last executing test programs: 9m54.70548421s ago: executing program 32 (id=142): r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'netdevsim0\x00', 0x0}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000003580)={0x0, 0x0, &(0x7f0000003540)={&(0x7f00000034c0)={0x28, r0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40044}, 0x4) 9m2.320584557s ago: executing program 33 (id=1316): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$inet6(0xa, 0x1, 0x0) syz_io_uring_setup(0x8d2, &(0x7f00000000c0)={0x0, 0x951a, 0x3010, 0x0, 0xfffffffe}, &(0x7f0000000040)=0x0, &(0x7f00000001c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=ANY=[], 0xe8}, 0x0, 0x24040092}) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) r6 = socket$inet6(0xa, 0x2, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) sendmmsg$inet6(r6, &(0x7f00000003c0)=[{{&(0x7f0000000100)={0xa, 0x4e24, 0xfffffffe, @mcast2}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000002280)='B', 0x1}], 0x1, &(0x7f0000000740)=ANY=[@ANYBLOB="c00000000000000029000000360000002f14000000000000074800000001100805007f0000000000000009000000000000000100000000000080060014000000000002000000000000000700000000000000080000000000000006000000000000000502000fc20400000006010100040108050200038045fa143e1a106b19c70ea0542d6d63da3d5e395944f9b3a32d7d56f9ac88221c36e246c8dd1b3bbdbc12f0ebac42dabfe74668b9390e9dfe93f026f5442cd566c77fb6b13abd00000014"], 0xd8}}], 0x1, 0x80) 7m10.660557973s ago: executing program 3 (id=3519): r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) close(r1) r2 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x3406c012) ioctl$int_in(r2, 0x5452, &(0x7f00000004c0)=0x1) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000540)={0x0, 0x66bd, 0x0, [0x7, 0x9dd7, 0x2, 0xc, 0x80000000], [0x4, 0x9241, 0x0, 0xe1a, 0x260, 0xcd64, 0x3, 0x5, 0x2, 0x8000000000000000, 0x7ff, 0x3, 0x6, 0x7, 0x5, 0x0, 0x200, 0x9fc2, 0x4, 0x1a3, 0x6, 0x100, 0x3, 0x800, 0x4a67, 0x4, 0x1, 0x2, 0x7ff, 0x8, 0x3, 0x8, 0xffffffffffffff81, 0x8000, 0x6, 0x3, 0x1, 0x7, 0x5, 0x5, 0x4, 0x5, 0x400, 0x5, 0xfffffffffffffbff, 0xffffffff, 0x7, 0x9, 0x3, 0x2, 0x1a, 0xfffffffffffff000, 0x6, 0x7, 0x1, 0x401, 0x9, 0x8, 0x4, 0x8380, 0x9e, 0x2f1, 0xd48, 0x2, 0x0, 0xe, 0x8, 0x9, 0x7, 0x7, 0xc4, 0x0, 0x7fffffffffffffff, 0x80000001, 0x0, 0x9, 0x2, 0x729, 0x1, 0x6, 0x3, 0x6, 0x4, 0x7, 0x1, 0xce, 0x2, 0x205, 0x24c0000, 0x8001, 0x0, 0x9, 0x4, 0x1, 0x6, 0x1, 0x40, 0x2f, 0x200, 0x2, 0x8, 0x7, 0xca, 0x3, 0x3, 0x5, 0xe, 0x32a003a9, 0xc3, 0x8, 0x400, 0x68e, 0x200, 0x3, 0x6, 0x4, 0xfffffffffffffffb, 0x9, 0x3fffffffc00000, 0x4, 0xffffffff]}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000980)={r3, 0x0, 0x0, 0x1}) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) syz_emit_ethernet(0x83, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c80)=ANY=[], 0xe0}, 0x20004065) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x6}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_PEER_GET(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d030000000000000000130000001c000980080002"], 0x30}}, 0x0) 7m10.577844799s ago: executing program 3 (id=3522): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a00000709000100"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x64}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) 7m10.550981351s ago: executing program 3 (id=3523): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYRES64=r1], 0x0}, 0x94) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) socket$netlink(0x10, 0x3, 0x2) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x3c}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x220, 0x100, 0x0) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="4c000000020681010000000000000000000000000500050002000000050001000700000005000400030000000900020073797a310000000011000300686173683a6e65742c6e6574"], 0x4c}, 0x1, 0x0, 0x0, 0x4040000}, 0x800) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="50000000090601020000000000000000030000000900020073797a31000000000500010007000000280007800c00018008000140ffffffff0c00148008000140ac1414bb0c0002800800014064110101"], 0x50}, 0x1, 0x0, 0x0, 0xd24f4d5778621d46}, 0x4) r7 = socket$caif_seqpacket(0x25, 0x5, 0x0) sendmsg$inet(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000680)}, 0x94) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[@ANYRES64=0x0], 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000"], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r8}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0xb, &(0x7f00000004c0)=ANY=[@ANYRES32=r5], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x0, 0x0, &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[], 0x0) close_range(r4, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r3}, 0x10) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x2400, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) 7m9.297610632s ago: executing program 3 (id=3533): syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file2\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x36e, &(0x7f00000007c0)="$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") openat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x105042, 0x40) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) io_setup(0x3, &(0x7f0000000340)) (async) io_setup(0x3, &(0x7f0000000340)=0x0) io_cancel(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x5, 0x58a, r1, &(0x7f0000000500)="31c29075ddfa959ff93fa313cb9496aea4ca95b431f71d371214ed8a7cff9547787e5fec4e064beef6894fc30a56aa3292e8da7d6477048b1911011ca767decb4b276f4a812a17bc789796ae74f235e6bc0a90e741acd5cde9834d5d2d5c4dfb969b30590433e4a229252dd23201951cfc14a1a758ca1bd57b09683535c68521", 0xb1, 0x3a, 0x0, 0x3}, &(0x7f0000000740)) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="020000000400000008000000010000008000910e81f836a975449e1d7e9efd447a", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r4}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r4}, 0x18) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1800403, &(0x7f0000000940), 0x2, 0x5ad, &(0x7f0000000180)="$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") sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000100001000000f5ffffffffffffff000a14000000060a0000000000000000000002"], 0x3c}}, 0x0) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f0000000000)='\x06\x00\x00\x00\x04\xb0\xfe\x98\x9a!s\x91]\xab\xc9\xa2IV\xb6-\xd9z\x81\x91\x8aP}I\xc6\x0e\xd9\v\xda\xbfS\x16 \x04\r\xcd\xdb:\xd4\xaf\r\x11\xa0\xd7\xd7\xb6\x9bz\x99\xaf\xfd\x87fN\xad\x90U\xb4A\xdf\xabB\xbba\x7f\xb8\x96\x1a\xe7\xc1\xab\x16\x02\x000xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = syz_pidfd_open(r1, 0x0) setns(r5, 0x24020000) syz_clone(0xf5982500, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) 1m3.18927308s ago: executing program 8 (id=8593): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r3, &(0x7f0000000740)=@pppol2tpv3={0x18, 0x1, {0x3, r4, {0x2, 0x4e24, @broadcast}, 0x2, 0x0, 0x4}}, 0x2e) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r3, 0x0, 0x0) sendmsg$nl_generic(r2, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="200000001000010700000000200000000a0000000c0002006e6c3830323131"], 0x20}}, 0x0) recvmmsg(r2, &(0x7f0000001580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001440)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000011c0)=""/70, 0x46}, {&(0x7f00000000c0)=""/43, 0x2b}, {0x0}], 0x3}, 0x1801}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r1, 0x0) r5 = socket$unix(0x1, 0x2, 0x0) bind$unix(r5, &(0x7f0000003000)=@abs={0x1, 0x0, 0x4e21}, 0x6e) bind$unix(0xffffffffffffffff, 0x0, 0x0) unshare(0x20040600) r6 = socket$l2tp6(0xa, 0x2, 0x73) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x4e21, 0x1, @private1, 0x1000}, 0x1c) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x6000) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='kmem_cache_free\x00', r7}, 0x10) rename(0x0, 0x0) r8 = socket$kcm(0x10, 0x2, 0x0) io_setup(0x30, &(0x7f0000000600)=0x0) r10 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000002740), 0x101002) io_submit(r9, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r10, &(0x7f00000000c0)="01", 0x24}]) io_submit(r9, 0x1, &(0x7f0000000240)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x3, 0x1, r8, &(0x7f00000001c0)="7574c78b460d830f98ace6843d118592814142d2a612fba5e09f89063f0809485393c0cddcb0ac4cae2ef4be2d89f616e86a2715fa8741d04c47ef6a2d1edea562be883044ee3463cb46d4f6a9dbb778a2afc32d8d1aafc577e0f77fae682347a645536cb9", 0x65, 0xf, 0x0, 0x1}]) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b34, &(0x7f0000000000)={'wlan1\x00', @random="0000230c1100"}) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[@ANYBLOB="25390000290003"], 0x33fe0) sendmsg$DEVLINK_CMD_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="ddffffff", @ANYRES16=0x0, @ANYBLOB="000428bd7000fbdbdf25010000000e0001006e657464657673696d0000000f0002006e657464657673696d300000"], 0x34}, 0x1, 0x0, 0x0, 0x4001}, 0x804) 1m2.974256427s ago: executing program 8 (id=8598): r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100)=0xffffffffffffffff, 0x4) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, r0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r1}, 0x10) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r2, 0x800448d5, 0x0) bind$bt_hci(r2, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x180, 0x4, 0x28}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000003e40), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r5, &(0x7f0000004080)={0x0, 0x0, &(0x7f0000004040)={&(0x7f0000003e80)={0x28, r6, 0x1, 0x78bd2d, 0x25dfdbff, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) r9 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000001c0)={'sit0\x00', 0x0}) sendmsg$nl_route_sched(r9, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, r10, {0x0, 0x6}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x14, 0x2, [@TCA_GRED_DPS={0x10, 0x3, {0x10, 0x1}}]}}, @TCA_RATE={0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x48801}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r11 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x20040084) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x4000080) r12 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(0x0, r12) bpf$MAP_CREATE(0x0, 0x0, 0x50) syz_mount_image$ext4(&(0x7f0000001280)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x0, &(0x7f0000001080), 0x1, 0x4fe, &(0x7f0000000a40)="$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") openat(0xffffffffffffff9c, 0x0, 0x42, 0x46) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x18) syz_clone(0x9100000, 0x0, 0x0, 0x0, 0x0, 0x0) 1m2.754563975s ago: executing program 8 (id=8601): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc0004}]}) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='kmem_cache_free\x00', r1, 0x0, 0x100000000}, 0x18) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x11, 0x10, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) socket$inet(0x2, 0x2, 0x1) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01040000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000000900010073797a30000000000900030073797a310000000080010000060a01040000000000000000010000000900020073797a310000000038000480340001800c00010062697477697365002400028008000340000000040800024000000000080006400000000008000140000000000900010073797a30"], 0x1f4}}, 0x0) 1m2.052208991s ago: executing program 8 (id=8613): capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'\x00', 0x8000}) perf_event_open(0x0, 0x0, 0xb, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port0\x00', 0x62, 0x51cfa, 0x0, 0x8000008, 0x3, 0xfffffffe, 0x1, 0x0, 0x7cce8c743ee810df}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x40505330, &(0x7f00000001c0)={0x800100, 0xfffffffd, 0x22, 0x6, 0x1101, 0x1}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x40505330, &(0x7f0000000500)={0x800000, 0x210002, 0xffffffdd, 0x7fffffff, 0x2, 0x69}) 1m2.040195282s ago: executing program 36 (id=8613): capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'\x00', 0x8000}) perf_event_open(0x0, 0x0, 0xb, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port0\x00', 0x62, 0x51cfa, 0x0, 0x8000008, 0x3, 0xfffffffe, 0x1, 0x0, 0x7cce8c743ee810df}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x40505330, &(0x7f00000001c0)={0x800100, 0xfffffffd, 0x22, 0x6, 0x1101, 0x1}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x40505330, &(0x7f0000000500)={0x800000, 0x210002, 0xffffffdd, 0x7fffffff, 0x2, 0x69}) 59.876640715s ago: executing program 7 (id=8644): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x50, 0x10, 0x40d, 0x70bd2a, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_BC_QUEUE_LEN={0x8, 0x9, 0x2}]}}}, @IFLA_ALT_IFNAME={0x14, 0x35, 'macvlan0\x00'}]}, 0x50}}, 0xc000) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x12) socket$nl_route(0x10, 0x3, 0x0) (async) sendmsg$nl_route(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x50, 0x10, 0x40d, 0x70bd2a, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_BC_QUEUE_LEN={0x8, 0x9, 0x2}]}}}, @IFLA_ALT_IFNAME={0x14, 0x35, 'macvlan0\x00'}]}, 0x50}}, 0xc000) (async) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x12) (async) 59.829898959s ago: executing program 7 (id=8645): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) sendmsg$nl_route(r0, 0x0, 0x0) 59.724603338s ago: executing program 7 (id=8648): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/13], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000c40)=[{}, {0x0, 0x4}, {0x0, 0x4, 0x10009, 0x5}], 0x10, 0xfffffff7}, 0x94) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c01803002d000b12d25a80648c2594f90124fc60100c020000040000053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 59.412735003s ago: executing program 7 (id=8651): r0 = syz_open_dev$sg(&(0x7f0000001600), 0x0, 0x40042) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f0000000480)=ANY=[], 0x125) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x80) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3d, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffdbd}]}) umount2(&(0x7f00000000c0)='./file0\x00', 0x4) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_mount_image$vfat(&(0x7f0000000580), &(0x7f0000000180)='./file0\x00', 0x1000802, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e6f6e756d7461696c3d302c6e6f6e756d7461696c003130dbbb3121258e322c262b537f5d0000006e695f7804590000000000003d312c696f63686172538c6c90392bc69373686f72746e616d65653ff959f53d6d697865642c636f6465706167653d3821332c696f6368617273650000000031323831e54f1bb0a3d72c007e3db5a829498e2a721ae5804ff8ccb41eff157cfdfcef90a6010100003ceeeac934b3165b4a0ea182cdd0666ab32f2d041a99ac9fc865ba946f1bb7759d02742dfcc68937ff86d7a54d6de8823119c767d45d6047209f4436383ee21373a9c3f450cb6d7c37b59a34407d4a0e6a382108ddd52580281f1d8ad71c4ceafb49960f1429b090d1429f519f9c2b0cb88ffa6fc04fa61c275bf560b9eeeb2d0c8b3ddeb56783f9908c21cf9b2ba0b76b9b60c991bb17c7d0accad1cdaf3259b7dc405d72e2bc3abe0cf37bda3dbfc05e2e55f8aa272b5ea736019c3c0a9b34115a445e0c5da1bd7352ec9529f5caa71f1ae71b36b500c79fffb487ed081232b5d93d3162c7f71f4d5756c9e5442fa3692127266a0c15dac9171edda86b148d17a48d4d90470e79620eeab5acf6f78f807298315e2b80fe1874098d75ab47837a96699e2a7db456f2a4368bece813135ed970951c7471ac16703820a799421cb24f32a5f49ab45bec637c38bcbdae4da3a05f96b2162c47d0b1277e1b1bcc981cce8f6f7f3dd8d06352eb387997b498a732d8442115755ff14d508891abd401b3cafcba75a6901fbe08002674d8663b8c40e9cf13fa4c4a092cb8004a1d2a6fe18cd5d702493d52a7110b17e64b9fa22fb3ace98b9ca35cb98c65f0902dd430373f6ae43c4a60c423b6f65b5ecc2093698072abc857ab2d36a261a7fc5776d39c3d5d5fad291c88ff9726d5ee32c6bcac1799ade9459eb39b56d985d29b988c72c9ad7e82b589f454a58d7cd5ace9436cf69acc217737c863d8938cc95767a0c9b14cb79f5b45ea2408d1da65a2ed8cf55a"], 0x4, 0x24e, &(0x7f0000000a00)="$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") ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000040)) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000400)={0x3}, 0x10) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="640000001600010000000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="14000100fc00000000000000000000000000000114000200ff02000000000000000000000000000108000800080400001400060005000000070000000080000036000000080009"], 0x64}}, 0x24008818) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xe, 0x4, 0x4, 0x6, 0x0, 0x1}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = syz_clone(0x300, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000180)={r2, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[0x45c], 0x0, 0x0, 0x1, 0x1, r3}}, 0x40) r4 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f00000003c0)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x1, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000340)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x5a}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "f900f5", 0x14, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 59.31831888s ago: executing program 7 (id=8653): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc0004}]}) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='kmem_cache_free\x00', r1, 0x0, 0x100000000}, 0x18) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x11, 0x10, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01040000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000000900010073797a30000000000900030073797a310000000080010000060a01040000000000000000010000000900020073797a310000000038000480340001800c00010062697477697365002400028008000340000000040800024000000000080006400000000008000140000000000900010073797a30"], 0x1f4}}, 0x0) 58.852082758s ago: executing program 9 (id=8614): r0 = syz_open_dev$sg(&(0x7f0000001600), 0x0, 0x40042) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f0000000480)=ANY=[], 0x125) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x80) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3d, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffdbd}]}) umount2(&(0x7f00000000c0)='./file0\x00', 0x4) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_mount_image$vfat(&(0x7f0000000580), &(0x7f0000000180)='./file0\x00', 0x1000802, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x4, 0x24e, &(0x7f0000000a00)="$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") ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000040)) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000400)={0x3}, 0x10) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="640000001600010000000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="14000100fc00000000000000000000000000000114000200ff02000000000000000000000000000108000800080400001400060005000000070000000080000036000000080009"], 0x64}}, 0x24008818) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xe, 0x4, 0x4, 0x6, 0x0, 0x1}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = syz_clone(0x300, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000180)={r2, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[0x45c], 0x0, 0x0, 0x1, 0x1, r3}}, 0x40) r4 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r4, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000340)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x5a}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "f900f5", 0x14, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 58.674324052s ago: executing program 9 (id=8661): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/13], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000c40)=[{}, {0x0, 0x4}, {0x0, 0x4, 0x10009, 0x5}], 0x10, 0xfffffff7}, 0x94) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c01803002d000b12d25a80648c2594f90124fc60100c020000040000053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 58.064424551s ago: executing program 7 (id=8664): r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) read$qrtrtun(r0, 0x0, 0xeffd) 58.064237931s ago: executing program 37 (id=8664): r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) read$qrtrtun(r0, 0x0, 0xeffd) 56.44677233s ago: executing program 9 (id=8675): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc0004}]}) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='kmem_cache_free\x00', r1, 0x0, 0x100000000}, 0x18) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x11, 