379834bf1aac9a0f65e9e9bf1a66be6aa6516a13d2c18c71ff0d2ba968abdce3bf7c5ddac60081356f619cb88e9f796bcd7e1399d61e2a763aebcbc1fa6a980b94428c63ce6efb6ae2765b353f49ecf"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r13}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) 1.110942114s ago: executing program 2 (id=6957): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000740)=ANY=[@ANYBLOB="540100001a001307000000000000001cac141400"/48, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ffffffff0000000000000000000000000000000032000000ac141417000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000048000200656362286369706865725f6e756c6c29000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001c"], 0x154}}, 0x0) 1.077996095s ago: executing program 2 (id=6959): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket(0x80000000000000a, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000300)='./file2\x00', 0x90, &(0x7f0000000340)={[{@dioread_lock}, {@noquota}]}, 0x1, 0x50c, &(0x7f0000001000)="$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") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x200000c, 0x6, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r0) 1.028932715s ago: executing program 4 (id=6961): syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x410c84, &(0x7f0000000340), 0x1, 0x775, &(0x7f0000001900)="$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") r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) syz_emit_ethernet(0xfc0, &(0x7f0000001a80)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @multicast, @void, {@ipv4={0x800, @udp={{0x6, 0x4, 0x0, 0x0, 0xfb2, 0x0, 0x2, 0x0, 0x11, 0x0, @empty, @empty, {[@end]}}, {0x0, 0x0, 0xf9a, 0x0, @opaque="edf1df4edc119cb3d0b8ad66bf21898f56dea225ccb2d8ed7e491f7a300b0b38fe69e2910f6158f4cf4d2bf792d3758d8173e85e1bf7fa7eeba490c2cf30bb231e806bfabcabdc0213d969b0b9434fa01623fc23c249a85e8258d584625788fafd9c12f510d09598f6dd6fabf6ac7a2dfe649fa04122d102e69784c8d78a65b1b9bf29114e5c2d5f1e7ae1e4338cfa45917f69e5ceac119ad400a552d4c840f0d3c4f7e64b2b88abb9c9c351dd84a30149d52caf718c64395eecb782880e012c6aeb368f429df66a611d773911057c7c0f854721c9c6eb45f1dd169791ee6e69c774608cb5b27a72fe02901efeec8f0533af0d040309cc15790df5450f1436129bf90da1eaa17fb268321a420daf37de6de4b9427b5c23b4c6464d994b8d624270403962219c427a1f6cad10ac4324c476f2d7cbb40a3a2152f3eba910733d56125a30ea13f5d62a7137764f4aabc3d3bf2ed6ae9372cff490b2bf06514e090df8cb651baaec0e333a5119b73034858016ae4607cf108127907094bb483de4d4a067e79f3761516e7c6c052b3abb947d3ac60ae14087b868a41bed15f4b396fdf92406fde018bd5aacc53fdc8d567889d7e2d04369a10f9654d01c5f63dad861216ad3fddccfb55ec1af75d200f528ee898dc09352b9dea259e05a1b235de5cccf0f946b5e6381ca8c548252cd3c571d389b216fea6cdff7d94c71355bc40eafaa7c087b72f6c916d62e8928ddfd8f1e1c7fcf5710de10a191c87238111de6cdf92c9263f7e30a735e0a36a32d4313ba1aa4e307fc9c83931cf87f2d824c247e7b049518ce986a8508551f5f1a56b38ec9cd97db9b1a1aee6b17d3167f58f7b1c59f7db3bf2f25a0ac3d187e28dade5feb9af131ce82da8d7c59cc49c33c6d83eaf940556828055075bb67268fbdca664789c5039732e03d120d2ed45bf6deb3fda5c1c78c1c8acc420dcba6584354ad20f648c94688773fb28249a13316507625e9d7e013fe3a0673c37c130cde07d7c5c10b141faed29bf646774d5d66a7e2adb39e0ff08019fd1c3ac48ea81da2764c38f5621870fd56cb32a6561a0e2c2be22f826c9b721799c19c9e4ebafec55785d62b7a08d72f27028eb11137de29f90a520e11f5064972bf0901833d8d9af653414e5c2ae329fb5075a1c7929badda2f7a3099b9760e8196ac177d191151572e890898219bade493fe9a2f7450694f88d66f827d1acd8221855ae1c6b73665957ee2f90fe3e4ece6fad6630c8a1d4ea025fd12ce10fdf9f92a6a798de701e376c1c4f460a24957446065789acd14ddc07773d9f96d5c5174895c79801fc99ee2d454543a5c101a7e02141cf562514d788511f3b654bcb291cc397ad6b89666246bf1a7f19525ca77077fc450f0b2a83fac614276711d4e08fb71b209f1e3e1a9b894df97a8e9bd180a50b9423f1b9c9b5335d57bd5caaa1b0a0f33ac9397030db272eb0eab096c69defc0229925fe7c259d30849bd36f1d67860b20760cdb387cbe661cbd3a9a352192425e1235a6905e7acacbfacaeb54fd2c76e03e9b9e57650ea1a06996ee8ce07e2724128c1fcd436047b8eeab184121c27772c036f85cf572e7f618ebc5e4b93be6bfead852f9128e2dadc195742f61d9e03a71f4437f2832df9ae52a419f27957edc6b1667ce80bda928dca2851ac64c080ce4e5bddaa58530ff4135cc86948a0dcd177d18e3e5f87148460fcbd5897813cf7d3c13ce769b7e07590e1390c5d15fdb6443c806065c15acff6e59a85df2e0f821b56f93105b0f87556ae2f5b37cfcda8e8a4e1876a8021fc21752bcbe4b0a9fd97ec3b93e41c7b5ef2157d2c65ac4249fc09bdede59386e948b17c30e5f108e0306a25a9cd6ef3b71c592c374ec5bd18ae427b6626dad6e1e4d0c6de16a8cd43849aa6a2fa4ac51cbd027ae8f628e27d30149b15f8bd858c1e322f856d569c70077f46d200b10c53be11b413c42e5e5656fd7ad8dd682386ab007b674c17fcf999a3d870e0840dbd0515a8b798e5309f54fa73b2231ce770bdd43ac609f771fe18099405f1a4fc2e3baebb4f479335d0379ee4b419dbd02ac1957d4dc429669308dd660d205897f8694ce3b82efb8dc715226161e47c85f0738adb6376d7a3e4b827b242245921fd184e2afbeb57c9dc96f91771a5dea966d1a823b9b8b150ed728687b6dcbfba7d0d3cf32ddf00a50b4ee465c1a4d8d2d01aa4a74966df83fbe0632e29df8c841b0f122984b0aa42f992d8a9d20a10e465d46a6127a900ceaffc90eb33fb05717fcaa2e8d02ed0ea0c5e2136f9d8d0c59be7671e85f72ad5751534224d88e4cb30958a9c0d816f7f2fd0ef42a0a508faca89afe82c737636be23098545be3f34f62f4e52958c72f91f5303a8c01d8c44ba6cbb657a7f07e919593a71c49c3e2280dfa5a242a97b3999c014ddcb0a6c33e6dfc0c0d876bec03940bc6d3be2993c5ee620e1110b2f281319376f8ff0fa35b14fab43005632a3ad0b4d15e58fde2ad7958d7d55bb649d554b3510be1cb7e7eb256afb8ebc6b25173874a470c4b4d3bcc299116c599583c8be01c4e63df0441a7aca948baf1cf878cc8bcccf78854e63b253b0055f6396c73860c393ea395b7a01aa9808b3bf2d5d508b0aaf8203853a1404c699f777a9b654de1855b31c0293f4f66dcd80d7cd82f89ab41b16542eb8b0649483323a74d27fd22207e00fcd13e212bb82ff8a4faf9af5980f0e99c01623b5e736f2318fe4019e70ab20952119c7f62c693e59b57ebafaa5a30ae2a901bde6a45ba36184192ef44f6a8221cb40b30f2a0f9845ec401907e6dd7c17bff1f894d38507d5151637ba944ba4051fe85e62882e290828c1b6f1a84f13feb83ac6f763dbe586d2f8a87fff3801764ee8abd053874c2c62b55ee03b016218e5229ae1b94221f13c5db51c28be4b95de955240e7d596c0288ba5250fe53fd4e9ad665d83c3863ce30d9b2eedb14bfd76c1ee8eb727dc02484eefeaa2e8ed0c3674c82ba583607c9bc35768fdaf8e2b6957e337bd7f4a48641b3ddb94f4156e9a0fcfe8244dcd26e31b665e5b59f3e924485d57aefb62b5365435adfc0194652bdc260b976b2d4184e18844c7a320f2fe948185dd9037c0e08c75edd26bb19114ecbbb0c75b392865139ff1f37d73d07d9069db6b9c8679d7994d5042d84e4d5261cb4f1dac7f1775bd2f5ba78ce677e249a0e1c046fb3e94391fbc00538ad8fc4f36b1f814a023287cc55fb2c6dc57b924f62c72e3e2cea02c3219449c7624f62d8d4e12fc0385c523c93cab456e95ffc5e25bba3001e12b7c1a22580a5788f4c5b53352f305bed341c314b400e075853859a95dd9f629eaee5ab0137c8f76d50b4e6be3728b79579483ffa8bf9fd4f85cdec3ba62ee8594d438fbd8c16361e82cf1f5a41714cd10231d02c2d2e5598814da6473d369c69eb0a6322dd3de414cd79c0e5c0e5ff87c6eb4f941e73aefdf2c87be134a2a5a9fd46d92f34aa7a52d1299481fd507e077346a8d438688b32509e2297d483306aa5ead530d0ad2a2892ef5fe5f9ed7fa4b566c6f5823e71b61347386d21c36cec70fb3c86bb525a68e06ff8717b3788b2295d8906820e8abf2c345631a366e55a1e2766b03bca88559760b9a88164567e8cf208283c6bd4165aa3db85eab42f0c5df2aaf1a285d2e87f859b6e0c10616f76237af6dfc10767052273d617bfb2e808a336b64c7ff98b04c30bd854360c822936e5ae915f2de5e81dca1f32f9eee2eb674be010bd884f7923d9806db542ae349f161b9245741f63a6cd9cb3ad73d58b6482de702a6ce06ef725d27fa104cd33ade94e379d154033b6553363910a8476b5957e22ef37164a8582c4173c7c61ef63d6a41817511fd114a57c7691e6cfcb410ff8258f422c3f5f207764b6e162211bd09ad00f3f6ebe686a3fac2530d4e81046971ec8812f8873f0bf1ff5dbab04f547b6c8ba8243b108bdd184e7358179882abfb19b2fd97ad740cbf535fd46941d46ae9778d2616c35277360e8f1c013520635ad1140fa330f95a64ddc2b8adf53ad13b00a03f7727d91afddcff9a50171f3802f8d50cc6a7042052019e23aa46eae532401fb8bda678a2a0681101f454adb3f6603ae90cebcfee9ef6b46411f8f320046fa1d74adaedf7c907bd7fa7fd6c496b11ac4b07ab6ebeccd0f9ab7f1bcbfc2dc7772c075f98d0371d24fb3b2eeaf21073efa76051a748c6c2b2683cca6b02178103eccd436c128f2ff95b9a56f1152ca5e35d3def06ef6edc372e8f19b6d2d167b17d379d5965dbe0110cc6c944eadc8b4240cd87f5e3b159bbcf7c037b4550abdc683f7f4553561c59fc8f1de247c51331d636d458abb2202feb8d8125c63184cdd8077ad7f154f25a0a331695e174bb1916540bc1b1150d08da736da5788742ed754316b7cc769bab8ac860bea58761a72e4577aff0cd7567223028a88759eba3c7d00b0b1e56c057400621b1eda2dbc6792ec84100b8e5cffad015d73179b4a29f9349a42d9ae1e67a443ba70d49619d28cfa390ceb9cf1eb5e2dfacda467c871d9d2fe9d03ac8ff7a36b2872fc42c602778371c1e1397e6468eaa88d40803524d283cf39a7865b0e11fb0886c0eef06fb7f0bdc73eee35adca58bb7ab3983e7d998a9c8d12a451990e5d8479ed57736b86ca9fa8160eb2ce547a55d2863aee0457b32db2b1cc202023bd65a5d73441d411198ac86c61de278f2cc8824c93a242ee7812c2014d18c2b9f9e81a71e26a790cdf9814e3cc2097d1bf01f42e268b104fddaafbc74681b565b77d616650f54e6fc8322a8cbd4555cd91cdb2a302f85e23fd154c83f41ce7ebab2d3a4a10ce93b754418ca72b694c081db8b9a642f01dc3c803f770f4802d02ff07932038dc345d08da3080b5c9994707e0de30ee9a11550a8be8eaab9696ecd0117afd21b894ec4a24f3bd1d9eca9c02098ba6fe4e41dcef1dabd862598db9b3b5d7f3442ec5e39f72b92912ccac2d912d18cdbafc650d56c03a57aab6301da11d523bce6ceee85076894a223f098acb0d574654ca43e170579329e84e7671432986d9b53554096227ba1eecf2b3ecca7d972de7730eb847eab3bb6c0797dcfe4e2b5c9ac98611ded719afc4c001c455671520fd0a4de2e275f5c2e4ecfd0465fdbfcce24a87f8cf3be61162f389859d7bc27c24178946542d678c425d0e57abc64a03e6105bcb7977c07e86e2c5cffe07905286ee4f1b54c366dbdccc0c7d716bc00557e4656e8fe3254851722753ed5690074f003075c875919a3b6e762f42e249444b518e78cff998b0311db99977588709b76e35959d0c0a6fb2919f2cb720e3a95365e13e50ff293a2561f69f1726cd733d7e180a7dd25c57378a70efe811f1aee79d796f4663bbc74986045e086ec1ba044046c1d6ed7a25da19e264a33df9aa1c6741c7634238dca85cb75129d06a071eda07d7c8abdf3069eb04aef5513e761e572aff660f1991f109d1e08868f1c39b185310be6bf9be015dce5f58cf446ca4688108829a8c0485a341776a4873fabae6a24b2681fda241831746eb434306be0828a2c12c89c96a69ec3b202e02ddb6290ed3de4b791d8759acbfa8187972ccfff"}}}}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x88882, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./bus\x00', 0x1c5902, 0x2d) write(r2, &(0x7f0000004200)='t', 0x1) sendfile(r2, r1, 0x0, 0x7ffff000) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18010000008000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000800), 0x8000, 0x0) r5 = dup(r4) ioctl$GIO_UNISCRNMAP(r5, 0x40103d02, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000340)='kfree\x00', r3}, 0x18) r6 = syz_io_uring_setup(0x1725, &(0x7f0000000080)={0x0, 0xfffffffe, 0x80, 0x400002, 0x9c}, &(0x7f0000000100)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000240)=0xfffffc04, 0x0, 0x4) unshare(0x28000600) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000440)={'gretap0\x00', &(0x7f0000000400)={'ip_vti0\x00', 0x0, 0x7, 0x7, 0x1, 0xa64f, {{0x7, 0x4, 0x2, 0x3b, 0x1c, 0x64, 0x0, 0x40, 0x2f, 0x0, @multicast1, @local, {[@ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}]}}}}}) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000580)={&(0x7f0000000600)=ANY=[@ANYBLOB="d0000000", @ANYRES16=0x0, @ANYBLOB="00012dbd7000b3842a84476432af4a9fb477f7befddbdf250300000008000300010000ff0000000000000000fc00000000000000000000000000000008000400010400003c00018014000400fc010000000000000000000000000000060005004e200000090005b2533d022bd1f6b64848d26e25a868fb004e23000014000400fc0000000000000000000000000000000800020006000000080003000100000048000680060001000a00", @ANYRES32=r10, @ANYBLOB="060005004e240000060005004e2100001400040000000000000000000000ffffffffffff060005004e230000"], 0xd0}, 0x1, 0x0, 0x0, 0x8001}, 0x44) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r9}, 0x10) syz_io_uring_submit(r7, r8, &(0x7f0000000180)=@IORING_OP_MKDIRAT={0x25, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)='./file0\x00', 0x84, 0x0, 0x1}) io_uring_enter(r6, 0x264b, 0x4, 0x1, 0x0, 0x0) 981.039256ms ago: executing program 0 (id=6962): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000840)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r3) sendmsg$TIPC_CMD_GET_NODES(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000480)={0x1c, r4, 0x1, 0x0, 0x0, {{}, {0x0, 0x6}}}, 0x1c}}, 0x0) 980.275826ms ago: executing program 2 (id=6963): prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x7, 0x2, 0x55, 0xd08}]}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x8000, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x2, @perf_config_ext={0xf60, 0x40ffffffff}, 0x1100, 0x20005, 0x3a65, 0x5, 0x0, 0x6, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x16, 0xf, &(0x7f0000000640)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x18) r3 = socket(0x1e, 0x4, 0x0) mremap(&(0x7f0000006000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ffd000/0x3000)=nil) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc}, 0x10) socket$inet(0x2, 0x3, 0x4) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x4000, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) add_key(&(0x7f00000001c0)='asymmetric\x00', 0x0, &(0x7f0000002680)='G', 0x1, 0xffffffffffffffff) 966.031646ms ago: executing program 0 (id=6964): socket$l2tp6(0xa, 0x2, 0x73) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a000002000000240001801400018008000100e000000108000200e00000010c00028005000100000000002400028014000180080001000000000008000200ac1e00010c00028005000100000000000800074000000001"], 0x64}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c00000000010104000000efa10000000200000004001880240001801400018008000100e000000108000200e00000010c0002800500010000000000"], 0x3c}}, 0x20008820) syz_io_uring_setup(0x7440, &(0x7f00000004c0)={0x0, 0xa6e9, 0x10100, 0x2, 0xfffffffb}, &(0x7f0000000140)=0x0, &(0x7f0000000280)) unshare(0x22020600) r3 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000400)='./file0\x00', 0x10, &(0x7f0000000380)=ANY=[], 0xfe, 0x2be, &(0x7f0000000440)="$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") truncate(&(0x7f0000000080)='./file1\x00', 0x8) ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f00000003c0)={0x1, 0x4}) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') setns(r4, 0x0) close_range(r3, 0xffffffffffffffff, 0x2) syz_io_uring_submit(r2, 0x0, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x40, 0x0, 0x3, 0x1, 0x0, 0xce}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00', 0x0}) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000067ef00040000007000ea844d783b94f80cc2841ca00000000208003b", @ANYRES32=r6, @ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0xc004}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) splice(0xffffffffffffffff, 0x0, r8, 0x0, 0x10d00, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) 929.086037ms ago: executing program 0 (id=6965): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x18) link(&(0x7f0000000680)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/../file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000240)=ANY=[@ANYBLOB="48000000100005ff08000000000000000000004a", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b000100", @ANYRES32], 0x48}}, 0x0) 853.922268ms ago: executing program 2 (id=6966): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_ext={0x1c, 0x2, &(0x7f0000000040)=@raw=[@map_val={0x18, 0x3, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xc}], &(0x7f0000000080)='syzkaller\x00', 0xcccc, 0xd, &(0x7f00000000c0)=""/13, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x0, 0xb, 0xfffffffd, 0x2}, 0x10, 0x26eed, 0xffffffffffffffff, 0x5, &(0x7f00000001c0)=[0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000000240)=[{0x1, 0x2, 0x10, 0x7}, {0x0, 0x3, 0x9, 0xb}, {0x0, 0x1, 0x9, 0x7}, {0x1, 0x3, 0x7}, {0x4, 0x1, 0x4, 0x3}], 0x10, 0x7, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x14, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000001000000009302180100002020702500000000aa395f2f588fa3dd87ae5c04002020207b1af85aacd783b1ef59ffd100bfa107000200000000000000f8ffffffb70200000030733a8a0ddc341a00000085000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x401) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000b40)={'\x00', 0x7ff, 0x530, 0xc, 0xfffffffffffffffd, 0x59c, 0xffffffffffffffff}) ioctl$SG_BLKTRACETEARDOWN(r1, 0x1276, 0x0) 816.191419ms ago: executing program 0 (id=6967): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x500, 0x0) close(r1) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x800, 0x0) ioctl$TUNSETDEBUG(r2, 0x400454c9, &(0x7f00000001c0)=0xb) ioctl$TUNGETVNETLE(r1, 0x40047452, &(0x7f00000017c0)) syz_io_uring_setup(0x106, &(0x7f0000000140)={0x0, 0x2ef3, 0x80, 0x2, 0x2000088}, &(0x7f0000000040)=0x0, &(0x7f0000000200)) getsockopt$inet_mptcp_buf(0xffffffffffffffff, 0x11c, 0x4, &(0x7f0000000300)=""/162, &(0x7f00000003c0)=0xa2) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x0, &(0x7f0000000200)=0x401, 0x0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x2, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4, 0x0, 0x400000000}, 0x18) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000) r5 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r5, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB], 0xf0}}, 0x0) 782.618849ms ago: executing program 0 (id=6968): socket$l2tp6(0xa, 0x2, 0x73) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a000002000000240001801400018008000100e000000108000200e00000010c00028005000100000000002400028014000180080001000000000008000200ac1e00010c00028005000100000000000800074000000001"], 0x64}}, 0x0) (fail_nth: 2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c00000000010104000000efa10000000200000004001880240001801400018008000100e000000108000200e00000010c0002800500010000000000"], 0x3c}}, 0x20008820) syz_io_uring_setup(0x7440, &(0x7f00000004c0)={0x0, 0xa6e9, 0x10100, 0x2, 0xfffffffb}, &(0x7f0000000140)=0x0, &(0x7f0000000280)) unshare(0x22020600) r3 = syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000400)='./file0\x00', 0x10, &(0x7f0000000380)=ANY=[], 0xfe, 