0x10, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01040000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000000900010073797a30000000000900030073797a310000000080010000060a01040000000000000000010000000900020073797a310000000038000480340001800c00010062697477697365002400028008000340000000040800024000000000080006400000000008000140000000000900010073797a30"], 0x1f4}}, 0x0) 56.424652962s ago: executing program 38 (id=8675): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc0004}]}) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='kmem_cache_free\x00', r1, 0x0, 0x100000000}, 0x18) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x11, 0x10, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01040000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000000900010073797a30000000000900030073797a310000000080010000060a01040000000000000000010000000900020073797a310000000038000480340001800c00010062697477697365002400028008000340000000040800024000000000080006400000000008000140000000000900010073797a30"], 0x1f4}}, 0x0) 2.87871839s ago: executing program 1 (id=9605): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r3, &(0x7f0000000740)=@pppol2tpv3={0x18, 0x1, {0x3, r4, {0x2, 0x4e24, @broadcast}, 0x2, 0x0, 0x4}}, 0x2e) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r3, 0x0, 0x0) sendmsg$nl_generic(r2, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="200000001000010700000000200000000a0000000c0002006e6c3830323131"], 0x20}}, 0x0) recvmmsg(r2, &(0x7f0000001580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001440)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000011c0)=""/70, 0x46}, {&(0x7f00000000c0)=""/43, 0x2b}, {0x0}], 0x3}, 0x1801}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r1, 0x0) r5 = socket$unix(0x1, 0x2, 0x0) bind$unix(r5, &(0x7f0000003000)=@abs={0x1, 0x0, 0x4e21}, 0x6e) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) unshare(0x20040600) r6 = socket$l2tp6(0xa, 0x2, 0x73) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x4e21, 0x1, @private1, 0x1000}, 0x1c) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x6000) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) rename(0x0, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) io_setup(0x30, 0x0) r8 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000002740), 0x101002) io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r8, &(0x7f00000000c0)="01", 0x24}]) io_submit(0x0, 0x1, &(0x7f0000000240)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x3, 0x1, r7, &(0x7f00000001c0)="7574c78b460d830f98ace6843d118592814142d2a612fba5e09f89063f0809485393c0cddcb0ac4cae2ef4be2d89f616e86a2715fa8741d04c47ef6a2d1edea562be883044ee3463cb46d4f6a9dbb778a2afc32d8d1aafc577e0f77fae682347a645", 0x62, 0xf, 0x0, 0x1}]) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b34, &(0x7f0000000000)={'wlan1\x00', @random="0000230c1100"}) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[@ANYBLOB="25390000290003"], 0x33fe0) sendmsg$DEVLINK_CMD_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="ddffffff", @ANYRES16=0x0, @ANYBLOB="000428bd7000fbdbdf25010000000e0001006e657464657673696d0000000f0002006e657464657673696d300000"], 0x34}, 0x1, 0x0, 0x0, 0x4001}, 0x804) 2.762759409s ago: executing program 1 (id=9610): socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc680000000c0a010100000000000000000a0000070900020073797a31000000000900010073797a31000000003c0003803800008008000340000000022c0007800a0001006c696d69740000001c0002800c00024000000000000000050c000140000000000000000414000000110001"], 0xcc}, 0x1, 0x0, 0x0, 0x24000850}, 0x40) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$sysfs(0xffffff9c, &(0x7f00000037c0)='/sys/kernel/notes', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x275a, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) unshare(0x28000600) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x1, 0x6}, 0x2, 0x0, 0x2, 0x5, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @multicast1}}, 0x14) r6 = inotify_init1(0x800) inotify_add_watch(r6, &(0x7f0000000100)='./cgroup\x00', 0x24000042) close_range(r4, 0xffffffffffffffff, 0x2) fcntl$lock(r3, 0x24, &(0x7f00000000c0)={0x0, 0x3, 0x9, 0x8f}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r1}, &(0x7f00000008c0), &(0x7f0000000880)=r7}, 0x20) close(r0) mq_unlink(0x0) 2.439614155s ago: executing program 1 (id=9618): bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000000e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000002800000a28000000000a010800000000000000000200000908000240000000020900010073797a310000000040000000030a01030000000000000000020000060900010073797a31000000000900030073797a300000000f1400048008000140000000030800024000000064140000001100010000000000000000000000000a"], 0x90}, 0x1, 0x0, 0x0, 0x24000144}, 0x2000) close(r3) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r4, 0x0) io_uring_enter(0xffffffffffffffff, 0x212e, 0xb392, 0x20, &(0x7f0000000540)={[0x5]}, 0x8) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x8) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[@ANYRESDEC=r2, @ANYRESHEX=r4, @ANYRES16=r1, @ANYRESHEX=r1], &(0x7f00000001c0)='GPL\x00', 0xc60, 0x0, 0x0, 0x41100, 0x1e, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='page_pool_state_release\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x6, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="180200000000000000000000005a8e7c56d4c087aa009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x0, 0x15c, 0x0, &(0x7f0000000bc0)="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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x4000}, 0x50) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0xc, &(0x7f0000000d40)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYRESHEX, @ANYRES16=r0, @ANYRES64=0x0], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) io_setup(0x58, &(0x7f00000001c0)) write(0xffffffffffffffff, 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x180, 0x0) 2.361856992s ago: executing program 1 (id=9621): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x4000000) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000340)={r2, 0x3, 0x4, 0x4}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r6, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x4000000) 1.442510075s ago: executing program 4 (id=9630): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000380), &(0x7f0000000400)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x18) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x2, &(0x7f0000002400)=0x0) io_submit(r7, 0x1, &(0x7f0000001c00)=[&(0x7f0000000400)={0x2000000000, 0x4, 0x0, 0x1, 0x0, r6, &(0x7f0000000040)="5400ffff0000", 0x6, 0x0, 0x0, 0x2}]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x200102, 0x20) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000007c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x1000000, {0x0, 0x0, 0x0, 0x0, {0x9}, {0xffff}, {0xe, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x1}}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x691, 0x0, 0x0, 0x1, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x8c0}, 0x0) 855.850422ms ago: executing program 4 (id=9641): socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc680000000c0a010100000000000000000a0000070900020073797a31000000000900010073797a31000000003c0003803800008008000340000000022c0007800a0001006c696d69740000001c0002800c00024000000000000000050c000140000000000000000414000000110001"], 0xcc}, 0x1, 0x0, 0x0, 0x24000850}, 0x40) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$sysfs(0xffffff9c, &(0x7f00000037c0)='/sys/kernel/notes', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x275a, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) unshare(0x28000600) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x1, 0x6}, 0x2, 0x0, 0x2, 0x5, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @multicast1}}, 0x14) r6 = inotify_init1(0x800) inotify_add_watch(r6, &(0x7f0000000100)='./cgroup\x00', 0x24000042) close_range(r4, 0xffffffffffffffff, 0x2) fcntl$lock(r3, 0x24, &(0x7f00000000c0)={0x0, 0x3, 0x9, 0x8f}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r1}, &(0x7f00000008c0), &(0x7f0000000880)=r7}, 0x20) mq_unlink(0x0) 807.320136ms ago: executing program 1 (id=9644): bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000002800000a28000000000a010800000000000000000200000908000240000000020900010073797a310000000040000000030a01030000000000000000020000060900010073797a31000000000900030073797a300000000f14000480080001400000000308000240000000641400000011000100"/143], 0x90}, 0x1, 0x0, 0x0, 0x24000144}, 0x2000) close(r0) 792.761777ms ago: executing program 1 (id=9646): socket(0x10, 0x3, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x4004743d, 0x110e22fff6) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000001c000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) socket$rxrpc(0x21, 0x2, 0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000008000000070000000900000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000ff0f00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x80, 0x5, 0x7fff0003}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000400)) 787.233948ms ago: executing program 4 (id=9647): r0 = socket(0x23, 0x0, 0x6) socket$nl_netfilter(0x10, 0x3, 0xc) write(r0, &(0x7f0000000000)="240000001a005f0214f9f407000904000a000000fe0000000000000008000f00fd000000", 0x85) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ff9}]}) r1 = shmget$private(0x0, 0x3000, 0x28d, &(0x7f00003e4000/0x3000)=nil) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000000)={{0x2, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x0, 0xff7e, 0x0, 0xffffffffffffffff, 0x2280}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="010000000000000000"], 0x2c}}, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) bpf$PROG_LOAD(0x5, 0x0, 0x0) 602.629752ms ago: executing program 2 (id=9655): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00"/11], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x8401) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000b40)={'\x00', 0x7ff, 0x5, 0xc, 0xfffffffffffffffd, 0x59c, 0xffffffffffffffff}) ioctl$SG_BLKTRACETEARDOWN(r2, 0x1276, 0x0) 521.972749ms ago: executing program 5 (id=9658): r0 = syz_open_dev$sg(&(0x7f0000001600), 0x0, 0x40042) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f0000000480)=ANY=[], 0x125) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x80) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3d, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffdbd}]}) umount2(&(0x7f00000000c0)='./file0\x00', 0x4) umount2(0x0, 0x4) syz_mount_image$vfat(&(0x7f0000000580), &(0x7f0000000180)='./file0\x00', 0x1000802, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e6f6e756d7461696c3d302c6e6f6e756d7461696c003130dbbb3121258e322c262b537f5d0000006e695f7804590000000000003d312c696f63686172538c6c90392bc69373686f72746e616d65653ff959f53d6d697865642c636f6465706167653d3821332c696f6368617273650000000031323831e54f1bb0a3d72c007e3db5a829498e2a721ae5804ff8ccb41eff157cfdfcef90a6010100003ceeeac934b3165b4a0ea182cdd0666ab32f2d041a99ac9fc865ba946f1bb7759d02742dfcc68937ff86d7a54d6de8823119c767d45d6047209f4436383ee21373a9c3f450cb6d7c37b59a34407d4a0e6a382108ddd52580281f1d8ad71c4ceafb49960f1429b090d1429f519f9c2b0cb88ffa6fc04fa61c275bf560b9eeeb2d0c8b3ddeb56783f9908c21cf9b2ba0b76b9b60c991bb17c7d0accad1cdaf3259b7dc405d72e2bc3abe0cf37bda3dbfc05e2e55f8aa272b5ea736019c3c0a9b34115a445e0c5da1bd7352ec9529f5caa71f1ae71b36b500c79fffb487ed081232b5d93d3162c7f71f4d5756c9e5442fa3692127266a0c15dac9171edda86b148d17a48d4d90470e79620eeab5acf6f78f807298315e2b80fe1874098d75ab47837a96699e2a7db456f2a4368bece813135ed970951c7471ac16703820a799421cb24f32a5f49ab45bec637c38bcbdae4da3a05f96b2162c47d0b1277e1b1bcc981cce8f6f7f3dd8d06352eb387997b498a732d8442115755ff14d508891abd401b3cafcba75a6901fbe08002674d8663b8c40e9cf13fa4c4a092cb8004a1d2a6fe18cd5d702493d52a7110b17e64b9fa22fb3ace98b9ca35cb98c65f0902dd430373f6ae43c4a60c423b6f65b5ecc2093698072abc857ab2d36a261a7fc5776d39c3d5d5fad291c88ff9726d5ee32c6bcac1799ade9459eb39b56d985d29b988c72c9ad7e82b589f454a58d7cd5ace9436cf69acc217737c863d8938cc95767a0c9b14cb79f5b45ea2408d1da65a2ed8cf55a"], 0x4, 0x24e, &(0x7f0000000a00)="$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") ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000040)) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000400)={0x3}, 0x10) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="640000001600010000000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="14000100fc00000000000000000000000000000114000200ff02000000000000000000000000000108000800080400001400060005000000070000000080000036000000080009"], 0x64}}, 0x24008818) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xe, 0x4, 0x4, 0x6, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r2, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000003c0)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x1, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000340)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x5a}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "f900f5", 0x14, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 454.211744ms ago: executing program 2 (id=9660): shmget$private(0x0, 0x13000, 0x1, &(0x7f0000feb000/0x13000)=nil) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x1000c16, &(0x7f0000000500), 0xff, 0x260, &(0x7f0000000980)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file1\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="02000000010000000000f400040000000000000020"], 0x1c, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x439, 0x70bd2a, 0xffffffea, {0x0, 0x0, 0xe403, 0x0, 0x3, 0x600c3}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @sit={{0x8}, {0x20, 0x2, 0x0, 0x1, [@IFLA_IPTUN_6RD_PREFIX={0x14, 0xb, @dev={0xfe, 0x80, '\x00', 0x15}}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x35}}]}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x4008040) mkdir(&(0x7f0000000240)='./file1/file1\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="0200000001000400000000000400030000000000100003000000020020"], 0x24, 0x1) r3 = request_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='\x00', 0xfffffffffffffff8) r4 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000007c0)=@newqdisc={0x8c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r5, {0x0, 0xfff2}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x5c, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x8], 0x0, [0x8, 0x4, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x400, 0x0, 0x1], [0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200]}}]}}]}, 0x8c}}, 0x8000) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.bfq.io_queued_recursive\x00', 0x275a, 0x0) utimensat(r7, 0x0, &(0x7f0000000080)={{}, {0x77359400}}, 0x0) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x3}, 0x50) r9 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = openat$null(0xffffffffffffff9c, &(0x7f0000000540), 0x80, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x13, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffff}, {}, {}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x6}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000001c0)='GPL\x00', 0xfffffffb, 0xe2, &(0x7f0000000380)=""/226, 0x41100, 0x1, '\x00', r5, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x4, 0x10, 0xa, 0x7}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000580)=[r8, r9, r10], &(0x7f00000005c0)=[{0x4, 0x1, 0x3, 0xb}, {0x4, 0x2, 0xa, 0xc}, {0x0, 0x5, 0x3, 0x6}, {0x3, 0x2, 0xa, 0xa}], 0x10, 0xe}, 0x94) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f00000000c0)='syzkaller\x00', 0x0) 434.373776ms ago: executing program 5 (id=9661): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='sys_enter\x00', r0}, 0x18) msgget(0x0, 0x366) 408.498428ms ago: executing program 0 (id=9662): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x1) set_mempolicy_home_node(&(0x7f0000146000/0x1000)=nil, 0x1000, 0x0, 0x0) 385.00731ms ago: executing program 5 (id=9663): bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000000e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000002800000a28000000000a010800000000000000000200000908000240000000020900010073797a310000000040000000030a01030000000000000000020000060900010073797a31000000000900030073797a300000000f1400048008000140000000030800024000000064140000001100010000000000000000000000000a"], 0x90}, 0x1, 0x0, 0x0, 0x24000144}, 0x2000) close(r3) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r4, 0x0) io_uring_enter(0xffffffffffffffff, 0x212e, 0xb392, 0x20, &(0x7f0000000540)={[0x5]}, 0x8) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x8) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=ANY=[@ANYRESDEC=r2, @ANYRESHEX=r4, @ANYRES16=r1, @ANYRESHEX=r1], &(0x7f00000001c0)='GPL\x00', 0xc60, 0x0, 0x0, 0x41100, 0x1e, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='page_pool_state_release\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x6, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="180200000000000000000000005a8e7c56d4c087aa009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x0, 0x15c, 0x0, &(0x7f0000000bc0)="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", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x4000}, 0x50) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0xc, &(0x7f0000000d40)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYRESHEX, @ANYRES16=r0, @ANYRES64=0x0], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) io_setup(0x58, &(0x7f00000001c0)) write(0xffffffffffffffff, 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000031c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x180, 0x0) 371.67493ms ago: executing program 0 (id=9664): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/13], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000", @ANYBLOB='\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000c40)=[{}, {0x0, 0x4}, {0x0, 0x4, 0x10009, 0x5}], 0x10, 0xfffffff7}, 0x94) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c01803002d000b12d25a80648c2594f90124fc60100c02", 0x17}], 0x1}, 0x0) 324.496774ms ago: executing program 2 (id=9665): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0x8000000000000001, 0xffffffff}, 0x723, 0x10000, 0x0, 0x7, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x7fffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={0xffffffffffffffff, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x32600) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)=@generic={&(0x7f0000000380)='./file0\x00'}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000005c0)={{0x1}, &(0x7f0000000540), 0x0}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1f00, 0x0}) 308.891136ms ago: executing program 5 (id=9666): r0 = socket$packet(0x11, 0x2, 0x300) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000200100000102"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x6, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="00000100", 0x4, 0x404c0d5, &(0x7f0000000080)={0x11, 0x8100, r3, 0x1, 0xfb}, 0x14) 215.984013ms ago: executing program 0 (id=9667): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d0000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000040000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001900)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x18) io_pgetevents(0x0, 0x4, 0x4, &(0x7f0000000200)=[{}, {}, {}, {}], 0x0, 0x0) 168.598777ms ago: executing program 4 (id=9668): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000de0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netlink_extack\x00', r0}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='./file1\x00', 0x3000846, &(0x7f0000000440)={[{@noquota}, {@data_err_abort}, {@abort}, {@dioread_lock}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@data_err_ignore}, {@grpquota}, {@grpquota}, {@user_xattr}, {@bh}, {@noload}]}, 0x1, 0x553, &(0x7f0000000a40)="$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") sched_setscheduler(0x0, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r4}, 0x10) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x20800, 0x0) ioctl$RTC_UIE_ON(r5, 0x7003) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0f000000040000000400000001"], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r7, 0x58, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r8}, 0xc) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r8, 0x10001, 0x10}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r9, &(0x7f0000000240)="3adfb0adc32e63c045d248ebfe932e8086c60aab0dbfcba755682d4538f3b59af98fa4838b54f6c9928b0cdefc3264db3c48e16b278d95163959ce54a3fcc7a13ae5a17025296fc4d597c7d68b541eb4e00ce77558b04b578ab9d8db4ddf559d22bb5a17404ffb0384ded88952db23ec37f69c7653bba7ff3468fa939eb46c7d78802585a152a3d37798f34dbcb9109f", &(0x7f0000000300)=""/167, 0x4}, 0x20) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000001900010000000000000000001c"], 0x24}}, 0x4000000) 85.783774ms ago: executing program 0 (id=9669): socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc680000000c0a010100000000000000000a0000070900020073797a31000000000900010073797a31000000003c0003803800008008000340000000022c0007800a0001006c696d69740000001c0002800c00024000000000000000050c000140000000000000000414000000110001"], 0xcc}, 0x1, 0x0, 0x0, 0x24000850}, 0x40) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$sysfs(0xffffff9c, &(0x7f00000037c0)='/sys/kernel/notes', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x275a, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) unshare(0x28000600) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x1, 0x6}, 0x2, 0x0, 0x2, 0x5, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f00000001c0)={@ipv4={'\x00', '\xff\xff', @multicast1}}, 0x14) r6 = inotify_init1(0x800) inotify_add_watch(r6, &(0x7f0000000100)='./cgroup\x00', 0x24000042) close_range(r4, 0xffffffffffffffff, 0x2) fcntl$lock(r3, 0x24, &(0x7f00000000c0)={0x0, 0x3, 0x9, 0x8f}) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r1}, &(0x7f00000008c0), &(0x7f0000000880)=r7}, 0x20) close(r0) mq_unlink(&(0x7f0000000000)='GPL\x00') syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) 72.658375ms ago: executing program 2 (id=9670): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)='%pS \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 71.941375ms ago: executing program 5 (id=9671): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5ba}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r0, 0x0, 0x3}, 0x18) (async) r1 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r1, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x0, 0x4}}, 0x10) (async) listen(r1, 0x0) (async, rerun: 64) r2 = socket$tipc(0x1e, 0x5, 0x0) (rerun: 64) sendmsg$tipc(r2, &(0x7f0000002300)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x0, {0x4e22, 0x1}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x44}, 0x4) (async) sendmsg$tipc(r2, &(0x7f00000002c0)={&(0x7f0000000080)=@nameseq={0x1e, 0x2, 0x0, {0x41}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x480c0}, 0x0) (async, rerun: 32) accept4(r1, 0x0, 0x0, 0x400000000000000) (async, rerun: 32) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) r6 = socket(0x10, 0x3, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x8, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x5}, 0x2004c000) (async) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019f00000000000000000a000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) (async, rerun: 64) sendmmsg(r6, &(0x7f0000000000), 0x4000000000001f2, 0x0) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='ext4_ext_load_extent\x00', r3}, 0x18) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9}}, './file0\x00'}) (async) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x100000b, 0x12011, 0xffffffffffffffff, 0x0) 42.971167ms ago: executing program 4 (id=9672): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r0, 0x0, 0xbfb}, 0x18) r1 = openat$sysfs(0xffffff9c, &(0x7f00000037c0)='/sys/kernel/notes', 0x0, 0x0) readv(r1, &(0x7f0000000400)=[{0x0}, {&(0x7f0000004900)=""/4068, 0x88}], 0x2) 42.590227ms ago: executing program 2 (id=9673): mq_unlink(0x0) 41.922177ms ago: executing program 0 (id=9674): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r0, 0x0, 0xbfb}, 0x18) r1 = openat$sysfs(0xffffff9c, &(0x7f00000037c0)='/sys/kernel/notes', 0x0, 0x0) readv(r1, 0x0, 0x0) 26.432809ms ago: executing program 5 (id=9675): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xa, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x4}, 0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00'}) prlimit64(0x0, 0x7, &(0x7f0000000780)={0x6, 0x8}, 0x0) memfd_secret(0x80000) 25.739958ms ago: executing program 4 (id=9676): r0 = syz_open_dev$sg(&(0x7f0000001600), 0x0, 0x40042) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000000)) write$binfmt_aout(r0, &(0x7f0000000480)=ANY=[], 0x125) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x80) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x3d, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffdbd}]}) umount2(&(0x7f00000000c0)='./file0\x00', 0x4) umount2(&(0x7f0000000080)='./file0\x00', 0x4) syz_mount_image$vfat(&(0x7f0000000580), &(0x7f0000000180)='./file0\x00', 0x1000802, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x4, 0x24e, &(0x7f0000000a00)="$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") ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000400)={0x3}, 0x10) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="640000001600010000000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="14000100fc00000000000000000000000000000114000200ff02000000000000000000000000000108000800080400001400060005000000070000000080000036000000080009"], 0x64}}, 0x24008818) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xe, 0x4, 0x4, 0x6, 0x0, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r2, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000003c0)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x1, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000340)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x5a}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "f900f5", 0x14, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 367.7µs ago: executing program 0 (id=9677): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000280)='+}[@\x00') mkdir(&(0x7f0000000580)='./file0\x00', 0x92) lsetxattr$security_selinux(&(0x7f0000000400)='./file0\x00', &(0x7f0000000000), &(0x7f0000000280)='system_u:object_r:fsadm_exec_t:s0\x00', 0x22, 0x0) 0s ago: executing program 2 (id=9678): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) mq_notify(0xffffffffffffffff, 0x0) (fail_nth: 3) kernel console output (not intermixed with test programs): 03 Comm: syz.2.8798 Tainted: G W 6.17.0-rc2-syzkaller #0 PREEMPT(voluntary) [ 584.256805][T27803] Tainted: [W]=WARN [ 584.256812][T27803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 584.256824][T27803] Call Trace: [ 584.256834][T27803] [ 584.256842][T27803] __dump_stack+0x1d/0x30 [ 584.256867][T27803] dump_stack_lvl+0xe8/0x140 [ 584.256887][T27803] dump_stack+0x15/0x1b [ 584.256905][T27803] should_fail_ex+0x265/0x280 [ 584.256926][T27803] ? __request_region+0x55/0x420 [ 584.256952][T27803] should_failslab+0x8c/0xb0 [ 584.256979][T27803] __kmalloc_cache_noprof+0x4c/0x320 [ 584.257024][T27803] __request_region+0x55/0x420 [ 584.257128][T27803] ? bpf_trace_run2+0x124/0x1c0 [ 584.257149][T27803] ? __slab_free+0x77/0x270 [ 584.257167][T27803] serial8250_request_std_resource+0x11d/0x260 [ 584.257300][T27803] serial8250_config_port+0x38/0x2b50 [ 584.257322][T27803] ? free_resource+0x11b/0x270 [ 584.257359][T27803] ? __release_region+0x1e1/0x240 [ 584.257425][T27803] univ8250_config_port+0x299/0x370 [ 584.257494][T27803] uart_ioctl+0xb8f/0xe80 [ 584.257516][T27803] ? do_vfs_ioctl+0x866/0xe10 [ 584.257533][T27803] ? tty_jobctrl_ioctl+0x29e/0x810 [ 584.257557][T27803] tty_ioctl+0x7de/0xb80 [ 584.257637][T27803] ? __pfx_tty_ioctl+0x10/0x10 [ 584.257713][T27803] __se_sys_ioctl+0xcb/0x140 [ 584.257756][T27803] __x64_sys_ioctl+0x43/0x50 [ 584.257785][T27803] x64_sys_call+0x1816/0x2ff0 [ 584.257808][T27803] do_syscall_64+0xd2/0x200 [ 584.257912][T27803] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 584.257936][T27803] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 584.257959][T27803] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 584.258052][T27803] RIP: 0033:0x7ff76d96ebe9 [ 584.258068][T27803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 584.258084][T27803] RSP: 002b:00007ff76c3d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 584.258102][T27803] RAX: ffffffffffffffda RBX: 00007ff76db95fa0 RCX: 00007ff76d96ebe9 [ 584.258114][T27803] RDX: 0000000000000000 RSI: 0000000000005453 RDI: 0000000000000006 [ 584.258126][T27803] RBP: 00007ff76c3d7090 R08: 0000000000000000 R09: 0000000000000000 [ 584.258138][T27803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 584.258224][T27803] R13: 00007ff76db96038 R14: 00007ff76db95fa0 R15: 00007ffd8c24fb48 [ 584.258241][T27803] [ 584.916647][T27818] resource: Trying to free nonexistent resource <0x00000000000002e8-0x00000000000002ef> [ 585.650709][T27849] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 585.685137][T27852] FAULT_INJECTION: forcing a failure. [ 585.685137][T27852] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 585.698296][T27852] CPU: 0 UID: 0 PID: 27852 Comm: syz.0.8817 Tainted: G W 6.17.0-rc2-syzkaller #0 PREEMPT(voluntary) [ 585.698331][T27852] Tainted: [W]=WARN [ 585.698339][T27852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 585.698354][T27852] Call Trace: [ 585.698365][T27852] [ 585.698373][T27852] __dump_stack+0x1d/0x30 [ 585.698440][T27852] dump_stack_lvl+0xe8/0x140 [ 585.698457][T27852] dump_stack+0x15/0x1b [ 585.698474][T27852] should_fail_ex+0x265/0x280 [ 585.698524][T27852] should_fail+0xb/0x20 [ 585.698542][T27852] should_fail_usercopy+0x1a/0x20 [ 585.698566][T27852] _copy_from_user+0x1c/0xb0 [ 585.698593][T27852] get_timespec64+0x4c/0x100 [ 585.698654][T27852] __se_sys_clock_nanosleep+0x10b/0x250 [ 585.698690][T27852] __x64_sys_clock_nanosleep+0x55/0x70 [ 585.698723][T27852] x64_sys_call+0x272d/0x2ff0 [ 585.698798][T27852] do_syscall_64+0xd2/0x200 [ 585.698821][T27852] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 585.698847][T27852] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 585.698869][T27852] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 585.698925][T27852] RIP: 0033:0x7f903723ebe9 [ 585.698941][T27852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 585.698959][T27852] RSP: 002b:00007f9035c9f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000e6 [ 585.698979][T27852] RAX: ffffffffffffffda RBX: 00007f9037465fa0 RCX: 00007f903723ebe9 [ 585.699008][T27852] RDX: 00002000000004c0 RSI: 0000000000000000 RDI: 0000000000000009 [ 585.699019][T27852] RBP: 00007f9035c9f090 R08: 0000000000000000 R09: 0000000000000000 [ 585.699030][T27852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 585.699040][T27852] R13: 00007f9037466038 R14: 00007f9037465fa0 R15: 00007ffcf069a588 [ 585.699059][T27852] [ 585.947292][T27860] netlink: 'syz.0.8820': attribute type 2 has an invalid length. [ 585.955256][T27860] netlink: 'syz.0.8820': attribute type 1 has an invalid length. [ 585.963062][T27860] netlink: 199820 bytes leftover after parsing attributes in process `syz.0.8820'. [ 586.099618][T27869] netlink: 8 bytes leftover after parsing attributes in process `syz.5.8824'. [ 586.135123][T27874] loop4: detected capacity change from 0 to 512 [ 586.173132][T27874] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 586.200234][T27874] EXT4-fs (loop4): 1 truncate cleaned up [ 586.206831][T27874] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 586.246309][T27874] netlink: 'syz.4.8826': attribute type 298 has an invalid length. [ 586.276576][T27378] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 586.698713][T27902] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 640) [ 586.707971][T27902] SELinux: failed to load policy [ 586.715805][T27902] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27902 comm=syz.4.8838 [ 586.728361][T27902] netlink: 14521 bytes leftover after parsing attributes in process `syz.4.8838'. [ 586.761497][T27913] FAULT_INJECTION: forcing a failure. [ 586.761497][T27913] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 586.774761][T27913] CPU: 0 UID: 0 PID: 27913 Comm: syz.2.8843 Tainted: G W 6.17.0-rc2-syzkaller #0 PREEMPT(voluntary) [ 586.774796][T27913] Tainted: [W]=WARN [ 586.774844][T27913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 586.774855][T27913] Call Trace: [ 586.774861][T27913] [ 586.774868][T27913] __dump_stack+0x1d/0x30 [ 586.774887][T27913] dump_stack_lvl+0xe8/0x140 [ 586.774903][T27913] dump_stack+0x15/0x1b [ 586.774918][T27913] should_fail_ex+0x265/0x280 [ 586.774940][T27913] should_fail+0xb/0x20 [ 586.774973][T27913] should_fail_usercopy+0x1a/0x20 [ 586.775073][T27913] _copy_from_user+0x1c/0xb0 [ 586.775101][T27913] __sys_sendto+0x19e/0x330 [ 586.775143][T27913] __x64_sys_sendto+0x76/0x90 [ 586.775204][T27913] x64_sys_call+0x2d05/0x2ff0 [ 586.775223][T27913] do_syscall_64+0xd2/0x200 [ 586.775296][T27913] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 586.775321][T27913] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 586.775347][T27913] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 586.775370][T27913] RIP: 0033:0x7ff76d96ebe9 [ 586.775441][T27913] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 586.775458][T27913] RSP: 002b:00007ff76c3d7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 586.775478][T27913] RAX: ffffffffffffffda RBX: 00007ff76db95fa0 RCX: 00007ff76d96ebe9 [ 586.775536][T27913] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 586.775546][T27913] RBP: 00007ff76c3d7090 R08: 0000200000000080 R09: 0000000000000014 [ 586.775557][T27913] R10: 000000000404c0d5 R11: 0000000000000246 R12: 0000000000000001 [ 586.775568][T27913] R13: 00007ff76db96038 R14: 00007ff76db95fa0 R15: 00007ffd8c24fb48 [ 586.775583][T27913] [ 586.957808][T27919] loop4: detected capacity change from 0 to 256 [ 586.964331][T27920] netlink: 8 bytes leftover after parsing attributes in process `syz.5.8837'. [ 586.973241][T27920] netlink: 8 bytes leftover after parsing attributes in process `syz.5.8837'. [ 586.986856][T27919] FAT-fs (loop4): Directory bread(block 1285) failed [ 587.027762][T27915] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 587.341589][T27951] loop4: detected capacity change from 0 to 256 [ 587.385999][T27951] FAT-fs (loop4): Directory bread(block 1285) failed [ 587.408833][T27951] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 587.456727][T27962] loop4: detected capacity change from 0 to 512 [ 587.484206][T27962] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 587.547737][T27962] EXT4-fs (loop4): 1 truncate cleaned up [ 587.554559][T27962] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 587.676832][T27962] netlink: 8 bytes leftover after parsing attributes in process `syz.4.8862'. [ 587.742142][T27378] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 588.276007][ T29] kauditd_printk_skb: 633 callbacks suppressed [ 588.276020][ T29] audit: type=1326 audit(1755529919.039:38141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27970 comm="syz.0.8864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 588.307752][T27991] loop4: detected capacity change from 0 to 256 [ 588.325165][ T29] audit: type=1326 audit(1755529919.039:38142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27970 comm="syz.0.8864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 588.349336][ T29] audit: type=1326 audit(1755529919.039:38143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27970 comm="syz.0.8864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 588.373549][ T29] audit: type=1326 audit(1755529919.039:38144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27970 comm="syz.0.8864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 588.397352][ T29] audit: type=1326 audit(1755529919.039:38145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27970 comm="syz.0.8864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 588.421121][ T29] audit: type=1326 audit(1755529919.039:38146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27970 comm="syz.0.8864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 588.444804][ T29] audit: type=1326 audit(1755529919.039:38147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27970 comm="syz.0.8864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 588.468650][ T29] audit: type=1326 audit(1755529919.039:38148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27970 comm="syz.0.8864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 588.492446][ T29] audit: type=1326 audit(1755529919.039:38149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27970 comm="syz.0.8864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 588.514837][T27991] FAT-fs (loop4): Directory bread(block 1285) failed [ 588.516109][ T29] audit: type=1326 audit(1755529919.039:38150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27970 comm="syz.0.8864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 588.589223][T27991] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 588.654892][T27995] loop1: detected capacity change from 0 to 512 [ 588.662304][T27995] msdos: Bad value for 'time_offset' [ 588.745718][T27995] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(15) [ 588.752355][T27995] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 588.759932][T27995] vhci_hcd vhci_hcd.0: Device attached [ 588.856216][T28017] netlink: 'syz.0.8884': attribute type 2 has an invalid length. [ 588.864240][T28017] netlink: 'syz.0.8884': attribute type 1 has an invalid length. [ 588.872142][T28017] netlink: 199820 bytes leftover after parsing attributes in process `syz.0.8884'. [ 589.011214][ T3383] usb 3-1: new low-speed USB device number 2 using vhci_hcd [ 589.160002][T28004] vhci_hcd: connection reset by peer [ 589.185927][T27693] vhci_hcd: stop threads [ 589.190439][T27693] vhci_hcd: release socket [ 589.194888][T27693] vhci_hcd: disconnect device [ 589.339026][T28035] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 640) [ 589.381352][T28035] SELinux: failed to load policy [ 589.411068][T28035] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28035 comm=syz.5.8893 [ 589.440121][T28035] netlink: 14521 bytes leftover after parsing attributes in process `syz.5.8893'. [ 589.739586][T28059] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8902'. [ 589.760160][T28059] IPVS: Error joining to the multicast group [ 590.573951][T28082] loop4: detected capacity change from 0 to 512 [ 590.710977][T28082] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 590.736283][T28082] EXT4-fs (loop4): 1 truncate cleaned up [ 590.746367][T28082] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 590.780590][T27378] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 590.818452][T28093] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8915'. [ 590.859541][T28096] loop1: detected capacity change from 0 to 512 [ 590.877065][T28096] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 590.926559][T28096] EXT4-fs (loop1): 1 truncate cleaned up [ 590.954816][T28096] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 591.005847][T28096] netlink: 'syz.1.8916': attribute type 298 has an invalid length. [ 591.054811][T28115] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 591.067318][T27338] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 591.178903][T28125] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 640) [ 591.188396][T28125] SELinux: failed to load policy [ 591.196184][T28125] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28125 comm=syz.0.8929 [ 591.219192][T28125] netlink: 14521 bytes leftover after parsing attributes in process `syz.0.8929'. [ 592.426137][T28152] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 592.649485][T28158] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 640) [ 592.683248][T28158] SELinux: failed to load policy [ 592.704885][T28161] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28161 comm=syz.2.8941 [ 592.768927][T28161] netlink: 14521 bytes leftover after parsing attributes in process `syz.2.8941'. [ 593.046931][T28176] loop1: detected capacity change from 0 to 512 [ 593.160034][T28176] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 593.190738][T28176] EXT4-fs (loop1): orphan cleanup on readonly fs [ 593.235452][T28176] EXT4-fs warning (device loop1): ext4_enable_quotas:7168: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 593.280678][T28176] EXT4-fs (loop1): Cannot turn on quotas: error -117 [ 593.312467][T28176] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm syz.1.8948: bg 0: block 40: padding at end of block bitmap is not set [ 593.342145][T28176] EXT4-fs error (device loop1) in ext4_mb_clear_bb:6657: Corrupt filesystem [ 593.352357][T28176] EXT4-fs (loop1): 1 truncate cleaned up [ 593.358954][T28176] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 593.403139][T28171] chnl_net:caif_netlink_parms(): no params data found [ 593.484960][T27338] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 593.588856][T28171] bridge0: port 1(bridge_slave_0) entered blocking state [ 593.595918][T28171] bridge0: port 1(bridge_slave_0) entered disabled state [ 593.603278][T28171] bridge_slave_0: entered allmulticast mode [ 593.609943][T28171] bridge_slave_0: entered promiscuous mode [ 593.629510][ T29] kauditd_printk_skb: 443 callbacks suppressed [ 593.629539][ T29] audit: type=1326 audit(1755529924.401:38593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28197 comm="syz.0.8952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 593.659561][T28171] bridge0: port 2(bridge_slave_1) entered blocking state [ 593.666711][T28171] bridge0: port 2(bridge_slave_1) entered disabled state [ 593.684039][ T29] audit: type=1326 audit(1755529924.401:38594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28197 comm="syz.0.8952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 593.707823][ T29] audit: type=1326 audit(1755529924.401:38595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28197 comm="syz.0.8952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 593.731578][ T29] audit: type=1326 audit(1755529924.401:38596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28197 comm="syz.0.8952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 593.755172][ T29] audit: type=1326 audit(1755529924.401:38597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28197 comm="syz.0.8952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 593.778947][ T29] audit: type=1326 audit(1755529924.411:38598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28197 comm="syz.0.8952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 593.802982][ T29] audit: type=1326 audit(1755529924.411:38599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28197 comm="syz.0.8952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 593.826844][ T29] audit: type=1326 audit(1755529924.411:38600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28197 comm="syz.0.8952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 593.850708][ T29] audit: type=1326 audit(1755529924.411:38601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28197 comm="syz.0.8952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 593.863269][T28171] bridge_slave_1: entered allmulticast mode [ 593.874348][ T29] audit: type=1326 audit(1755529924.411:38602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28197 comm="syz.0.8952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 593.927117][T28205] 9pnet_fd: Insufficient options for proto=fd [ 593.970646][T28171] bridge_slave_1: entered promiscuous mode [ 594.006013][T28171] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 594.026618][T28171] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 594.037150][T28214] netlink: 'syz.1.8953': attribute type 4 has an invalid length. [ 594.045081][T28214] netlink: 17 bytes leftover after parsing attributes in process `syz.1.8953'. [ 594.057684][T28215] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 594.092576][ T3383] usb 3-1: enqueue for inactive port 0 [ 594.099437][ T3383] usb 3-1: enqueue for inactive port 0 [ 594.106129][T28171] team0: Port device team_slave_0 added [ 594.120180][T28171] team0: Port device team_slave_1 added [ 594.132738][T28217] loop4: detected capacity change from 0 to 512 [ 594.154716][T28171] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 594.161956][T28171] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 594.188076][T28171] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 594.199389][ T3383] vhci_hcd: vhci_device speed not set [ 594.238451][T28171] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 594.245475][T28171] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 594.271500][T28171] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 594.292357][T11847] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 594.304358][T28217] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 594.331546][T28217] EXT4-fs (loop4): orphan cleanup on readonly fs [ 594.343292][T28217] EXT4-fs warning (device loop4): ext4_enable_quotas:7168: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 594.361416][T28171] hsr_slave_0: entered promiscuous mode [ 594.382862][T28217] EXT4-fs (loop4): Cannot turn on quotas: error -117 [ 594.393172][T28171] hsr_slave_1: entered promiscuous mode [ 594.406734][T28171] debugfs: 'hsr0' already exists in 'hsr' [ 594.412519][T28171] Cannot create hsr debugfs directory [ 594.421023][T11847] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 594.462979][T28217] EXT4-fs error (device loop4): ext4_validate_block_bitmap:441: comm syz.4.8960: bg 0: block 40: padding at end of block bitmap is not set [ 594.496167][T11847] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 594.547653][T28217] EXT4-fs error (device loop4) in ext4_mb_clear_bb:6657: Corrupt filesystem [ 594.573384][T28217] EXT4-fs (loop4): 1 truncate cleaned up [ 594.600200][T28217] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 594.600532][T11847] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 594.811540][T27378] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 594.889925][T11847] bond0 (unregistering): Released all slaves [ 594.904334][T11847] bond1 (unregistering): Released all slaves [ 594.933413][T11847] bond2 (unregistering): Released all slaves [ 594.952009][T11847] bond3 (unregistering): Released all slaves [ 594.971019][T11847] bond4 (unregistering): Released all slaves [ 594.990840][T11847] bond5 (unregistering): Released all slaves [ 595.011399][T11847] bond6 (unregistering): Released all slaves [ 595.073697][T11847] tipc: Left network mode [ 595.090511][T11847] hsr_slave_0: left promiscuous mode [ 595.107315][T11847] hsr_slave_1: left promiscuous mode [ 595.125740][T11847] veth1_vlan: left promiscuous mode [ 595.137249][T11847] veth0_vlan: left promiscuous mode [ 595.719104][T28171] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 595.749406][T28171] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 595.759481][T28171] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 595.776125][T28171] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 596.004596][T11847] IPVS: stop unused estimator thread 0... [ 596.033378][T28171] 8021q: adding VLAN 0 to HW filter on device bond0 [ 596.318777][T28171] 8021q: adding VLAN 0 to HW filter on device team0 [ 596.967075][T27712] bridge0: port 1(bridge_slave_0) entered blocking state [ 596.974209][T27712] bridge0: port 1(bridge_slave_0) entered forwarding state [ 597.050586][T27712] bridge0: port 2(bridge_slave_1) entered blocking state [ 597.057768][T27712] bridge0: port 2(bridge_slave_1) entered forwarding state [ 597.100329][T28271] loop4: detected capacity change from 0 to 256 [ 597.166353][T28271] FAT-fs (loop4): Directory bread(block 1285) failed [ 597.185519][T28171] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 597.196124][T28171] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 597.250713][T28271] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 597.377950][T28171] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 597.630845][T28171] veth0_vlan: entered promiscuous mode [ 597.659701][T28171] veth1_vlan: entered promiscuous mode [ 597.689547][T28171] veth0_macvtap: entered promiscuous mode [ 597.719504][T28171] veth1_macvtap: entered promiscuous mode [ 597.740952][T28171] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 597.767910][T28171] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 597.798071][T27702] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 597.829713][T27702] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 597.875510][T27702] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 597.910404][T27702] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 598.102160][T28304] loop1: detected capacity change from 0 to 512 [ 598.194269][T28304] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 598.246656][T28304] EXT4-fs (loop1): orphan cleanup on readonly fs [ 598.270990][T28304] EXT4-fs warning (device loop1): ext4_enable_quotas:7168: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 598.330764][T28316] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 640) [ 598.341678][T28316] SELinux: failed to load policy [ 598.368176][T28316] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28316 comm=syz.5.8987 [ 598.381957][T28316] netlink: 14521 bytes leftover after parsing attributes in process `syz.5.8987'. [ 598.395738][T28304] EXT4-fs (loop1): Cannot turn on quotas: error -117 [ 598.428612][T28304] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm syz.1.8983: bg 0: block 40: padding at end of block bitmap is not set [ 598.466311][T28304] EXT4-fs error (device loop1) in ext4_mb_clear_bb:6657: Corrupt filesystem [ 598.485648][T28304] EXT4-fs (loop1): 1 truncate cleaned up [ 598.493763][T28304] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 598.527203][T27338] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 598.575305][T28324] loop1: detected capacity change from 0 to 256 [ 598.607071][T28324] FAT-fs (loop1): Directory bread(block 1285) failed [ 598.617220][T28324] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 598.673170][ T29] kauditd_printk_skb: 90 callbacks suppressed [ 598.673193][ T29] audit: type=1326 audit(1755529929.444:38691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28331 comm="syz.4.8994" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1aa6a1ebe9 code=0x7ffc0000 [ 598.703201][ T29] audit: type=1326 audit(1755529929.444:38692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28331 comm="syz.4.8994" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1aa6a1ebe9 code=0x7ffc0000 [ 598.733387][T28329] netlink: 'syz.2.8992': attribute type 1 has an invalid length. [ 598.815699][T28329] 8021q: adding VLAN 0 to HW filter on device bond4 [ 598.853400][T28329] bond3: (slave bond4): making interface the new active one [ 598.876948][T28345] 9pnet_fd: Insufficient options for proto=fd [ 598.922693][T28346] netlink: 28 bytes leftover after parsing attributes in process `syz.2.8992'. [ 598.922893][T28329] bond3: (slave bond4): Enslaving as an active interface with an up link [ 598.995816][T28348] wireguard0: entered promiscuous mode [ 599.001363][T28348] wireguard0: entered allmulticast mode [ 599.134091][ T29] audit: type=1400 audit(1755529929.504:38693): avc: denied { create } for pid=28326 comm="syz.2.8992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 599.154875][ T29] audit: type=1400 audit(1755529929.504:38694): avc: denied { write } for pid=28326 comm="syz.2.8992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 599.175554][ T29] audit: type=1326 audit(1755529929.514:38695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28331 comm="syz.4.8994" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1aa6a1ebe9 code=0x7ffc0000 [ 599.188584][T28342] bond3: (slave gretap1): Enslaving as a backup interface with an up link [ 599.199641][ T29] audit: type=1326 audit(1755529929.514:38696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28331 comm="syz.4.8994" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1aa6a1ebe9 code=0x7ffc0000 [ 599.232255][ T29] audit: type=1326 audit(1755529929.514:38697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28331 comm="syz.4.8994" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1aa6a1ebe9 code=0x7ffc0000 [ 599.255999][ T29] audit: type=1326 audit(1755529929.514:38698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28331 comm="syz.4.8994" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1aa6a1ebe9 code=0x7ffc0000 [ 599.279790][ T29] audit: type=1326 audit(1755529929.514:38699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28331 comm="syz.4.8994" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1aa6a1ebe9 code=0x7ffc0000 [ 599.291692][T28356] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 640) [ 599.303619][ T29] audit: type=1326 audit(1755529929.514:38700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28331 comm="syz.4.8994" exe="/root/syz-executor" sig=0 arch=c000003e syscall=237 compat=0 ip=0x7f1aa6a1ebe9 code=0x7ffc0000 [ 599.356443][T28346] 8021q: adding VLAN 0 to HW filter on device bond3 [ 599.369347][T28356] SELinux: failed to load policy [ 599.526309][T28356] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28356 comm=syz.1.9002 [ 599.552051][T28364] loop4: detected capacity change from 0 to 512 [ 599.578328][T28356] netlink: 14521 bytes leftover after parsing attributes in process `syz.1.9002'. [ 599.606030][T28364] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 599.630847][T28364] EXT4-fs (loop4): orphan cleanup on readonly fs [ 599.665344][T28364] EXT4-fs warning (device loop4): ext4_enable_quotas:7168: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 599.692884][T28368] SELinux: policydb magic number 0x100 does not match expected magic number 0xf97cff8c [ 599.701152][T28364] EXT4-fs (loop4): Cannot turn on quotas: error -117 [ 599.721773][T28364] EXT4-fs error (device loop4): ext4_validate_block_bitmap:441: comm syz.4.9005: bg 0: block 40: padding at end of block bitmap is not set [ 599.764962][T28368] SELinux: failed to load policy [ 599.771499][T28368] netlink: 14593 bytes leftover after parsing attributes in process `syz.5.9006'. [ 599.787425][T28364] EXT4-fs error (device loop4) in ext4_mb_clear_bb:6657: Corrupt filesystem [ 599.866315][T28364] EXT4-fs (loop4): 1 truncate cleaned up [ 599.875341][T28364] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 599.912677][T27378] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 600.141847][T28394] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 600.149165][T28395] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 600.259994][T28375] loop1: detected capacity change from 0 to 32768 [ 600.367801][T28375] loop1: p1 p3 < > [ 600.753546][T28427] 9pnet_fd: Insufficient options for proto=fd [ 600.819832][T28430] netlink: 'syz.1.9032': attribute type 6 has an invalid length. [ 600.925519][T28436] netlink: 12 bytes leftover after parsing attributes in process `syz.1.9032'. [ 600.964735][T18068] IPVS: starting estimator thread 0... [ 601.074297][T28441] IPVS: using max 2688 ests per chain, 134400 per kthread [ 601.278318][T13805] udevd[13805]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 601.291058][T25705] udevd[25705]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 601.330997][T28460] 9pnet_fd: Insufficient options for proto=fd [ 601.484607][T28466] netlink: 36 bytes leftover after parsing attributes in process `syz.5.9047'. [ 601.605802][T28481] 9pnet_fd: Insufficient options for proto=fd [ 601.658779][T28485] netlink: 'syz.1.9050': attribute type 2 has an invalid length. [ 601.666697][T28485] netlink: 'syz.1.9050': attribute type 1 has an invalid length. [ 601.674665][T28485] netlink: 199820 bytes leftover after parsing attributes in process `syz.1.9050'. [ 601.679515][T28483] netlink: 36 bytes leftover after parsing attributes in process `syz.5.9056'. [ 601.748685][T28491] loop4: detected capacity change from 0 to 512 [ 601.776291][T28491] EXT4-fs (loop4): revision level too high, forcing read-only mode [ 601.785912][T28491] EXT4-fs (loop4): orphan cleanup on readonly fs [ 601.794810][T28491] EXT4-fs warning (device loop4): ext4_enable_quotas:7168: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 601.797729][T28498] FAULT_INJECTION: forcing a failure. [ 601.797729][T28498] name failslab, interval 1, probability 0, space 0, times 0 [ 601.822505][T28498] CPU: 1 UID: 0 PID: 28498 Comm: syz.0.9061 Tainted: G W 6.17.0-rc2-syzkaller #0 PREEMPT(voluntary) [ 601.822614][T28498] Tainted: [W]=WARN [ 601.822621][T28498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 601.822642][T28498] Call Trace: [ 601.822650][T28498] [ 601.822659][T28498] __dump_stack+0x1d/0x30 [ 601.822683][T28498] dump_stack_lvl+0xe8/0x140 [ 601.822703][T28498] dump_stack+0x15/0x1b [ 601.822758][T28498] should_fail_ex+0x265/0x280 [ 601.822781][T28498] should_failslab+0x8c/0xb0 [ 601.822812][T28498] kmem_cache_alloc_node_noprof+0x57/0x320 [ 601.822844][T28498] ? __alloc_skb+0x101/0x320 [ 601.822879][T28498] ? __account_obj_stock+0x211/0x350 [ 601.822938][T28498] __alloc_skb+0x101/0x320 [ 601.823050][T28498] tipc_msg_build+0xbe/0x840 [ 601.823072][T28498] ? __rcu_read_unlock+0x4f/0x70 [ 601.823095][T28498] ? __rcu_read_unlock+0x4f/0x70 [ 601.823119][T28498] tipc_send_group_msg+0x15e/0x260 [ 601.823232][T28498] tipc_send_group_unicast+0x3d0/0x430 [ 601.823325][T28498] ? __pfx_woken_wake_function+0x10/0x10 [ 601.823349][T28498] __tipc_sendmsg+0x2f1/0x1b00 [ 601.823440][T28498] ? selinux_socket_sendmsg+0x175/0x1b0 [ 601.823525][T28498] ? _raw_spin_unlock_bh+0x36/0x40 [ 601.823579][T28498] ? lock_sock_nested+0x112/0x140 [ 601.823610][T28498] tipc_sendmsg+0x3e/0x60 [ 601.823647][T28498] ? __pfx_tipc_sendmsg+0x10/0x10 [ 601.823679][T28498] __sock_sendmsg+0x142/0x180 [ 601.823709][T28498] ____sys_sendmsg+0x31e/0x4e0 [ 601.823812][T28498] ___sys_sendmsg+0x17b/0x1d0 [ 601.823839][T28498] __x64_sys_sendmsg+0xd4/0x160 [ 601.823860][T28498] x64_sys_call+0x191e/0x2ff0 [ 601.823877][T28498] do_syscall_64+0xd2/0x200 [ 601.823921][T28498] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 601.823944][T28498] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 601.824011][T28498] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 601.824031][T28498] RIP: 0033:0x7f903723ebe9 [ 601.824045][T28498] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 601.824176][T28498] RSP: 002b:00007f9035c9f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 601.824195][T28498] RAX: ffffffffffffffda RBX: 00007f9037465fa0 RCX: 00007f903723ebe9 [ 601.824209][T28498] RDX: 0000000000000004 RSI: 0000200000000180 RDI: 0000000000000004 [ 601.824221][T28498] RBP: 00007f9035c9f090 R08: 0000000000000000 R09: 0000000000000000 [ 601.824234][T28498] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 601.824247][T28498] R13: 00007f9037466038 R14: 00007f9037465fa0 R15: 00007ffcf069a588 [ 601.824267][T28498] [ 602.104949][T28491] EXT4-fs (loop4): Cannot turn on quotas: error -117 [ 602.114629][T28491] EXT4-fs error (device loop4): ext4_validate_block_bitmap:441: comm syz.4.9059: bg 0: block 40: padding at end of block bitmap is not set [ 602.180868][T28491] EXT4-fs error (device loop4) in ext4_mb_clear_bb:6657: Corrupt filesystem [ 602.193526][T28491] EXT4-fs (loop4): 1 truncate cleaned up [ 602.217356][T28491] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 602.244271][T28512] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 602.263264][T28504] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 640) [ 602.273185][T28504] SELinux: failed to load policy [ 602.280402][T28504] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28504 comm=syz.1.9063 [ 602.293186][T28504] netlink: 14521 bytes leftover after parsing attributes in process `syz.1.9063'. [ 602.343470][T27378] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 602.417334][T28527] 9pnet_fd: Insufficient options for proto=fd [ 602.529820][T28541] netlink: 4 bytes leftover after parsing attributes in process `syz.5.9078'. [ 602.540338][T18068] hid_parser_main: 73 callbacks suppressed [ 602.540421][T18068] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 602.553865][T18068] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 602.561335][T18068] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 602.568773][T18068] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 602.576336][T18068] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 602.583765][T18068] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 602.591251][T18068] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 602.598655][T18068] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 602.606073][T18068] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 