0x2be, &(0x7f0000000440)="$eJzs3T2LY1UYAOD3ZpJMdIqZwkoFb7GFjcNmWwuzyAjiVEoKP0AXdxeWSViYQGBWMW7lL7Cw8H/Y2Qs2goWl4A+wc5GFIyff87HJ3pHsyPo8zRzOed973nPvYZLmnnz2av/o9v3B3Ydf/h6tVhG1TnTiURF7UYuZrwMAeJ48Sin+TBPVMuu1TdUEAGzW0ud/4wkh2+e73tp0WQDABn3w4Ufv3Tw8PHi/LFsR/W+G3SImfyPyF4Kbd+Ne9OJOXI/deByR5ibtd949PIh6me3Ftf5o2M2Z/U9/XoTGOL8du7F3cX67nFjKHw27jXgxoigi7nVyoTdiN146l5/HD27k5F+3T+VHtxmvt6aLzPPvx2788nncj17cjpy7mP+rdlm+nb7964uPo9WMnF+Mht3tcdxC2rqK5wMAAAAAAAAAAAAAAAAAAAAAwPNpv5zbi2v93DU9f2fr8Xh8/9T4+Hyd2nh8kl9ENMeNM+cDjVJ8Pztf53pZlqmYxC/O96nHy/WoX9nCAQAAAAAAAAAAAAAAAAAA4D9kcPLg6Favd+c4Nxq5UY+lnoqN8Uv+r/w2f63/stfpLPW8tqae7UpzxdY0PNd6Nqb90yf9eU9exGWKHzbKiFU1N871vJDrWX/lv1NKqSgiLnlXZ0/5aeZa09hZHZNv8I/f7bxxdKtYdw9bswf3w/JQM44HJ2eeaRRVKkyVtl9zRUxzumOe6jo7/+auDk4evPnHZLJpT1FhFY1pI560/VqV9vMz/TcEAAAAAAAAAAAAAAAAAACcev//gsGHK1NrGysKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJ6xxe//V2iMpskXx6SURvOeZhwPrniJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/A/8EwAA///aVmfz") truncate(&(0x7f0000000080)='./file1\x00', 0x8) ioctl$PTP_EXTTS_REQUEST2(0xffffffffffffffff, 0x40103d0b, &(0x7f00000003c0)={0x1, 0x4}) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') setns(r4, 0x0) close_range(r3, 0xffffffffffffffff, 0x2) syz_io_uring_submit(r2, 0x0, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x40, 0x0, 0x3, 0x1, 0x0, 0xce}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00', 0x0}) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="44000067ef00040000007000ea844d783b94f80cc2841ca00000000208003b", @ANYRES32=r6, @ANYBLOB="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"], 0x44}, 0x1, 0x0, 0x0, 0xc004}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) splice(0xffffffffffffffff, 0x0, r8, 0x0, 0x10d00, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) 698.76849ms ago: executing program 2 (id=6969): r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r1}, 0x18) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0xffff}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @xfrm={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_XFRM_IF_ID={0x8, 0x2, 0x2}, @IFLA_XFRM_LINK={0x8, 0x1, 0x3}]}}}, @IFLA_IFNAME={0x14, 0x3, 'xfrm0\x00'}]}, 0x58}}, 0x0) 488.748593ms ago: executing program 1 (id=6970): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0x0) connect(0xffffffffffffffff, &(0x7f00000000c0)=@nfc={0x27, r1, 0xffffffffffffffff, 0x3}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x18) ustat(0x801, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@private2}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000380)=0xe8) syz_open_dev$usbfs(&(0x7f0000000200), 0x5, 0x100c0) r2 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$EVIOCRMFF(r2, 0x40085503, &(0x7f0000000000)=0x1) socket$packet(0x11, 0x2, 0x300) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x10) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r4}, 0x10) set_robust_list(&(0x7f0000000400), 0x18) getresuid(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140)=0x0) lchown(&(0x7f00000006c0)='./file0\x00', r5, 0xee01) setuid(0x0) 461.185693ms ago: executing program 0 (id=6971): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r2 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r4 = syz_open_dev$usbfs(&(0x7f0000000040), 0x400000001fc, 0x301) ioctl$USBDEVFS_REAPURB(r4, 0x4004550c, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r5}, 0x10) r6 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = syz_open_dev$tty1(0xc, 0x4, 0x3) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000010000000800000008"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0x14, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641c00000000002008007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r9, 0x0, 0x7}, 0x18) ioctl$KDSKBENT(r7, 0x4b47, &(0x7f0000000400)={0x0, 0xa, 0x8001}) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r10 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r12}, 0x10) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r10, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x1018, 0xffffffffffffffff, {0x29}}, './file0\x00'}) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xf, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESDEC=r6, @ANYBLOB="0000000000000000b70200001400000000bf19000000000000550901000000000095000000000074e03c7560c4b23a0bbdfae4c5db470000bf91000000000000b70200000126cb90bf9d69fc9d050000008500000085000000b7000000000000379c7afc149b416610e3c234fc8d446ac378a3d3d2e4c7ffda51b5a1a824ebdddcc48e7b260f0d0ccd519a6f96f4e5725fce6984eee7ec9d2420940dd83c9d5ee7b22379834bf1aac9a0f65e9e9bf1a66be6aa6516a13d2c18c71ff0d2ba968abdce3bf7c5ddac60081356f619cb88e9f796bcd7e1399d61e2a763aebcbc1fa6a980b94428c63ce6efb6ae2765b353f49ecf"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r13}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) 436.299194ms ago: executing program 2 (id=6972): r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x200100, 0x22) faccessat2(r1, &(0x7f00000005c0)='./file0\x00', 0x6, 0x100) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r2, 0x0, 0xffffffffffffff9c, 0x0, 0x262) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0}, 0x6}], 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[], 0x48) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000400)='mm_migrate_pages\x00', r5, 0x0, 0x9}, 0x18) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000009d000000010001000900000001000000", @ANYRES32, @ANYBLOB="000000000000001000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r7, 0x0, 0x0}, 0x20) mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c3a00000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000000600000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = gettid() tkill(r10, 0x16) r11 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000cab000)=0x7) setuid(r12) fsetxattr$security_capability(r6, &(0x7f0000000600), &(0x7f0000000680)=@v3={0x3000000, [{0x3, 0x40}, {0x1ff, 0x5}], r12}, 0x18, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) 261.778156ms ago: executing program 1 (id=6973): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0x0) connect(0xffffffffffffffff, &(0x7f00000000c0)=@nfc={0x27, r1, 0xffffffffffffffff, 0x3}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x18) ustat(0x801, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@private2}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000380)=0xe8) syz_open_dev$usbfs(&(0x7f0000000200), 0x5, 0x100c0) r2 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$EVIOCRMFF(r2, 0x40085503, &(0x7f0000000000)=0x1) socket$packet(0x11, 0x2, 0x300) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x10) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r4}, 0x10) set_robust_list(&(0x7f0000000400), 0x18) getresuid(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140)=0x0) lchown(&(0x7f00000006c0)='./file0\x00', r5, 0xee01) socket$inet_udplite(0x2, 0x2, 0x88) setuid(0x0) 234.419036ms ago: executing program 1 (id=6974): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) kexec_load(0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000840)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r3) sendmsg$TIPC_CMD_GET_NODES(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000480)={0x1c, r4, 0x1, 0x0, 0x0, {{}, {0x0, 0x6}}}, 0x1c}}, 0x0) 176.207657ms ago: executing program 1 (id=6975): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket(0x80000000000000a, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000300)='./file2\x00', 0x90, &(0x7f0000000340)={[{@dioread_lock}, {@noquota}]}, 0x1, 0x50c, &(0x7f0000001000)="$eJzs3c9vG1kdAPCvnThx0uwmu+wBEOyW3YWCqjqJuxut9gDLEaGVEHsEqRsSN4pix1HsLJvQQ3rmikQlTvTIH8C5Jw7cuCC4cSkHJH5EoAaJg9GMJ6mb2o3VJHYUfz7SaObNm/r7fXH8Xuc59gtgZF2PiP2ImIiITyNiNjufy7b4qL0l1z05uLdyeHBvJRet1if/zKX1ybno+DeJa9ljFiPihw8jfpJ7Pm5jd29juVqtbGfl+WZta76xu3drvba8VlmrbJbLS4tLCx/cfr98bm19qzaRHX318R/2v/WzJK2Z7ExnO85Tu+mF4ziJ8Yj4/kUEG4KxrD0Tw06El5KPiNcj4u309T8bY+mzCQBcZa3WbLRmO8sAwFWXT+fAcvlSNhcwE/l8qdSew3sjpvPVeqN58259Z3O1PVc2F4X83fVqZSGbK5yLQi4pL6bHT8vlE+XbEfFaRPxiciotl1bq1dVh/scHAEbYtRPj/38m2+M/AHDFFYedAAAwcD3G//1B5wEADI77fwAYPcZ/ABg97fF/athpAAAD5P4fAEaP8R8ARsoPPv442VqH2fdfr362u7NR/+zWaqWxUartrJRW6ttbpbV6fS39zp7aaY9Xrde3Ft+Lnc/nvr3VaM43dvfu1Oo7m8076fd636kU0qt8sgAAhum1tx79OZeMyB9OpVt0rOVQGGpmwEXLDzsBYGjGhp0AMDRW+4LRdYZ7fNMDcEV0WaL3GcVuHxBqtVqti0sJuGA3vmT+H0ZVx/y/vwKGEWP+H0aX+X8YXa1Wrt81/6PfCwGAy80cP9Dj/f/Xs/1vsjcHfrx68ooHF5kVAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAXG5H6/+WsrXAZyKfL5UiXomIuSjk7q5XKwsR8WpE/GmyMJmUF4ecMwBwVvm/5bL1v27MvjvzTNWb144PJyLip7/65JefLzeb23+MmMj9a/LofPNBdr48+OwBgNMdjdPpvuNG/snBvZWjbZD5/P27EVFsxz88mIjD4/jjMZ7ui1GIiOl/57JyW65j7uIs9u9HxBe7tT8XM+kcSHvl05Pxk9ivDDR+/pn4+bSuvU9+Fl84h1xg1DxK+p+Pur3+8nE93Xd//RfTHurssv4veaiVw7QPfBr/qP8b69H/Xe83xnu/+177aOr5uvsRXx6POIp92NH/HMXP9Yj/bp/x//KVN9/uVdf6dcSN6B6/M9Z8s7Y139jdu7VeW16rrFU2y+WlxaWFD26/X55P56jne48G//jw5qu96pL2T/eIXzyl/V/vs/0P//fpj772gvjffKdb/Hy88YL4yZj4jT7jL0//ttirLom/2qP9pz3/N/uM//ive88tGw4ADE9jd29juVqtbI/kQfR38e+zH9alyHmkD5Jn4RKk0fXgO4OKNRHdq37+TvvXdDKi8xe71XqpWL16jPOYdQMug+MXfUT8d9jJAAAAAAAAAAAAAAAAXQ3iE0vDbiMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABX1/8DAAD//9RMyv0=") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x200000c, 0x6, 0x20) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r0) 155.495278ms ago: executing program 4 (id=6976): syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x2000) r0 = socket$inet(0x2, 0x1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0xe, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="0701000000f809000500feff"], &(0x7f0000000480)='syzkaller\x00', 0x8, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) listen(r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') mount$9p_fd(0x0, &(0x7f0000000340)='.\x00', &(0x7f0000000400), 0x6, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x2000) (async) socket$inet(0x2, 0x1, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0xe, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="0701000000f809000500feff"], &(0x7f0000000480)='syzkaller\x00', 0x8, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) (async) listen(r0, 0x0) (async) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') (async) mount$9p_fd(0x0, &(0x7f0000000340)='.\x00', &(0x7f0000000400), 0x6, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) (async) 32.083359ms ago: executing program 4 (id=6977): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x18) link(&(0x7f0000000680)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/../file0\x00', 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000240)=ANY=[@ANYBLOB="48000000100005ff08000000000000000000004a", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b000100", @ANYRES32], 0x48}}, 0x0) 31.421549ms ago: executing program 1 (id=6978): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x500, 0x0) close(r1) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x800, 0x0) ioctl$TUNSETDEBUG(r2, 0x400454c9, &(0x7f00000001c0)=0xb) ioctl$TUNGETVNETLE(r1, 0x40047452, &(0x7f00000017c0)) syz_io_uring_setup(0x106, &(0x7f0000000140)={0x0, 0x2ef3, 0x80, 0x2, 0x2000088}, &(0x7f0000000040)=0x0, &(0x7f0000000200)) getsockopt$inet_mptcp_buf(0xffffffffffffffff, 0x11c, 0x4, &(0x7f0000000300)=""/162, &(0x7f00000003c0)=0xa2) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x0, &(0x7f0000000200)=0x401, 0x0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x2, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4, 0x0, 0x400000000}, 0x18) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000) r5 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r5, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB], 0xf0}}, 0x0) 0s ago: executing program 1 (id=6979): prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x7, 0x2, 0x55, 0xd08}]}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x8000, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x2, @perf_config_ext={0xf60, 0x40ffffffff}, 0x1100, 0x20005, 0x3a65, 0x5, 0x0, 0x6, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x4, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x80000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x16, 0xf, &(0x7f0000000640)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x18) r3 = socket(0x1e, 0x4, 0x0) mremap(&(0x7f0000006000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000ffd000/0x3000)=nil) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc}, 0x10) socket$inet(0x2, 0x3, 0x4) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x4000, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x18) add_key(&(0x7f00000001c0)='asymmetric\x00', 0x0, &(0x7f0000002680)='G', 0x1, 0xffffffffffffffff) kernel console output (not intermixed with test programs): ino=1960 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 410.805082][ T29] audit: type=1400 audit(1746511271.985:15635): avc: denied { mount } for pid=18306 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 410.827642][ T29] audit: type=1400 audit(1746511271.985:15636): avc: denied { mount } for pid=18306 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 410.851101][ T29] audit: type=1400 audit(1746511271.985:15637): avc: denied { mounton } for pid=18306 comm="syz-executor" path="/root/syzkaller.VMRWBv/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 410.878164][ T29] audit: type=1400 audit(1746511271.985:15638): avc: denied { mounton } for pid=18306 comm="syz-executor" path="/root/syzkaller.VMRWBv/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=65380 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 410.906186][ T29] audit: type=1400 audit(1746511271.985:15639): avc: denied { unmount } for pid=18306 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 411.089808][T18500] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5845'. [ 411.105385][T18500] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 411.112975][T18500] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 411.122951][T18500] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 411.131936][T18500] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 412.587544][ T29] kauditd_printk_skb: 26 callbacks suppressed [ 412.587564][ T29] audit: type=1400 audit(1746511273.805:15666): avc: denied { read write } for pid=18530 comm="syz.2.5858" name="nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 413.024380][T18545] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5859'. [ 413.038100][ T3412] bridge_slave_1: left allmulticast mode [ 413.043874][ T3412] bridge_slave_1: left promiscuous mode [ 413.049959][ T3412] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.087000][ T3412] bridge_slave_0: left allmulticast mode [ 413.092861][ T3412] bridge_slave_0: left promiscuous mode [ 413.098691][ T3412] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.219872][ T3412] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 413.234307][ T3412] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 413.249543][ T3412] bond0 (unregistering): Released all slaves [ 413.262898][ T3412] bond1 (unregistering): Released all slaves [ 413.283871][ T3412] bond2 (unregistering): Released all slaves [ 413.304800][ T3412] bond3 (unregistering): Released all slaves [ 413.332460][T18527] chnl_net:caif_netlink_parms(): no params data found [ 413.458655][T18527] bridge0: port 1(bridge_slave_0) entered blocking state [ 413.465867][T18527] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.503652][T18527] bridge_slave_0: entered allmulticast mode [ 413.520222][T18527] bridge_slave_0: entered promiscuous mode [ 413.543569][T18527] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.551141][T18527] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.567894][ T29] audit: type=1400 audit(1746511273.805:15667): avc: denied { open } for pid=18530 comm="syz.2.5858" path="/dev/nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 413.576982][T18527] bridge_slave_1: entered allmulticast mode [ 413.806723][T18527] bridge_slave_1: entered promiscuous mode [ 413.880453][T18527] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 413.899513][ T3412] hsr_slave_0: left promiscuous mode [ 413.905332][ T3412] hsr_slave_1: left promiscuous mode [ 413.927248][ T3412] team0 (unregistering): Port device batadv1 removed [ 413.979452][ T29] audit: type=1400 audit(1746511275.195:15668): avc: denied { append } for pid=18569 comm="syz.4.5869" name="001" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 414.078213][ T3412] team0 (unregistering): Port device team_slave_1 removed [ 414.088392][ T3412] team0 (unregistering): Port device team_slave_0 removed [ 414.122692][T18527] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 414.134385][ T29] audit: type=1326 audit(1746511275.355:15669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18579 comm="syz.3.5872" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f36a00ce969 code=0x7ffc0000 [ 414.163642][ T29] audit: type=1326 audit(1746511275.375:15670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18579 comm="syz.3.5872" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f36a00ce969 code=0x7ffc0000 [ 414.187497][ T29] audit: type=1326 audit(1746511275.375:15671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18579 comm="syz.3.5872" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f36a00ce969 code=0x7ffc0000 [ 414.211243][ T29] audit: type=1326 audit(1746511275.375:15672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18579 comm="syz.3.5872" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f36a00ce969 code=0x7ffc0000 [ 414.234937][ T29] audit: type=1326 audit(1746511275.375:15673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18579 comm="syz.3.5872" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f36a00ce969 code=0x7ffc0000 [ 414.258808][ T29] audit: type=1326 audit(1746511275.375:15674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18579 comm="syz.3.5872" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f36a00ce969 code=0x7ffc0000 [ 414.282740][ T29] audit: type=1326 audit(1746511275.375:15675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18579 comm="syz.3.5872" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f36a00ce969 code=0x7ffc0000 [ 414.325164][T18583] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5873'. [ 414.337271][T18527] team0: Port device team_slave_0 added [ 414.349030][T18583] bridge0: entered promiscuous mode [ 414.356689][T18583] bridge0: port 3(macvlan2) entered blocking state [ 