602.613533][T18068] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 602.622030][T18068] hid-generic 0000:0000:0000.0005: hidraw0: HID v8.00 Device [syz0] on syz0 [ 602.632290][T28547] FAULT_INJECTION: forcing a failure. [ 602.632290][T28547] name failslab, interval 1, probability 0, space 0, times 0 [ 602.645171][T28547] CPU: 0 UID: 0 PID: 28547 Comm: syz.5.9078 Tainted: G W 6.17.0-rc2-syzkaller #0 PREEMPT(voluntary) [ 602.645208][T28547] Tainted: [W]=WARN [ 602.645215][T28547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 602.645228][T28547] Call Trace: [ 602.645234][T28547] [ 602.645244][T28547] __dump_stack+0x1d/0x30 [ 602.645268][T28547] dump_stack_lvl+0xe8/0x140 [ 602.645303][T28547] dump_stack+0x15/0x1b [ 602.645373][T28547] should_fail_ex+0x265/0x280 [ 602.645393][T28547] should_failslab+0x8c/0xb0 [ 602.645415][T28547] kmem_cache_alloc_node_noprof+0x57/0x320 [ 602.645442][T28547] ? __alloc_skb+0x101/0x320 [ 602.645482][T28547] __alloc_skb+0x101/0x320 [ 602.645550][T28547] alloc_uevent_skb+0x5c/0x120 [ 602.645570][T28547] kobject_uevent_net_broadcast+0x23c/0x410 [ 602.645590][T28547] kobject_uevent_env+0x43d/0x570 [ 602.645622][T28547] ? device_pm_check_callbacks+0x683/0x6a0 [ 602.645655][T28547] kobject_uevent+0x1d/0x30 [ 602.645695][T28547] device_del+0x710/0x790 [ 602.645721][T28547] device_destroy+0x66/0xa0 [ 602.645819][T28547] drop_ref+0xbf/0x1a0 [ 602.645922][T28547] hidraw_disconnect+0x39/0x50 [ 602.646012][T28547] hid_device_remove+0x158/0x210 [ 602.646038][T28547] ? __pfx_hid_device_remove+0x10/0x10 [ 602.646066][T28547] device_release_driver_internal+0x2be/0x4e0 [ 602.646153][T28547] device_release_driver+0x19/0x20 [ 602.646174][T28547] bus_remove_device+0x26d/0x290 [ 602.646207][T28547] device_del+0x36a/0x790 [ 602.646230][T28547] hid_destroy_device+0x54/0x120 [ 602.646260][T28547] uhid_dev_destroy+0x6a/0xb0 [ 602.646282][T28547] uhid_char_write+0x3aa/0x650 [ 602.646303][T28547] ? __pfx_uhid_char_write+0x10/0x10 [ 602.646365][T28547] vfs_write+0x269/0x960 [ 602.646388][T28547] ? __rcu_read_unlock+0x4f/0x70 [ 602.646455][T28547] ? __fget_files+0x184/0x1c0 [ 602.646499][T28547] ksys_write+0xda/0x1a0 [ 602.646673][T28547] __x64_sys_write+0x40/0x50 [ 602.646692][T28547] x64_sys_call+0x27fe/0x2ff0 [ 602.646710][T28547] do_syscall_64+0xd2/0x200 [ 602.646733][T28547] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 602.646795][T28547] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 602.646822][T28547] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 602.646844][T28547] RIP: 0033:0x7f98aa29ebe9 [ 602.646902][T28547] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 602.646920][T28547] RSP: 002b:00007f98a8ce6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 602.647005][T28547] RAX: ffffffffffffffda RBX: 00007f98aa4c6090 RCX: 00007f98aa29ebe9 [ 602.647016][T28547] RDX: 0000000000000004 RSI: 0000200000000080 RDI: 0000000000000007 [ 602.647029][T28547] RBP: 00007f98a8ce6090 R08: 0000000000000000 R09: 0000000000000000 [ 602.647042][T28547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 602.647055][T28547] R13: 00007f98aa4c6128 R14: 00007f98aa4c6090 R15: 00007fffacae27b8 [ 602.647075][T28547] [ 602.659584][T28548] fido_id[28548]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 602.762480][T28554] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 640) [ 602.929843][T28561] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28561 comm=syz.1.9084 [ 602.938480][T28554] SELinux: failed to load policy [ 602.988985][T28559] SELinux: policydb magic number 0x100 does not match expected magic number 0xf97cff8c [ 603.000618][T28559] SELinux: failed to load policy [ 603.054959][T28563] loop4: detected capacity change from 0 to 256 [ 603.069548][T28563] FAT-fs (loop4): Directory bread(block 1285) failed [ 603.138529][T28563] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 604.020696][T28597] netlink: 'syz.2.9098': attribute type 2 has an invalid length. [ 604.028703][T28597] netlink: 'syz.2.9098': attribute type 1 has an invalid length. [ 604.036796][T28597] __nla_validate_parse: 2 callbacks suppressed [ 604.036811][T28597] netlink: 199820 bytes leftover after parsing attributes in process `syz.2.9098'. [ 604.242752][ T29] kauditd_printk_skb: 448 callbacks suppressed [ 604.242770][ T29] audit: type=1326 audit(1755529934.927:39147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28600 comm="syz.0.9100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 604.273022][ T29] audit: type=1326 audit(1755529934.927:39148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28600 comm="syz.0.9100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 604.296865][ T29] audit: type=1326 audit(1755529934.927:39149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28600 comm="syz.0.9100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 604.322011][ T29] audit: type=1326 audit(1755529934.927:39150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28600 comm="syz.0.9100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 604.346142][ T29] audit: type=1326 audit(1755529934.927:39151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28600 comm="syz.0.9100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 604.370419][ T29] audit: type=1326 audit(1755529934.927:39152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28600 comm="syz.0.9100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 604.394700][ T29] audit: type=1326 audit(1755529934.927:39153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28600 comm="syz.0.9100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 604.418402][ T29] audit: type=1326 audit(1755529934.927:39154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28600 comm="syz.0.9100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 604.442609][ T29] audit: type=1326 audit(1755529934.927:39155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28600 comm="syz.0.9100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 604.466490][ T29] audit: type=1326 audit(1755529934.957:39156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28600 comm="syz.0.9100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 604.493541][T28605] netlink: 20 bytes leftover after parsing attributes in process `syz.4.9105'. [ 604.752267][T28648] netlink: 12 bytes leftover after parsing attributes in process `syz.4.9124'. [ 605.006816][T28663] pim6reg1: entered promiscuous mode [ 605.012395][T28663] pim6reg1: entered allmulticast mode [ 605.565536][T28697] FAULT_INJECTION: forcing a failure. [ 605.565536][T28697] name failslab, interval 1, probability 0, space 0, times 0 [ 605.578573][T28697] CPU: 0 UID: 0 PID: 28697 Comm: syz.5.9141 Tainted: G W 6.17.0-rc2-syzkaller #0 PREEMPT(voluntary) [ 605.578619][T28697] Tainted: [W]=WARN [ 605.578625][T28697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 605.578639][T28697] Call Trace: [ 605.578645][T28697] [ 605.578696][T28697] __dump_stack+0x1d/0x30 [ 605.578717][T28697] dump_stack_lvl+0xe8/0x140 [ 605.578836][T28697] dump_stack+0x15/0x1b [ 605.578853][T28697] should_fail_ex+0x265/0x280 [ 605.578874][T28697] should_failslab+0x8c/0xb0 [ 605.578899][T28697] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 605.578928][T28697] ? sidtab_sid2str_get+0xa0/0x130 [ 605.578967][T28697] kmemdup_noprof+0x2b/0x70 [ 605.578995][T28697] sidtab_sid2str_get+0xa0/0x130 [ 605.579019][T28697] security_sid_to_context_core+0x1eb/0x2e0 [ 605.579089][T28697] security_sid_to_context+0x27/0x40 [ 605.579109][T28697] selinux_lsmprop_to_secctx+0x67/0xf0 [ 605.579133][T28697] security_lsmprop_to_secctx+0x43/0x80 [ 605.579169][T28697] audit_log_task_context+0x77/0x190 [ 605.579198][T28697] audit_log_task+0xf4/0x250 [ 605.579226][T28697] audit_seccomp+0x61/0x100 [ 605.579253][T28697] ? __seccomp_filter+0x68c/0x10d0 [ 605.579305][T28697] __seccomp_filter+0x69d/0x10d0 [ 605.579418][T28697] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 605.579458][T28697] ? vfs_write+0x7e8/0x960 [ 605.579482][T28697] ? __rcu_read_unlock+0x4f/0x70 [ 605.579511][T28697] ? __fget_files+0x184/0x1c0 [ 605.579541][T28697] __secure_computing+0x82/0x150 [ 605.579562][T28697] syscall_trace_enter+0xcf/0x1e0 [ 605.579613][T28697] do_syscall_64+0xac/0x200 [ 605.579642][T28697] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 605.579666][T28697] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 605.579691][T28697] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 605.579715][T28697] RIP: 0033:0x7f98aa29ebe9 [ 605.579731][T28697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 605.579747][T28697] RSP: 002b:00007f98a8d07038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bf [ 605.579765][T28697] RAX: ffffffffffffffda RBX: 00007f98aa4c5fa0 RCX: 00007f98aa29ebe9 [ 605.579777][T28697] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 605.579844][T28697] RBP: 00007f98a8d07090 R08: 0000000000000000 R09: 0000000000000000 [ 605.579858][T28697] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 605.579869][T28697] R13: 00007f98aa4c6038 R14: 00007f98aa4c5fa0 R15: 00007fffacae27b8 [ 605.579946][T28697] [ 605.874481][T28698] loop4: detected capacity change from 0 to 1024 [ 605.885713][T28698] ext4: Unknown parameter 'fowner>18446744073709551615' [ 606.111084][T28714] vhci_hcd: default hub control req: 0310 v0006 i0003 l0 [ 606.496949][T28734] loop1: detected capacity change from 0 to 164 [ 606.592199][T28741] netlink: 16 bytes leftover after parsing attributes in process `syz.1.9158'. [ 607.338510][T28755] FAULT_INJECTION: forcing a failure. [ 607.338510][T28755] name failslab, interval 1, probability 0, space 0, times 0 [ 607.351350][T28755] CPU: 0 UID: 0 PID: 28755 Comm: syz.0.9163 Tainted: G W 6.17.0-rc2-syzkaller #0 PREEMPT(voluntary) [ 607.351386][T28755] Tainted: [W]=WARN [ 607.351393][T28755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 607.351437][T28755] Call Trace: [ 607.351444][T28755] [ 607.351452][T28755] __dump_stack+0x1d/0x30 [ 607.351475][T28755] dump_stack_lvl+0xe8/0x140 [ 607.351574][T28755] dump_stack+0x15/0x1b [ 607.351603][T28755] should_fail_ex+0x265/0x280 [ 607.351623][T28755] should_failslab+0x8c/0xb0 [ 607.351659][T28755] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 607.351692][T28755] ? sidtab_sid2str_get+0xa0/0x130 [ 607.351811][T28755] kmemdup_noprof+0x2b/0x70 [ 607.351876][T28755] sidtab_sid2str_get+0xa0/0x130 [ 607.351899][T28755] security_sid_to_context_core+0x1eb/0x2e0 [ 607.351973][T28755] security_sid_to_context+0x27/0x40 [ 607.352055][T28755] selinux_lsmprop_to_secctx+0x67/0xf0 [ 607.352140][T28755] security_lsmprop_to_secctx+0x43/0x80 [ 607.352212][T28755] audit_log_task_context+0x77/0x190 [ 607.352292][T28755] audit_log_task+0xf4/0x250 [ 607.352325][T28755] audit_seccomp+0x61/0x100 [ 607.352359][T28755] ? __seccomp_filter+0x68c/0x10d0 [ 607.352449][T28755] __seccomp_filter+0x69d/0x10d0 [ 607.352469][T28755] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 607.352548][T28755] ? vfs_write+0x7e8/0x960 [ 607.352568][T28755] ? __rcu_read_unlock+0x4f/0x70 [ 607.352590][T28755] ? __fget_files+0x184/0x1c0 [ 607.352620][T28755] __secure_computing+0x82/0x150 [ 607.352642][T28755] syscall_trace_enter+0xcf/0x1e0 [ 607.352686][T28755] do_syscall_64+0xac/0x200 [ 607.352714][T28755] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 607.352802][T28755] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 607.352888][T28755] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 607.352909][T28755] RIP: 0033:0x7f903723ebe9 [ 607.352925][T28755] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 607.352990][T28755] RSP: 002b:00007f9035c9f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 607.353008][T28755] RAX: ffffffffffffffda RBX: 00007f9037465fa0 RCX: 00007f903723ebe9 [ 607.353020][T28755] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f9037f9e000 [ 607.353030][T28755] RBP: 00007f9035c9f090 R08: 0000000000000000 R09: 0000000000000000 [ 607.353205][T28755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 607.353222][T28755] R13: 00007f9037466038 R14: 00007f9037465fa0 R15: 00007ffcf069a588 [ 607.353240][T28755] [ 607.813987][T28761] IPv6: Can't replace route, no match found [ 607.973744][T28773] loop1: detected capacity change from 0 to 256 [ 608.012205][T28773] FAT-fs (loop1): Directory bread(block 1285) failed [ 608.065997][T28773] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 608.125679][T28779] loop1: detected capacity change from 0 to 512 [ 608.156605][T28767] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 608.192886][T28779] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 608.200914][T28767] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 608.229792][T28779] EXT4-fs (loop1): orphan cleanup on readonly fs [ 608.241221][T28767] FAULT_INJECTION: forcing a failure. [ 608.241221][T28767] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 608.254596][T28767] CPU: 0 UID: 0 PID: 28767 Comm: syz.2.9169 Tainted: G W 6.17.0-rc2-syzkaller #0 PREEMPT(voluntary) [ 608.254629][T28767] Tainted: [W]=WARN [ 608.254636][T28767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 608.254650][T28767] Call Trace: [ 608.254659][T28767] [ 608.254668][T28767] __dump_stack+0x1d/0x30 [ 608.254690][T28767] dump_stack_lvl+0xe8/0x140 [ 608.254754][T28767] dump_stack+0x15/0x1b [ 608.254772][T28767] should_fail_ex+0x265/0x280 [ 608.254797][T28767] should_fail+0xb/0x20 [ 608.254856][T28767] should_fail_usercopy+0x1a/0x20 [ 608.254881][T28767] _copy_from_iter+0xcf/0xe40 [ 608.254906][T28767] ? __build_skb_around+0x1a0/0x200 [ 608.254948][T28767] ? __alloc_skb+0x223/0x320 [ 608.255003][T28767] netlink_sendmsg+0x471/0x6b0 [ 608.255025][T28767] ? __pfx_netlink_sendmsg+0x10/0x10 [ 608.255083][T28767] __sock_sendmsg+0x142/0x180 [ 608.255109][T28767] ____sys_sendmsg+0x31e/0x4e0 [ 608.255131][T28767] ___sys_sendmsg+0x17b/0x1d0 [ 608.255204][T28767] __x64_sys_sendmsg+0xd4/0x160 [ 608.255230][T28767] x64_sys_call+0x191e/0x2ff0 [ 608.255249][T28767] do_syscall_64+0xd2/0x200 [ 608.255276][T28767] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 608.255365][T28767] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 608.255387][T28767] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 608.255410][T28767] RIP: 0033:0x7ff76d96ebe9 [ 608.255436][T28767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 608.255502][T28767] RSP: 002b:00007ff76c3d7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 608.255533][T28767] RAX: ffffffffffffffda RBX: 00007ff76db95fa0 RCX: 00007ff76d96ebe9 [ 608.255545][T28767] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000005 [ 608.255556][T28767] RBP: 00007ff76c3d7090 R08: 0000000000000000 R09: 0000000000000000 [ 608.255567][T28767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 608.255579][T28767] R13: 00007ff76db96038 R14: 00007ff76db95fa0 R15: 00007ffd8c24fb48 [ 608.255600][T28767] [ 608.260258][T28779] EXT4-fs warning (device loop1): ext4_enable_quotas:7168: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 608.501108][T28779] EXT4-fs (loop1): Cannot turn on quotas: error -117 [ 608.516922][T28779] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm syz.1.9176: bg 0: block 40: padding at end of block bitmap is not set [ 608.541775][T28779] EXT4-fs error (device loop1) in ext4_mb_clear_bb:6657: Corrupt filesystem [ 608.564908][T28779] EXT4-fs (loop1): 1 truncate cleaned up [ 608.582148][T28779] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 608.616343][T27338] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 608.825051][T28814] loop1: detected capacity change from 0 to 512 [ 608.868788][T28814] EXT4-fs error (device loop1): ext4_xattr_inode_iget:437: inode #11: comm syz.1.9188: missing EA_INODE flag [ 608.891472][T28814] EXT4-fs error (device loop1): ext4_xattr_inode_iget:442: comm syz.1.9188: error while reading EA inode 11 err=-117 [ 608.909748][T28814] EXT4-fs (loop1): 1 orphan inode deleted [ 608.916519][T28814] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 608.986057][T27338] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 609.109865][T28836] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 609.163654][T28839] 9pnet_fd: Insufficient options for proto=fd [ 609.303716][T28847] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 640) [ 609.312942][T28847] SELinux: failed to load policy [ 609.320342][T28847] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28847 comm=syz.2.9196 [ 609.333879][T28847] netlink: 14521 bytes leftover after parsing attributes in process `syz.2.9196'. [ 609.581254][ T29] kauditd_printk_skb: 479 callbacks suppressed [ 609.581269][ T29] audit: type=1326 audit(1755529940.359:39633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28853 comm="syz.0.9203" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 609.611606][ T29] audit: type=1326 audit(1755529940.359:39634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28853 comm="syz.0.9203" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 609.698771][T28869] 9pnet_fd: Insufficient options for proto=fd [ 609.734699][ T29] audit: type=1326 audit(1755529940.359:39635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28853 comm="syz.0.9203" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 609.758515][ T29] audit: type=1326 audit(1755529940.359:39636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28853 comm="syz.0.9203" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 609.782224][ T29] audit: type=1326 audit(1755529940.359:39637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28853 comm="syz.0.9203" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 609.806673][ T29] audit: type=1326 audit(1755529940.359:39638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28853 comm="syz.0.9203" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 609.830699][ T29] audit: type=1326 audit(1755529940.359:39639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28853 comm="syz.0.9203" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 609.845353][T28872] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 640) [ 609.854645][ T29] audit: type=1326 audit(1755529940.359:39640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28853 comm="syz.0.9203" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 609.887590][ T29] audit: type=1326 audit(1755529940.359:39641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28853 comm="syz.0.9203" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 609.908543][T28872] SELinux: failed to load policy [ 609.911464][ T29] audit: type=1326 audit(1755529940.359:39642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28853 comm="syz.0.9203" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f903723ebe9 code=0x7ffc0000 [ 609.934590][T28872] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28872 comm=syz.0.9211 [ 609.956863][T28877] loop4: detected capacity change from 0 to 1024 [ 609.958369][T28872] netlink: 14521 bytes leftover after parsing attributes in process `syz.0.9211'. [ 610.048616][T28877] EXT4-fs (loop4): mounted filesystem 00000000-0000-0006-0000-000000000000 r/w without journal. Quota mode: none. [ 610.077280][T28877] ext4 filesystem being mounted at /86/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 610.092798][T28882] loop1: detected capacity change from 0 to 1024 [ 610.108365][T28893] IPv6: Can't replace route, no match found [ 610.157235][T28882] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 610.176909][T28882] ext4 filesystem being mounted at /75/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 610.204950][T28904] 9pnet_fd: Insufficient options for proto=fd [ 610.234658][T27712] EXT4-fs error (device loop4): ext4_map_blocks:814: inode #15: comm kworker/u8:62: lblock 0 mapped to illegal pblock 0 (length 6) [ 610.261046][T27338] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 610.269881][T27712] EXT4-fs (loop4): Delayed block allocation failed for inode 15 at logical offset 0 with max blocks 6 with error 117 [ 610.282471][T27712] EXT4-fs (loop4): This should not happen!! Data will be lost [ 610.282471][T27712] [ 610.321494][T11847] EXT4-fs error (device loop4): ext4_map_blocks:814: inode #15: block 8: comm kworker/u8:22: lblock 8 mapped to illegal pblock 8 (length 8) [ 610.344168][T28913] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 610.376241][T11847] EXT4-fs (loop4): Delayed