414.363499][T18583] bridge0: port 3(macvlan2) entered disabled state [ 414.371143][T18583] macvlan2: entered allmulticast mode [ 414.377013][T18583] bridge0: entered allmulticast mode [ 414.384917][T18583] macvlan2: left allmulticast mode [ 414.390343][T18583] bridge0: left allmulticast mode [ 414.402853][T18583] bridge0: left promiscuous mode [ 414.425936][T18527] team0: Port device team_slave_1 added [ 414.539904][T18527] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 414.547168][T18527] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 414.573325][T18527] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 414.590100][T18527] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 414.597247][T18527] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 414.623991][T18527] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 414.662460][T18527] hsr_slave_0: entered promiscuous mode [ 414.668860][T18527] hsr_slave_1: entered promiscuous mode [ 414.674915][T18527] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 414.682733][T18527] Cannot create hsr debugfs directory [ 414.700071][T18604] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5882'. [ 414.976100][T18614] netlink: 'syz.3.5884': attribute type 10 has an invalid length. [ 414.984038][T18614] netlink: 40 bytes leftover after parsing attributes in process `syz.3.5884'. [ 415.014784][T18613] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 415.657850][T18527] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 415.683639][T18527] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 415.758568][T18527] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 415.772747][T18630] netlink: 44 bytes leftover after parsing attributes in process `syz.4.5890'. [ 415.785475][T18527] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 415.795804][T18630] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5890'. [ 415.888363][T18527] 8021q: adding VLAN 0 to HW filter on device bond0 [ 415.938352][T18527] 8021q: adding VLAN 0 to HW filter on device team0 [ 415.955892][T11028] bridge0: port 1(bridge_slave_0) entered blocking state [ 415.963044][T11028] bridge0: port 1(bridge_slave_0) entered forwarding state [ 416.010988][T18527] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 416.021666][T18527] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 416.061206][T11028] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.068626][T11028] bridge0: port 2(bridge_slave_1) entered forwarding state [ 416.165543][T18527] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 416.328236][T18527] veth0_vlan: entered promiscuous mode [ 416.342826][T18527] veth1_vlan: entered promiscuous mode [ 416.362118][T18664] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5901'. [ 416.383963][T18527] veth0_macvtap: entered promiscuous mode [ 416.399018][T18527] veth1_macvtap: entered promiscuous mode [ 416.411036][T18527] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 416.429034][T18527] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 416.439778][T18527] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 416.448780][T18527] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 416.457541][T18527] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 416.466318][T18527] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 416.882653][T18692] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 417.711445][ T29] kauditd_printk_skb: 178 callbacks suppressed [ 417.711463][ T29] audit: type=1326 audit(1746511278.915:15854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18710 comm="syz.1.5921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 417.741855][ T29] audit: type=1326 audit(1746511278.915:15855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18710 comm="syz.1.5921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=246 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 417.765661][ T29] audit: type=1326 audit(1746511278.915:15856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18710 comm="syz.1.5921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 417.789827][ T29] audit: type=1326 audit(1746511278.915:15857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18710 comm="syz.1.5921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 417.813709][ T29] audit: type=1326 audit(1746511278.915:15858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18710 comm="syz.1.5921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 417.837534][ T29] audit: type=1326 audit(1746511278.915:15859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18710 comm="syz.1.5921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 417.861183][ T29] audit: type=1326 audit(1746511278.915:15860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18710 comm="syz.1.5921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 417.884959][ T29] audit: type=1326 audit(1746511278.915:15861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18710 comm="syz.1.5921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 417.908556][ T29] audit: type=1326 audit(1746511278.915:15862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18710 comm="syz.1.5921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 417.932394][ T29] audit: type=1326 audit(1746511278.915:15863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18710 comm="syz.1.5921" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 418.018905][T18719] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5925'. [ 418.041776][T18715] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5924'. [ 418.073581][T18715] bridge0: port 3(macvlan2) entered blocking state [ 418.080718][T18715] bridge0: port 3(macvlan2) entered disabled state [ 418.101435][T18715] macvlan2: entered allmulticast mode [ 418.106907][T18715] bridge0: entered allmulticast mode [ 418.117902][T18715] macvlan2: left allmulticast mode [ 418.123140][T18715] bridge0: left allmulticast mode [ 418.479904][T18742] 8021q: adding VLAN 0 to HW filter on device bond0 [ 418.490439][T18742] 8021q: adding VLAN 0 to HW filter on device team0 [ 418.500495][T18742] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 418.701206][T18756] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5942'. [ 418.718041][T18756] bridge0: entered promiscuous mode [ 418.726009][T18756] bridge0: port 3(macvlan2) entered blocking state [ 418.732979][T18756] bridge0: port 3(macvlan2) entered disabled state [ 418.741094][T18756] macvlan2: entered allmulticast mode [ 418.746585][T18756] bridge0: entered allmulticast mode [ 418.752841][T18756] macvlan2: left allmulticast mode [ 418.758127][T18756] bridge0: left allmulticast mode [ 418.763813][T18756] bridge0: left promiscuous mode [ 418.816540][T18766] netlink: 'syz.3.5945': attribute type 10 has an invalid length. [ 418.826850][T18766] netlink: 40 bytes leftover after parsing attributes in process `syz.3.5945'. [ 419.520799][T18792] netlink: 'syz.1.5957': attribute type 10 has an invalid length. [ 419.529280][T18792] __nla_validate_parse: 1 callbacks suppressed [ 419.529338][T18792] netlink: 40 bytes leftover after parsing attributes in process `syz.1.5957'. [ 419.823743][T18792] team0: Port device geneve1 added [ 420.059699][T18805] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5963'. [ 420.770074][ T3412] bridge_slave_1: left allmulticast mode [ 420.775786][ T3412] bridge_slave_1: left promiscuous mode [ 420.781489][ T3412] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.817395][ T3412] bridge_slave_0: left allmulticast mode [ 420.823178][ T3412] bridge_slave_0: left promiscuous mode [ 420.829000][ T3412] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.890079][ T3412] team0: Port device geneve1 removed [ 420.969803][ T3412] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 420.985013][ T3412] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 420.997333][ T3412] bond0 (unregistering): Released all slaves [ 421.008280][ T3412] bond1 (unregistering): Released all slaves [ 421.039528][T18860] FAULT_INJECTION: forcing a failure. [ 421.039528][T18860] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 421.052823][T18860] CPU: 1 UID: 0 PID: 18860 Comm: syz.2.5983 Not tainted 6.15.0-rc5-syzkaller-00022-g01f95500a162 #0 PREEMPT(voluntary) [ 421.052935][T18860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 421.052953][T18860] Call Trace: [ 421.052959][T18860] [ 421.052968][T18860] __dump_stack+0x1d/0x30 [ 421.052992][T18860] dump_stack_lvl+0xe8/0x140 [ 421.053012][T18860] dump_stack+0x15/0x1b [ 421.053033][T18860] should_fail_ex+0x265/0x280 [ 421.053100][T18860] should_fail+0xb/0x20 [ 421.053136][T18860] should_fail_usercopy+0x1a/0x20 [ 421.053158][T18860] _copy_to_user+0x20/0xa0 [ 421.053236][T18860] simple_read_from_buffer+0xb5/0x130 [ 421.053259][T18860] proc_fail_nth_read+0x100/0x140 [ 421.053290][T18860] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 421.053327][T18860] vfs_read+0x19d/0x6f0 [ 421.053355][T18860] ? __rcu_read_unlock+0x4f/0x70 [ 421.053439][T18860] ? __fget_files+0x184/0x1c0 [ 421.053509][T18860] ksys_read+0xda/0x1a0 [ 421.053608][T18860] __x64_sys_read+0x40/0x50 [ 421.053637][T18860] x64_sys_call+0x2d77/0x2fb0 [ 421.053690][T18860] do_syscall_64+0xd0/0x1a0 [ 421.053709][T18860] ? clear_bhb_loop+0x25/0x80 [ 421.053730][T18860] ? clear_bhb_loop+0x25/0x80 [ 421.053749][T18860] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 421.053767][T18860] RIP: 0033:0x7f2fa192d37c [ 421.053837][T18860] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 421.053885][T18860] RSP: 002b:00007f2f9ff97030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 421.053902][T18860] RAX: ffffffffffffffda RBX: 00007f2fa1b55fa0 RCX: 00007f2fa192d37c [ 421.053913][T18860] RDX: 000000000000000f RSI: 00007f2f9ff970a0 RDI: 0000000000000003 [ 421.053924][T18860] RBP: 00007f2f9ff97090 R08: 0000000000000000 R09: 0000000000000000 [ 421.053938][T18860] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 421.053952][T18860] R13: 0000000000000000 R14: 00007f2fa1b55fa0 R15: 00007ffd8f7b8e88 [ 421.053974][T18860] [ 421.330918][T18866] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 421.380718][ T3412] hsr_slave_0: left promiscuous mode [ 421.403514][ T3412] hsr_slave_1: left promiscuous mode [ 421.529095][ T3412] team0 (unregistering): Port device team_slave_1 removed [ 421.543233][ T3412] team0 (unregistering): Port device team_slave_0 removed [ 421.585670][T18824] chnl_net:caif_netlink_parms(): no params data found [ 421.755211][T18824] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.762494][T18824] bridge0: port 1(bridge_slave_0) entered disabled state [ 421.820571][T18824] bridge_slave_0: entered allmulticast mode [ 421.843596][T18909] FAULT_INJECTION: forcing a failure. [ 421.843596][T18909] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 421.852410][T18824] bridge_slave_0: entered promiscuous mode [ 421.857007][T18909] CPU: 1 UID: 0 PID: 18909 Comm: syz.1.6004 Not tainted 6.15.0-rc5-syzkaller-00022-g01f95500a162 #0 PREEMPT(voluntary) [ 421.857099][T18909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 421.857179][T18909] Call Trace: [ 421.857187][T18909] [ 421.857197][T18909] __dump_stack+0x1d/0x30 [ 421.857248][T18909] dump_stack_lvl+0xe8/0x140 [ 421.857329][T18909] dump_stack+0x15/0x1b [ 421.857349][T18909] should_fail_ex+0x265/0x280 [ 421.857386][T18909] should_fail_alloc_page+0xf2/0x100 [ 421.857425][T18909] __alloc_frozen_pages_noprof+0xff/0x360 [ 421.857515][T18909] alloc_pages_mpol+0xb3/0x250 [ 421.857541][T18909] alloc_pages_noprof+0x90/0x130 [ 421.857567][T18909] __pud_alloc+0x47/0x450 [ 421.857602][T18909] handle_mm_fault+0x19c7/0x2ae0 [ 421.857679][T18909] ? __rcu_read_unlock+0x4f/0x70 [ 421.857713][T18909] do_user_addr_fault+0x3fe/0x1090 [ 421.857752][T18909] exc_page_fault+0x54/0xc0 [ 421.857809][T18909] asm_exc_page_fault+0x26/0x30 [ 421.857868][T18909] RIP: 0010:rep_movs_alternative+0x30/0x90 [ 421.857947][T18909] Code: 83 f9 08 73 25 85 c9 74 0f 8a 06 88 07 48 ff c7 48 ff c6 48 ff c9 75 f1 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 <48> 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 db 83 f9 08 [ 421.858050][T18909] RSP: 0018:ffffc9001116be10 EFLAGS: 00050246 [ 421.858068][T18909] RAX: ffff888117c82b98 RBX: 0000000000000008 RCX: 0000000000000008 [ 421.858152][T18909] RDX: 0000000000000001 RSI: 0000200000000000 RDI: ffffc9001116be38 [ 421.858168][T18909] RBP: 0000000000000008 R08: 00000000000002d7 R09: 0000000000000000 [ 421.858217][T18909] R10: 0001c9001116be38 R11: 0001c9001116be3f R12: 0000200000000000 [ 421.858323][T18909] R13: 0000000000000008 R14: ffffc9001116be38 R15: 0000200000000000 [ 421.858424][T18909] _copy_from_user+0x6f/0xb0 [ 421.858452][T18909] __sys_bind+0x106/0x2a0 [ 421.858492][T18909] __x64_sys_bind+0x3f/0x50 [ 421.858528][T18909] x64_sys_call+0x2086/0x2fb0 [ 421.858578][T18909] do_syscall_64+0xd0/0x1a0 [ 421.858607][T18909] ? clear_bhb_loop+0x25/0x80 [ 421.858646][T18909] ? clear_bhb_loop+0x25/0x80 [ 421.858676][T18909] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 421.858702][T18909] RIP: 0033:0x7f93decde969 [ 421.858721][T18909] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 421.858829][T18909] RSP: 002b:00007f93dd347038 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 421.858852][T18909] RAX: ffffffffffffffda RBX: 00007f93def05fa0 RCX: 00007f93decde969 [ 421.858879][T18909] RDX: 0000000000000008 RSI: 0000200000000000 RDI: 0000000000000004 [ 421.858896][T18909] RBP: 00007f93dd347090 R08: 0000000000000000 R09: 0000000000000000 [ 421.858911][T18909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 421.858926][T18909] R13: 0000000000000000 R14: 00007f93def05fa0 R15: 00007ffd1a97b678 [ 421.858950][T18909] [ 422.062736][T18913] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6003'. [ 422.073161][T18824] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.162921][T18824] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.170598][T18824] bridge_slave_1: entered allmulticast mode [ 422.183657][T18824] bridge_slave_1: entered promiscuous mode [ 422.246174][T18824] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 422.277702][T18824] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 422.320142][T18824] team0: Port device team_slave_0 added [ 422.327770][T18824] team0: Port device team_slave_1 added [ 422.346413][T18824] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 422.353512][T18824] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 422.379557][T18824] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 422.392801][T18824] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 422.399871][T18824] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 422.425992][T18824] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 422.459091][T18824] hsr_slave_0: entered promiscuous mode [ 422.465193][T18824] hsr_slave_1: entered promiscuous mode [ 422.471449][T18824] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 422.479958][T18824] Cannot create hsr debugfs directory [ 422.550829][T18930] netlink: 36 bytes leftover after parsing attributes in process `syz.0.6010'. [ 422.569008][T18930] FAULT_INJECTION: forcing a failure. [ 422.569008][T18930] name failslab, interval 1, probability 0, space 0, times 0 [ 422.581713][T18930] CPU: 0 UID: 0 PID: 18930 Comm: syz.0.6010 Not tainted 6.15.0-rc5-syzkaller-00022-g01f95500a162 #0 PREEMPT(voluntary) [ 422.581883][T18930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 422.581897][T18930] Call Trace: [ 422.581904][T18930] [ 422.581911][T18930] __dump_stack+0x1d/0x30 [ 422.581934][T18930] dump_stack_lvl+0xe8/0x140 [ 422.581956][T18930] dump_stack+0x15/0x1b [ 422.581975][T18930] should_fail_ex+0x265/0x280 [ 422.582048][T18930] ? mac802154_llsec_key_add+0x364/0x8d0 [ 422.582080][T18930] should_failslab+0x8c/0xb0 [ 422.582155][T18930] __kmalloc_cache_noprof+0x4c/0x320 [ 422.582196][T18930] mac802154_llsec_key_add+0x364/0x8d0 [ 422.582280][T18930] ieee802154_add_llsec_key+0x4a/0x70 [ 422.582442][T18930] nl802154_add_llsec_key+0x337/0x420 [ 422.582487][T18930] genl_family_rcv_msg_doit+0x140/0x1b0 [ 422.582525][T18930] genl_rcv_msg+0x422/0x460 [ 422.582553][T18930] ? __pfx_nl802154_pre_doit+0x10/0x10 [ 422.582620][T18930] ? __pfx_nl802154_add_llsec_key+0x10/0x10 [ 422.582730][T18930] ? __pfx_nl802154_post_doit+0x10/0x10 [ 422.582758][T18930] netlink_rcv_skb+0x120/0x220 [ 422.582794][T18930] ? __pfx_genl_rcv_msg+0x10/0x10 [ 422.582829][T18930] genl_rcv+0x28/0x40 [ 422.582907][T18930] netlink_unicast+0x59e/0x670 [ 422.582943][T18930] netlink_sendmsg+0x58b/0x6b0 [ 422.583045][T18930] ? __pfx_netlink_sendmsg+0x10/0x10 [ 422.583084][T18930] __sock_sendmsg+0x142/0x180 [ 422.583115][T18930] ____sys_sendmsg+0x31e/0x4e0 [ 422.583142][T18930] ___sys_sendmsg+0x17b/0x1d0 [ 422.583180][T18930] __x64_sys_sendmsg+0xd4/0x160 [ 422.583232][T18930] x64_sys_call+0x2999/0x2fb0 [ 422.583259][T18930] do_syscall_64+0xd0/0x1a0 [ 422.583284][T18930] ? clear_bhb_loop+0x25/0x80 [ 422.583311][T18930] ? clear_bhb_loop+0x25/0x80 [ 422.583337][T18930] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 422.583396][T18930] RIP: 0033:0x7fd12c2ce969 [ 422.583415][T18930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 422.583446][T18930] RSP: 002b:00007fd12a937038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 422.583467][T18930] RAX: ffffffffffffffda RBX: 00007fd12c4f5fa0 RCX: 00007fd12c2ce969 [ 422.583481][T18930] RDX: 0000000000000000 RSI: 00002000000003c0 RDI: 0000000000000004 [ 422.583495][T18930] RBP: 00007fd12a937090 R08: 0000000000000000 R09: 0000000000000000 [ 422.583509][T18930] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 422.583573][T18930] R13: 0000000000000000 R14: 00007fd12c4f5fa0 R15: 00007ffeb9a8a568 [ 422.583593][T18930] [ 422.871321][T18943] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6016'. [ 422.881548][T18947] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 422.891027][T18943] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 422.898644][T18943] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 422.910906][T18943] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 422.918363][T18943] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 422.962115][ T29] kauditd_printk_skb: 167 callbacks suppressed [ 422.962132][ T29] audit: type=1326 audit(1746511284.175:16031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18948 comm="syz.0.6018" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd12c2ce969 code=0x7ffc0000 [ 422.993426][ T29] audit: type=1326 audit(1746511284.175:16032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18948 comm="syz.0.6018" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd12c2ce969 code=0x7ffc0000 [ 423.014001][T18950] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6018'. [ 423.017109][ T29] audit: type=1326 audit(1746511284.175:16033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18948 comm="syz.0.6018" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd12c2ce969 code=0x7ffc0000 [ 423.029340][T18950] bridge0: entered promiscuous mode [ 423.049804][ T29] audit: type=1326 audit(1746511284.175:16034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18948 comm="syz.0.6018" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd12c2ce969 code=0x7ffc0000 [ 423.057533][T18950] bridge0: port 3(macvlan2) entered blocking state [ 423.078555][ T29] audit: type=1326 audit(1746511284.175:16035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18948 comm="syz.0.6018" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd12c2ce969 code=0x7ffc0000 [ 423.085100][T18950] bridge0: port 3(macvlan2) entered disabled state [ 423.108682][ T29] audit: type=1326 audit(1746511284.175:16036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18948 comm="syz.0.6018" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fd12c2ce969 code=0x7ffc0000 [ 423.120165][T18950] macvlan2: entered allmulticast mode [ 423.138763][ T29] audit: type=1326 audit(1746511284.175:16037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18948 comm="syz.0.6018" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd12c2ce969 code=0x7ffc0000 [ 423.144156][T18950] bridge0: entered allmulticast mode [ 423.168000][ T29] audit: type=1326 audit(1746511284.175:16038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18948 comm="syz.0.6018" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd12c2ce969 code=0x7ffc0000 [ 423.196937][ T29] audit: type=1326 audit(1746511284.175:16039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18948 comm="syz.0.6018" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd12c2ce969 code=0x7ffc0000 [ 423.220877][ T29] audit: type=1326 audit(1746511284.175:16040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18948 comm="syz.0.6018" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd12c2ce969 code=0x7ffc0000 [ 423.244744][T18950] macvlan2: left allmulticast mode [ 423.249931][T18950] bridge0: left allmulticast mode [ 423.255437][T18950] bridge0: left promiscuous mode [ 423.288464][T18953] pim6reg1: entered promiscuous mode [ 423.293884][T18953] pim6reg1: entered allmulticast mode [ 423.380737][T18959] netlink: 44 bytes leftover after parsing attributes in process `syz.0.6021'. [ 423.390007][T18959] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6021'. [ 423.401697][T18959] netlink: 36 bytes leftover after parsing attributes in process `syz.0.6021'. [ 423.559326][T18824] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 423.666635][T18824] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 423.681758][T18824] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 423.698723][T18824] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 423.785143][T18824] 8021q: adding VLAN 0 to HW filter on device bond0 [ 423.824603][T18824] 8021q: adding VLAN 0 to HW filter on device team0 [ 423.964984][T18985] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 423.986764][T18824] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 423.986850][T18824] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 424.270157][T18990] netlink: 12 bytes leftover after parsing attributes in process `syz.1.6031'. [ 424.444009][ T3412] bridge0: port 1(bridge_slave_0) entered blocking state [ 424.451362][ T3412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 424.472110][ T3412] bridge0: port 2(bridge_slave_1) entered blocking state [ 424.479575][ T3412] bridge0: port 2(bridge_slave_1) entered forwarding state [ 424.613632][T18824] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 424.692399][T19012] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6036'. [ 424.786400][T18824] veth0_vlan: entered promiscuous mode [ 424.806752][T18824] veth1_vlan: entered promiscuous mode [ 424.832993][T18824] veth0_macvtap: entered promiscuous mode [ 424.842802][T19022] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6040'. [ 424.858020][T19022] bridge0: entered promiscuous mode [ 424.872283][T19022] bridge0: port 3(macvlan2) entered blocking state [ 424.879148][T19022] bridge0: port 3(macvlan2) entered disabled state [ 424.899380][T19022] macvlan2: entered allmulticast mode [ 424.904813][T19022] bridge0: entered allmulticast mode [ 424.924695][T19022] macvlan2: left allmulticast mode [ 424.929918][T19022] bridge0: left allmulticast mode [ 424.944935][T19022] bridge0: left promiscuous mode [ 424.986164][T18824] veth1_macvtap: entered promiscuous mode [ 425.012586][T18824] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 425.065527][T19029] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6043'. [ 425.084770][T19029] netlink: 2 bytes leftover after parsing attributes in process `syz.2.6043'. [ 425.112069][T18824] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 425.129392][T18824] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.138510][T18824] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.147326][T18824] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.156059][T18824] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.202333][T19031] netlink: 12 bytes leftover after parsing attributes in process `syz.2.6044'. [ 425.351716][T19047] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6049'. [ 425.413992][T19059] netlink: 'syz.2.6053': attribute type 10 has an invalid length. [ 425.414069][T19059] netlink: 40 bytes leftover after parsing attributes in process `syz.2.6053'. [ 425.435350][T19056] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6052'. [ 425.944723][T19075] chnl_net:caif_netlink_parms(): no params data found [ 426.014659][T19075] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.021832][T19075] bridge0: port 1(bridge_slave_0) entered disabled state [ 426.051364][T19075] bridge_slave_0: entered allmulticast mode [ 426.078869][T19075] bridge_slave_0: entered promiscuous mode [ 426.112779][T19075] bridge0: port 2(bridge_slave_1) entered blocking state [ 426.120002][T19075] bridge0: port 2(bridge_slave_1) entered disabled state [ 426.175223][T19075] bridge_slave_1: entered allmulticast mode [ 426.182936][T19075] bridge_slave_1: entered promiscuous mode [ 426.214167][T19075] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 426.226316][T19075] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 426.358977][T19075] team0: Port device team_slave_0 added [ 426.374552][T19075] team0: Port device team_slave_1 added [ 426.423426][T19075] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 426.430498][T19075] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 426.456570][T19075] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 426.506470][T19075] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 426.513469][T19075] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 426.539474][T19075] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 426.620353][ T12] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 426.670472][T19075] hsr_slave_0: entered promiscuous mode [ 426.681304][T19075] hsr_slave_1: entered promiscuous mode [ 426.695188][T19075] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 426.710852][T19075] Cannot create hsr debugfs directory [ 426.721462][ T12] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 426.746374][T19103] bond1: entered promiscuous mode [ 426.751524][T19103] bond1: entered allmulticast mode [ 426.768130][T19103] 8021q: adding VLAN 0 to HW filter on device bond1 [ 426.793800][T19103] bond1 (unregistering): Released all slaves [ 426.820775][ T12] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 426.900546][ T12] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 427.149102][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 427.170153][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 427.190290][ T12] bond0 (unregistering): Released all slaves [ 427.209502][ T12] bond1 (unregistering): Released all slaves [ 427.228398][ T12] bond2 (unregistering): Released all slaves [ 427.327576][ T12] hsr_slave_0: left promiscuous mode [ 427.337322][ T12] veth1_macvtap: left promiscuous mode [ 427.342850][ T12] veth0_macvtap: left promiscuous mode [ 427.367547][ T12] veth1_vlan: left promiscuous mode [ 427.373047][ T12] veth0_vlan: left promiscuous mode [ 427.530324][ T12] team0 (unregistering): Port device team_slave_1 removed [ 427.549521][ T12] team0 (unregistering): Port device team_slave_0 removed [ 427.784042][T19119] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6070'. [ 427.796181][T19119] bridge0: entered promiscuous mode [ 427.803712][T19119] bridge0: port 3(macvlan2) entered blocking state [ 427.810362][T19119] bridge0: port 3(macvlan2) entered disabled state [ 427.817292][T19119] macvlan2: entered allmulticast mode [ 427.822800][T19119] bridge0: entered allmulticast mode [ 427.829589][T19119] macvlan2: left allmulticast mode [ 427.834755][T19119] bridge0: left allmulticast mode [ 427.840588][T19119] bridge0: left promiscuous mode [ 427.881245][T19075] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 427.890300][T19075] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 427.900138][T19075] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 427.913037][T19075] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 427.989176][T19075] 8021q: adding VLAN 0 to HW filter on device bond0 [ 428.014584][T19075] 8021q: adding VLAN 0 to HW filter on device team0 [ 428.029948][ T3338] bridge0: port 1(bridge_slave_0) entered blocking state [ 428.037089][ T3338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 428.067755][T11028] bridge0: port 2(bridge_slave_1) entered blocking state [ 428.074893][T11028] bridge0: port 2(bridge_slave_1) entered forwarding state [ 428.101616][T19075] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 428.112167][T19075] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 428.137632][ T29] kauditd_printk_skb: 117 callbacks suppressed [ 428.137646][ T29] audit: type=1326 audit(1746511289.345:16158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19127 comm="syz.1.6074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 428.167630][ T29] audit: type=1326 audit(1746511289.345:16159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19127 comm="syz.1.6074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 428.191291][ T29] audit: type=1326 audit(1746511289.345:16160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19127 comm="syz.1.6074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 428.214910][ T29] audit: type=1326 audit(1746511289.345:16161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19127 comm="syz.1.6074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 428.238635][ T29] audit: type=1326 audit(1746511289.345:16162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19127 comm="syz.1.6074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 428.411952][ T29] audit: type=1326 audit(1746511289.355:16163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19127 comm="syz.1.6074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 428.435557][ T29] audit: type=1326 audit(1746511289.355:16164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19127 comm="syz.1.6074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 428.459160][ T29] audit: type=1326 audit(1746511289.355:16165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19127 comm="syz.1.6074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 428.482962][ T29] audit: type=1326 audit(1746511289.365:16166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19127 comm="syz.1.6074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 428.483648][T19075] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 428.506547][ T29] audit: type=1326 audit(1746511289.365:16167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19127 comm="syz.1.6074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 428.624023][T19147] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 428.732582][T19075] veth0_vlan: entered promiscuous mode [ 428.743590][T19075] veth1_vlan: entered promiscuous mode [ 428.771292][T19075] veth0_macvtap: entered promiscuous mode [ 428.772837][T19180] netlink: 'syz.1.6088': attribute type 10 has an invalid length. [ 428.781064][T19075] veth1_macvtap: entered promiscuous mode [ 428.785675][T19180] netlink: 40 bytes leftover after parsing attributes in process `syz.1.6088'. [ 428.797892][T19075] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 428.811357][T19075] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 428.822311][T19075] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 428.879280][T19075] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 428.889807][T19075] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 428.900899][T19075] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 428.913430][T19075] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 428.922236][T19075] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 428.931056][T19075] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 428.939755][T19075] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 429.031707][T19188] bridge0: entered promiscuous mode [ 429.038900][T19188] bridge0: port 3(macvlan2) entered blocking state [ 429.045478][T19188] bridge0: port 3(macvlan2) entered disabled state [ 429.052742][T19188] macvlan2: entered allmulticast mode [ 429.058235][T19188] bridge0: entered allmulticast mode [ 429.065477][T19188] macvlan2: left allmulticast mode [ 429.070658][T19188] bridge0: left allmulticast mode [ 429.076299][T19188] bridge0: left promiscuous mode [ 429.088198][T19198] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 429.095661][T19198] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 429.112376][T19198] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 429.119853][T19198] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 430.413398][ T12] tipc: Subscription rejected, illegal request [ 430.478351][T19253] netlink: 'syz.3.6120': attribute type 27 has an invalid length. [ 430.522648][T19253] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.529942][T19253] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.587600][T19253] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 430.599353][T19253] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 430.634526][T19253] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 430.643580][T19253] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 430.652490][T19253] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 430.661401][T19253] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 430.715067][T19254] 8021q: adding VLAN 0 to HW filter on device bond0 [ 430.732430][T19254] 8021q: adding VLAN 0 to HW filter on device team0 [ 430.742265][T19254] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 431.918339][T19285] FAULT_INJECTION: forcing a failure. [ 431.918339][T19285] name failslab, interval 1, probability 0, space 0, times 0 [ 431.931579][T19285] CPU: 0 UID: 0 PID: 19285 Comm: syz.3.6132 Not tainted 6.15.0-rc5-syzkaller-00022-g01f95500a162 #0 PREEMPT(voluntary) [ 431.931614][T19285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 431.931630][T19285] Call Trace: [ 431.931639][T19285] [ 431.931646][T19285] __dump_stack+0x1d/0x30 [ 431.931729][T19285] dump_stack_lvl+0xe8/0x140 [ 431.931746][T19285] dump_stack+0x15/0x1b [ 431.931761][T19285] should_fail_ex+0x265/0x280 [ 431.931803][T19285] should_failslab+0x8c/0xb0 [ 431.931840][T19285] kmem_cache_alloc_node_noprof+0x57/0x320 [ 431.931978][T19285] ? __alloc_skb+0x101/0x320 [ 431.932002][T19285] ? __slab_free+0x77/0x270 [ 431.932024][T19285] __alloc_skb+0x101/0x320 [ 431.932105][T19285] ? __kfree_skb+0x109/0x150 [ 431.932147][T19285] tipc_msg_create+0x47/0x230 [ 431.932173][T19285] ? tipc_node_remove_conn+0x1ba/0x270 [ 431.932238][T19285] __tipc_shutdown+0x8b0/0xbf0 [ 431.932270][T19285] ? __pfx_woken_wake_function+0x10/0x10 [ 431.932292][T19285] tipc_release+0x67/0xd10 [ 431.932320][T19285] sock_close+0x68/0x150 [ 431.932339][T19285] ? __pfx_sock_close+0x10/0x10 [ 431.932359][T19285] __fput+0x298/0x650 [ 431.932377][T19285] ____fput+0x1c/0x30 [ 431.932450][T19285] task_work_run+0x12e/0x1a0 [ 431.932472][T19285] resume_user_mode_work+0x6a/0x70 [ 431.932492][T19285] syscall_exit_to_user_mode+0x77/0xb0 [ 431.932605][T19285] do_syscall_64+0xdd/0x1a0 [ 431.932624][T19285] ? clear_bhb_loop+0x25/0x80 [ 431.932643][T19285] ? clear_bhb_loop+0x25/0x80 [ 431.932662][T19285] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 431.932710][T19285] RIP: 0033:0x7f2715d7e969 [ 431.932723][T19285] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 431.932738][T19285] RSP: 002b:00007f27143e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 431.932754][T19285] RAX: 00000000000000f9 RBX: 00007f2715fa5fa0 RCX: 00007f2715d7e969 [ 431.932765][T19285] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000006 [ 431.932775][T19285] RBP: 00007f27143e7090 R08: 0000000000000000 R09: 0000000000000000 [ 431.932814][T19285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 431.932824][T19285] R13: 0000000000000000 R14: 00007f2715fa5fa0 R15: 00007ffdff9287f8 [ 431.932841][T19285] [ 432.333984][T19310] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 432.470999][T19326] __nla_validate_parse: 2 callbacks suppressed [ 432.471015][T19326] netlink: 24 bytes leftover after parsing attributes in process `syz.4.6151'. [ 432.819096][T19350] 9pnet_fd: Insufficient options for proto=fd [ 433.430964][T19372] FAULT_INJECTION: forcing a failure. [ 433.430964][T19372] name failslab, interval 1, probability 0, space 0, times 0 [ 433.443676][T19372] CPU: 1 UID: 0 PID: 19372 Comm: syz.1.6171 Not tainted 6.15.0-rc5-syzkaller-00022-g01f95500a162 #0 PREEMPT(voluntary) [ 433.443704][T19372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 433.443719][T19372] Call Trace: [ 433.443726][T19372] [ 433.443735][T19372] __dump_stack+0x1d/0x30 [ 433.443756][T19372] dump_stack_lvl+0xe8/0x140 [ 433.443847][T19372] dump_stack+0x15/0x1b [ 433.443869][T19372] should_fail_ex+0x265/0x280 [ 433.443914][T19372] should_failslab+0x8c/0xb0 [ 433.443967][T19372] __kmalloc_noprof+0xa5/0x3e0 [ 433.443990][T19372] ? genl_family_rcv_msg_attrs_parse+0x75/0x190 [ 433.444065][T19372] genl_family_rcv_msg_attrs_parse+0x75/0x190 [ 433.444089][T19372] ? selinux_capable+0x1f9/0x270 [ 433.444121][T19372] genl_family_rcv_msg_doit+0x48/0x1b0 [ 433.444146][T19372] ? security_capable+0x83/0x90 [ 433.444197][T19372] ? ns_capable+0x7d/0xb0 [ 433.444216][T19372] genl_rcv_msg+0x422/0x460 [ 433.444238][T19372] ? __pfx_seg6_genl_sethmac+0x10/0x10 [ 433.444352][T19372] netlink_rcv_skb+0x120/0x220 [ 433.444389][T19372] ? __pfx_genl_rcv_msg+0x10/0x10 [ 433.444486][T19372] genl_rcv+0x28/0x40 [ 433.444511][T19372] netlink_unicast+0x59e/0x670 [ 433.444599][T19372] netlink_sendmsg+0x58b/0x6b0 [ 433.444648][T19372] ? __pfx_netlink_sendmsg+0x10/0x10 [ 433.444678][T19372] __sock_sendmsg+0x142/0x180 [ 433.444711][T19372] ____sys_sendmsg+0x31e/0x4e0 [ 433.444805][T19372] ___sys_sendmsg+0x17b/0x1d0 [ 433.444850][T19372] __x64_sys_sendmsg+0xd4/0x160 [ 433.444872][T19372] x64_sys_call+0x2999/0x2fb0 [ 433.444893][T19372] do_syscall_64+0xd0/0x1a0 [ 433.444920][T19372] ? clear_bhb_loop+0x25/0x80 [ 433.445026][T19372] ? clear_bhb_loop+0x25/0x80 [ 433.445050][T19372] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 433.445078][T19372] RIP: 0033:0x7f93decde969 [ 433.445095][T19372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 433.445122][T19372] RSP: 002b:00007f93dd347038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 433.445166][T19372] RAX: ffffffffffffffda RBX: 00007f93def05fa0 RCX: 00007f93decde969 [ 433.445181][T19372] RDX: 0000000000000000 RSI: 00002000000004c0 RDI: 0000000000000003 [ 433.445193][T19372] RBP: 00007f93dd347090 R08: 0000000000000000 R09: 0000000000000000 [ 433.445205][T19372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 433.445220][T19372] R13: 0000000000000000 R14: 00007f93def05fa0 R15: 00007ffd1a97b678 [ 433.445242][T19372] [ 433.726801][ T29] kauditd_printk_skb: 293 callbacks suppressed [ 433.726841][ T29] audit: type=1400 audit(1746511294.935:16461): avc: denied { append } for pid=19374 comm="syz.1.6172" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 433.891947][T19383] 9pnet_fd: Insufficient options for proto=fd [ 434.166597][T19402] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 434.200412][T19404] netlink: 12 bytes leftover after parsing attributes in process `syz.2.6185'. [ 434.313116][T19409] 9pnet_fd: Insufficient options for proto=fd [ 434.358411][T19411] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6187'. [ 434.430050][ T29] audit: type=1326 audit(1746511295.645:16462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19428 comm="syz.3.6195" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 434.454479][ T29] audit: type=1326 audit(1746511295.675:16463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19428 comm="syz.3.6195" exe="/root/syz-executor" sig=0 arch=c000003e syscall=246 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 434.478340][ T29] audit: type=1326 audit(1746511295.675:16464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19428 comm="syz.3.6195" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 434.502017][ T29] audit: type=1326 audit(1746511295.675:16465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19428 comm="syz.3.6195" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 434.527725][ T29] audit: type=1326 audit(1746511295.675:16466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19428 comm="syz.3.6195" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 434.527841][ T29] audit: type=1326 audit(1746511295.675:16467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19428 comm="syz.3.6195" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 434.527876][ T29] audit: type=1326 audit(1746511295.675:16468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19428 comm="syz.3.6195" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 434.599132][ T29] audit: type=1326 audit(1746511295.675:16469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19428 comm="syz.3.6195" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 434.622756][ T29] audit: type=1326 audit(1746511295.675:16470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19428 comm="syz.3.6195" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 434.668308][T19433] netlink: 44 bytes leftover after parsing attributes in process `syz.2.6197'. [ 434.683870][T19421] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6192'. [ 434.712576][T19437] netlink: 'syz.4.6198': attribute type 10 has an invalid length. [ 434.721534][T19437] netlink: 40 bytes leftover after parsing attributes in process `syz.4.6198'. [ 434.813212][T19437] team0: Port device geneve1 added [ 434.837405][T19435] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 434.864856][T19450] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6204'. [ 434.978471][T19465] netlink: 44 bytes leftover after parsing attributes in process `syz.2.6210'. [ 435.053376][T19478] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6217'. [ 435.062522][T19478] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 435.070655][T19478] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 435.125640][T19483] netlink: 'syz.1.6219': attribute type 10 has an invalid length. [ 435.134290][T19483] netlink: 40 bytes leftover after parsing attributes in process `syz.1.6219'. [ 436.008687][T19519] netlink: 'syz.2.6233': attribute type 10 has an invalid length. [ 436.058811][T19525] debugfs: Directory 'ttyS3' with parent 'caif_serial' already present! [ 436.308303][T19557] debugfs: Directory 'ttyS3' with parent 'caif_serial' already present! [ 436.465809][T19581] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 436.579928][T19587] debugfs: Directory 'ttyS3' with parent 'caif_serial' already present! [ 437.631042][T19662] __nla_validate_parse: 8 callbacks suppressed [ 437.631063][T19662] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6291'. [ 437.764828][T19666] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6293'. [ 437.854177][T19673] syz.0.6294: attempt to access beyond end of device [ 437.854177][T19673] md33: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 438.093271][T19693] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6304'. [ 438.103447][T19690] netlink: 24 bytes leftover after parsing attributes in process `wg1'. [ 438.695787][T19724] netlink: 8 bytes leftover after parsing attributes in process `syz.3.6316'. [ 438.861289][ T29] kauditd_printk_skb: 227 callbacks suppressed [ 438.861306][ T29] audit: type=1326 audit(1746511300.075:16698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19736 comm="syz.3.6322" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 438.895048][T19737] netlink: 8 bytes leftover after parsing attributes in process `syz.3.6322'. [ 438.904794][ T29] audit: type=1326 audit(1746511300.105:16699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19736 comm="syz.3.6322" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 438.927107][T19737] bridge0: entered promiscuous mode [ 438.928471][ T29] audit: type=1326 audit(1746511300.105:16700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19736 comm="syz.3.6322" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 438.942094][T19737] bridge0: port 3(macvlan2) entered blocking state [ 438.957232][ T29] audit: type=1326 audit(1746511300.105:16701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19736 comm="syz.3.6322" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 438.957270][ T29] audit: type=1326 audit(1746511300.105:16702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19736 comm="syz.3.6322" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 438.963840][T19737] bridge0: port 3(macvlan2) entered disabled state [ 438.987323][ T29] audit: type=1326 audit(1746511300.105:16703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19736 comm="syz.3.6322" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 439.041212][ T29] audit: type=1326 audit(1746511300.105:16704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19736 comm="syz.3.6322" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 439.064856][ T29] audit: type=1326 audit(1746511300.105:16705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19736 comm="syz.3.6322" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 439.088685][ T29] audit: type=1326 audit(1746511300.105:16706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19736 comm="syz.3.6322" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 439.095493][T19737] macvlan2: entered allmulticast mode [ 439.112300][ T29] audit: type=1326 audit(1746511300.105:16707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19736 comm="syz.3.6322" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 439.117672][T19737] bridge0: entered allmulticast mode [ 439.148027][T19737] macvlan2: left allmulticast mode [ 439.153158][T19737] bridge0: left allmulticast mode [ 439.160669][T19737] bridge0: left promiscuous mode [ 439.347840][T19747] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 439.553855][T19759] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 439.634890][T19763] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6334'. [ 439.657281][T19763] bridge0: entered promiscuous mode [ 439.665444][T19763] bridge0: port 3(macvlan2) entered blocking state [ 439.672067][T19763] bridge0: port 3(macvlan2) entered disabled state [ 439.684347][T19763] macvlan2: entered allmulticast mode [ 439.689934][T19763] bridge0: entered allmulticast mode [ 439.704767][T19763] macvlan2: left allmulticast mode [ 439.710038][T19763] bridge0: left allmulticast mode [ 439.717616][T19763] bridge0: left promiscuous mode [ 439.727838][T19765] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6335'. [ 439.783371][T19772] netlink: 'syz.3.6337': attribute type 10 has an invalid length. [ 439.791784][T19772] netlink: 40 bytes leftover after parsing attributes in process `syz.3.6337'. [ 439.830646][T19776] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 439.840079][T19772] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 439.849908][T19772] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 439.859307][T19772] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 439.869097][T19772] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 439.940994][T19772] team0: Port device geneve1 added [ 440.126963][T19796] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=19796 comm=syz.3.6346 [ 440.432503][T19837] FAULT_INJECTION: forcing a failure. [ 440.432503][T19837] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 440.445743][T19837] CPU: 0 UID: 0 PID: 19837 Comm: syz.0.6365 Not tainted 6.15.0-rc5-syzkaller-00022-g01f95500a162 #0 PREEMPT(voluntary) [ 440.445798][T19837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 440.445814][T19837] Call Trace: [ 440.445822][T19837] [ 440.445831][T19837] __dump_stack+0x1d/0x30 [ 440.445852][T19837] dump_stack_lvl+0xe8/0x140 [ 440.445870][T19837] dump_stack+0x15/0x1b [ 440.445885][T19837] should_fail_ex+0x265/0x280 [ 440.445959][T19837] should_fail+0xb/0x20 [ 440.445984][T19837] should_fail_usercopy+0x1a/0x20 [ 440.446001][T19837] _copy_to_user+0x20/0xa0 [ 440.446156][T19837] map_lookup_elem+0x359/0x460 [ 440.446192][T19837] __sys_bpf+0x3ae/0x790 [ 440.446274][T19837] __x64_sys_bpf+0x41/0x50 [ 440.446322][T19837] x64_sys_call+0x2478/0x2fb0 [ 440.446364][T19837] do_syscall_64+0xd0/0x1a0 [ 440.446408][T19837] ? clear_bhb_loop+0x25/0x80 [ 440.446430][T19837] ? clear_bhb_loop+0x25/0x80 [ 440.446533][T19837] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 440.446552][T19837] RIP: 0033:0x7fd12c2ce969 [ 440.446566][T19837] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 440.446681][T19837] RSP: 002b:00007fd12a937038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 440.446704][T19837] RAX: ffffffffffffffda RBX: 00007fd12c4f5fa0 RCX: 00007fd12c2ce969 [ 440.446719][T19837] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000001 [ 440.446734][T19837] RBP: 00007fd12a937090 R08: 0000000000000000 R09: 0000000000000000 [ 440.446746][T19837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 440.446757][T19837] R13: 0000000000000000 R14: 00007fd12c4f5fa0 R15: 00007ffeb9a8a568 [ 440.446782][T19837] [ 440.687443][T19854] netlink: 16 bytes leftover after parsing attributes in process `syz.1.6371'. [ 440.706335][T19856] bridge0: entered promiscuous mode [ 440.707174][T19856] bridge0: port 3(macvlan2) entered blocking state [ 440.707280][T19856] bridge0: port 3(macvlan2) entered disabled state [ 440.707361][T19856] macvlan2: entered allmulticast mode [ 440.707378][T19856] bridge0: entered allmulticast mode [ 440.713441][T19856] macvlan2: left allmulticast mode [ 440.713459][T19856] bridge0: left allmulticast mode [ 440.720902][T19856] bridge0: left promiscuous mode [ 440.815620][T19864] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 440.849160][T19866] bridge0: entered promiscuous mode [ 440.855790][T19866] bridge0: port 3(macvlan2) entered blocking state [ 440.862504][T19866] bridge0: port 3(macvlan2) entered disabled state [ 440.869468][T19866] macvlan2: entered allmulticast mode [ 440.874903][T19866] bridge0: entered allmulticast mode [ 440.881034][T19866] macvlan2: left allmulticast mode [ 440.886167][T19866] bridge0: left allmulticast mode [ 440.892254][T19866] bridge0: left promiscuous mode [ 441.118228][T19886] bridge0: entered promiscuous mode [ 441.135529][T19886] bridge0: port 3(macvlan2) entered blocking state [ 441.142196][T19886] bridge0: port 3(macvlan2) entered disabled state [ 441.157017][T19886] macvlan2: entered allmulticast mode [ 441.162618][T19886] bridge0: entered allmulticast mode [ 441.170162][T19886] macvlan2: left allmulticast mode [ 441.175340][T19886] bridge0: left allmulticast mode [ 441.189625][T19886] bridge0: left promiscuous mode [ 441.276238][T19890] netlink: 'syz.1.6389': attribute type 10 has an invalid length. [ 441.330660][T19896] FAULT_INJECTION: forcing a failure. [ 441.330660][T19896] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 441.344194][T19896] CPU: 0 UID: 0 PID: 19896 Comm: syz.4.6392 Not tainted 6.15.0-rc5-syzkaller-00022-g01f95500a162 #0 PREEMPT(voluntary) [ 441.344295][T19896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 441.344309][T19896] Call Trace: [ 441.344316][T19896] [ 441.344324][T19896] __dump_stack+0x1d/0x30 [ 441.344362][T19896] dump_stack_lvl+0xe8/0x140 [ 441.344404][T19896] dump_stack+0x15/0x1b [ 441.344428][T19896] should_fail_ex+0x265/0x280 [ 441.344471][T19896] should_fail+0xb/0x20 [ 441.344509][T19896] should_fail_usercopy+0x1a/0x20 [ 441.344593][T19896] _copy_to_iter+0x380/0xdd0 [ 441.344614][T19896] ? _raw_spin_unlock_irqrestore+0x2b/0x60 [ 441.344694][T19896] __skb_datagram_iter+0xc3/0x680 [ 441.344718][T19896] ? __pfx_simple_copy_to_iter+0x10/0x10 [ 441.344942][T19896] skb_copy_datagram_iter+0x3d/0x110 [ 441.344968][T19896] netlink_recvmsg+0x1ab/0x7f0 [ 441.345076][T19896] ? __pfx_netlink_recvmsg+0x10/0x10 [ 441.345121][T19896] sock_recvmsg+0x136/0x170 [ 441.345156][T19896] ____sys_recvmsg+0xf5/0x280 [ 441.345214][T19896] ___sys_recvmsg+0x11f/0x370 [ 441.345249][T19896] do_recvmmsg+0x1ef/0x540 [ 441.345286][T19896] ? get_timespec64+0xc9/0x100 [ 441.345313][T19896] __x64_sys_recvmmsg+0xfb/0x170 [ 441.345340][T19896] x64_sys_call+0x1c6a/0x2fb0 [ 441.345362][T19896] do_syscall_64+0xd0/0x1a0 [ 441.345430][T19896] ? clear_bhb_loop+0x25/0x80 [ 441.345452][T19896] ? clear_bhb_loop+0x25/0x80 [ 441.345479][T19896] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 441.345547][T19896] RIP: 0033:0x7f85d5dbe969 [ 441.345567][T19896] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 441.345590][T19896] RSP: 002b:00007f85d4427038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 441.345614][T19896] RAX: ffffffffffffffda RBX: 00007f85d5fe5fa0 RCX: 00007f85d5dbe969 [ 441.345632][T19896] RDX: 04000000000003b4 RSI: 00002000000037c0 RDI: 0000000000000003 [ 441.345687][T19896] RBP: 00007f85d4427090 R08: 0000200000003700 R09: 0000000000000000 [ 441.345699][T19896] R10: 0000000002040000 R11: 0000000000000246 R12: 0000000000000001 [ 441.345711][T19896] R13: 0000000000000000 R14: 00007f85d5fe5fa0 R15: 00007fff8aac9c08 [ 441.345733][T19896] [ 442.537244][T19978] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 442.875575][T20005] __nla_validate_parse: 9 callbacks suppressed [ 442.875589][T20005] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6441'. [ 442.894089][T20005] bridge0: entered promiscuous mode [ 442.900955][T20005] bridge0: port 3(macvlan2) entered blocking state [ 442.907770][T20005] bridge0: port 3(macvlan2) entered disabled state [ 442.914851][T20005] macvlan2: entered allmulticast mode [ 442.920408][T20005] bridge0: entered allmulticast mode [ 442.929547][T20005] macvlan2: left allmulticast mode [ 442.934707][T20005] bridge0: left allmulticast mode [ 442.945097][T20005] bridge0: left promiscuous mode [ 443.093669][T20017] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6445'. [ 443.290266][T20028] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6450'. [ 443.333835][T20028] bridge0: entered promiscuous mode [ 443.344282][T20028] bridge0: port 3(macvlan2) entered blocking state [ 443.350966][T20028] bridge0: port 3(macvlan2) entered disabled state [ 443.358472][T20028] macvlan2: entered allmulticast mode [ 443.363904][T20028] bridge0: entered allmulticast mode [ 443.371379][T20028] macvlan2: left allmulticast mode [ 443.376560][T20028] bridge0: left allmulticast mode [ 443.382443][T20028] bridge0: left promiscuous mode [ 443.639238][T20041] netlink: 16 bytes leftover after parsing attributes in process `syz.2.6455'. [ 443.920020][ T29] kauditd_printk_skb: 241 callbacks suppressed [ 443.920036][ T29] audit: type=1326 audit(1746511305.135:16949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20053 comm="syz.1.6460" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 443.957569][T20054] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6460'. [ 443.969554][T20054] bridge0: entered promiscuous mode [ 443.974856][ T29] audit: type=1326 audit(1746511305.165:16950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20053 comm="syz.1.6460" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 443.998626][ T29] audit: type=1326 audit(1746511305.165:16951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20053 comm="syz.1.6460" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 444.022798][ T29] audit: type=1326 audit(1746511305.165:16952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20053 comm="syz.1.6460" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 444.046531][ T29] audit: type=1326 audit(1746511305.165:16953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20053 comm="syz.1.6460" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 444.070546][ T29] audit: type=1326 audit(1746511305.165:16954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20053 comm="syz.1.6460" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 444.095027][ T29] audit: type=1326 audit(1746511305.165:16955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20053 comm="syz.1.6460" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 444.118768][ T29] audit: type=1326 audit(1746511305.165:16956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20053 comm="syz.1.6460" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 444.143125][ T29] audit: type=1326 audit(1746511305.165:16957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20053 comm="syz.1.6460" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 444.167169][ T29] audit: type=1326 audit(1746511305.165:16958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20053 comm="syz.1.6460" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 444.193855][T20054] bridge0: port 3(macvlan2) entered blocking state [ 444.200497][T20054] bridge0: port 3(macvlan2) entered disabled state [ 444.207498][T20054] macvlan2: entered allmulticast mode [ 444.213444][T20054] bridge0: entered allmulticast mode [ 444.219691][T20054] macvlan2: left allmulticast mode [ 444.224924][T20054] bridge0: left allmulticast mode [ 444.230657][T20054] bridge0: left promiscuous mode [ 444.787750][T20077] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 444.836320][T20073] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 444.845706][T20077] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(10) [ 444.852336][T20077] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 444.860186][T20077] vhci_hcd vhci_hcd.0: Device attached [ 444.882812][T20084] netlink: 8 bytes leftover after parsing attributes in process `syz.3.6469'. [ 444.906880][T20060] chnl_net:caif_netlink_parms(): no params data found [ 444.922208][T20084] bridge0: entered promiscuous mode [ 444.935394][T20084] bridge0: port 3(macvlan2) entered blocking state [ 444.942466][T20084] bridge0: port 3(macvlan2) entered disabled state [ 444.958356][T20084] macvlan2: entered allmulticast mode [ 444.963787][T20084] bridge0: entered allmulticast mode [ 444.980996][T20084] macvlan2: left allmulticast mode [ 444.986277][T20084] bridge0: left allmulticast mode [ 444.992277][T20084] bridge0: left promiscuous mode [ 445.077247][T20060] bridge0: port 1(bridge_slave_0) entered blocking state [ 445.084476][T20060] bridge0: port 1(bridge_slave_0) entered disabled state [ 445.088062][T20095] netlink: 16 bytes leftover after parsing attributes in process `syz.3.6471'. [ 445.092189][T20060] bridge_slave_0: entered allmulticast mode [ 445.106969][T18039] usb 3-1: new high-speed USB device number 3 using vhci_hcd [ 445.107323][T20060] bridge_slave_0: entered promiscuous mode [ 445.121590][T20060] bridge0: port 2(bridge_slave_1) entered blocking state [ 445.128705][T20060] bridge0: port 2(bridge_slave_1) entered disabled state [ 445.136181][T20060] bridge_slave_1: entered allmulticast mode [ 445.142550][T20081] vhci_hcd: connection reset by peer [ 445.143003][T20060] bridge_slave_1: entered promiscuous mode [ 445.158045][T11028] vhci_hcd: stop threads [ 445.162388][T11028] vhci_hcd: release socket [ 445.166879][T11028] vhci_hcd: disconnect device [ 445.180583][T20060] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 445.191201][T20060] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 445.211036][T20060] team0: Port device team_slave_0 added [ 445.217792][T20060] team0: Port device team_slave_1 added [ 445.238649][ T37] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 445.250797][T20060] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 445.257902][T20060] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 445.284252][T20060] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 445.296612][T20060] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 445.303709][T20060] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 445.329975][T20060] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 445.350317][ T37] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 445.376276][T20060] hsr_slave_0: entered promiscuous mode [ 445.382789][T20060] hsr_slave_1: entered promiscuous mode [ 445.389005][T20060] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 445.396788][T20060] Cannot create hsr debugfs directory [ 445.412064][ T37] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 445.475032][ T37] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 445.522520][ T37] bridge_slave_1: left allmulticast mode [ 445.528312][ T37] bridge_slave_1: left promiscuous mode [ 445.533963][ T37] bridge0: port 2(bridge_slave_1) entered disabled state [ 445.541839][ T37] bridge_slave_0: left allmulticast mode [ 445.547646][ T37] bridge_slave_0: left promiscuous mode [ 445.553517][ T37] bridge0: port 1(bridge_slave_0) entered disabled state [ 445.598761][ T37] team0: Port device geneve1 removed [ 445.660731][T11028] smc: removing ib device syz0 [ 445.665802][ T37] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 445.675837][ T37] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 445.685950][ T37] bond0 (unregistering): Released all slaves [ 445.694927][ T37] bond1 (unregistering): Released all slaves [ 445.918464][T20130] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6484'. [ 445.950486][ T37] hsr_slave_0: left promiscuous mode [ 445.966032][ T37] hsr_slave_1: left promiscuous mode [ 445.982405][ T37] veth1_macvtap: left promiscuous mode [ 445.988100][ T37] veth0_macvtap: left promiscuous mode [ 445.993895][ T37] veth1_vlan: left promiscuous mode [ 446.000431][ T37] veth0_vlan: left promiscuous mode [ 446.148413][ T37] team0 (unregistering): Port device team_slave_1 removed [ 446.158327][ T37] team0 (unregistering): Port device team_slave_0 removed [ 446.233824][T20060] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 446.253668][T20060] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 446.275006][T20060] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 446.293937][T20060] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 446.369848][T20060] 8021q: adding VLAN 0 to HW filter on device bond0 [ 446.383172][T20060] 8021q: adding VLAN 0 to HW filter on device team0 [ 446.393611][ T3338] bridge0: port 1(bridge_slave_0) entered blocking state [ 446.400745][ T3338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 446.434566][T20060] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 446.445043][T20060] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 446.459221][ T3338] bridge0: port 2(bridge_slave_1) entered blocking state [ 446.466304][ T3338] bridge0: port 2(bridge_slave_1) entered forwarding state [ 446.527952][T20060] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 446.594677][T20060] veth0_vlan: entered promiscuous mode [ 446.602978][T20060] veth1_vlan: entered promiscuous mode [ 446.619567][T20060] veth0_macvtap: entered promiscuous mode [ 446.637864][T20060] veth1_macvtap: entered promiscuous mode [ 446.660925][T20060] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 446.672006][T20060] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 446.681699][T20060] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 446.690584][T20060] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 446.699390][T20060] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 446.708180][T20060] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 446.927644][T20182] netlink: 'syz.2.6498': attribute type 10 has an invalid length. [ 446.935796][T20182] netlink: 40 bytes leftover after parsing attributes in process `syz.2.6498'. [ 446.965637][T20182] team0: Port device geneve1 added [ 447.095561][T20190] netlink: 16 bytes leftover after parsing attributes in process `syz.2.6502'. [ 447.142405][T20194] 9pnet_fd: Insufficient options for proto=fd [ 447.209996][T20204] bridge0: entered promiscuous mode [ 447.216017][T20204] bridge0: port 3(macvlan2) entered blocking state [ 447.222598][T20204] bridge0: port 3(macvlan2) entered disabled state [ 447.229977][T20204] macvlan2: entered allmulticast mode [ 447.235385][T20204] bridge0: entered allmulticast mode [ 447.246983][T20204] macvlan2: left allmulticast mode [ 447.252165][T20204] bridge0: left allmulticast mode [ 447.257719][T20204] bridge0: left promiscuous mode [ 448.294211][T20235] __nla_validate_parse: 1 callbacks suppressed [ 448.294232][T20235] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6522'. [ 448.358484][T20235] bridge0: entered promiscuous mode [ 448.383430][T20235] bridge0: port 3(macvlan2) entered blocking state [ 448.390572][T20235] bridge0: port 3(macvlan2) entered disabled state [ 448.426408][T20235] macvlan2: entered allmulticast mode [ 448.431944][T20235] bridge0: entered allmulticast mode [ 448.471356][T20235] macvlan2: left allmulticast mode [ 448.476545][T20235] bridge0: left allmulticast mode [ 448.482803][T20235] bridge0: left promiscuous mode [ 448.638951][T20243] netlink: 12 bytes leftover after parsing attributes in process `syz.4.6526'. [ 449.033067][T20253] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6531'. [ 449.165553][ T29] kauditd_printk_skb: 245 callbacks suppressed [ 449.165605][ T29] audit: type=1326 audit(1746511310.375:17204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20258 comm="syz.1.6533" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 449.195473][ T29] audit: type=1326 audit(1746511310.375:17205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20258 comm="syz.1.6533" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 449.219073][ T29] audit: type=1326 audit(1746511310.375:17206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20258 comm="syz.1.6533" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 449.242725][ T29] audit: type=1326 audit(1746511310.375:17207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20258 comm="syz.1.6533" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 449.266378][ T29] audit: type=1326 audit(1746511310.375:17208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20258 comm="syz.1.6533" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 449.289972][ T29] audit: type=1326 audit(1746511310.375:17209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20258 comm="syz.1.6533" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 449.313562][ T29] audit: type=1326 audit(1746511310.375:17210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20258 comm="syz.1.6533" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 449.337203][ T29] audit: type=1326 audit(1746511310.375:17211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20258 comm="syz.1.6533" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 449.360805][ T29] audit: type=1326 audit(1746511310.375:17212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20258 comm="syz.1.6533" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 449.384389][ T29] audit: type=1326 audit(1746511310.375:17213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20258 comm="syz.1.6533" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93decde969 code=0x7ffc0000 [ 449.743025][T20284] netlink: 'syz.0.6542': attribute type 10 has an invalid length. [ 449.751453][T20284] netlink: 40 bytes leftover after parsing attributes in process `syz.0.6542'. [ 449.800867][T20284] team0: Port device geneve1 added [ 450.016946][T20301] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6548'. [ 450.028387][T20301] bridge0: entered promiscuous mode [ 450.035110][T20301] bridge0: port 3(macvlan2) entered blocking state [ 450.041837][T20301] bridge0: port 3(macvlan2) entered disabled state [ 450.050454][T20301] macvlan2: entered allmulticast mode [ 450.055935][T20301] bridge0: entered allmulticast mode [ 450.062121][T20301] macvlan2: left allmulticast mode [ 450.067378][T20301] bridge0: left allmulticast mode [ 450.073231][T20301] bridge0: left promiscuous mode [ 450.080915][T20298] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6547'. [ 450.256225][T20320] netlink: 100 bytes leftover after parsing attributes in process `syz.2.6556'. [ 450.276830][T18039] vhci_hcd: vhci_device speed not set [ 450.527927][T20330] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(4) [ 450.534534][T20330] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 450.542109][T20330] vhci_hcd vhci_hcd.0: Device attached [ 450.580431][T20336] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 450.592267][T20332] netlink: 12 bytes leftover after parsing attributes in process `syz.4.6561'. [ 450.662790][T20337] vhci_hcd vhci_hcd.0: pdev(2) rhport(2) sockfd(10) [ 450.669555][T20337] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 450.677067][T20337] vhci_hcd vhci_hcd.0: Device attached [ 450.703092][T20340] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 450.769371][T20336] vhci_hcd vhci_hcd.0: pdev(2) rhport(4) sockfd(15) [ 450.776015][T20336] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 450.783713][T20336] vhci_hcd vhci_hcd.0: Device attached [ 450.843164][ T1041] usb 5-1: new low-speed USB device number 3 using vhci_hcd [ 450.901711][T20344] FAULT_INJECTION: forcing a failure. [ 450.901711][T20344] name failslab, interval 1, probability 0, space 0, times 0 [ 450.914517][T20344] CPU: 1 UID: 0 PID: 20344 Comm: syz.3.6562 Not tainted 6.15.0-rc5-syzkaller-00022-g01f95500a162 #0 PREEMPT(voluntary) [ 450.914553][T20344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 450.914569][T20344] Call Trace: [ 450.914575][T20344] [ 450.914630][T20344] __dump_stack+0x1d/0x30 [ 450.914653][T20344] dump_stack_lvl+0xe8/0x140 [ 450.914677][T20344] dump_stack+0x15/0x1b [ 450.914698][T20344] should_fail_ex+0x265/0x280 [ 450.914818][T20344] should_failslab+0x8c/0xb0 [ 450.914853][T20344] kmem_cache_alloc_noprof+0x50/0x310 [ 450.914888][T20344] ? alloc_empty_file+0x76/0x200 [ 450.914966][T20344] alloc_empty_file+0x76/0x200 [ 450.915079][T20344] path_openat+0x68/0x2170 [ 450.915106][T20344] ? mntput+0x4b/0x80 [ 450.915127][T20344] ? terminate_walk+0x27f/0x2a0 [ 450.915164][T20344] ? path_openat+0x1bf8/0x2170 [ 450.915185][T20344] ? _parse_integer_limit+0x170/0x190 [ 450.915283][T20344] do_filp_open+0x109/0x230 [ 450.915321][T20344] do_open_execat+0xd8/0x260 [ 450.915392][T20344] alloc_bprm+0x28/0x660 [ 450.915416][T20344] do_execveat_common+0x12e/0x750 [ 450.915452][T20344] __x64_sys_execve+0x5c/0x70 [ 450.915477][T20344] x64_sys_call+0x13ab/0x2fb0 [ 450.915500][T20344] do_syscall_64+0xd0/0x1a0 [ 450.915588][T20344] ? clear_bhb_loop+0x25/0x80 [ 450.915613][T20344] ? clear_bhb_loop+0x25/0x80 [ 450.915640][T20344] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 450.915666][T20344] RIP: 0033:0x7f2715d7e969 [ 450.915684][T20344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 450.915706][T20344] RSP: 002b:00007f27143e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 450.915787][T20344] RAX: ffffffffffffffda RBX: 00007f2715fa5fa0 RCX: 00007f2715d7e969 [ 450.915803][T20344] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000400 [ 450.915818][T20344] RBP: 00007f27143e7090 R08: 0000000000000000 R09: 0000000000000000 [ 450.915912][T20344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 450.915928][T20344] R13: 0000000000000000 R14: 00007f2715fa5fa0 R15: 00007ffdff9287f8 [ 450.915952][T20344] [ 451.218432][T20330] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6560'. [ 451.268693][T20341] vhci_hcd: connection closed [ 451.268888][ T12] vhci_hcd: stop threads [ 451.277900][ T12] vhci_hcd: release socket [ 451.282318][ T12] vhci_hcd: disconnect device [ 451.287856][T20333] vhci_hcd: connection reset by peer [ 451.293315][T20338] vhci_hcd: connection closed [ 451.358462][ T12] vhci_hcd: stop threads [ 451.367836][ T12] vhci_hcd: release socket [ 451.372302][ T12] vhci_hcd: disconnect device [ 451.407094][ T12] vhci_hcd: stop threads [ 451.411557][ T12] vhci_hcd: release socket [ 451.415984][ T12] vhci_hcd: disconnect device [ 451.447136][T20355] netlink: 'syz.0.6567': attribute type 10 has an invalid length. [ 451.455386][T20355] netlink: 40 bytes leftover after parsing attributes in process `syz.0.6567'. [ 451.482258][T20357] 9pnet_fd: Insufficient options for proto=fd [ 451.870694][T20382] bridge0: entered promiscuous mode [ 451.884246][T20382] bridge0: port 3(macvlan2) entered blocking state [ 451.891039][T20382] bridge0: port 3(macvlan2) entered disabled state [ 451.907540][T20382] macvlan2: entered allmulticast mode [ 451.913243][T20382] bridge0: entered allmulticast mode [ 451.920794][T20382] macvlan2: left allmulticast mode [ 451.926001][T20382] bridge0: left allmulticast mode [ 451.926577][T20382] bridge0: left promiscuous mode [ 452.179988][T20434] bridge0: entered promiscuous mode [ 452.186630][T20434] bridge0: port 3(macvlan2) entered blocking state [ 452.193380][T20434] bridge0: port 3(macvlan2) entered disabled state [ 452.200249][T20434] macvlan2: entered allmulticast mode [ 452.205674][T20434] bridge0: entered allmulticast mode [ 452.213474][T20434] macvlan2: left allmulticast mode [ 452.218628][T20434] bridge0: left allmulticast mode [ 452.238231][T20434] bridge0: left promiscuous mode [ 453.370892][T20486] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 453.390671][T20486] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(10) [ 453.397373][T20486] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 453.405007][T20486] vhci_hcd vhci_hcd.0: Device attached [ 454.120022][T20503] ucma_write: process 320 (syz.4.6623) changed security contexts after opening file descriptor, this is not allowed. [ 454.152669][T20505] __nla_validate_parse: 9 callbacks suppressed [ 454.152688][T20505] netlink: 36 bytes leftover after parsing attributes in process `syz.3.6625'. [ 454.167979][T20505] netlink: 16 bytes leftover after parsing attributes in process `syz.3.6625'. [ 454.177041][T20505] netlink: 36 bytes leftover after parsing attributes in process `syz.3.6625'. [ 454.187813][ T29] kauditd_printk_skb: 303 callbacks suppressed [ 454.187829][ T29] audit: type=1326 audit(1746511315.395:17517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20506 comm="syz.0.6626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd12c2ce969 code=0x7ffc0000 [ 454.217838][ T29] audit: type=1326 audit(1746511315.395:17518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20506 comm="syz.0.6626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd12c2ce969 code=0x7ffc0000 [ 454.241598][ T29] audit: type=1326 audit(1746511315.395:17519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20506 comm="syz.0.6626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd12c2ce969 code=0x7ffc0000 [ 454.265383][ T29] audit: type=1326 audit(1746511315.395:17520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20506 comm="syz.0.6626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd12c2ce969 code=0x7ffc0000 [ 454.289776][ T29] audit: type=1326 audit(1746511315.395:17521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20506 comm="syz.0.6626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd12c2ce969 code=0x7ffc0000 [ 454.313484][ T29] audit: type=1326 audit(1746511315.395:17522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20506 comm="syz.0.6626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fd12c2ce969 code=0x7ffc0000 [ 454.326886][T20505] netlink: 36 bytes leftover after parsing attributes in process `syz.3.6625'. [ 454.336977][ T29] audit: type=1326 audit(1746511315.395:17523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20506 comm="syz.0.6626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd12c2ce969 code=0x7ffc0000 [ 454.369516][ T29] audit: type=1326 audit(1746511315.395:17524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20506 comm="syz.0.6626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd12c2ce969 code=0x7ffc0000 [ 454.377468][T20514] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6628'. [ 454.393441][ T29] audit: type=1326 audit(1746511315.395:17525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20506 comm="syz.0.6626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7fd12c2ce969 code=0x7ffc0000 [ 454.426551][ T29] audit: type=1326 audit(1746511315.395:17526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20506 comm="syz.0.6626" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd12c2ce969 code=0x7ffc0000 [ 454.430260][T20514] bridge0: entered promiscuous mode [ 454.431893][T20514] bridge0: port 3(macvlan2) entered blocking state [ 454.431996][T20514] bridge0: port 3(macvlan2) entered disabled state [ 454.432073][T20514] macvlan2: entered allmulticast mode [ 454.432090][T20514] bridge0: entered allmulticast mode [ 454.433086][T20514] macvlan2: left allmulticast mode [ 454.433103][T20514] bridge0: left allmulticast mode [ 454.433376][T20514] bridge0: left promiscuous mode [ 454.449244][T20487] vhci_hcd: connection closed [ 454.496621][T20509] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6627'. [ 454.531754][ T31] vhci_hcd: stop threads [ 454.536072][ T31] vhci_hcd: release socket [ 454.540714][ T31] vhci_hcd: disconnect device [ 454.555649][T20520] netlink: 12 bytes leftover after parsing attributes in process `syz.4.6631'. [ 454.865542][T20554] syzkaller1: entered promiscuous mode [ 454.871247][T20554] syzkaller1: entered allmulticast mode [ 454.884821][T20545] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6642'. [ 454.896521][T20554] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 454.918428][T20559] netlink: 28 bytes leftover after parsing attributes in process `syz.4.6647'. [ 454.946310][T20561] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 454.954863][T20561] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 454.971370][T20561] tmpfs: Unknown parameter 'inode12' [ 455.379672][T20594] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6661'. [ 455.502960][T20600] bridge0: entered promiscuous mode [ 455.510169][T20600] bridge0: port 3(macvlan2) entered blocking state [ 455.516981][T20600] bridge0: port 3(macvlan2) entered disabled state [ 455.523917][T20600] macvlan2: entered allmulticast mode [ 455.529361][T20600] bridge0: entered allmulticast mode [ 455.535627][T20600] macvlan2: left allmulticast mode [ 455.540817][T20600] bridge0: left allmulticast mode [ 455.546596][T20600] bridge0: left promiscuous mode [ 455.977899][T20619] netlink: 'syz.3.6672': attribute type 10 has an invalid length. [ 455.988534][T20619] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 455.998815][T20619] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 456.010316][T20619] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 456.019861][T20619] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 456.170508][T20626] FAULT_INJECTION: forcing a failure. [ 456.170508][T20626] name failslab, interval 1, probability 0, space 0, times 0 [ 456.183267][T20626] CPU: 0 UID: 0 PID: 20626 Comm: syz.3.6675 Not tainted 6.15.0-rc5-syzkaller-00022-g01f95500a162 #0 PREEMPT(voluntary) [ 456.183294][T20626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 456.183306][T20626] Call Trace: [ 456.183312][T20626] [ 456.183328][T20626] __dump_stack+0x1d/0x30 [ 456.183433][T20626] dump_stack_lvl+0xe8/0x140 [ 456.183470][T20626] dump_stack+0x15/0x1b [ 456.183516][T20626] should_fail_ex+0x265/0x280 [ 456.183550][T20626] should_failslab+0x8c/0xb0 [ 456.183588][T20626] kmem_cache_alloc_node_noprof+0x57/0x320 [ 456.183653][T20626] ? __alloc_skb+0x101/0x320 [ 456.183709][T20626] __alloc_skb+0x101/0x320 [ 456.183737][T20626] netlink_ack+0xfd/0x500 [ 456.183773][T20626] ? __pfx_nl802154_pre_doit+0x10/0x10 [ 456.183820][T20626] ? __pfx_nl802154_del_llsec_devkey+0x10/0x10 [ 456.183886][T20626] ? __pfx_nl802154_post_doit+0x10/0x10 [ 456.183913][T20626] netlink_rcv_skb+0x192/0x220 [ 456.183990][T20626] ? __pfx_genl_rcv_msg+0x10/0x10 [ 456.184019][T20626] genl_rcv+0x28/0x40 [ 456.184044][T20626] netlink_unicast+0x59e/0x670 [ 456.184094][T20626] netlink_sendmsg+0x58b/0x6b0 [ 456.184129][T20626] ? __pfx_netlink_sendmsg+0x10/0x10 [ 456.184198][T20626] __sock_sendmsg+0x142/0x180 [ 456.184231][T20626] ____sys_sendmsg+0x31e/0x4e0 [ 456.184260][T20626] ___sys_sendmsg+0x17b/0x1d0 [ 456.184302][T20626] __x64_sys_sendmsg+0xd4/0x160 [ 456.184365][T20626] x64_sys_call+0x2999/0x2fb0 [ 456.184390][T20626] do_syscall_64+0xd0/0x1a0 [ 456.184418][T20626] ? clear_bhb_loop+0x25/0x80 [ 456.184445][T20626] ? clear_bhb_loop+0x25/0x80 [ 456.184473][T20626] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 456.184523][T20626] RIP: 0033:0x7f2715d7e969 [ 456.184541][T20626] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 456.184564][T20626] RSP: 002b:00007f27143e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 456.184587][T20626] RAX: ffffffffffffffda RBX: 00007f2715fa5fa0 RCX: 00007f2715d7e969 [ 456.184610][T20626] RDX: 0000000000004880 RSI: 0000200000000e40 RDI: 0000000000000004 [ 456.184623][T20626] RBP: 00007f27143e7090 R08: 0000000000000000 R09: 0000000000000000 [ 456.184635][T20626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 456.184646][T20626] R13: 0000000000000000 R14: 00007f2715fa5fa0 R15: 00007ffdff9287f8 [ 456.184667][T20626] [ 456.226848][ T1041] usb 5-1: enqueue for inactive port 0 [ 456.463612][T20632] bridge0: port 3(macvlan2) entered blocking state [ 456.470230][T20632] bridge0: port 3(macvlan2) entered disabled state [ 456.482962][ T1041] usb 5-1: enqueue for inactive port 0 [ 456.497225][T20632] macvlan2: entered allmulticast mode [ 456.502745][T20632] bridge0: entered allmulticast mode [ 456.534321][T20632] macvlan2: left allmulticast mode [ 456.539544][T20632] bridge0: left allmulticast mode [ 456.556836][ T1041] vhci_hcd: vhci_device speed not set [ 456.784808][T20651] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 456.792398][T20651] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 456.821419][T20651] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 456.828940][T20651] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 456.934453][T20664] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 456.943698][T20664] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(10) [ 456.950339][T20664] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 456.958111][T20664] vhci_hcd vhci_hcd.0: Device attached [ 457.042225][T20672] IPv6: Can't replace route, no match found [ 457.069663][T20674] bridge0: entered promiscuous mode [ 457.076169][T20674] bridge0: port 3(macvlan2) entered blocking state [ 457.082761][T20674] bridge0: port 3(macvlan2) entered disabled state [ 457.089387][T20674] macvlan2: entered allmulticast mode [ 457.094831][T20674] bridge0: entered allmulticast mode [ 457.100587][T20674] macvlan2: left allmulticast mode [ 457.105990][T20674] bridge0: left allmulticast mode [ 457.111761][T20665] vhci_hcd: connection closed [ 457.111948][ T3338] vhci_hcd: stop threads [ 457.112292][T20674] bridge0: left promiscuous mode [ 457.116722][ T3338] vhci_hcd: release socket [ 457.130382][ T3338] vhci_hcd: disconnect device [ 457.510977][T20696] 9pnet_fd: Insufficient options for proto=fd [ 458.277730][T20740] FAULT_INJECTION: forcing a failure. [ 458.277730][T20740] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 458.290967][T20740] CPU: 0 UID: 0 PID: 20740 Comm: syz.0.6722 Not tainted 6.15.0-rc5-syzkaller-00022-g01f95500a162 #0 PREEMPT(voluntary) [ 458.290997][T20740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 458.291017][T20740] Call Trace: [ 458.291023][T20740] [ 458.291030][T20740] __dump_stack+0x1d/0x30 [ 458.291079][T20740] dump_stack_lvl+0xe8/0x140 [ 458.291097][T20740] dump_stack+0x15/0x1b [ 458.291111][T20740] should_fail_ex+0x265/0x280 [ 458.291166][T20740] should_fail+0xb/0x20 [ 458.291192][T20740] should_fail_usercopy+0x1a/0x20 [ 458.291208][T20740] strncpy_from_user+0x25/0x230 [ 458.291303][T20740] ? kmem_cache_alloc_noprof+0x186/0x310 [ 458.291335][T20740] ? getname_flags+0x80/0x3b0 [ 458.291432][T20740] getname_flags+0xae/0x3b0 [ 458.291459][T20740] __x64_sys_symlinkat+0x40/0x70 [ 458.291534][T20740] x64_sys_call+0x1558/0x2fb0 [ 458.291553][T20740] do_syscall_64+0xd0/0x1a0 [ 458.291575][T20740] ? clear_bhb_loop+0x25/0x80 [ 458.291594][T20740] ? clear_bhb_loop+0x25/0x80 [ 458.291645][T20740] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 458.291664][T20740] RIP: 0033:0x7fd12c2ce969 [ 458.291677][T20740] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 458.291692][T20740] RSP: 002b:00007fd12a937038 EFLAGS: 00000246 ORIG_RAX: 000000000000010a [ 458.291723][T20740] RAX: ffffffffffffffda RBX: 00007fd12c4f5fa0 RCX: 00007fd12c2ce969 [ 458.291734][T20740] RDX: 0000000000000000 RSI: ffffffffffffff9c RDI: 00002000000001c0 [ 458.291745][T20740] RBP: 00007fd12a937090 R08: 0000000000000000 R09: 0000000000000000 [ 458.291756][T20740] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 458.291795][T20740] R13: 0000000000000000 R14: 00007fd12c4f5fa0 R15: 00007ffeb9a8a568 [ 458.291822][T20740] [ 459.977324][ T29] kauditd_printk_skb: 488 callbacks suppressed [ 459.977388][ T29] audit: type=1326 audit(1746511321.195:18015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20793 comm="syz.4.6743" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f85d5dbe969 code=0x7ffc0000 [ 460.007617][ T29] audit: type=1326 audit(1746511321.195:18016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20793 comm="syz.4.6743" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f85d5dbe969 code=0x7ffc0000 [ 460.106830][ T29] audit: type=1326 audit(1746511321.195:18017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20793 comm="syz.4.6743" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f85d5dbe969 code=0x7ffc0000 [ 460.130619][ T29] audit: type=1326 audit(1746511321.195:18018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20793 comm="syz.4.6743" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f85d5dbe969 code=0x7ffc0000 [ 460.154293][ T29] audit: type=1326 audit(1746511321.195:18019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20793 comm="syz.4.6743" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f85d5dbe969 code=0x7ffc0000 [ 460.177805][ T29] audit: type=1326 audit(1746511321.195:18020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20793 comm="syz.4.6743" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f85d5dbe969 code=0x7ffc0000 [ 460.201531][ T29] audit: type=1326 audit(1746511321.195:18021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20793 comm="syz.4.6743" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f85d5dbe969 code=0x7ffc0000 [ 460.225107][ T29] audit: type=1326 audit(1746511321.195:18022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20793 comm="syz.4.6743" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f85d5dbe969 code=0x7ffc0000 [ 460.249122][ T29] audit: type=1326 audit(1746511321.195:18023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20793 comm="syz.4.6743" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f85d5dbe969 code=0x7ffc0000 [ 460.273382][ T29] audit: type=1326 audit(1746511321.195:18024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20793 comm="syz.4.6743" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f85d5dbe969 code=0x7ffc0000 [ 461.466388][T20865] __nla_validate_parse: 11 callbacks suppressed [ 461.466404][T20865] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 461.487292][T20865] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 461.513237][T20865] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 461.529692][T20865] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 461.570364][T20865] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 461.587870][T20865] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 462.383837][ T1041] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 462.391959][T20908] UHID_CREATE from different security context by process 392 (syz.4.6789), this is not allowed. [ 462.406926][ T1041] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz0 [ 463.379800][T20927] netlink: 16 bytes leftover after parsing attributes in process `syz.3.6795'. [ 463.767331][T20956] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6807'. [ 464.781557][T20980] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6818'. [ 465.076447][T21000] netlink: 100 bytes leftover after parsing attributes in process `syz.3.6827'. [ 465.117194][T21002] netlink: 'syz.4.6828': attribute type 6 has an invalid length. [ 465.145041][ T29] kauditd_printk_skb: 215 callbacks suppressed [ 465.145058][ T29] audit: type=1326 audit(1746511326.355:18240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21003 comm="syz.3.6829" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 465.231805][ T29] audit: type=1326 audit(1746511326.395:18241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21003 comm="syz.3.6829" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 465.255621][ T29] audit: type=1326 audit(1746511326.395:18242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21003 comm="syz.3.6829" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 465.279402][ T29] audit: type=1326 audit(1746511326.395:18243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21003 comm="syz.3.6829" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 465.303100][ T29] audit: type=1326 audit(1746511326.395:18244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21003 comm="syz.3.6829" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 465.326673][ T29] audit: type=1326 audit(1746511326.395:18245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21003 comm="syz.3.6829" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 465.350419][ T29] audit: type=1326 audit(1746511326.395:18246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21003 comm="syz.3.6829" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 465.374004][ T29] audit: type=1326 audit(1746511326.395:18247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21003 comm="syz.3.6829" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 465.397663][ T29] audit: type=1326 audit(1746511326.395:18248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21003 comm="syz.3.6829" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 465.421433][ T29] audit: type=1326 audit(1746511326.395:18249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21003 comm="syz.3.6829" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2715d7e969 code=0x7ffc0000 [ 465.923358][T21013] ipvlan2: entered promiscuous mode [ 465.928767][T21013] ipvlan2: entered allmulticast mode [ 465.934400][T21013] bridge0: entered allmulticast mode [ 465.962804][T21011] ipvlan2: entered promiscuous mode [ 465.968112][T21011] ipvlan2: entered allmulticast mode [ 466.013886][T21013] netlink: 'syz.2.6832': attribute type 4 has an invalid length. [ 466.025615][T21022] netlink: 'syz.0.6835': attribute type 6 has an invalid length. [ 466.083332][T21022] Cannot find set identified by id 0 to match [ 466.679512][T21058] __nla_validate_parse: 3 callbacks suppressed [ 466.679532][T21058] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6847'. [ 466.706730][T21060] netlink: 16 bytes leftover after parsing attributes in process `syz.1.6849'. [ 466.732971][T21060] netlink: 'syz.1.6849': attribute type 4 has an invalid length. [ 466.740882][T21060] netlink: 152 bytes leftover after parsing attributes in process `syz.1.6849'. [ 466.899633][T21060] : renamed from bond0 (while UP) [ 466.925230][T21066] netlink: 'syz.2.6851': attribute type 10 has an invalid length. [ 466.934931][T21066] netlink: 40 bytes leftover after parsing attributes in process `syz.2.6851'. [ 466.973180][T21068] netlink: 'syz.0.6852': attribute type 10 has an invalid length. [ 466.983608][T21068] netlink: 40 bytes leftover after parsing attributes in process `syz.0.6852'. [ 467.400446][T21088] netlink: 'syz.3.6860': attribute type 4 has an invalid length. [ 467.408402][T21088] netlink: 152 bytes leftover after parsing attributes in process `syz.3.6860'. [ 467.436892][T21088] : renamed from bond0 (while UP) [ 467.501151][T21093] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6862'. [ 467.555690][T21097] netlink: 12 bytes leftover after parsing attributes in process `syz.0.6864'. [ 467.636382][T21099] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6865'. [ 467.873984][T21115] netlink: 'syz.0.6871': attribute type 10 has an invalid length. [ 467.884259][T21115] netlink: 40 bytes leftover after parsing attributes in process `syz.0.6871'. [ 468.300521][T21138] SELinux: ebitmap: truncated map [ 468.315789][T21138] SELinux: failed to load policy [ 468.802754][T21149] netlink: 'syz.2.6885': attribute type 10 has an invalid length. [ 469.736530][T21178] x_tables: ip6_tables: SYNPROXY target: used from hooks PREROUTING, but only usable from INPUT/FORWARD [ 470.038885][T21200] FAULT_INJECTION: forcing a failure. [ 470.038885][T21200] name failslab, interval 1, probability 0, space 0, times 0 [ 470.051673][T21200] CPU: 1 UID: 0 PID: 21200 Comm: syz.4.6909 Not tainted 6.15.0-rc5-syzkaller-00022-g01f95500a162 #0 PREEMPT(voluntary) [ 470.051713][T21200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 470.051725][T21200] Call Trace: [ 470.051731][T21200] [ 470.051813][T21200] __dump_stack+0x1d/0x30 [ 470.051840][T21200] dump_stack_lvl+0xe8/0x140 [ 470.051864][T21200] dump_stack+0x15/0x1b [ 470.051886][T21200] should_fail_ex+0x265/0x280 [ 470.051937][T21200] should_failslab+0x8c/0xb0 [ 470.051975][T21200] kmem_cache_alloc_node_noprof+0x57/0x320 [ 470.052029][T21200] ? __alloc_skb+0x101/0x320 [ 470.052110][T21200] __alloc_skb+0x101/0x320 [ 470.052142][T21200] ? audit_log_start+0x365/0x6c0 [ 470.052233][T21200] audit_log_start+0x380/0x6c0 [ 470.052275][T21200] audit_seccomp+0x48/0x100 [ 470.052301][T21200] ? __seccomp_filter+0x68c/0x10d0 [ 470.052325][T21200] __seccomp_filter+0x69d/0x10d0 [ 470.052428][T21200] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 470.052488][T21200] ? vfs_write+0x75e/0x8d0 [ 470.052518][T21200] ? __rcu_read_unlock+0x4f/0x70 [ 470.052544][T21200] ? __fget_files+0x184/0x1c0 [ 470.052581][T21200] __secure_computing+0x82/0x150 [ 470.052628][T21200] syscall_trace_enter+0xcf/0x1e0 [ 470.052654][T21200] do_syscall_64+0xaa/0x1a0 [ 470.052682][T21200] ? clear_bhb_loop+0x25/0x80 [ 470.052712][T21200] ? clear_bhb_loop+0x25/0x80 [ 470.052733][T21200] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 470.052826][T21200] RIP: 0033:0x7f85d5dbe969 [ 470.052844][T21200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 470.052872][T21200] RSP: 002b:00007f85d4427038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b0 [ 470.052895][T21200] RAX: ffffffffffffffda RBX: 00007f85d5fe5fa0 RCX: 00007f85d5dbe969 [ 470.052911][T21200] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000000000005 [ 470.052924][T21200] RBP: 00007f85d4427090 R08: 0000000000000000 R09: 0000000000000000 [ 470.052972][T21200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 470.053050][T21200] R13: 0000000000000000 R14: 00007f85d5fe5fa0 R15: 00007fff8aac9c08 [ 470.053071][T21200] [ 470.274466][ T29] kauditd_printk_skb: 262 callbacks suppressed [ 470.274484][ T29] audit: type=1326 audit(1746511331.485:18510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21199 comm="syz.4.6909" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f85d5dbd37c code=0x7ffc0000 [ 470.304623][ T29] audit: type=1326 audit(1746511331.485:18511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21199 comm="syz.4.6909" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f85d5dbd41f code=0x7ffc0000 [ 470.328081][ T29] audit: type=1326 audit(1746511331.485:18512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21199 comm="syz.4.6909" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f85d5dbd5ca code=0x7ffc0000 [ 470.352192][ T29] audit: type=1326 audit(1746511331.485:18513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21199 comm="syz.4.6909" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f85d5dbe969 code=0x7ffc0000 [ 470.376113][ T29] audit: type=1326 audit(1746511331.485:18514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21199 comm="syz.4.6909" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f85d5dbe969 code=0x7ffc0000 [ 470.410154][ T29] audit: type=1326 audit(1746511331.625:18515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21202 comm="syz.0.6910" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd12c2ce969 code=0x7ffc0000 [ 470.434135][ T29] audit: type=1326 audit(1746511331.625:18516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21202 comm="syz.0.6910" exe="/root/syz-executor" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7fd12c2ce969 code=0x7ffc0000 [ 470.488779][ T29] audit: type=1326 audit(1746511331.655:18517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21205 comm="syz.0.6910" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fd12c301225 code=0x7ffc0000 [ 470.512669][ T29] audit: type=1326 audit(1746511331.655:18518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21202 comm="syz.0.6910" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd12c2ce969 code=0x7ffc0000 [ 470.536710][ T29] audit: type=1326 audit(1746511331.655:18519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21202 comm="syz.0.6910" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd12c2ce969 code=0x7ffc0000 [ 470.825857][T21233] 9pnet_fd: Insufficient options for proto=fd [ 470.834332][T21234] 9pnet_fd: Insufficient options for proto=fd [ 471.388799][T21261] 9pnet_fd: Insufficient options for proto=fd [ 471.450196][T21266] 9pnet_fd: Insufficient options for proto=fd [ 471.458991][T21265] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 471.534353][T21265] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 471.639955][T21265] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 471.693260][T21274] __nla_validate_parse: 10 callbacks suppressed [ 471.693277][T21274] netlink: 40 bytes leftover after parsing attributes in process `syz.1.6938'. [ 471.748185][T21265] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 471.776084][T21278] FAULT_INJECTION: forcing a failure. [ 471.776084][T21278] name failslab, interval 1, probability 0, space 0, times 0 [ 471.789010][T21278] CPU: 1 UID: 0 PID: 21278 Comm: syz.0.6940 Not tainted 6.15.0-rc5-syzkaller-00022-g01f95500a162 #0 PREEMPT(voluntary) [ 471.789109][T21278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 471.789123][T21278] Call Trace: [ 471.789128][T21278] [ 471.789136][T21278] __dump_stack+0x1d/0x30 [ 471.789160][T21278] dump_stack_lvl+0xe8/0x140 [ 471.789184][T21278] dump_stack+0x15/0x1b [ 471.789245][T21278] should_fail_ex+0x265/0x280 [ 471.789305][T21278] should_failslab+0x8c/0xb0 [ 471.789342][T21278] kmem_cache_alloc_noprof+0x50/0x310 [ 471.789383][T21278] ? audit_log_start+0x365/0x6c0 [ 471.789420][T21278] audit_log_start+0x365/0x6c0 [ 471.789523][T21278] audit_seccomp+0x48/0x100 [ 471.789547][T21278] ? __seccomp_filter+0x68c/0x10d0 [ 471.789606][T21278] __seccomp_filter+0x69d/0x10d0 [ 471.789631][T21278] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 471.789663][T21278] ? vfs_write+0x75e/0x8d0 [ 471.789694][T21278] __secure_computing+0x82/0x150 [ 471.789750][T21278] syscall_trace_enter+0xcf/0x1e0 [ 471.789780][T21278] do_syscall_64+0xaa/0x1a0 [ 471.789809][T21278] ? clear_bhb_loop+0x25/0x80 [ 471.789895][T21278] ? clear_bhb_loop+0x25/0x80 [ 471.789915][T21278] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 471.789937][T21278] RIP: 0033:0x7fd12c2ce969 [ 471.789955][T21278] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 471.789992][T21278] RSP: 002b:00007fd12a937038 EFLAGS: 00000246 ORIG_RAX: 000000000000012f [ 471.790040][T21278] RAX: ffffffffffffffda RBX: 00007fd12c4f5fa0 RCX: 00007fd12c2ce969 [ 471.790051][T21278] RDX: 00002000000000c0 RSI: 0000000000000000 RDI: ffffffffffffff9c [ 471.790062][T21278] RBP: 00007fd12a937090 R08: 0000000000000000 R09: 0000000000000000 [ 471.790076][T21278] R10: 0000200000000180 R11: 0000000000000246 R12: 0000000000000001 [ 471.790168][T21278] R13: 0000000000000000 R14: 00007fd12c4f5fa0 R15: 00007ffeb9a8a568 [ 471.790192][T21278] [ 472.064602][T21265] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 472.078049][T21265] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 472.104623][T21265] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 472.118783][T21265] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 472.156172][T21284] netlink: 100 bytes leftover after parsing attributes in process `syz.1.6943'. [ 472.234812][T21288] FAULT_INJECTION: forcing a failure. [ 472.234812][T21288] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 472.248895][T21288] CPU: 1 UID: 0 PID: 21288 Comm: syz.2.6944 Not tainted 6.15.0-rc5-syzkaller-00022-g01f95500a162 #0 PREEMPT(voluntary) [ 472.248925][T21288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 472.248951][T21288] Call Trace: [ 472.248960][T21288] [ 472.248969][T21288] __dump_stack+0x1d/0x30 [ 472.248995][T21288] dump_stack_lvl+0xe8/0x140 [ 472.249019][T21288] dump_stack+0x15/0x1b [ 472.249048][T21288] should_fail_ex+0x265/0x280 [ 472.249088][T21288] should_fail+0xb/0x20 [ 472.249123][T21288] should_fail_usercopy+0x1a/0x20 [ 472.249168][T21288] _copy_to_iter+0x380/0xdd0 [ 472.249194][T21288] ? _raw_spin_unlock_irqrestore+0x2b/0x60 [ 472.249232][T21288] __skb_datagram_iter+0xc3/0x680 [ 472.249259][T21288] ? __pfx_simple_copy_to_iter+0x10/0x10 [ 472.249422][T21288] skb_copy_datagram_iter+0x3d/0x110 [ 472.249456][T21288] netlink_recvmsg+0x1ab/0x7f0 [ 472.249562][T21288] ? __pfx_netlink_recvmsg+0x10/0x10 [ 472.249599][T21288] sock_recvmsg+0x136/0x170 [ 472.249629][T21288] ____sys_recvmsg+0xf5/0x280 [ 472.249706][T21288] ___sys_recvmsg+0x11f/0x370 [ 472.249736][T21288] do_recvmmsg+0x1ef/0x540 [ 472.249766][T21288] ? get_timespec64+0xc9/0x100 [ 472.249789][T21288] __x64_sys_recvmmsg+0xfb/0x170 [ 472.249895][T21288] x64_sys_call+0x1c6a/0x2fb0 [ 472.249921][T21288] do_syscall_64+0xd0/0x1a0 [ 472.249946][T21288] ? clear_bhb_loop+0x25/0x80 [ 472.249967][T21288] ? clear_bhb_loop+0x25/0x80 [ 472.250066][T21288] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 472.250089][T21288] RIP: 0033:0x7f3ce08de969 [ 472.250103][T21288] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 472.250121][T21288] RSP: 002b:00007f3cdef47038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 472.250199][T21288] RAX: ffffffffffffffda RBX: 00007f3ce0b05fa0 RCX: 00007f3ce08de969 [ 472.250286][T21288] RDX: 04000000000003b4 RSI: 00002000000037c0 RDI: 0000000000000003 [ 472.250302][T21288] RBP: 00007f3cdef47090 R08: 0000200000003700 R09: 0000000000000000 [ 472.250316][T21288] R10: 0000000002040000 R11: 0000000000000246 R12: 0000000000000001 [ 472.250380][T21288] R13: 0000000000000000 R14: 00007f3ce0b05fa0 R15: 00007ffe7ea7fc78 [ 472.250434][T21288] [ 472.361860][T21296] 9pnet_fd: Insufficient options for proto=fd [ 472.567829][T21292] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6947'. [ 472.625880][T21304] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6949'. [ 472.634923][T21304] netlink: 28 bytes leftover after parsing attributes in process `syz.2.6949'. [ 472.685168][T21304] geneve2: entered promiscuous mode [ 472.690657][T21304] geneve2: entered allmulticast mode [ 472.873453][T21313] netlink: 20 bytes leftover after parsing attributes in process `syz.0.6953'. [ 472.882550][T21313] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6953'. [ 473.058624][T21322] netlink: 100 bytes leftover after parsing attributes in process `syz.2.6957'. [ 473.243943][T21338] netlink: 20 bytes leftover after parsing attributes in process `syz.0.6965'. [ 473.253110][T21338] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6965'. [ 473.402736][T21346] FAULT_INJECTION: forcing a failure. [ 473.402736][T21346] name failslab, interval 1, probability 0, space 0, times 0 [ 473.415447][T21346] CPU: 1 UID: 0 PID: 21346 Comm: syz.0.6968 Not tainted 6.15.0-rc5-syzkaller-00022-g01f95500a162 #0 PREEMPT(voluntary) [ 473.415554][T21346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 473.415566][T21346] Call Trace: [ 473.415572][T21346] [ 473.415579][T21346] __dump_stack+0x1d/0x30 [ 473.415600][T21346] dump_stack_lvl+0xe8/0x140 [ 473.415621][T21346] dump_stack+0x15/0x1b [ 473.415674][T21346] should_fail_ex+0x265/0x280 [ 473.415711][T21346] should_failslab+0x8c/0xb0 [ 473.415749][T21346] kmem_cache_alloc_node_noprof+0x57/0x320 [ 473.415828][T21346] ? __alloc_skb+0x101/0x320 [ 473.415860][T21346] __alloc_skb+0x101/0x320 [ 473.415956][T21346] netlink_alloc_large_skb+0xba/0xf0 [ 473.415990][T21346] netlink_sendmsg+0x3cf/0x6b0 [ 473.416031][T21346] ? __pfx_netlink_sendmsg+0x10/0x10 [ 473.416069][T21346] __sock_sendmsg+0x142/0x180 [ 473.416110][T21346] ____sys_sendmsg+0x31e/0x4e0 [ 473.416138][T21346] ___sys_sendmsg+0x17b/0x1d0 [ 473.416171][T21346] __x64_sys_sendmsg+0xd4/0x160 [ 473.416193][T21346] x64_sys_call+0x2999/0x2fb0 [ 473.416229][T21346] do_syscall_64+0xd0/0x1a0 [ 473.416249][T21346] ? clear_bhb_loop+0x25/0x80 [ 473.416282][T21346] ? clear_bhb_loop+0x25/0x80 [ 473.416305][T21346] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 473.416325][T21346] RIP: 0033:0x7fd12c2ce969 [ 473.416397][T21346] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 473.416417][T21346] RSP: 002b:00007fd12a937038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 473.416440][T21346] RAX: ffffffffffffffda RBX: 00007fd12c4f5fa0 RCX: 00007fd12c2ce969 [ 473.416456][T21346] RDX: 0000000000000000 RSI: 0000200000000300 RDI: 0000000000000004 [ 473.416472][T21346] RBP: 00007fd12a937090 R08: 0000000000000000 R09: 0000000000000000 [ 473.416559][T21346] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 473.416570][T21346] R13: 0000000000000000 R14: 00007fd12c4f5fa0 R15: 00007ffeb9a8a568 [ 473.416646][T21346] [ 474.163296][T19075] ================================================================== [ 474.171430][T19075] BUG: KCSAN: data-race in pollwake / pollwake [ 474.177602][T19075] [ 474.179915][T19075] write to 0xffffc9000157fa00 of 4 bytes by interrupt on cpu 0: [ 474.187538][T19075] pollwake+0xb6/0x100 [ 474.192056][T19075] __wake_up_sync_key+0x4f/0x80 [ 474.196909][T19075] sock_def_readable+0x70/0x190 [ 474.201768][T19075] tcp_data_ready+0x1ab/0x290 [ 474.206480][T19075] tcp_rcv_established+0xce0/0xea0 [ 474.211595][T19075] tcp_v4_do_rcv+0x672/0x740 [ 474.216197][T19075] tcp_v4_rcv+0x1bcf/0x1f60 [ 474.220700][T19075] ip_protocol_deliver_rcu+0x397/0x780 [ 474.226166][T19075] ip_local_deliver_finish+0x184/0x220 [ 474.231631][T19075] ip_local_deliver+0xe8/0x1c0 [ 474.236407][T19075] ip_sublist_rcv+0x56b/0x650 [ 474.241111][T19075] ip_list_rcv+0x261/0x290 [ 474.245530][T19075] __netif_receive_skb_list_core+0x4dc/0x500 [ 474.251508][T19075] netif_receive_skb_list_internal+0x487/0x600 [ 474.257661][T19075] napi_complete_done+0x1a3/0x410 [ 474.262692][T19075] virtnet_poll+0x18bf/0x1d00 [ 474.267385][T19075] __napi_poll+0x63/0x3a0 [ 474.271710][T19075] net_rx_action+0x38e/0x7b0 [ 474.276297][T19075] handle_softirqs+0xb7/0x290 [ 474.280971][T19075] __irq_exit_rcu+0x3a/0xc0 [ 474.285473][T19075] common_interrupt+0x83/0x90 [ 474.290154][T19075] asm_common_interrupt+0x26/0x40 [ 474.295177][T19075] do_syscall_64+0x9a/0x1a0 [ 474.299678][T19075] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 474.305567][T19075] [ 474.307880][T19075] write to 0xffffc9000157fa00 of 4 bytes by task 19075 on cpu 1: [ 474.315584][T19075] pollwake+0xb6/0x100 [ 474.319645][T19075] __wake_up_sync_key+0x4f/0x80 [ 474.324494][T19075] anon_pipe_write+0x8ba/0xaa0 [ 474.329254][T19075] vfs_write+0x49d/0x8d0 [ 474.333486][T19075] ksys_write+0xda/0x1a0 [ 474.337714][T19075] __x64_sys_write+0x40/0x50 [ 474.342296][T19075] x64_sys_call+0x2cdd/0x2fb0 [ 474.346965][T19075] do_syscall_64+0xd0/0x1a0 [ 474.351451][T19075] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 474.357327][T19075] [ 474.359634][T19075] value changed: 0x00000000 -> 0x00000001 [ 474.365332][T19075] [ 474.367640][T19075] Reported by Kernel Concurrency Sanitizer on: [ 474.373776][T19075] CPU: 1 UID: 0 PID: 19075 Comm: syz-executor Not tainted 6.15.0-rc5-syzkaller-00022-g01f95500a162 #0 PREEMPT(voluntary) [ 474.386443][T19075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 474.396580][T19075] ==================================================================