block allocation failed for inode 15 at logical offset 8 with max blocks 8 with error 117 [ 610.388634][T11847] EXT4-fs (loop4): This should not happen!! Data will be lost [ 610.388634][T11847] [ 610.415327][T27378] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0006-0000-000000000000. [ 610.465829][T28919] loop1: detected capacity change from 0 to 512 [ 610.510438][T28919] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 610.528461][T28919] EXT4-fs (loop1): orphan cleanup on readonly fs [ 610.552362][T28929] 9pnet_fd: Insufficient options for proto=fd [ 610.572935][T28919] EXT4-fs warning (device loop1): ext4_enable_quotas:7168: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 610.591240][T28919] EXT4-fs (loop1): Cannot turn on quotas: error -117 [ 610.632058][T28919] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm syz.1.9230: bg 0: block 40: padding at end of block bitmap is not set [ 610.646681][T28919] EXT4-fs error (device loop1) in ext4_mb_clear_bb:6657: Corrupt filesystem [ 610.670733][T28941] loop4: detected capacity change from 0 to 512 [ 610.679544][T28919] EXT4-fs (loop1): 1 truncate cleaned up [ 610.690234][T28939] infiniband syz!: set down [ 610.694866][T28939] infiniband syz!: added team_slave_0 [ 610.697883][T28941] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 610.701247][T28919] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 610.729569][T28939] RDS/IB: syz!: added [ 610.733947][T28945] veth1_macvtap: left promiscuous mode [ 610.739493][T28939] smc: adding ib device syz! with port count 1 [ 610.746006][T28939] smc: ib device syz! port 1 has pnetid [ 610.755253][T28941] EXT4-fs (loop4): 1 truncate cleaned up [ 610.762330][T28948] netlink: 68 bytes leftover after parsing attributes in process `syz.5.9241'. [ 610.766604][T28941] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 610.772491][T28945] macsec0: entered allmulticast mode [ 610.791893][T28949] veth1_macvtap: entered promiscuous mode [ 610.797703][T28949] veth1_macvtap: entered allmulticast mode [ 610.814639][T28949] macsec0: entered promiscuous mode [ 610.829919][T27338] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 610.830418][T28951] syzkaller1: entered promiscuous mode [ 610.844465][T28951] syzkaller1: entered allmulticast mode [ 611.028300][T28953] loop1: detected capacity change from 0 to 8192 [ 611.103314][T27378] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 611.113375][T28953] loop1: p1 p2 p3 p4 [ 611.117511][T28953] loop1: p1 size 3523149824 extends beyond EOD, truncated [ 611.133095][T28953] loop1: p2 start 4293394688 is beyond EOD, truncated [ 611.139984][T28953] loop1: p3 start 150994944 is beyond EOD, truncated [ 611.146675][T28953] loop1: p4 size 50331648 extends beyond EOD, truncated [ 611.655823][T29001] netlink: 'syz.1.9259': attribute type 4 has an invalid length. [ 611.663721][T29001] netlink: 17 bytes leftover after parsing attributes in process `syz.1.9259'. [ 612.014125][T29005] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 612.534350][T29015] FAULT_INJECTION: forcing a failure. [ 612.534350][T29015] name failslab, interval 1, probability 0, space 0, times 0 [ 612.547253][T29015] CPU: 1 UID: 0 PID: 29015 Comm: syz.0.9267 Tainted: G W 6.17.0-rc2-syzkaller #0 PREEMPT(voluntary) [ 612.547354][T29015] Tainted: [W]=WARN [ 612.547360][T29015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 612.547372][T29015] Call Trace: [ 612.547451][T29015] [ 612.547458][T29015] __dump_stack+0x1d/0x30 [ 612.547479][T29015] dump_stack_lvl+0xe8/0x140 [ 612.547497][T29015] dump_stack+0x15/0x1b [ 612.547511][T29015] should_fail_ex+0x265/0x280 [ 612.547579][T29015] should_failslab+0x8c/0xb0 [ 612.547606][T29015] __kmalloc_noprof+0xa5/0x3e0 [ 612.547646][T29015] ? sock_kmalloc+0x85/0xc0 [ 612.547668][T29015] sock_kmalloc+0x85/0xc0 [ 612.547687][T29015] ipv6_renew_options+0x1fb/0x5f0 [ 612.547780][T29015] ipv6_set_opt_hdr+0x13b/0x600 [ 612.547804][T29015] do_ipv6_setsockopt+0x10b9/0x2160 [ 612.547881][T29015] ? kstrtoull+0x111/0x140 [ 612.547901][T29015] ? __rcu_read_unlock+0x4f/0x70 [ 612.547966][T29015] ? avc_has_perm_noaudit+0x1b1/0x200 [ 612.547989][T29015] ? selinux_netlbl_socket_setsockopt+0x1f9/0x2d0 [ 612.548094][T29015] ipv6_setsockopt+0x59/0x130 [ 612.548173][T29015] rawv6_setsockopt+0x1d2/0x420 [ 612.548196][T29015] sock_common_setsockopt+0x69/0x80 [ 612.548221][T29015] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 612.548263][T29015] __sys_setsockopt+0x181/0x200 [ 612.548286][T29015] __x64_sys_setsockopt+0x64/0x80 [ 612.548308][T29015] x64_sys_call+0x20ec/0x2ff0 [ 612.548331][T29015] do_syscall_64+0xd2/0x200 [ 612.548355][T29015] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 612.548416][T29015] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 612.548440][T29015] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 612.548460][T29015] RIP: 0033:0x7f903723ebe9 [ 612.548474][T29015] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 612.548567][T29015] RSP: 002b:00007f9035c75038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 612.548587][T29015] RAX: ffffffffffffffda RBX: 00007f9037466090 RCX: 00007f903723ebe9 [ 612.548600][T29015] RDX: 0000000000000039 RSI: 0000000000000029 RDI: 0000000000000005 [ 612.548614][T29015] RBP: 00007f9035c75090 R08: 0000000000000018 R09: 0000000000000000 [ 612.548627][T29015] R10: 0000200000001640 R11: 0000000000000246 R12: 0000000000000001 [ 612.548643][T29015] R13: 00007f9037466128 R14: 00007f9037466090 R15: 00007ffcf069a588 [ 612.548661][T29015] [ 612.868884][T29019] FAULT_INJECTION: forcing a failure. [ 612.868884][T29019] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 612.882113][T29019] CPU: 1 UID: 0 PID: 29019 Comm: syz.5.9269 Tainted: G W 6.17.0-rc2-syzkaller #0 PREEMPT(voluntary) [ 612.882144][T29019] Tainted: [W]=WARN [ 612.882150][T29019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 612.882161][T29019] Call Trace: [ 612.882168][T29019] [ 612.882176][T29019] __dump_stack+0x1d/0x30 [ 612.882262][T29019] dump_stack_lvl+0xe8/0x140 [ 612.882279][T29019] dump_stack+0x15/0x1b [ 612.882297][T29019] should_fail_ex+0x265/0x280 [ 612.882317][T29019] should_fail+0xb/0x20 [ 612.882333][T29019] should_fail_usercopy+0x1a/0x20 [ 612.882394][T29019] _copy_from_iter+0xcf/0xe40 [ 612.882422][T29019] ? __build_skb_around+0x1a0/0x200 [ 612.882527][T29019] ? __alloc_skb+0x223/0x320 [ 612.882616][T29019] netlink_sendmsg+0x471/0x6b0 [ 612.882639][T29019] ? __pfx_netlink_sendmsg+0x10/0x10 [ 612.882659][T29019] __sock_sendmsg+0x142/0x180 [ 612.882710][T29019] ____sys_sendmsg+0x31e/0x4e0 [ 612.882732][T29019] ___sys_sendmsg+0x17b/0x1d0 [ 612.882762][T29019] __x64_sys_sendmsg+0xd4/0x160 [ 612.882785][T29019] x64_sys_call+0x191e/0x2ff0 [ 612.882835][T29019] do_syscall_64+0xd2/0x200 [ 612.882879][T29019] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 612.882961][T29019] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 612.882987][T29019] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 612.883027][T29019] RIP: 0033:0x7f98aa29ebe9 [ 612.883042][T29019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 612.883061][T29019] RSP: 002b:00007f98a8d07038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 612.883079][T29019] RAX: ffffffffffffffda RBX: 00007f98aa4c5fa0 RCX: 00007f98aa29ebe9 [ 612.883091][T29019] RDX: 0000000000008844 RSI: 0000200000000080 RDI: 0000000000000003 [ 612.883109][T29019] RBP: 00007f98a8d07090 R08: 0000000000000000 R09: 0000000000000000 [ 612.883122][T29019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 612.883139][T29019] R13: 00007f98aa4c6038 R14: 00007f98aa4c5fa0 R15: 00007fffacae27b8 [ 612.883158][T29019] [ 613.145528][T29023] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 613.269477][T29039] netlink: 'syz.5.9274': attribute type 2 has an invalid length. [ 613.277283][T29039] netlink: 199836 bytes leftover after parsing attributes in process `syz.5.9274'. [ 613.331479][T29047] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 613.376388][T29055] blktrace: Concurrent blktraces are not allowed on sg0 [ 613.519810][T29044] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 613.528357][T29044] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 613.566709][T29044] netlink: 'syz.2.9280': attribute type 13 has an invalid length. [ 613.574778][T29044] netlink: 'syz.2.9280': attribute type 17 has an invalid length. [ 613.590251][T29080] FAULT_INJECTION: forcing a failure. [ 613.590251][T29080] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 613.603397][T29080] CPU: 1 UID: 0 PID: 29080 Comm: syz.1.9294 Tainted: G W 6.17.0-rc2-syzkaller #0 PREEMPT(voluntary) [ 613.603488][T29080] Tainted: [W]=WARN [ 613.603494][T29080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 613.603505][T29080] Call Trace: [ 613.603510][T29080] [ 613.603544][T29080] __dump_stack+0x1d/0x30 [ 613.603562][T29080] dump_stack_lvl+0xe8/0x140 [ 613.603583][T29080] dump_stack+0x15/0x1b [ 613.603597][T29080] should_fail_ex+0x265/0x280 [ 613.603615][T29080] should_fail+0xb/0x20 [ 613.603658][T29080] should_fail_usercopy+0x1a/0x20 [ 613.603716][T29080] _copy_from_iter+0xcf/0xe40 [ 613.603737][T29080] ? __build_skb_around+0x1a0/0x200 [ 613.603769][T29080] ? __alloc_skb+0x223/0x320 [ 613.603866][T29080] netlink_sendmsg+0x471/0x6b0 [ 613.603886][T29080] ? __pfx_netlink_sendmsg+0x10/0x10 [ 613.603905][T29080] __sock_sendmsg+0x142/0x180 [ 613.603994][T29080] ____sys_sendmsg+0x31e/0x4e0 [ 613.604015][T29080] ___sys_sendmsg+0x17b/0x1d0 [ 613.604077][T29080] __x64_sys_sendmsg+0xd4/0x160 [ 613.604098][T29080] x64_sys_call+0x191e/0x2ff0 [ 613.604116][T29080] do_syscall_64+0xd2/0x200 [ 613.604139][T29080] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 613.604160][T29080] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 613.604227][T29080] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 613.604246][T29080] RIP: 0033:0x7fb9b625ebe9 [ 613.604259][T29080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 613.604303][T29080] RSP: 002b:00007fb9b4cbf038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 613.604320][T29080] RAX: ffffffffffffffda RBX: 00007fb9b6485fa0 RCX: 00007fb9b625ebe9 [ 613.604331][T29080] RDX: 0000000000040000 RSI: 00002000000000c0 RDI: 0000000000000006 [ 613.604342][T29080] RBP: 00007fb9b4cbf090 R08: 0000000000000000 R09: 0000000000000000 [ 613.604353][T29080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 613.604363][T29080] R13: 00007fb9b6486038 R14: 00007fb9b6485fa0 R15: 00007ffdb2c6b5b8 [ 613.604446][T29080] [ 613.876635][T29044] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 614.168198][T29119] IPv6: Can't replace route, no match found [ 614.176686][T29110] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=29110 comm=syz.0.9307 [ 614.327988][T29132] FAULT_INJECTION: forcing a failure. [ 614.327988][T29132] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 614.341419][T29132] CPU: 1 UID: 0 PID: 29132 Comm: syz.1.9316 Tainted: G W 6.17.0-rc2-syzkaller #0 PREEMPT(voluntary) [ 614.341455][T29132] Tainted: [W]=WARN [ 614.341527][T29132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 614.341538][T29132] Call Trace: [ 614.341544][T29132] [ 614.341550][T29132] __dump_stack+0x1d/0x30 [ 614.341614][T29132] dump_stack_lvl+0xe8/0x140 [ 614.341639][T29132] dump_stack+0x15/0x1b [ 614.341657][T29132] should_fail_ex+0x265/0x280 [ 614.341679][T29132] should_fail+0xb/0x20 [ 614.341696][T29132] should_fail_usercopy+0x1a/0x20 [ 614.341717][T29132] _copy_from_user+0x1c/0xb0 [ 614.341774][T29132] ___sys_sendmsg+0xc1/0x1d0 [ 614.341804][T29132] __x64_sys_sendmsg+0xd4/0x160 [ 614.341826][T29132] x64_sys_call+0x191e/0x2ff0 [ 614.341848][T29132] do_syscall_64+0xd2/0x200 [ 614.341945][T29132] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 614.341967][T29132] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 614.341991][T29132] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 614.342013][T29132] RIP: 0033:0x7fb9b625ebe9 [ 614.342030][T29132] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 614.342071][T29132] RSP: 002b:00007fb9b4cbf038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 614.342087][T29132] RAX: ffffffffffffffda RBX: 00007fb9b6485fa0 RCX: 00007fb9b625ebe9 [ 614.342098][T29132] RDX: 0000000000048002 RSI: 0000200000000080 RDI: 0000000000000007 [ 614.342109][T29132] RBP: 00007fb9b4cbf090 R08: 0000000000000000 R09: 0000000000000000 [ 614.342119][T29132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 614.342129][T29132] R13: 00007fb9b6486038 R14: 00007fb9b6485fa0 R15: 00007ffdb2c6b5b8 [ 614.342146][T29132] [ 614.665098][ T29] kauditd_printk_skb: 333 callbacks suppressed [ 614.665135][ T29] audit: type=1326 audit(1755529945.442:39973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29148 comm="syz.1.9325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb9b625ebe9 code=0x7ffc0000 [ 614.694934][ T29] audit: type=1326 audit(1755529945.442:39974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29148 comm="syz.1.9325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb9b625ebe9 code=0x7ffc0000 [ 614.718831][ T29] audit: type=1326 audit(1755529945.442:39975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29148 comm="syz.1.9325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=201 compat=0 ip=0x7fb9b625ebe9 code=0x7ffc0000 [ 614.742915][ T29] audit: type=1326 audit(1755529945.442:39976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29148 comm="syz.1.9325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb9b625ebe9 code=0x7ffc0000 [ 614.767159][ T29] audit: type=1326 audit(1755529945.442:39977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29148 comm="syz.1.9325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb9b625ebe9 code=0x7ffc0000 [ 614.808517][ T29] audit: type=1326 audit(1755529945.442:39978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29148 comm="syz.1.9325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fb9b625ebe9 code=0x7ffc0000 [ 614.832197][ T29] audit: type=1326 audit(1755529945.442:39979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29148 comm="syz.1.9325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb9b625ebe9 code=0x7ffc0000 [ 614.855883][ T29] audit: type=1326 audit(1755529945.442:39980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29148 comm="syz.1.9325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb9b625ebe9 code=0x7ffc0000 [ 614.879639][ T29] audit: type=1326 audit(1755529945.442:39981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29148 comm="syz.1.9325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fb9b625ebe9 code=0x7ffc0000 [ 614.903137][ T29] audit: type=1326 audit(1755529945.442:39982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29148 comm="syz.1.9325" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb9b625ebe9 code=0x7ffc0000 [ 615.019404][T29166] FAULT_INJECTION: forcing a failure. [ 615.019404][T29166] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 615.032997][T29166] CPU: 0 UID: 0 PID: 29166 Comm: syz.0.9330 Tainted: G W 6.17.0-rc2-syzkaller #0 PREEMPT(voluntary) [ 615.033045][T29166] Tainted: [W]=WARN [ 615.033051][T29166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 615.033064][T29166] Call Trace: [ 615.033071][T29166] [ 615.033078][T29166] __dump_stack+0x1d/0x30 [ 615.033098][T29166] dump_stack_lvl+0xe8/0x140 [ 615.033113][T29166] dump_stack+0x15/0x1b [ 615.033192][T29166] should_fail_ex+0x265/0x280 [ 615.033210][T29166] should_fail+0xb/0x20 [ 615.033224][T29166] should_fail_usercopy+0x1a/0x20 [ 615.033243][T29166] _copy_from_iter+0xcf/0xe40 [ 615.033263][T29166] ? __build_skb_around+0x1a0/0x200 [ 615.033307][T29166] ? __alloc_skb+0x223/0x320 [ 615.033404][T29166] netlink_sendmsg+0x471/0x6b0 [ 615.033425][T29166] ? __pfx_netlink_sendmsg+0x10/0x10 [ 615.033442][T29166] __sock_sendmsg+0x142/0x180 [ 615.033512][T29166] ____sys_sendmsg+0x31e/0x4e0 [ 615.033601][T29166] ___sys_sendmsg+0x17b/0x1d0 [ 615.033625][T29166] __x64_sys_sendmsg+0xd4/0x160 [ 615.033645][T29166] x64_sys_call+0x191e/0x2ff0 [ 615.033752][T29166] do_syscall_64+0xd2/0x200 [ 615.033773][T29166] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 615.033793][T29166] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 615.033814][T29166] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 615.033831][T29166] RIP: 0033:0x7f903723ebe9 [ 615.033866][T29166] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 615.033881][T29166] RSP: 002b:00007f9035c9f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 615.033896][T29166] RAX: ffffffffffffffda RBX: 00007f9037465fa0 RCX: 00007f903723ebe9 [ 615.033905][T29166] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000003 [ 615.033914][T29166] RBP: 00007f9035c9f090 R08: 0000000000000000 R09: 0000000000000000 [ 615.033924][T29166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 615.034009][T29166] R13: 00007f9037466038 R14: 00007f9037465fa0 R15: 00007ffcf069a588 [ 615.034022][T29166] [ 615.074464][T29170] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29170 comm=syz.4.9334 [ 615.075767][T29170] netlink: 12 bytes leftover after parsing attributes in process `syz.4.9334'. [ 615.126821][T29174] FAULT_INJECTION: forcing a failure. [ 615.126821][T29174] name failslab, interval 1, probability 0, space 0, times 0 [ 615.126848][T29174] CPU: 1 UID: 0 PID: 29174 Comm: syz.4.9336 Tainted: G W 6.17.0-rc2-syzkaller #0 PREEMPT(voluntary) [ 615.126900][T29174] Tainted: [W]=WARN [ 615.126906][T29174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 615.126917][T29174] Call Trace: [ 615.126923][T29174] [ 615.126930][T29174] __dump_stack+0x1d/0x30 [ 615.126949][T29174] dump_stack_lvl+0xe8/0x140 [ 615.126969][T29174] dump_stack+0x15/0x1b [ 615.127055][T29174] should_fail_ex+0x265/0x280 [ 615.127092][T29174] ? selinux_bpf_prog_load+0x36/0xf0 [ 615.127111][T29174] should_failslab+0x8c/0xb0 [ 615.127203][T29174] __kmalloc_cache_noprof+0x4c/0x320 [ 615.127235][T29174] selinux_bpf_prog_load+0x36/0xf0 [ 615.127355][T29174] security_bpf_prog_load+0x54/0xa0 [ 615.127388][T29174] bpf_prog_load+0xe6b/0x1070 [ 615.127480][T29174] ? security_bpf+0x2b/0x90 [ 615.127511][T29174] __sys_bpf+0x462/0x7b0 [ 615.127567][T29174] __x64_sys_bpf+0x41/0x50 [ 615.127591][T29174] x64_sys_call+0x2aea/0x2ff0 [ 615.127652][T29174] do_syscall_64+0xd2/0x200 [ 615.127678][T29174] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 615.127702][T29174] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 615.127785][T29174] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 615.127807][T29174] RIP: 0033:0x7f1aa6a1ebe9 [ 615.127822][T29174] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 615.127840][T29174] RSP: 002b:00007f1aa547f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 615.127859][T29174] RAX: ffffffffffffffda RBX: 00007f1aa6c45fa0 RCX: 00007f1aa6a1ebe9 [ 615.127871][T29174] RDX: 0000000000000048 RSI: 00002000000017c0 RDI: 0000000000000005 [ 615.127934][T29174] RBP: 00007f1aa547f090 R08: 0000000000000000 R09: 0000000000000000 [ 615.127979][T29174] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 615.128054][T29174] R13: 00007f1aa6c46038 R14: 00007f1aa6c45fa0 R15: 00007ffed36d39a8 [ 615.128073][T29174] [ 615.418937][T29187] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 615.550743][T29190] loop1: detected capacity change from 0 to 256 [ 615.561405][T29190] FAT-fs (loop1): Directory bread(block 1285) failed [ 615.570128][T29189] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 615.647255][T29201] FAULT_INJECTION: forcing a failure. [ 615.647255][T29201] name failslab, interval 1, probability 0, space 0, times 0 [ 615.660016][T29201] CPU: 0 UID: 0 PID: 29201 Comm: syz.1.9347 Tainted: G W 6.17.0-rc2-syzkaller #0 PREEMPT(voluntary) [ 615.660092][T29201] Tainted: [W]=WARN [ 615.660100][T29201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 615.660113][T29201] Call Trace: [ 615.660120][T29201] [ 615.660127][T29201] __dump_stack+0x1d/0x30 [ 615.660146][T29201] dump_stack_lvl+0xe8/0x140 [ 615.660164][T29201] dump_stack+0x15/0x1b [ 615.660180][T29201] should_fail_ex+0x265/0x280 [ 615.660278][T29201] should_failslab+0x8c/0xb0 [ 615.660310][T29201] kmem_cache_alloc_noprof+0x50/0x310 [ 615.660340][T29201] ? prepare_kernel_cred+0x3d/0x680 [ 615.660384][T29201] ? __list_add_valid_or_report+0x38/0xe0 [ 615.660411][T29201] prepare_kernel_cred+0x3d/0x680 [ 615.660436][T29201] ? _request_firmware+0x431/0xbb0 [ 615.660624][T29201] _request_firmware+0x446/0xbb0 [ 615.660650][T29201] ? cred_has_capability+0x210/0x280 [ 615.660667][T29201] ? __rcu_read_unlock+0x4f/0x70 [ 615.660690][T29201] request_firmware+0x36/0x50 [ 615.660715][T29201] devlink_compat_flash_update+0xb2/0x1b0 [ 615.660760][T29201] dev_ethtool+0x14a1/0x1660 [ 615.660785][T29201] ? full_name_hash+0x92/0xe0 [ 615.660892][T29201] dev_ioctl+0x2e0/0x960 [ 615.660926][T29201] sock_do_ioctl+0x197/0x220 [ 615.660951][T29201] sock_ioctl+0x41b/0x610 [ 615.660978][T29201] ? __pfx_sock_ioctl+0x10/0x10 [ 615.661035][T29201] __se_sys_ioctl+0xcb/0x140 [ 615.661064][T29201] __x64_sys_ioctl+0x43/0x50 [ 615.661096][T29201] x64_sys_call+0x1816/0x2ff0 [ 615.661192][T29201] do_syscall_64+0xd2/0x200 [ 615.661215][T29201] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 615.661239][T29201] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 615.661285][T29201] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 615.661308][T29201] RIP: 0033:0x7fb9b625ebe9 [ 615.661325][T29201] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 615.661343][T29201] RSP: 002b:00007fb9b4cbf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 615.661431][T29201] RAX: ffffffffffffffda RBX: 00007fb9b6485fa0 RCX: 00007fb9b625ebe9 [ 615.661445][T29201] RDX: 0000200000000340 RSI: 0000000000008946 RDI: 0000000000000005 [ 615.661458][T29201] RBP: 00007fb9b4cbf090 R08: 0000000000000000 R09: 0000000000000000 [ 615.661469][T29201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 615.661479][T29201] R13: 00007fb9b6486038 R14: 00007fb9b6485fa0 R15: 00007ffdb2c6b5b8 [ 615.661523][T29201] [ 616.225730][T29220] IPv6: Can't replace route, no match found [ 616.327994][T29222] netdevsim netdevsim1: Direct firmware load for ./file0/file1 failed with error -2 [ 616.429290][T29224] loop1: detected capacity change from 0 to 512 [ 616.506863][T29224] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 616.535118][T29224] EXT4-fs (loop1): orphan cleanup on readonly fs [ 616.554467][T29224] EXT4-fs warning (device loop1): ext4_enable_quotas:7168: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 616.579289][T29224] EXT4-fs (loop1): Cannot turn on quotas: error -117 [ 616.598376][T29224] EXT4-fs error (device loop1): ext4_validate_block_bitmap:441: comm syz.1.9356: bg 0: block 40: padding at end of block bitmap is not set [ 616.613897][T29224] EXT4-fs error (device loop1) in ext4_mb_clear_bb:6657: Corrupt filesystem [ 616.640491][T29224] EXT4-fs (loop1): 1 truncate cleaned up [ 616.655879][T29224] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 616.702406][T27338] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 617.103138][T29251] loop1: detected capacity change from 0 to 1024 [ 617.139738][T29251] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 617.206274][T29251] ext4 filesystem being mounted at /115/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 617.290029][T27338] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 617.345449][T29262] loop4: detected capacity change from 0 to 512 [ 617.359721][T29262] EXT4-fs error (device loop4): ext4_xattr_inode_iget:437: inode #11: comm syz.4.9370: missing EA_INODE flag [ 617.372661][T29262] EXT4-fs error (device loop4): ext4_xattr_inode_iget:442: comm syz.4.9370: error while reading EA inode 11 err=-117 [ 617.385379][T29262] EXT4-fs (loop4): 1 orphan inode deleted [ 617.397194][T29262] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 617.404615][T29265] loop1: detected capacity change from 0 to 1024 [ 617.440737][T29265] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 617.452900][T29265] ext4 filesystem being mounted at /117/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 617.477069][T27378] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 617.525275][T29272] loop4: detected capacity change from 0 to 256 [ 617.535956][T27338] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 617.545983][T29272] FAT-fs (loop4): Directory bread(block 1285) failed [ 617.565030][T29276] IPv6: Can't replace route, no match found [ 617.572565][T29272] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 617.659284][T29284] loop1: detected capacity change from 0 to 1024 [ 617.671539][T29284] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 617.690004][T29284] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 617.699859][T29284] EXT4-fs (loop1): group descriptors corrupted! [ 617.836601][T29304] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 618.485608][T29292] syz.5.9383 invoked oom-killer: gfp_mask=0x402dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_ZERO|__GFP_NOWARN), order=0, oom_score_adj=1000 [ 618.499878][T29292] CPU: 0 UID: 0 PID: 29292 Comm: syz.5.9383 Tainted: G W 6.17.0-rc2-syzkaller #0 PREEMPT(voluntary) [ 618.499958][T29292] Tainted: [W]=WARN [ 618.499964][T29292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 618.499976][T29292] Call Trace: [ 618.499982][T29292] [ 618.499989][T29292] __dump_stack+0x1d/0x30 [ 618.500023][T29292] dump_stack_lvl+0xe8/0x140 [ 618.500078][T29292] dump_stack+0x15/0x1b [ 618.500092][T29292] dump_header+0x81/0x220 [ 618.500125][T29292] oom_kill_process+0x342/0x400 [ 618.500158][T29292] out_of_memory+0x979/0xb80 [ 618.500228][T29292] try_charge_memcg+0x5e6/0x9e0 [ 618.500327][T29292] obj_cgroup_charge_pages+0xa6/0x150 [ 618.500391][T29292] __memcg_kmem_charge_page+0x9f/0x170 [ 618.500419][T29292] __alloc_frozen_pages_noprof+0x188/0x360 [ 618.500473][T29292] alloc_pages_mpol+0xb3/0x250 [ 618.500651][T29292] alloc_pages_noprof+0x90/0x130 [ 618.500760][T29292] __vmalloc_node_range_noprof+0x6f2/0xe00 [ 618.500807][T29292] __kvmalloc_node_noprof+0x30f/0x4e0 [ 618.500836][T29292] ? ip_set_alloc+0x1f/0x30 [ 618.500944][T29292] ? ip_set_alloc+0x1f/0x30 [ 618.500984][T29292] ? __kmalloc_cache_noprof+0x189/0x320 [ 618.501013][T29292] ip_set_alloc+0x1f/0x30 [ 618.501051][T29292] hash_netiface_create+0x282/0x740 [ 618.501141][T29292] ? __pfx_hash_netiface_create+0x10/0x10 [ 618.501177][T29292] ip_set_create+0x3cc/0x960 [ 618.501232][T29292] ? save_fpregs_to_fpstate+0x100/0x160 [ 618.501276][T29292] nfnetlink_rcv_msg+0x4c3/0x590 [ 618.501398][T29292] netlink_rcv_skb+0x123/0x220 [ 618.501418][T29292] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 618.501456][T29292] nfnetlink_rcv+0x16b/0x1690 [ 618.501483][T29292] ? nlmon_xmit+0x4f/0x60 [ 618.501539][T29292] ? consume_skb+0x49/0x150 [ 618.501559][T29292] ? nlmon_xmit+0x4f/0x60 [ 618.501586][T29292] ? dev_hard_start_xmit+0x3b0/0x3e0 [ 618.501657][T29292] ? __dev_queue_xmit+0x1200/0x2000 [ 618.501680][T29292] ? __dev_queue_xmit+0x182/0x2000 [ 618.501714][T29292] ? ref_tracker_free+0x37d/0x3e0 [ 618.501742][T29292] ? __netlink_deliver_tap+0x4dc/0x500 [ 618.501766][T29292] netlink_unicast+0x5bd/0x690 [ 618.501859][T29292] netlink_sendmsg+0x58b/0x6b0 [ 618.501884][T29292] ? __pfx_netlink_sendmsg+0x10/0x10 [ 618.501905][T29292] __sock_sendmsg+0x142/0x180 [ 618.501940][T29292] ____sys_sendmsg+0x31e/0x4e0 [ 618.501961][T29292] ___sys_sendmsg+0x17b/0x1d0 [ 618.501996][T29292] __x64_sys_sendmsg+0xd4/0x160 [ 618.502022][T29292] x64_sys_call+0x191e/0x2ff0 [ 618.502046][T29292] do_syscall_64+0xd2/0x200 [ 618.502137][T29292] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 618.502163][T29292] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 618.502190][T29292] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 618.502305][T29292] RIP: 0033:0x7f98aa29ebe9 [ 618.502321][T29292] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 618.502341][T29292] RSP: 002b:00007f98a8d07038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 618.502438][T29292] RAX: ffffffffffffffda RBX: 00007f98aa4c5fa0 RCX: 00007f98aa29ebe9 [ 618.502453][T29292] RDX: 0000000000000800 RSI: 0000200000000040 RDI: 0000000000000006 [ 618.502466][T29292] RBP: 00007f98aa321e19 R08: 0000000000000000 R09: 0000000000000000 [ 618.502479][T29292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 618.502493][T29292] R13: 00007f98aa4c6038 R14: 00007f98aa4c5fa0 R15: 00007fffacae27b8 [ 618.502509][T29292] [ 618.502515][T29292] memory: usage 307200kB, limit 307200kB, failcnt 11454 [ 618.850623][T29292] memory+swap: usage 307360kB, limit 9007199254740988kB, failcnt 0 [ 618.858521][T29292] kmem: usage 241756kB, limit 9007199254740988kB, failcnt 0 [ 618.865841][T29292] Memory cgroup stats for /syz5: [ 618.866061][T29292] cache 66981888 [ 618.875049][T29292] rss 4096 [ 618.878121][T29292] shmem 0 [ 618.881072][T29292] mapped_file 0 [ 618.884526][T29292] dirty 0 [ 618.887538][T29292] writeback 0 [ 618.890805][T29292] workingset_refault_anon 15174 [ 618.895672][T29292] workingset_refault_file 7846 [ 618.900517][T29292] swap 163840 [ 618.903882][T29292] swapcached 32768 [ 618.907629][T29292] pgpgin 2020342 [ 618.911230][T29292] pgpgout 2003981 [ 618.914849][T29292] pgfault 902423 [ 618.918412][T29292] pgmajfault 1936 [ 618.922113][T29292] inactive_anon 32768 [ 618.926106][T29292] active_anon 0 [ 618.929628][T29292] inactive_file 0 [ 618.933257][T29292] active_file 0 [ 618.936988][T29292] unevictable 66981888 [ 618.939551][T29360] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 640) [ 618.941055][T29292] hierarchical_memory_limit 314572800 [ 618.941066][T29292] hierarchical_memsw_limit 9223372036854771712 [ 618.941076][T29292] total_cache 66981888 [ 618.941083][T29292] total_rss 4096 [ 618.951370][T29360] SELinux: failed to load policy [ 618.955257][T29292] total_shmem 0 [ 618.964467][T29360] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29360 comm=syz.0.9410 [ 618.965465][T29292] total_mapped_file 0 [ 618.965474][T29292] total_dirty 0 [ 618.965481][T29292] total_writeback 0 [ 618.965488][T29292] total_workingset_refault_anon 15174 [ 618.965495][T29292] total_workingset_refault_file 7846 [ 618.965503][T29292] total_swap 163840 [ 618.965510][T29292] total_swapcached 32768 [ 618.973666][T29360] netlink: 14521 bytes leftover after parsing attributes in process `syz.0.9410'. [ 618.973954][T29292] total_pgpgin 2020342 [ 619.033782][T29292] total_pgpgout 2003981 [ 619.037967][T29292] total_pgfault 902423 [ 619.042086][T29292] total_pgmajfault 1936 [ 619.046345][T29292] total_inactive_anon 32768 [ 619.050934][T29292] total_active_anon 0 [ 619.054950][T29292] total_inactive_file 0 [ 619.059230][T29292] total_active_file 0 [ 619.063205][T29292] total_unevictable 66981888 [ 619.068001][T29292] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz5,task_memcg=/syz5,task=syz.5.9383,pid=29291,uid=0 [ 619.082744][T29292] Memory cgroup out of memory: Killed process 29291 (syz.5.9383) total-vm:93764kB, anon-rss:944kB, file-rss:22316kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 619.220101][T29380] loop4: detected capacity change from 0 to 256 [ 619.240165][T29380] FAT-fs (loop4): Directory bread(block 1285) failed [ 619.271089][T29380] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 619.295685][T29384] netlink: 8 bytes leftover after parsing attributes in process `syz.2.9416'. [ 619.332760][T29384] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 619.520913][T29363] chnl_net:caif_netlink_parms(): no params data found [ 619.665652][ T29] kauditd_printk_skb: 249 callbacks suppressed [ 619.665745][ T29] audit: type=1326 audit(1755529950.454:40231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29414 comm="syz.4.9429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1aa6a1ebe9 code=0x7ffc0000 [ 619.698207][T29363] bridge0: port 1(bridge_slave_0) entered blocking state [ 619.705419][T29363] bridge0: port 1(bridge_slave_0) entered disabled state [ 619.722907][T29363] bridge_slave_0: entered allmulticast mode [ 619.735297][T29363] bridge_slave_0: entered promiscuous mode [ 619.741461][ T29] audit: type=1326 audit(1755529950.454:40232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29414 comm="syz.4.9429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1aa6a1ebe9 code=0x7ffc0000 [ 619.765129][ T29] audit: type=1326 audit(1755529950.454:40233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29414 comm="syz.4.9429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1aa6a1ebe9 code=0x7ffc0000 [ 619.788792][ T29] audit: type=1326 audit(1755529950.454:40234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29414 comm="syz.4.9429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1aa6a1ebe9 code=0x7ffc0000 [ 619.812930][ T29] audit: type=1326 audit(1755529950.454:40235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29414 comm="syz.4.9429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1aa6a1ebe9 code=0x7ffc0000 [ 619.837003][ T29] audit: type=1326 audit(1755529950.454:40236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29414 comm="syz.4.9429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1aa6a1ebe9 code=0x7ffc0000 [ 619.860922][ T29] audit: type=1326 audit(1755529950.454:40237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29414 comm="syz.4.9429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=237 compat=0 ip=0x7f1aa6a1ebe9 code=0x7ffc0000 [ 619.884627][ T29] audit: type=1326 audit(1755529950.454:40238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29414 comm="syz.4.9429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1aa6a1ebe9 code=0x7ffc0000 [ 619.908527][ T29] audit: type=1326 audit(1755529950.454:40239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29414 comm="syz.4.9429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=450 compat=0 ip=0x7f1aa6a1ebe9 code=0x7ffc0000 [ 619.932301][ T29] audit: type=1326 audit(1755529950.454:40240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29414 comm="syz.4.9429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1aa6a1ebe9 code=0x7ffc0000 [ 619.957978][T29363] bridge0: port 2(bridge_slave_1) entered blocking state [ 619.965176][T29363] bridge0: port 2(bridge_slave_1) entered disabled state [ 619.967146][T29424] loop4: detected capacity change from 0 to 512 [ 619.972428][T29363] bridge_slave_1: entered allmulticast mode [ 619.985316][T29363] bridge_slave_1: entered promiscuous mode [ 620.038844][T29363] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 620.054623][T29424] EXT4-fs error (device loop4): ext4_xattr_inode_iget:437: inode #11: comm syz.4.9434: missing EA_INODE flag [ 620.069116][T29424] EXT4-fs error (device loop4): ext4_xattr_inode_iget:442: comm syz.4.9434: error while reading EA inode 11 err=-117 [ 620.090204][T29424] EXT4-fs (loop4): 1 orphan inode deleted [ 620.096423][T27712] bridge_slave_1: left allmulticast mode [ 620.102064][T27712] bridge_slave_1: left promiscuous mode [ 620.107922][T27712] bridge0: port 2(bridge_slave_1) entered disabled state [ 620.117854][T29424] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 620.131049][T27712] bridge_slave_0: left allmulticast mode [ 620.136804][T27712] bridge_slave_0: left promiscuous mode [ 620.142687][T27712] bridge0: port 1(bridge_slave_0) entered disabled state [ 620.242439][T27378] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 620.307474][T27712] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 620.317352][T27712] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 620.323239][T29447] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 620.347550][T27712] bond0 (unregistering): Released all slaves [ 620.366659][T27712] bond1 (unregistering): Released all slaves [ 620.386070][T27712] bond2 (unregistering): (slave batadv1): Releasing active interface [ 620.405648][T27712] bond2 (unregistering): Released all slaves [ 620.414930][T29363] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 620.472449][T29363] team0: Port device team_slave_0 added [ 620.493691][T27712] IPVS: stopping master sync thread 24727 ... [ 621.002697][T29454] loop4: detected capacity change from 0 to 8192 [ 621.251871][T29461] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 640) [ 621.262411][T29461] SELinux: failed to load policy [ 621.268638][T29461] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29461 comm=syz.5.9449 [ 621.296591][T29461] netlink: 14521 bytes leftover after parsing attributes in process `syz.5.9449'. [ 621.343399][T29363] team0: Port device team_slave_1 added [ 621.404886][T29468] netlink: 44 bytes leftover after parsing attributes in process `syz.5.9452'. [ 621.451145][T29454] loop4: p1 p2 p3 p4 [ 621.456507][T29454] loop4: p1 size 3523149824 extends beyond EOD, truncated [ 621.470916][T29454] loop4: p2 start 4293394688 is beyond EOD, truncated [ 621.477920][T29454] loop4: p3 start 150994944 is beyond EOD, truncated [ 621.484702][T29454] loop4: p4 size 50331648 extends beyond EOD, truncated [ 621.510061][T29466] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 640) [ 621.533056][T27712] hsr_slave_0: left promiscuous mode [ 621.548793][T27712] hsr_slave_1: left promiscuous mode [ 621.554789][T29466] SELinux: failed to load policy [ 621.567207][T29472] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 621.580167][T27712] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 621.587706][T27712] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 621.598117][T29466] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29466 comm=syz.1.9451 [ 621.621047][T27712] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 621.628577][T27712] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 621.651762][T27712] veth1_macvtap: left promiscuous mode [ 621.658595][T27712] veth0_macvtap: left promiscuous mode [ 621.664401][T27712] veth1_vlan: left promiscuous mode [ 621.669818][T27712] veth0_vlan: left promiscuous mode [ 621.770781][T27712] team0 (unregistering): Port device team_slave_1 removed [ 621.784273][T27712] team0 (unregistering): Port device team_slave_0 removed [ 621.830923][T29363] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 621.838070][T29363] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 621.864697][T29363] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 621.879943][T29466] netlink: 14521 bytes leftover after parsing attributes in process `syz.1.9451'. [ 621.890176][T29363] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 621.897216][T29363] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 621.923753][T29363] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 621.937215][ T2991] loop4: p1 p2 p3 p4 [ 621.941278][ T2991] loop4: p1 size 3523149824 extends beyond EOD, truncated [ 621.950349][ T2991] loop4: p2 start 4293394688 is beyond EOD, truncated [ 621.957270][ T2991] loop4: p3 start 150994944 is beyond EOD, truncated [ 621.964139][ T2991] loop4: p4 size 50331648 extends beyond EOD, truncated [ 622.027593][T29363] hsr_slave_0: entered promiscuous mode [ 622.042964][T29363] hsr_slave_1: entered promiscuous mode [ 622.060711][T29363] debugfs: 'hsr0' already exists in 'hsr' [ 622.066508][T29363] Cannot create hsr debugfs directory [ 622.108435][T25705] udevd[25705]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 622.125694][T13805] udevd[13805]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 622.168936][T25705] udevd[25705]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 622.180505][T29495] loop4: detected capacity change from 0 to 256 [ 622.199546][T13805] udevd[13805]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 622.213231][T29495] FAT-fs (loop4): Directory bread(block 1285) failed [ 622.231782][T29495] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 622.313609][T29480] loop1: detected capacity change from 0 to 8192 [ 622.387105][ T6613] loop1: p1 p2 p3 p4 [ 622.391377][ T6613] loop1: p1 size 3523149824 extends beyond EOD, truncated [ 622.400829][ T6613] loop1: p2 start 4293394688 is beyond EOD, truncated [ 622.407788][ T6613] loop1: p3 start 150994944 is beyond EOD, truncated [ 622.414594][ T6613] loop1: p4 size 50331648 extends beyond EOD, truncated [ 622.415700][T29504] loop4: detected capacity change from 0 to 1024 [ 622.523478][T29504] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 622.533376][T29504] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 622.543268][T29504] EXT4-fs (loop4): group descriptors corrupted! [ 622.782299][T29363] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 622.794349][T29363] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 622.808290][T29363] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 622.818478][T29363] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 622.889135][T29363] 8021q: adding VLAN 0 to HW filter on device bond0 [ 622.906284][T29363] 8021q: adding VLAN 0 to HW filter on device team0 [ 622.919796][ T1082] bridge0: port 1(bridge_slave_0) entered blocking state [ 622.927026][ T1082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 622.960505][T29363] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 622.971318][T29363] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 622.990483][ T1082] bridge0: port 2(bridge_slave_1) entered blocking state [ 622.997870][ T1082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 623.189487][T29363] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 623.297117][T29363] veth0_vlan: entered promiscuous mode [ 623.309096][T29363] veth1_vlan: entered promiscuous mode [ 623.349317][T29363] veth0_macvtap: entered promiscuous mode [ 623.369244][T29363] veth1_macvtap: entered promiscuous mode [ 623.386574][T29480] loop1: p1 p2 p3 p4 [ 623.390694][T29480] loop1: p1 size 3523149824 extends beyond EOD, truncated [ 623.409325][T29363] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 623.422369][T29480] loop1: p2 start 4293394688 is beyond EOD, truncated [ 623.429217][T29480] loop1: p3 start 150994944 is beyond EOD, truncated [ 623.435952][T29480] loop1: p4 size 50331648 extends beyond EOD, truncated [ 623.459391][T29363] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 623.481156][T11847] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 623.500550][T11847] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 623.522679][ T2991] loop1: p1 p2 p3 p4 [ 623.528659][ T2991] loop1: p1 size 3523149824 extends beyond EOD, truncated [ 623.560384][T11847] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 623.575060][ T2991] loop1: p2 start 4293394688 is beyond EOD, truncated [ 623.582087][ T2991] loop1: p3 start 150994944 is beyond EOD, truncated [ 623.588821][ T2991] loop1: p4 size 50331648 extends beyond EOD, truncated [ 623.623504][T11847] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 623.717796][T25705] udevd[25705]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 623.776396][T25705] udevd[25705]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 623.790751][T13805] udevd[13805]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 623.818917][T29540] netlink: 8 bytes leftover after parsing attributes in process `syz.0.9474'. [ 623.828455][T29540] netlink: 4 bytes leftover after parsing attributes in process `syz.0.9474'. [ 623.857879][T25705] udevd[25705]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 623.872424][T13805] udevd[13805]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 623.911336][T29547] loop1: detected capacity change from 0 to 1024 [ 623.933532][T29551] IPv6: Can't replace route, no match found [ 623.955067][T29547] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 623.978598][T29547] ext4 filesystem being mounted at /134/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 624.029002][T29562] loop4: detected capacity change from 0 to 512 [ 624.073141][T29562] EXT4-fs error (device loop4): ext4_xattr_inode_iget:437: inode #11: comm syz.4.9483: missing EA_INODE flag [ 624.088738][T29568] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 624.115933][T29562] EXT4-fs error (device loop4): ext4_xattr_inode_iget:442: comm syz.4.9483: error while reading EA inode 11 err=-117 [ 624.136706][T27338] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 624.146489][T29562] EXT4-fs (loop4): 1 orphan inode deleted [ 624.152973][T29562] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 624.215274][T27378] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 624.352011][T29603] loop1: detected capacity change from 0 to 1024 [ 624.386478][T29603] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 624.395132][T29603] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 624.405010][T29603] EXT4-fs (loop1): group descriptors corrupted! [ 624.626831][T29642] loop4: detected capacity change from 0 to 1024 [ 624.643672][T29642] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 624.657291][T29642] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 624.667288][T29642] EXT4-fs (loop4): group descriptors corrupted! [ 624.679858][T29644] netlink: 8 bytes leftover after parsing attributes in process `syz.1.9522'. [ 624.688864][T29644] netlink: 12 bytes leftover after parsing attributes in process `syz.1.9522'. [ 624.866319][ T29] kauditd_printk_skb: 267 callbacks suppressed [ 624.866413][ T29] audit: type=1400 audit(1755529955.657:40508): avc: denied { ioctl } for pid=29662 comm="syz.4.9530" path="socket:[107486]" dev="sockfs" ino=107486 ioctlcmd=0x745a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 624.904316][T29663] loop4: detected capacity change from 0 to 1024 [ 624.918912][T29663] ext4: Invalid gid '0x00000000ffffffff' [ 624.925639][T29651] loop1: detected capacity change from 0 to 8192 [ 624.962858][T25705] loop1: p1 p2 p3 p4 [ 624.975478][T25705] loop1: p1 size 3523149824 extends beyond EOD, truncated [ 624.987116][T29665] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9531'. [ 624.996382][T25705] loop1: p2 start 4293394688 is beyond EOD, truncated [ 625.003285][T25705] loop1: p3 start 150994944 is beyond EOD, truncated [ 625.010100][T25705] loop1: p4 size 50331648 extends beyond EOD, truncated [ 625.063446][T29651] loop1: p1 p2 p3 p4 [ 625.067645][T29651] loop1: p1 size 3523149824 extends beyond EOD, truncated [ 625.076149][T29651] loop1: p2 start 4293394688 is beyond EOD, truncated [ 625.083030][T29651] loop1: p3 start 150994944 is beyond EOD, truncated [ 625.089820][T29651] loop1: p4 size 50331648 extends beyond EOD, truncated [ 625.119618][ T29] audit: type=1326 audit(1755529955.907:40509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29650 comm="syz.1.9525" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb9b625ebe9 code=0x7ffc0000 [ 625.205815][ T29] audit: type=1326 audit(1755529955.937:40510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29650 comm="syz.1.9525" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb9b625ebe9 code=0x7ffc0000 [ 625.229566][ T29] audit: type=1326 audit(1755529955.937:40511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29650 comm="syz.1.9525" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb9b625ebe9 code=0x7ffc0000 [ 625.237492][T13805] udevd[13805]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 625.253324][ T29] audit: type=1326 audit(1755529955.937:40512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29650 comm="syz.1.9525" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb9b625ebe9 code=0x7ffc0000 [ 625.287061][ T29] audit: type=1326 audit(1755529955.937:40513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29650 comm="syz.1.9525" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb9b625ebe9 code=0x7ffc0000 [ 625.310861][ T29] audit: type=1326 audit(1755529955.937:40514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29650 comm="syz.1.9525" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fb9b625d550 code=0x7ffc0000 [ 625.334490][ T29] audit: type=1326 audit(1755529955.937:40515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29650 comm="syz.1.9525" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7fb9b6260417 code=0x7ffc0000 [ 625.358209][ T29] audit: type=1326 audit(1755529955.937:40516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29650 comm="syz.1.9525" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fb9b625ebe9 code=0x7ffc0000 [ 625.381895][ T29] audit: type=1326 audit(1755529955.937:40517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29650 comm="syz.1.9525" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7fb9b6260417 code=0x7ffc0000 [ 626.337260][T29674] syz.2.9535 (29674) used greatest stack depth: 5152 bytes left [ 626.555560][T29753] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 627.257159][T29813] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 640) [ 627.297050][T29813] SELinux: failed to load policy [ 627.393018][T29828] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 640) [ 627.406046][T29828] SELinux: failed to load policy [ 627.414482][T29828] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29828 comm=syz.1.9605 [ 627.436723][T29828] netlink: 14521 bytes leftover after parsing attributes in process `syz.1.9605'. [ 627.487236][T29840] FAULT_INJECTION: forcing a failure. [ 627.487236][T29840] name failslab, interval 1, probability 0, space 0, times 0 [ 627.500032][T29840] CPU: 1 UID: 0 PID: 29840 Comm: syz.4.9611 Tainted: G W 6.17.0-rc2-syzkaller #0 PREEMPT(voluntary) [ 627.500067][T29840] Tainted: [W]=WARN [ 627.500075][T29840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 627.500087][T29840] Call Trace: [ 627.500094][T29840] [ 627.500160][T29840] __dump_stack+0x1d/0x30 [ 627.500265][T29840] dump_stack_lvl+0xe8/0x140 [ 627.500282][T29840] dump_stack+0x15/0x1b [ 627.500334][T29840] should_fail_ex+0x265/0x280 [ 627.500355][T29840] should_failslab+0x8c/0xb0 [ 627.500430][T29840] kmem_cache_alloc_noprof+0x50/0x310 [ 627.500454][T29840] ? security_file_alloc+0x32/0x100 [ 627.500487][T29840] security_file_alloc+0x32/0x100 [ 627.500571][T29840] init_file+0x5c/0x1d0 [ 627.500597][T29840] alloc_empty_file+0x8b/0x200 [ 627.500623][T29840] alloc_file_pseudo+0xc6/0x160 [ 627.500717][T29840] sock_alloc_file+0x9c/0x1e0 [ 627.500740][T29840] __sys_socket+0x116/0x180 [ 627.500764][T29840] __x64_sys_socket+0x3f/0x50 [ 627.500785][T29840] x64_sys_call+0x1147/0x2ff0 [ 627.500832][T29840] do_syscall_64+0xd2/0x200 [ 627.500858][T29840] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 627.500884][T29840] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 627.500906][T29840] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 627.501013][T29840] RIP: 0033:0x7f1aa6a20b07 [ 627.501028][T29840] Code: f0 ff ff 77 06 c3 0f 1f 44 00 00 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 627.501045][T29840] RSP: 002b:00007f1aa547dfa8 EFLAGS: 00000286 ORIG_RAX: 0000000000000029 [ 627.501063][T29840] RAX: ffffffffffffffda RBX: 00007f1aa6c45fa0 RCX: 00007f1aa6a20b07 [ 627.501146][T29840] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 627.501159][T29840] RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000000 [ 627.501173][T29840] R10: 0000200000000040 R11: 0000000000000286 R12: 0000000000000001 [ 627.501207][T29840] R13: 00007f1aa6c46038 R14: 00007f1aa6c45fa0 R15: 00007ffed36d39a8 [ 627.501224][T29840] [ 628.332700][T29873] netlink: 96 bytes leftover after parsing attributes in process `syz.0.9625'. [ 628.397000][T29869] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 640) [ 628.456464][T29873] netlink: 268 bytes leftover after parsing attributes in process `syz.0.9625'. [ 628.486561][T29875] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29875 comm=syz.4.9624 [ 628.593297][T29869] SELinux: failed to load policy [ 628.639497][T29875] netlink: 14521 bytes leftover after parsing attributes in process `syz.4.9624'. [ 628.832236][T29886] netlink: 'syz.4.9630': attribute type 13 has an invalid length. [ 628.939818][T29886] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 628.982569][T29892] FAULT_INJECTION: forcing a failure. [ 628.982569][T29892] name failslab, interval 1, probability 0, space 0, times 0 [ 628.995583][T29892] CPU: 0 UID: 0 PID: 29892 Comm: syz.2.9633 Tainted: G W 6.17.0-rc2-syzkaller #0 PREEMPT(voluntary) [ 628.995621][T29892] Tainted: [W]=WARN [ 628.995629][T29892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 628.995642][T29892] Call Trace: [ 628.995650][T29892] [ 628.995659][T29892] __dump_stack+0x1d/0x30 [ 628.995685][T29892] dump_stack_lvl+0xe8/0x140 [ 628.995785][T29892] dump_stack+0x15/0x1b [ 628.995803][T29892] should_fail_ex+0x265/0x280 [ 628.995872][T29892] should_failslab+0x8c/0xb0 [ 628.995901][T29892] __kmalloc_noprof+0xa5/0x3e0 [ 628.995930][T29892] ? read_commands+0x4d/0x160 [ 628.995981][T29892] read_commands+0x4d/0x160 [ 628.996001][T29892] ? sk_skb_reason_drop+0xbd/0x270 [ 628.996032][T29892] hci_mgmt_cmd+0x7f5/0x8a0 [ 628.996068][T29892] hci_sock_sendmsg+0x518/0x910 [ 628.996101][T29892] ? __pfx_hci_sock_sendmsg+0x10/0x10 [ 628.996133][T29892] __sock_sendmsg+0x142/0x180 [ 628.996202][T29892] sock_write_iter+0x165/0x1b0 [ 628.996233][T29892] aio_write+0x2e2/0x410 [ 628.996346][T29892] io_submit_one+0xacd/0x11d0 [ 628.996382][T29892] __se_sys_io_submit+0xfb/0x280 [ 628.996412][T29892] __x64_sys_io_submit+0x43/0x50 [ 628.996438][T29892] x64_sys_call+0x2d5d/0x2ff0 [ 628.996465][T29892] do_syscall_64+0xd2/0x200 [ 628.996553][T29892] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 628.996579][T29892] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 628.996654][T29892] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 628.996678][T29892] RIP: 0033:0x7ff76d96ebe9 [ 628.996695][T29892] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 628.996715][T29892] RSP: 002b:00007ff76c3d7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 628.996736][T29892] RAX: ffffffffffffffda RBX: 00007ff76db95fa0 RCX: 00007ff76d96ebe9 [ 628.996755][T29892] RDX: 0000200000000340 RSI: 0000000000000001 RDI: 00007ff76e6d2000 [ 628.996769][T29892] RBP: 00007ff76c3d7090 R08: 0000000000000000 R09: 0000000000000000 [ 628.996783][T29892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 628.996796][T29892] R13: 00007ff76db96038 R14: 00007ff76db95fa0 R15: 00007ffd8c24fb48 [ 628.996816][T29892] [ 629.446276][T29910] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 629.460886][T29914] netlink: 96 bytes leftover after parsing attributes in process `syz.0.9643'. [ 629.537243][T29914] wireguard0: entered promiscuous mode [ 629.543334][T29914] wireguard0: entered allmulticast mode [ 629.664004][T29942] netlink: 'syz.5.9656': attribute type 10 has an invalid length. [ 629.673609][T29942] team0: Device dummy0 is up. Set it down before adding it as a team port [ 629.734588][T29946] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 629.796742][T29948] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 640) [ 629.807420][T29948] SELinux: failed to load policy [ 629.870455][ T29] kauditd_printk_skb: 521 callbacks suppressed [ 629.870470][ T29] audit: type=1326 audit(1755529960.659:41039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29956 comm="syz.5.9663" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f98aa29ebe9 code=0x7ffc0000 [ 629.923676][ T29] audit: type=1326 audit(1755529960.659:41040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29956 comm="syz.5.9663" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f98aa29ebe9 code=0x7ffc0000 [ 629.947345][ T29] audit: type=1326 audit(1755529960.659:41041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29956 comm="syz.5.9663" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f98aa29ebe9 code=0x7ffc0000 [ 629.971295][ T29] audit: type=1326 audit(1755529960.659:41042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29956 comm="syz.5.9663" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f98aa29ebe9 code=0x7ffc0000 [ 629.994927][ T29] audit: type=1326 audit(1755529960.659:41043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29956 comm="syz.5.9663" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f98aa29ebe9 code=0x7ffc0000 [ 630.018780][ T29] audit: type=1326 audit(1755529960.689:41044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29956 comm="syz.5.9663" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f98aa29ebe9 code=0x7ffc0000 [ 630.042293][ T29] audit: type=1326 audit(1755529960.689:41045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29956 comm="syz.5.9663" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f98aa29ebe9 code=0x7ffc0000 [ 630.066189][ T29] audit: type=1326 audit(1755529960.689:41046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29956 comm="syz.5.9663" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f98aa29ebe9 code=0x7ffc0000 [ 630.089778][ T29] audit: type=1326 audit(1755529960.689:41047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29956 comm="syz.5.9663" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f98aa29ebe9 code=0x7ffc0000 [ 630.113531][ T29] audit: type=1326 audit(1755529960.689:41048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29956 comm="syz.5.9663" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f98aa29ebe9 code=0x7ffc0000 [ 630.151738][T29966] netlink: 8 bytes leftover after parsing attributes in process `syz.4.9668'. [ 630.234892][ T3290] ================================================================== [ 630.243503][ T3290] BUG: KCSAN: data-race in virtqueue_disable_cb / virtqueue_disable_cb [ 630.251815][ T3290] [ 630.254116][ T3290] read to 0xffff8881020b0d78 of 2 bytes by interrupt on cpu 0: [ 630.261639][ T3290] virtqueue_disable_cb+0x58/0x150 [ 630.266730][ T3290] skb_xmit_done+0x65/0x140 [ 630.271221][ T3290] vring_interrupt+0x155/0x180 [ 630.275965][ T3290] __handle_irq_event_percpu+0x90/0x440 [ 630.281495][ T3290] handle_irq_event+0x64/0xf0 [ 630.286168][ T3290] handle_edge_irq+0x154/0x470 [ 630.290939][ T3290] __common_interrupt+0x60/0xb0 [ 630.295767][ T3290] common_interrupt+0x3e/0x90 [ 630.300522][ T3290] asm_common_interrupt+0x26/0x40 [ 630.305542][ T3290] __tsan_unaligned_write8+0x13b/0x190 [ 630.311044][ T3290] virtqueue_add+0x2260/0x2640 [ 630.315876][ T3290] virtqueue_add_inbuf_premapped+0x56/0x90 [ 630.321735][ T3290] try_fill_recv+0x89e/0x16d0 [ 630.326402][ T3290] virtnet_poll+0x1641/0x1cb0 [ 630.331067][ T3290] __napi_poll+0x66/0x310 [ 630.335381][ T3290] net_rx_action+0x391/0x830 [ 630.339956][ T3290] handle_softirqs+0xba/0x290 [ 630.344631][ T3290] __irq_exit_rcu+0x3a/0xc0 [ 630.349109][ T3290] common_interrupt+0x83/0x90 [ 630.353800][ T3290] asm_common_interrupt+0x26/0x40 [ 630.358818][ T3290] __tsan_read8+0xe9/0x190 [ 630.363220][ T3290] unmap_page_range+0xd52/0x2680 [ 630.368139][ T3290] unmap_vmas+0x23d/0x3a0 [ 630.372467][ T3290] exit_mmap+0x1b0/0x6c0 [ 630.376681][ T3290] __mmput+0x28/0x1c0 [ 630.380642][ T3290] mmput+0x40/0x50 [ 630.384435][ T3290] exit_mm+0xe4/0x190 [ 630.388403][ T3290] do_exit+0x417/0x15c0 [ 630.392548][ T3290] do_group_exit+0x139/0x140 [ 630.397181][ T3290] __x64_sys_exit_group+0x1f/0x20 [ 630.402199][ T3290] x64_sys_call+0x2fe2/0x2ff0 [ 630.406868][ T3290] do_syscall_64+0xd2/0x200 [ 630.411368][ T3290] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 630.417241][ T3290] [ 630.419548][ T3290] write to 0xffff8881020b0d78 of 2 bytes by task 3290 on cpu 1: [ 630.427179][ T3290] virtqueue_disable_cb+0x7a/0x150 [ 630.432277][ T3290] start_xmit+0x103/0x17a0 [ 630.436677][ T3290] dev_hard_start_xmit+0x122/0x3e0 [ 630.441766][ T3290] sch_direct_xmit+0x192/0x550 [ 630.446510][ T3290] __dev_queue_xmit+0xe9a/0x2000 [ 630.451420][ T3290] ip_finish_output2+0x77f/0x8b0 [ 630.456339][ T3290] ip_finish_output+0x114/0x2a0 [ 630.461170][ T3290] ip_output+0xbd/0x190 [ 630.465391][ T3290] __ip_queue_xmit+0xb4b/0xb80 [ 630.470134][ T3290] ip_queue_xmit+0x39/0x50 [ 630.474536][ T3290] __tcp_transmit_skb+0x1641/0x1a60 [ 630.479719][ T3290] __tcp_send_ack+0x227/0x350 [ 630.484384][ T3290] tcp_send_ack+0x29/0x30 [ 630.488694][ T3290] __tcp_cleanup_rbuf+0xd3/0x2c0 [ 630.493627][ T3290] tcp_recvmsg_locked+0x1ade/0x1fd0 [ 630.498850][ T3290] tcp_recvmsg+0x12e/0x490 [ 630.503336][ T3290] inet_recvmsg+0xb7/0x290 [ 630.507859][ T3290] sock_recvmsg+0xf6/0x170 [ 630.512340][ T3290] sock_read_iter+0x152/0x1a0 [ 630.516994][ T3290] vfs_read+0x649/0x770 [ 630.521128][ T3290] ksys_read+0xda/0x1a0 [ 630.525292][ T3290] __x64_sys_read+0x40/0x50 [ 630.529772][ T3290] x64_sys_call+0x27bc/0x2ff0 [ 630.534439][ T3290] do_syscall_64+0xd2/0x200 [ 630.538946][ T3290] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 630.544816][ T3290] [ 630.547149][ T3290] value changed: 0x0000 -> 0x0001 [ 630.552173][ T3290] [ 630.554484][ T3290] Reported by Kernel Concurrency Sanitizer on: [ 630.560729][ T3290] CPU: 1 UID: 0 PID: 3290 Comm: syz-executor Tainted: G W 6.17.0-rc2-syzkaller #0 PREEMPT(voluntary) [ 630.573309][ T3290] Tainted: [W]=WARN [ 630.577174][ T3290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 630.587207][ T3290] ================================================================== [ 630.617378][T29985] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies.