last executing test programs: 5m39.278829842s ago: executing program 0 (id=551): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x2c, r3, 0x6a98047402e98331, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8040}, 0x4886) 5m38.351229687s ago: executing program 0 (id=556): bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)={0x1c, r1, 0x1, 0x0, 0x8, {{}, {0x0, 0x6}}}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x6, 0x3, 0x10, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/11, @ANYRES32, @ANYBLOB='\x00'/17], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000005007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) clock_nanosleep(0x9, 0x0, &(0x7f00000007c0)={0x0, 0x989680}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socket(0x400000000010, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) socket$inet6(0xa, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) 5m38.172654239s ago: executing program 0 (id=562): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x80000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1, 0x0, 0x3}, 0x18) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="14000000100001000b000000000000000000000a20000000000a03000000000000000000010000000900010073797a300000000044000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f08000340000000045c0000000c0a01020000000000000000010000000900020073797a32000000000900010073797a3000000000300003802c00008028000180230001"], 0xe8}}, 0x0) 5m38.103979451s ago: executing program 0 (id=563): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="18fffffffc000000000050ed00ea41eea35a366ae03ed37100000000000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000072000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f00000002c0)='kfree\x00', r1}, 0x18) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800700, &(0x7f0000000200)={[{@usrjquota}, {@journal_dev={'journal_dev', 0x3d, 0x8000}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@minixdf}, {@resgid}, {@grpquota}, {@usrjquota}, {@journal_dev={'journal_dev', 0x3d, 0xdcc}}]}, 0x3, 0x44a, &(0x7f0000000400)="$eJzs281vG0UbAPBn10n6vv1KKOWjpUCgQkR8JE1aoAcuIJA4FIEEh3IMTlpVdRvUBIlWFQ0IlQsSqgRnxBGJv4AbFwSckLjCHVWqoJcWTkG73m1t106b1rFD/ftJm8x4x555PDve2R07gIE1nv1JIrZGxG8RMVrPNhcYr/+7evls9e/LZ6tJrKy89WeSl7ty+Wy1LFo+b0uRmUgj0k+SopJmi6fPHJ+t1eZPFfmppRPvTS2ePvPssROzR+ePzp+cOXjwwP7pF56fea4rcWZxXdn94cKeXa+9c+H16uEL7/70bdbercX+xji6ZTwL/K+VXOu+J7pdWZ9ta0gnQ31sCGtSiYisu4bz8T8albjeeaPx6sd9bRywrrJz06bOu5dXgLtYEv1uAdAf5Yk+u/4ttx5NPTaESy/VL4CyuK8WW33PUKRFmeGW69tuGo+Iw8v/fJVtsU73IQAAGn1W/fJQPNNu/pfG/Q3lthdrKGMRcU9E7IiIeyNiZ0TcF5GXfSAiHlxj/a1LQzfOf9KLtxXYLcrmfy8Wa1vN879y9hdjlSK3LY9/ODlyrDa/r3hPJmJ4U5afXqWO71/59fNO+xrnf9mW1V/OBYt2XBxquUE3N7s0m09Ku+DSRxG7h9rFn1xbCUgiYldE7F7bS28vE8ee+mZPp0I3j38VXVhnWvk64sl6/y9HS/ylZPX1yan/RW1+31R5VNzo51/Ov9mp/juKvwuy/t/cfPy3FhlLGtdrF9dex/nfP+14TXO7x/9I8nbeLyPFYx/MLi2dmo4YSQ7l+abHZ64/t8yX5bP4J/a2H/87iudk9TwUEdlB/HBEPBIRjxZtfywiHo+IvavE/+PLnfdthP6fa/v5d+34b+n/tScqx3/4rlP9t9b/B/LURPFI/vl3E7fawDt57wAAAOC/Is2/A5+kk9fSaTo5Wf8O/87YnNYWFpeePrLw/sm5+nflx2I4Le90jTbcD51OlotXrOdninvF5f79xX3jLyr/z/OT1YXaXJ9jh0G3pcP4z/xR6XfrgHXXbh1tZqQPDQF6rnX8p83Zc2/0sjFAT/m9Ngyum4z/tFftAHrP+R8GV7vxf64lby0A7k7O/zC4jH8YXMY/DC7jHwbSnfyuX2KQE5FuiGZIrFOi359MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3fFvAAAA//+uEO7O") r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0x1, 0x0, 0x0, "810000cc2b000000000000fa25ffff00ffffff"}) r6 = syz_open_pts(r5, 0x141601) write(r6, &(0x7f0000000000)="d5", 0xfffffedf) close_range(r4, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r7, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000001600)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002540)={{r8}, &(0x7f00000024c0), &(0x7f0000002500)}, 0x20) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) 5m37.53471721s ago: executing program 0 (id=569): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0, 0x80000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1, 0x0, 0x3}, 0x18) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f00000005c0)=ANY=[@ANYBLOB="14000000100001ff00000000000000000000000a2c000000050a01020000000000000000020000000900030073797a32000000000900010073797a300000000014000000020a031747d21400000000000000000014000000110001"], 0x68}, 0x1, 0x0, 0x0, 0x4006000}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="14000000100001000b000000000000000000000a20000000000a03000000000000000000010000000900010073797a300000000044000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f08000340000000045c0000000c0a01020000000000000000010000000900020073797a32000000000900010073797a3000000000300003802c00008028000180230001"], 0xe8}}, 0x0) 5m37.100033667s ago: executing program 0 (id=575): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00fdf60d2cb3e2a46805000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socket$inet6(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) (async) socket$netlink(0x10, 0x3, 0x8000000004) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000107000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa2000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$inet6(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r2, 0x101) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000040), 0x5, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x14, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="1800"/14, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], &(0x7f0000000c40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3020046, &(0x7f0000000c80)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@dioread_lock}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@data_err_ignore}, {@grpquota}, {@nobh}, {@user_xattr}, {@bh}, {@dioread_nolock}], [{@subj_role={'subj_role', 0x3d, '%&/{].+'}}, {@dont_appraise}, {@fsmagic}, {@uid_gt}, {@euid_lt}]}, 0x1, 0x553, &(0x7f0000001080)="$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") lsetxattr$security_selinux(&(0x7f00000001c0)='.\x00', &(0x7f0000000240), 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800700, &(0x7f0000000880)={[{@usrjquota}, {@journal_dev={'journal_dev', 0x3d, 0x8000}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@minixdf}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x10}}, {@grpquota}, {@usrjquota}, {@delalloc}]}, 0x3, 0x44a, &(0x7f0000000400)="$eJzs281vG0UbAPBn10n6vv1KKOWjpUCgQkR8JE1aoAcuIJA4FIEEh3IMTlpVdRvUBIlWFQ0IlQsSqgRnxBGJv4AbFwSckLjCHVWqoJcWTkG73m1t106b1rFD/ftJm8x4x555PDve2R07gIE1nv1JIrZGxG8RMVrPNhcYr/+7evls9e/LZ6tJrKy89WeSl7ty+Wy1LFo+b0uRmUgj0k+SopJmi6fPHJ+t1eZPFfmppRPvTS2ePvPssROzR+ePzp+cOXjwwP7pF56fea4rcWZxXdn94cKeXa+9c+H16uEL7/70bdbercX+xji6ZTwL/K+VXOu+J7pdWZ9ta0gnQ31sCGtSiYisu4bz8T8albjeeaPx6sd9bRywrrJz06bOu5dXgLtYEv1uAdAf5Yk+u/4ttx5NPTaESy/VL4CyuK8WW33PUKRFmeGW69tuGo+Iw8v/fJVtsU73IQAAGn1W/fJQPNNu/pfG/Q3lthdrKGMRcU9E7IiIeyNiZ0TcF5GXfSAiHlxj/a1LQzfOf9KLtxXYLcrmfy8Wa1vN879y9hdjlSK3LY9/ODlyrDa/r3hPJmJ4U5afXqWO71/59fNO+xrnf9mW1V/OBYt2XBxquUE3N7s0m09Ku+DSRxG7h9rFn1xbCUgiYldE7F7bS28vE8ee+mZPp0I3j38VXVhnWvk64sl6/y9HS/ylZPX1yan/RW1+31R5VNzo51/Ov9mp/juKvwuy/t/cfPy3FhlLGtdrF9dex/nfP+14TXO7x/9I8nbeLyPFYx/MLi2dmo4YSQ7l+abHZ64/t8yX5bP4J/a2H/87iudk9TwUEdlB/HBEPBIRjxZtfywiHo+IvavE/+PLnfdthP6fa/v5d+34b+n/tScqx3/4rlP9t9b/B/LURPFI/vl3E7fawDt57wAAAOC/Is2/A5+kk9fSaTo5Wf8O/87YnNYWFpeePrLw/sm5+nflx2I4Le90jTbcD51OlotXrOdninvF5f79xX3jLyr/z/OT1YXaXJ9jh0G3pcP4z/xR6XfrgHXXbh1tZqQPDQF6rnX8p83Zc2/0sjFAT/m9Ngyum4z/tFftAHrP+R8GV7vxf64lby0A7k7O/zC4jH8YXMY/DC7jHwbSnfyuX2KQE5FuiGZIrFOi359MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3fFvAAAA//+uEO7O") chdir(&(0x7f0000000400)='./file0\x00') (async) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x80080, 0x0) mkdirat(r4, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x408) (async) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b00), r4) sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x68, r5, 0x200, 0x70bd2d, 0x25dfdbfc, {{}, {}, {0x4c, 0x18, {0xfffffffa, @link='broadcast-link\x00'}}}, [""]}, 0x68}}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 5m37.036919867s ago: executing program 32 (id=575): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00fdf60d2cb3e2a46805000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socket$inet6(0xa, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) (async) socket$netlink(0x10, 0x3, 0x8000000004) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000107000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa2000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$inet6(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r2, 0x101) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000040), 0x5, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x14, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="1800"/14, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], &(0x7f0000000c40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3020046, &(0x7f0000000c80)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@dioread_lock}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@data_err_ignore}, {@grpquota}, {@nobh}, {@user_xattr}, {@bh}, {@dioread_nolock}], [{@subj_role={'subj_role', 0x3d, '%&/{].+'}}, {@dont_appraise}, {@fsmagic}, {@uid_gt}, {@euid_lt}]}, 0x1, 0x553, &(0x7f0000001080)="$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") lsetxattr$security_selinux(&(0x7f00000001c0)='.\x00', &(0x7f0000000240), 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800700, &(0x7f0000000880)={[{@usrjquota}, {@journal_dev={'journal_dev', 0x3d, 0x8000}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@minixdf}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x10}}, {@grpquota}, {@usrjquota}, {@delalloc}]}, 0x3, 0x44a, &(0x7f0000000400)="$eJzs281vG0UbAPBn10n6vv1KKOWjpUCgQkR8JE1aoAcuIJA4FIEEh3IMTlpVdRvUBIlWFQ0IlQsSqgRnxBGJv4AbFwSckLjCHVWqoJcWTkG73m1t106b1rFD/ftJm8x4x555PDve2R07gIE1nv1JIrZGxG8RMVrPNhcYr/+7evls9e/LZ6tJrKy89WeSl7ty+Wy1LFo+b0uRmUgj0k+SopJmi6fPHJ+t1eZPFfmppRPvTS2ePvPssROzR+ePzp+cOXjwwP7pF56fea4rcWZxXdn94cKeXa+9c+H16uEL7/70bdbercX+xji6ZTwL/K+VXOu+J7pdWZ9ta0gnQ31sCGtSiYisu4bz8T8albjeeaPx6sd9bRywrrJz06bOu5dXgLtYEv1uAdAf5Yk+u/4ttx5NPTaESy/VL4CyuK8WW33PUKRFmeGW69tuGo+Iw8v/fJVtsU73IQAAGn1W/fJQPNNu/pfG/Q3lthdrKGMRcU9E7IiIeyNiZ0TcF5GXfSAiHlxj/a1LQzfOf9KLtxXYLcrmfy8Wa1vN879y9hdjlSK3LY9/ODlyrDa/r3hPJmJ4U5afXqWO71/59fNO+xrnf9mW1V/OBYt2XBxquUE3N7s0m09Ku+DSRxG7h9rFn1xbCUgiYldE7F7bS28vE8ee+mZPp0I3j38VXVhnWvk64sl6/y9HS/ylZPX1yan/RW1+31R5VNzo51/Ov9mp/juKvwuy/t/cfPy3FhlLGtdrF9dex/nfP+14TXO7x/9I8nbeLyPFYx/MLi2dmo4YSQ7l+abHZ64/t8yX5bP4J/a2H/87iudk9TwUEdlB/HBEPBIRjxZtfywiHo+IvavE/+PLnfdthP6fa/v5d+34b+n/tScqx3/4rlP9t9b/B/LURPFI/vl3E7fawDt57wAAAOC/Is2/A5+kk9fSaTo5Wf8O/87YnNYWFpeePrLw/sm5+nflx2I4Le90jTbcD51OlotXrOdninvF5f79xX3jLyr/z/OT1YXaXJ9jh0G3pcP4z/xR6XfrgHXXbh1tZqQPDQF6rnX8p83Zc2/0sjFAT/m9Ngyum4z/tFftAHrP+R8GV7vxf64lby0A7k7O/zC4jH8YXMY/DC7jHwbSnfyuX2KQE5FuiGZIrFOi359MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3fFvAAAA//+uEO7O") chdir(&(0x7f0000000400)='./file0\x00') (async) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x80080, 0x0) mkdirat(r4, &(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x408) (async) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000b00), r4) sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000c00)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x68, r5, 0x200, 0x70bd2d, 0x25dfdbfc, {{}, {}, {0x4c, 0x18, {0xfffffffa, @link='broadcast-link\x00'}}}, [""]}, 0x68}}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 3m17.710234605s ago: executing program 2 (id=2824): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r5, 0x0, 0x7, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x5, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)=""/55, 0x37}], 0x1}, 0x4}], 0x1, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYRES64=r7, @ANYRES64=r0, @ANYRES16=r6, @ANYRES8=r4, @ANYRES32=r1, @ANYRES32=r8, @ANYRES32=0x0, @ANYRESHEX], 0xa0}, 0x1, 0x0, 0x0, 0x850}, 0xc000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000ac0)='kmem_cache_free\x00', r9}, 0x10) socket$nl_audit(0x10, 0x3, 0x9) socket$nl_netfilter(0x10, 0x3, 0xc) futex(&(0x7f000000cffc)=0xfffffffe, 0x5, 0x1, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r10, &(0x7f0000000200)={0x2, 0x4e24, @empty}, 0x10) sendmmsg(r10, &(0x7f0000003a80)=[{{&(0x7f00000000c0)=@in={0x2, 0x4e24, @loopback}, 0x80, 0x0}}], 0x1, 0x2c000811) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000001afc180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b703000000090000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r11}, 0x10) close(r4) writev(r3, &(0x7f0000000280)=[{&(0x7f00000002c0)='\x00', 0x1}], 0x1) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x14, r1, 0x30b}, 0x14}, 0x1, 0x0, 0x0, 0x14}, 0x4000040) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x5, 0xc, &(0x7f0000000180)=ANY=[@ANYRESDEC=r11, @ANYRES32, @ANYRES16=r1], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x14, 0xe, &(0x7f0000000540)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r12 = openat$tun(0xffffffffffffff9c, 0x0, 0x200, 0x0) ioctl$TUNSETIFF(r12, 0x400454ca, 0x0) 3m16.81169928s ago: executing program 2 (id=2836): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffdfc, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x800700, &(0x7f0000000600)={[{@usrjquota}, {@init_itable_val={'init_itable', 0x3d, 0x2}}, {@journal_dev={'journal_dev', 0x3d, 0xdcc}}, {@bsdgroups}, {@min_batch_time={'min_batch_time', 0x3d, 0x5}}, {@minixdf}, {@usrjquota}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@data_err_ignore}, {@dioread_lock}]}, 0x3, 0x45c, &(0x7f0000000880)="$eJzs289vFFUcAPDvzLag/GpF/AGiVomx8UdLCyoHLxpNPGA00QMea1sIYaGG1kQIkWoMXkwMUc/Go4l/gTcvRj2ZeNW7ISHKBfRUM7MzsLvsLi1sd5H9fJJt35t52/e+ffNm3szbDWBgjWU/kogtEfF7RIzUso0Fxmq/rlw6M/vPpTOzSaysvPVXkpe7fOnMbFm0fN/mIjOeRqSfJEUljRZPnT42U63Onyzyk0vH35tcPHX62aPHZ47MH5k/MX3gwP59Uy88P/1ch9ZvXHWcWVyXd324sHvna++cf3320Pl3f/4ua++WYn99HN0ylgX+90qubvMX2Y8nul1Zn22tSydDfWwIa1KJiKy7hvPxPxKVuNZ5I/Hqx31tHLCusmtTh6vo8gpwB0ui3y0A+qO80Gf3v+WrR1OP28LFl2o3QFncV4pXbc9QpEWZ4ab7224ai4hDy/9+nb1inZ5DAADU+2z2q4PxTKv5Xxr315XbVqyhjEbEPRGxPSLujYgdEXFfRF72gYh4sG1NG1pubV4aun7+k1646eBWIZv/vVisbTXO/8rZX2W0UuS25vEPJ4ePVuf3Fv+T8RjemOWnOtTxwyu/fd5uX/38L3tl9ZdzwaIdF4aaHtDNzSzN5JPSLrj4UcSuoVbxJ1dXApKI2BkRu9b2p7eViaNPfbu7XaEbx99BF9aZVr6JeLLW/8vRFH8p6bw+OXlXVOf3TpZHxfV++fXcm+3qv6X4uyDr/02Nx39zkdGkfr12ce11nPvj07b3NDd7/G9I3s77pTyrfDCztHRyKmJDcjDPN2yfvvbeMl+Wz+If39N6/G8v3pPV81BEZAfxwxHxSEQ8WrT9sYh4PCL2dIj/p5fb77sd+n+u5fnv6vHf1P9rT1SO/fh9u/pX1//789R4sSU//93Aaht4K/87AAAA+L9I88/AJ+nE1XSaTkzUPsO/Izal1YXFpacPL7x/Yq72WfnRGE7LJ10jdc9Dp5Ll4i/W8tPFs+Jy/77iufGXlbvz/MTsQnWuz7HDoNvcZvxn/qz0u3XAumu1jjbder0WuMM0j/+0MXv2jV42Bugp39eGwXWD8Z/2qh1A77n+w+BqNf7PNuWtBcCdyfUfBpfxD4PL+IfBZfzDQLqV7/UPciI7Zd4GzaiOFP3Y+9oj7XfsEuuZ6POJCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoEv+CwAA///clepZ") r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) 3m16.17798038s ago: executing program 2 (id=2845): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x5524, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x12) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1000004, &(0x7f0000000300)=ANY=[], 0x6, 0x2cc, &(0x7f0000000580)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$binfmt_script(r0, &(0x7f0000000280), 0xfea7) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000280)='kmem_cache_free\x00', r2, 0x0, 0x1008}, 0x18) r3 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) listen(r3, 0x0) r4 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r4, &(0x7f0000000080)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f00000000c0)=@req3={0x80000000, 0x0, 0x2}, 0x1c) accept4$inet6(r3, 0x0, 0x0, 0x0) sendmsg$tipc(r4, &(0x7f0000000640)={&(0x7f0000000300)=@nameseq={0x1e, 0x1, 0x2, {0x43, 0x0, 0x3}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ff8}]}) getgroups(0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) io_setup(0x40, &(0x7f00000000c0)) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x9, r0, 0x0, 0x0, 0xffffffff, 0x0, 0x1, r0}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f0000000000)='\x06\x00\x00\x00\x04\xb0\xfe\x98\x9a!s\x91]\xab\xc9\xa2IV\xb6-\xd9z\x81\x91\x8aP}I\xc6\x0e\xd9\v\xda\xbfS\x16 \x04\r\xcd\xdb\x9a\xd4\xaf\r\x11\xa0\xd7\xd7\xb6\x9bz\x99\xaf\xfd\x87fN\xad\x90U\xb4A\xdf\xabB\xbba\x7f\xb8\x96\x1a\xe7\xc1\xab\x16\x02\x000x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$FOU_CMD_ADD(r3, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000001000)={&(0x7f0000000fc0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="010000ac14141008000b00", @ANYRES32=r12, @ANYBLOB], 0x24}}, 0x44844) syz_open_procfs(r1, &(0x7f0000000280)='fdinfo\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r0, 0x0, 0x7}, 0x18) 3m9.047744322s ago: executing program 3 (id=2963): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x18, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x5, &(0x7f0000000100), 0x0, 0x58c, &(0x7f0000000600)="$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") mount$nfs(0x0, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x1c0030, 0x0) chroot(&(0x7f0000000100)='./file0\x00') umount2(&(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='./file0\x00') bpf$TOKEN_CREATE(0x24, &(0x7f00000000c0), 0x8) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) socketpair$unix(0x1, 0x1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x4) r3 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f0000258f88)) msgsnd(r3, &(0x7f0000000380)=ANY=[@ANYBLOB="0300"], 0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0x3, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f0000258f88)={{0x1}, 0x0, 0x0, 0x800000000000000, 0x7, 0x2, 0x0, 0x3, 0xe8, 0x0, 0x0, 0x0, 0xffffffffffffffff}) getgid() r4 = socket$inet(0x2, 0x3, 0x30) getsockopt$inet_mreqsrc(r4, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000080)=0x2c) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYRES64], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5, 0x0, 0x9}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) r6 = msgget$private(0x0, 0x200) msgsnd(r6, &(0x7f0000000300)=ANY=[@ANYRESHEX, @ANYRES16=r1, @ANYRESOCT, @ANYRESDEC=0x0], 0xff, 0x0) 3m8.810764816s ago: executing program 3 (id=2965): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x14) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r3, {0x2, 0x0, @dev}, 0x2, 0x0, 0x2000}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@rand_addr=0x4, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x2, 0x0, 0x8, 0x8, 0x4}, {0x4}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x80, 0x32}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x8}}, 0xe8) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000008c0), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x40, r4, 0x1, 0x1070bd2c, 0x4, {0x5}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0xaa8}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x20008000}, 0x30) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r6}, 0x10) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0xc0802, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newtaction={0x74, 0x30, 0x1, 0x0, 0x3, {}, [{0x60, 0x1, [@m_mpls={0x5c, 0x1, 0x0, 0x0, {{0x9}, {0x30, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x0, 0x0, 0x6, 0x0, 0x200000}, 0x2}}, @TCA_MPLS_LABEL={0x8}, @TCA_MPLS_PROTO={0x6, 0x4, 0x8848}]}, {0x4, 0x4}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}]}]}, 0x74}}, 0x0) pwritev(r7, 0x0, 0x0, 0x0, 0x0) 3m8.771961846s ago: executing program 34 (id=2965): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x14) connect$pppl2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r3, {0x2, 0x0, @dev}, 0x2, 0x0, 0x2000}}, 0x2e) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@rand_addr=0x4, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x2, 0x0, 0x8, 0x8, 0x4}, {0x4}, 0x0, 0x0, 0x1}, {{@in6=@remote, 0x80, 0x32}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x8}}, 0xe8) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000008c0), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x40, r4, 0x1, 0x1070bd2c, 0x4, {0x5}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0xaa8}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x20008000}, 0x30) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r6}, 0x10) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0xc0802, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newtaction={0x74, 0x30, 0x1, 0x0, 0x3, {}, [{0x60, 0x1, [@m_mpls={0x5c, 0x1, 0x0, 0x0, {{0x9}, {0x30, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x0, 0x0, 0x6, 0x0, 0x200000}, 0x2}}, @TCA_MPLS_LABEL={0x8}, @TCA_MPLS_PROTO={0x6, 0x4, 0x8848}]}, {0x4, 0x4}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}]}]}, 0x74}}, 0x0) pwritev(r7, 0x0, 0x0, 0x0, 0x0) 3.160914921s ago: executing program 5 (id=6681): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8923, &(0x7f0000000000)={'bond0\x00', 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYRESOCT=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='mm_page_free\x00', r2, 0x0, 0x3}, 0x18) socket$nl_route(0x10, 0x3, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x2040, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0xfffffffffffffce5, &(0x7f0000001140)={&(0x7f0000000140)=ANY=[@ANYBLOB="480000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800b0001006d61637365630000180000030004000000000000000000000000000004000000"], 0x48}}, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000100000000000000040000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) truncate(&(0x7f0000000140)='./file2\x00', 0x80000002328) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) r6 = socket$inet6(0xa, 0x3, 0x6) bind$inet6(r6, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) r7 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r7}, &(0x7f0000bbdffc)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) readv(r8, &(0x7f0000001340)=[{&(0x7f0000000580)=""/148, 0x94}], 0x1) 2.980825633s ago: executing program 6 (id=6686): r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x8957) r1 = accept4(r0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), r1) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x3c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DST={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRET={0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20040100}, 0x24000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r1) 2.326345154s ago: executing program 7 (id=6697): syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000640)='.\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d) unshare(0x64000600) 2.081859818s ago: executing program 6 (id=6698): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000500000002"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r3, 0x0) write$selinux_load(r2, &(0x7f0000000000)=ANY=[], 0x6000) 2.081472988s ago: executing program 5 (id=6699): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = socket$inet(0x2, 0x2, 0x1) sendmsg$inet(r1, &(0x7f0000000600)={&(0x7f0000000040)={0x2, 0xffff, @multicast2}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000400)='\b\x00', 0x2}, {&(0x7f00000004c0)="1ed8b7f9d457", 0x6}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000890b040a0101027f00000100000000001c000000000000000000000008"], 0x40}, 0x20000000) 1.93665717s ago: executing program 5 (id=6700): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x6, 0x60000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x235, 0x0, 0x0, 0x6, 0x3, 0x0, 0xfff7, 0x0, 0xfff}, 0x0, 0xffffffffffffffbd, 0xffffffffffffffff, 0x8) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x18) socket$xdp(0x2c, 0x3, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r2, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="595300000000000000086b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900020000c7ac153bf682727b0072000000"], 0x28}}, 0x0) 1.91946401s ago: executing program 6 (id=6701): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x10}, 0x18) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(r1, 0x0, 0x4000000a, 0x0) syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file2\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x35d, &(0x7f0000000f00)="$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") setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000280)={0x4000}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) open(&(0x7f00000005c0)='./bus\x00', 0x66842, 0x19) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='net_prio.prioidx\x00', 0x275a, 0x0) 1.906616261s ago: executing program 5 (id=6702): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8923, &(0x7f0000000000)={'bond0\x00', 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYRESOCT=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='mm_page_free\x00', r2, 0x0, 0x3}, 0x18) socket$nl_route(0x10, 0x3, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x2040, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0xfffffffffffffce5, &(0x7f0000001140)={&(0x7f0000000140)=ANY=[@ANYBLOB="480000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800b0001006d61637365630000180000030004000000000000000000000000000004000000"], 0x48}}, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000100000000000000040000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) truncate(&(0x7f0000000140)='./file2\x00', 0x80000002328) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) r6 = socket$inet6(0xa, 0x3, 0x6) bind$inet6(r6, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) r7 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r7}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socket(0x10, 0x803, 0x0) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) readv(r8, &(0x7f0000001340)=[{&(0x7f0000000580)=""/148, 0x94}], 0x1) readv(r8, &(0x7f0000001240)=[{&(0x7f0000000040)=""/73, 0x49}], 0x1) 1.832422581s ago: executing program 1 (id=6703): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x6, 0x60000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x235, 0x0, 0x0, 0x6, 0x3, 0x0, 0xfff7, 0x0, 0xfff}, 0x0, 0xffffffffffffffbd, 0xffffffffffffffff, 0x8) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x18) socket$xdp(0x2c, 0x3, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r2, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="595300000000000000086b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900020000c7ac153bf682727b0072000000"], 0x28}}, 0x0) 1.831951812s ago: executing program 1 (id=6704): r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x88002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000a4000085000000010000"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0xfffffffffffffffc}, 0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="de", 0x1}], 0x1, 0x0, 0x0) 1.792469602s ago: executing program 1 (id=6705): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000130000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000280), &(0x7f00000002c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2, 0x0, 0xfffffffffffffffd}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) brk(0x3) 1.792074412s ago: executing program 1 (id=6706): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000020000000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) socket$xdp(0x2c, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r1}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='cgroup.clone_children\x00', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000080)='memory.numa_stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x38) creat(&(0x7f0000000040)='./file0\x00', 0x75) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) unshare(0x42000000) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000010900010073797a310000000048000000030a01010000000000000000010000000900030073797a3100000000080007006e6174000900010073797a310000000014000480080002407c40280f080001"], 0xb8}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) 1.721803203s ago: executing program 6 (id=6707): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c000000"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000000080)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f0000000240)=[@rdma_args={0x48, 0x114, 0x1, {{0x0, 0x1}, {0x0}, &(0x7f00000002c0)=[{&(0x7f0000000880)=""/4096, 0x1000}], 0x1}}], 0x48, 0x20000000}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffd000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000006280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@newtaction={0x98, 0x30, 0x1, 0x70bd28, 0x0, {0x0, 0x0, 0x6a00}, [{0x84, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0x0, 0x2, 0x0, 0xfffffffe}, 0x2, r6}}]}, {0x4, 0xa}, {0xc}, {0xc}}}, @m_mpls={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x3}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='\n\x00\x00'], 0x50) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r8}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f00000005c0)={[{@noblock_validity}, {}, {@sysvgroups}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@orlov}, {@nogrpid}, {@noauto_da_alloc}, {@nomblk_io_submit}]}, 0x1, 0x56a, &(0x7f00000015c0)="$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") setxattr$trusted_overlay_upper(&(0x7f0000000380)='./file0/file0\x00', &(0x7f00000001c0), &(0x7f0000001400)=ANY=[], 0x835, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)={0x30, r10, 0x1, 0x70bd2b, 0x25dfdbfe, {}, [@NL80211_ATTR_REG_RULES={0xc, 0x22, 0x0, 0x1, [{0x4}, {0x4}]}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) openat$vcsa(0xffffffffffffff9c, 0x0, 0xa0581, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='./file0/file0\x00') 1.556202296s ago: executing program 1 (id=6709): r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x8957) r1 = accept4(r0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), r1) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x3c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DST={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRET={0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20040100}, 0x24000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r1) 1.239513461s ago: executing program 7 (id=6710): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = socket$inet(0x2, 0x2, 0x73) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa1000000000000070100", @ANYRES8=r0, @ANYRESHEX=0x0, @ANYRES32=r0, @ANYRESDEC=r0, @ANYRES8=r0, @ANYRES64=0x0, @ANYRES16, @ANYRESOCT=r0, @ANYRESDEC=r0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x200000005c832, 0xffffffffffffffff, 0x0) r1 = io_uring_setup(0x3eae, &(0x7f0000000080)={0x0, 0x6d33, 0x1000, 0x0, 0x4000000}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) prctl$PR_SET_NAME(0xf, &(0x7f0000000480)='gtp\x00') r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000031c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) sendto$inet6(r2, &(0x7f0000000500)="a4", 0x34000, 0x2000c851, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback, 0xffffffff}, 0x1c) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x600002, 0x600002, 0x7, &(0x7f0000a00000/0x600000)=nil) syz_clone(0x1000, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000440)={'filter\x00', 0x104, 0x2, 0x3c8, 0xe8, 0x1f8, 0x0, 0x2e0, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@uncond, 0xc0, 0xe8}, @unspec=@MARK={0x28}}, {{@arp={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, {@mac}, {@mac, {[0xff]}}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 'nicvf0\x00', 'lo\x00'}, 0xc0, 0x110, 0x0, {0xb000000}}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @mac=@remote, @dev={0xac, 0x14, 0x14, 0xb}, @local, 0x8, 0x1}}}, {{@arp={@rand_addr, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x9, {@empty, {[0xff]}}, {@mac=@remote}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 'veth0_macvtap\x00', 'ipvlan1\x00', {}, {}, 0x0, 0x2}, 0xc0, 0xe8}, @unspec=@AUDIT={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffb}}}}, 0x418) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r5 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r5, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x1}, 0x10) ioctl$sock_SIOCOUTQ(r5, 0x5411, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000240)='asymmetric\x00', &(0x7f00000000c0)=@chain) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) sched_setscheduler(0x0, 0x2, 0x0) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f0000ffa000/0x4000)=nil, &(0x7f00009ee000/0x4000)=nil], 0x0, &(0x7f0000000080), 0x0) r6 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x2) sched_setscheduler(r6, 0x2, &(0x7f0000000180)=0x7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 1.151747842s ago: executing program 7 (id=6711): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x83, &(0x7f0000000000)=@assoc_value, &(0x7f0000000300)=0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0x16, 0x3b00, 0x0, 0xfffffffffffffdfd) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000005c0)=""/141, 0x8d}], 0x1}, 0x41) setsockopt$inet6_udp_int(r2, 0x11, 0x1, &(0x7f0000000040)=0x6, 0x4) sendmmsg$inet6(r2, &(0x7f0000000740)=[{{&(0x7f0000000100)={0x2, 0x4e21, 0x0, @empty}, 0x1c, 0x0}}], 0x300, 0x0) socketpair(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000005c0)={'ip_vti0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x1, 0x7, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x400, 0x0, 0x0, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}}}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000280)={'syztnl0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x29, 0x2, 0x9, 0xc, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x0, 0x0, 0x27d}}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000003c0)={0x3ff, 0x9, 0x1, 'queue0\x00', 0x2}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1000000004004de4e42ca6c13cb7880000439016840200000000000000907dfd41", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000140)="d800000018007b29e00212ba0d8105040a601800fe0f040b067c55a1bc000900b80006990600000015000500fe800000000000000300014002000c0901ac04000bd67f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04fb95cae8c9010000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad8ffd5e1cace81ccd40dd601edef3d93452a92307ff0ff0e97031e9f05e9f16e9cb500"/216, 0xd8}], 0x1, 0x0, 0x0, 0x2663}, 0x400c000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r6}, &(0x7f0000000140), 0x0}, 0x20) 1.025553395s ago: executing program 5 (id=6712): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0xfd, 0x0, 0x7ffc0002}]}) socketpair$unix(0x1, 0x2, 0x0, 0x0) io_uring_setup(0x38eb, &(0x7f0000000300)={0x0, 0x342a, 0x40, 0x0, 0x3d7}) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x281c2, 0x0) pipe2$9p(0x0, 0x0) fremovexattr(r0, &(0x7f0000000040)=@known='system.posix_acl_default\x00') setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f00000002c0)=@req={0x3fc, 0x0, 0x0, 0x6b}, 0x10) socket(0x1e, 0x4, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000480)='./file0\x00', 0x18000, &(0x7f0000000100)=ANY=[], 0x1, 0x2f4, &(0x7f0000000500)="$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") msgget$private(0x0, 0x0) (fail_nth: 15) 800.145598ms ago: executing program 7 (id=6713): mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000001900), 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x1b) 741.268459ms ago: executing program 5 (id=6714): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8923, &(0x7f0000000000)={'bond0\x00', 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYRESOCT=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='mm_page_free\x00', r2, 0x0, 0x3}, 0x18) socket$nl_route(0x10, 0x3, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x2040, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0xfffffffffffffce5, &(0x7f0000001140)={&(0x7f0000000140)=ANY=[@ANYBLOB="480000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800b0001006d61637365630000180000030004000000000000000000000000000004000000"], 0x48}}, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000100000000000000040000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) truncate(&(0x7f0000000140)='./file2\x00', 0x80000002328) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) r6 = socket$inet6(0xa, 0x3, 0x6) bind$inet6(r6, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) r7 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r7}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) readv(r8, &(0x7f0000001340)=[{&(0x7f0000000580)=""/148, 0x94}], 0x1) 740.633659ms ago: executing program 6 (id=6715): r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x88002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000a4000085000000010000"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0xfffffffffffffffc}, 0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="de", 0x1}], 0x1, 0x0, 0x0) 715.241209ms ago: executing program 6 (id=6716): syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) fchdir(r0) exit(0x0) mount$bpf(0x0, &(0x7f0000000ac0)='.\x00', 0x0, 0x400008, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x29, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) munmap(&(0x7f0000ba0000/0x2000)=nil, 0x2000) mremap(&(0x7f0000dde000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000bb3000/0x1000)=nil) mremap(&(0x7f00006bd000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000721000/0x4000)=nil) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0}, 0x18000, 0x0, 0x800000, 0x0, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x10000, 0x82) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000200)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r3}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x200000005c832, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c0000000206010100000000000000000000000005000100070000000900020073797a300000000014000780050015000000000008001240000000000d000300686173683a6e657400000000050005000a000000050004"], 0x5c}}, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000b40)=ANY=[@ANYBLOB="1c000000030605000000000000000000000000000500010007"], 0x1c}}, 0x0) 714.710899ms ago: executing program 4 (id=6717): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x10}, 0x18) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(r1, 0x0, 0x4000000a, 0x0) syz_mount_image$vfat(&(0x7f0000000ec0), &(0x7f0000000180)='./file2\x00', 0x420c, &(0x7f0000003240)=ANY=[], 0x6, 0x35d, &(0x7f0000000f00)="$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") setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000280)={0x4000}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) open(&(0x7f00000005c0)='./bus\x00', 0x66842, 0x19) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='net_prio.prioidx\x00', 0x275a, 0x0) 659.80761ms ago: executing program 1 (id=6718): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000007000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r3, 0xffffffffffffffff}, &(0x7f0000000b00), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010600000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff1b000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}}, 0x0) 596.466251ms ago: executing program 7 (id=6719): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000020000000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) socket$xdp(0x2c, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='kfree\x00', r1}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='cgroup.clone_children\x00', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000080)='memory.numa_stat\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x38) creat(&(0x7f0000000040)='./file0\x00', 0x75) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) unshare(0x42000000) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000010900010073797a310000000048000000030a01010000000000000000010000000900030073797a3100000000080007006e6174000900010073797a310000000014000480080002407c40280f080001"], 0xb8}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) 386.356644ms ago: executing program 4 (id=6720): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x1d, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x14) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$nl_rdma(0x10, 0x3, 0x14) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000010000100"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="08001b"], 0x30}, 0x1, 0x0, 0x0, 0x4844}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$team(&(0x7f00000044c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000004700)) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000004bc0)={0x0, 0x0, &(0x7f0000004b80)={&(0x7f00000005c0)={0x14, r3, 0x405, 0x70bd27, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000401}, 0x44084) r4 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r4, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r4, 0x10e, 0x4, &(0x7f0000000640)=0x1800, 0x4) 379.917175ms ago: executing program 4 (id=6721): r0 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000400)={0x0, 0x4}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xc, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1, 0x0, 0x21}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000380000003800000006000000000000000100000d0000000004000000030000000000000000000003000000000100000003000000f6"], 0x0, 0x56, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="be", 0x1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) shutdown(r0, 0x1) socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000012c0)={&(0x7f0000000040)='kfree\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffffffd}, 0x18) r2 = io_uring_setup(0x4d3f, &(0x7f0000000240)={0x0, 0xb310, 0x40, 0x1, 0x3}) io_uring_register$IORING_REGISTER_RESTRICTIONS(r2, 0xb, &(0x7f0000000480), 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000180), 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan0\x00'}) syz_genetlink_get_family_id$nfc(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x1, 0x802, 0x0, {}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "cb7d302847bb1a28e8a4004b789607ed47df355645f2178a039ed508ff76df3536741848cc6cb65c6e77aad714472cb8856fcdd536f9d9655dcf800549436e96"}}, 0x80}}, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='\a\x00'/16, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00006df9f80fedfa09000000000200000000040000000000"], 0x48}}, 0x4c090) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000540)={'tunl0\x00', &(0x7f0000000740)={'sit0\x00', 0x0, 0x40, 0x80, 0xb1, 0x800, {{0x2e, 0x4, 0x2, 0x7, 0xb8, 0x64, 0x0, 0x7, 0x2f, 0x0, @multicast1, @dev={0xac, 0x14, 0x14, 0x2f}, {[@timestamp_prespec={0x44, 0x2c, 0xd1, 0x3, 0x5, [{@empty, 0x4}, {@empty, 0x1}, {@multicast1, 0xfffff7fa}, {@empty, 0x81}, {@private=0xa010102, 0x6100}]}, @timestamp_prespec={0x44, 0xc, 0x5, 0x3, 0x2, [{@loopback, 0x5}]}, @lsrr={0x83, 0x1b, 0x36, [@rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @local, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0x3f}]}, @generic={0x86, 0xb, "10a2f4530cc8f43292"}, @generic={0x83, 0x8, "fa31ec9c94c6"}, @timestamp_prespec={0x44, 0x3c, 0xc1, 0x3, 0x7, [{@private=0xa010102, 0x9}, {@multicast1, 0x8}, {@rand_addr=0x64010102, 0x71}, {@local}, {@broadcast}, {@loopback, 0xff}, {@remote, 0x50}]}]}}}}}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000280)={'batadv0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=@getchain={0x24, 0x11, 0x1, 0x80, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0x1}}}, 0x24}}, 0x0) 343.929865ms ago: executing program 7 (id=6722): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8923, &(0x7f0000000000)={'bond0\x00', 0x1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYRESOCT=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='mm_page_free\x00', r2, 0x0, 0x3}, 0x18) socket$nl_route(0x10, 0x3, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x2040, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0xfffffffffffffce5, &(0x7f0000001140)={&(0x7f0000000140)=ANY=[@ANYBLOB="480000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800b0001006d61637365630000180000030004000000000000000000000000000004000000"], 0x48}}, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000100000000000000040000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) truncate(&(0x7f0000000140)='./file2\x00', 0x80000002328) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) r6 = socket$inet6(0xa, 0x3, 0x6) bind$inet6(r6, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) gettid() bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socket(0x10, 0x803, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) readv(r7, &(0x7f0000001340)=[{&(0x7f0000000580)=""/148, 0x94}], 0x1) readv(r7, &(0x7f0000001240)=[{&(0x7f0000000040)=""/73, 0x49}], 0x1) 312.788135ms ago: executing program 4 (id=6723): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f05ebbeec, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000280)={0xf97cff8c, 0x8}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000018c0)={0x124, r6, 0xacf5e67dd0b583a1, 0x0, 0x0, {{0x5}, {@val={0x8}, @void}}, [@beacon=[@NL80211_ATTR_FTM_RESPONDER={0x108, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0x104, 0x2, "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"}]}]]}, 0x124}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000140)=0x6, 0x4) 120.963649ms ago: executing program 4 (id=6724): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00"/13], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000020000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[], 0x20}, 0x1, 0x0, 0x0, 0x88000}, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) r2 = syz_clone3(&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x2}, 0xa0) syz_open_procfs$namespace(r2, &(0x7f00000004c0)='ns/user\x00') r3 = socket(0x11, 0x800000003, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f00000001c0)=0x0) sched_setscheduler(r4, 0x2, &(0x7f0000000480)=0x1) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x400, 0x0) fadvise64(r6, 0xe0ffff, 0x9, 0x3) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) r8 = syz_open_dev$usbfs(&(0x7f0000000180), 0x205, 0x2581) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$USBDEVFS_SUBMITURB(r9, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x80, 0xf, 0x0, 0x0, 0x7995}, 0x10007, 0x0, 0x0, 0x48000000, 0x0, 0x40000000, 0x0}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_service_time_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x12, r10, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r8, 0x4008550d, 0x0) mremap(&(0x7f0000004000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000008000/0x4000)=nil) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x15, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r11, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000640)=@newqdisc={0x94, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x12, r7, {0x0, 0x2}, {0xffff, 0xffff}, {0x0, 0xb}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x64, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [0x1], 0x0, [0x8, 0x4, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80], [0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x400]}}, @TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x8, 0x2, 0x0, 0x1, [{0x4}]}]}}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 0s ago: executing program 4 (id=6725): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001810fd00", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x8, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xfffffffffffffda1) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000180)={0x80000020}, 0x10) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=@mpls_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x1c, 0x20, 0x0, 0x0, 0x0, 0x3}}, 0x1c}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) sendto$inet6(r4, &(0x7f0000000040)="aa", 0x1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x3}, 0x3}, 0x1c) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0x8004587d, &(0x7f0000000080)={@desc={0x1, 0x0, @desc1}}) r5 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r5, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000001000009006000000000000000000000a44000000090a0000000000fa82a3fa211411fa0008000a40000000000900020073797a31000000000900010073797a30000000000800054000000000080008400000000014000000110001"], 0x6c}}, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_INFO(r5, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x60, r7, 0x2, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x38, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x31}}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xd06a836dacbb24f}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x29}, @IPVS_SVC_ATTR_PE_NAME={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7ff}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1000}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x8000}, 0x4040810) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) kernel console output (not intermixed with test programs): 69 code=0x7ffc0000 [ 369.599523][T20276] lo speed is unknown, defaulting to 1000 [ 369.798313][T20278] lo speed is unknown, defaulting to 1000 [ 369.910976][T20278] chnl_net:caif_netlink_parms(): no params data found [ 370.158860][T20298] Set syz1 is full, maxelem 65536 reached [ 370.170801][ T4003] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 370.200869][T20314] lo speed is unknown, defaulting to 1000 [ 370.220663][ T4003] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 370.246390][T20278] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.253559][T20278] bridge0: port 1(bridge_slave_0) entered disabled state [ 370.288684][T20278] bridge_slave_0: entered allmulticast mode [ 370.302031][T20278] bridge_slave_0: entered promiscuous mode [ 370.365504][ T4003] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 370.887144][T20339] __nla_validate_parse: 13 callbacks suppressed [ 370.887161][T20339] netlink: 14 bytes leftover after parsing attributes in process `syz.5.5674'. [ 370.922577][T20278] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.929784][T20278] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.989062][T20278] bridge_slave_1: entered allmulticast mode [ 371.021827][T20278] bridge_slave_1: entered promiscuous mode [ 371.050664][T20336] tipc: Started in network mode [ 371.055647][T20336] tipc: Node identity aaaaaaaaaaaa, cluster identity 4711 [ 371.062959][T20336] tipc: Enabled bearer , priority 10 [ 371.105457][ T4003] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 371.132129][T20339] tipc: Resetting bearer [ 371.148582][T20339] tipc: Disabling bearer [ 371.179120][T20343] lo speed is unknown, defaulting to 1000 [ 371.194558][T20278] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 371.253637][T20278] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 371.639496][T20352] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 371.874472][ T4003]  (unregistering): Released all slaves [ 371.886650][ T4003] bond0 (unregistering): Released all slaves [ 371.922370][T20365] lo speed is unknown, defaulting to 1000 [ 371.947431][T20278] team0: Port device team_slave_0 added [ 371.967461][T20385] xt_CT: You must specify a L4 protocol and not use inversions on it [ 371.978394][T20278] team0: Port device team_slave_1 added [ 372.017712][ T4003] hsr_slave_0: left promiscuous mode [ 372.023382][ T4003] hsr_slave_1: left promiscuous mode [ 372.048803][ T4003] veth1_macvtap: left promiscuous mode [ 372.054335][ T4003] veth0_macvtap: left promiscuous mode [ 372.072788][ T4003] veth1_vlan: left promiscuous mode [ 372.078564][ T4003] veth0_vlan: left promiscuous mode [ 372.173501][T20391] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5689'. [ 372.208771][T20394] netlink: 4 bytes leftover after parsing attributes in process `syz.7.5687'. [ 372.285515][T20278] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 372.292527][T20278] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 372.318529][T20278] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 372.468011][T20278] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 372.475006][T20278] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 372.500981][T20278] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 372.601309][T20402] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 372.687625][T20278] hsr_slave_0: entered promiscuous mode [ 372.725903][T20278] hsr_slave_1: entered promiscuous mode [ 372.732453][T20278] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 372.780497][T20278] Cannot create hsr debugfs directory [ 373.449970][T20435] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 373.472552][T20278] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 373.516997][T20278] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 373.542983][T20439] lo speed is unknown, defaulting to 1000 [ 373.553087][T20278] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 373.576885][T20278] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 373.740850][T20278] 8021q: adding VLAN 0 to HW filter on device bond0 [ 373.754394][T20278] 8021q: adding VLAN 0 to HW filter on device team0 [ 373.764095][ T4003] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.771242][ T4003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 373.811143][ T4003] bridge0: port 2(bridge_slave_1) entered blocking state [ 373.818358][ T4003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 373.937587][T20278] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 374.211506][T20278] veth0_vlan: entered promiscuous mode [ 374.233157][T20278] veth1_vlan: entered promiscuous mode [ 374.263584][T20278] veth0_macvtap: entered promiscuous mode [ 374.279336][T20278] veth1_macvtap: entered promiscuous mode [ 374.305169][T20278] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 374.328305][T20278] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 374.348061][T20278] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 374.356911][T20278] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 374.365721][T20278] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 374.374998][T20278] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 374.441624][T20484] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 374.464395][T20499] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5708'. [ 374.619672][ T29] kauditd_printk_skb: 241 callbacks suppressed [ 374.619725][ T29] audit: type=1326 audit(1742978969.116:16372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20515 comm="syz.4.5710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 374.649809][ T29] audit: type=1326 audit(1742978969.116:16373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20515 comm="syz.4.5710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 374.835990][ T29] audit: type=1326 audit(1742978969.176:16374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20515 comm="syz.4.5710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 374.859660][ T29] audit: type=1326 audit(1742978969.176:16375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20515 comm="syz.4.5710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f89cd4dd1a3 code=0x7ffc0000 [ 374.883164][ T29] audit: type=1326 audit(1742978969.176:16376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20515 comm="syz.4.5710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f89cd4dbc1f code=0x7ffc0000 [ 374.906631][ T29] audit: type=1326 audit(1742978969.176:16377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20515 comm="syz.4.5710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f89cd4dd1f7 code=0x7ffc0000 [ 374.930517][ T29] audit: type=1326 audit(1742978969.176:16378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20515 comm="syz.4.5710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f89cd4dbad0 code=0x7ffc0000 [ 374.954101][ T29] audit: type=1326 audit(1742978969.176:16379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20515 comm="syz.4.5710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f89cd4dbdca code=0x7ffc0000 [ 374.977675][ T29] audit: type=1326 audit(1742978969.176:16380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20515 comm="syz.4.5710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 375.001255][ T29] audit: type=1326 audit(1742978969.176:16381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20515 comm="syz.4.5710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=261 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 375.093917][T20532] lo speed is unknown, defaulting to 1000 [ 375.962651][T20551] lo speed is unknown, defaulting to 1000 [ 376.843194][T20557] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 377.215139][T20596] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5727'. [ 377.608459][T20625] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5731'. [ 378.071437][T20632] Set syz1 is full, maxelem 65536 reached [ 378.990470][T20667] lo speed is unknown, defaulting to 1000 [ 379.009747][T20666] lo speed is unknown, defaulting to 1000 [ 379.371640][T20684] lo speed is unknown, defaulting to 1000 [ 379.497640][T20695] xt_CT: You must specify a L4 protocol and not use inversions on it [ 379.614754][T20689] lo speed is unknown, defaulting to 1000 [ 379.736419][T20686] lo speed is unknown, defaulting to 1000 [ 379.852511][T20709] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 379.852816][ T29] kauditd_printk_skb: 176 callbacks suppressed [ 379.852833][ T29] audit: type=1400 audit(1742978974.346:16558): avc: denied { load_policy } for pid=20708 comm="syz.7.5763" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 379.910784][T20709] SELinux: failed to load policy [ 379.923068][T20706] lo speed is unknown, defaulting to 1000 [ 380.053272][T20688] Set syz1 is full, maxelem 65536 reached [ 380.070269][ T29] audit: type=1326 audit(1742978974.556:16559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20707 comm="syz.5.5764" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc18298d169 code=0x7ffc0000 [ 380.094107][ T29] audit: type=1326 audit(1742978974.556:16560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20707 comm="syz.5.5764" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc18298d169 code=0x7ffc0000 [ 380.117823][ T29] audit: type=1326 audit(1742978974.556:16561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20707 comm="syz.5.5764" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc18298d169 code=0x7ffc0000 [ 380.141460][ T29] audit: type=1326 audit(1742978974.556:16562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20707 comm="syz.5.5764" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc18298d169 code=0x7ffc0000 [ 380.165201][ T29] audit: type=1326 audit(1742978974.566:16563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20707 comm="syz.5.5764" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc18298d169 code=0x7ffc0000 [ 380.188920][ T29] audit: type=1326 audit(1742978974.566:16564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20707 comm="syz.5.5764" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc18298d169 code=0x7ffc0000 [ 380.212607][ T29] audit: type=1326 audit(1742978974.566:16565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20707 comm="syz.5.5764" exe="/root/syz-executor" sig=0 arch=c000003e syscall=238 compat=0 ip=0x7fc18298d169 code=0x7ffc0000 [ 380.236535][ T29] audit: type=1326 audit(1742978974.566:16566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20707 comm="syz.5.5764" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc18298d169 code=0x7ffc0000 [ 380.260389][ T29] audit: type=1326 audit(1742978974.566:16567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20707 comm="syz.5.5764" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc18298d169 code=0x7ffc0000 [ 380.463456][T20733] sd 0:0:1:0: device reset [ 380.663139][T20745] netlink: 20 bytes leftover after parsing attributes in process `syz.7.5776'. [ 380.680008][T20744] xt_CT: You must specify a L4 protocol and not use inversions on it [ 382.016200][T20785] xt_CT: You must specify a L4 protocol and not use inversions on it [ 382.315104][T20801] lo speed is unknown, defaulting to 1000 [ 382.716311][T20811] lo speed is unknown, defaulting to 1000 [ 382.947695][T20793] Set syz1 is full, maxelem 65536 reached [ 383.021159][T20823] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5804'. [ 383.134263][T20806] Set syz1 is full, maxelem 65536 reached [ 383.498256][T20847] lo speed is unknown, defaulting to 1000 [ 384.335115][T20864] lo speed is unknown, defaulting to 1000 [ 384.530369][T20862] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 385.062055][T20881] xt_CT: You must specify a L4 protocol and not use inversions on it [ 385.251804][T20893] lo speed is unknown, defaulting to 1000 [ 385.267451][T20895] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5830'. [ 385.462143][ T29] kauditd_printk_skb: 119 callbacks suppressed [ 385.462160][ T29] audit: type=1400 audit(1742978979.956:16687): avc: denied { watch watch_reads } for pid=20909 comm="syz.4.5833" path="/21" dev="tmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 385.615116][T20911] lo speed is unknown, defaulting to 1000 [ 385.768146][T20927] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5839'. [ 385.866373][T20935] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5843'. [ 385.875733][T20935] bridge_slave_1: left allmulticast mode [ 385.881407][T20935] bridge_slave_1: left promiscuous mode [ 385.887227][T20935] bridge0: port 2(bridge_slave_1) entered disabled state [ 385.897333][T20935] bridge_slave_0: left allmulticast mode [ 385.903027][T20935] bridge_slave_0: left promiscuous mode [ 385.908870][T20935] bridge0: port 1(bridge_slave_0) entered disabled state [ 386.047313][T20950] netlink: 144 bytes leftover after parsing attributes in process `syz.7.5849'. [ 386.158191][T20964] SELinux: ebitmap: truncated map [ 386.164076][T20964] SELinux: failed to load policy [ 386.222026][ T29] audit: type=1326 audit(1742978980.716:16688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20977 comm="syz.7.5864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b5cabd169 code=0x7ffc0000 [ 386.288392][T20982] netlink: 144 bytes leftover after parsing attributes in process `syz.5.5865'. [ 386.300373][ T29] audit: type=1326 audit(1742978980.746:16689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20977 comm="syz.7.5864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5b5cabd169 code=0x7ffc0000 [ 386.324077][ T29] audit: type=1326 audit(1742978980.746:16690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20977 comm="syz.7.5864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b5cabd169 code=0x7ffc0000 [ 386.348046][ T29] audit: type=1326 audit(1742978980.746:16691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20977 comm="syz.7.5864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5b5cabd169 code=0x7ffc0000 [ 386.371719][ T29] audit: type=1326 audit(1742978980.746:16692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20977 comm="syz.7.5864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b5cabd169 code=0x7ffc0000 [ 386.395594][ T29] audit: type=1326 audit(1742978980.746:16693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20977 comm="syz.7.5864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b5cabd169 code=0x7ffc0000 [ 386.409728][T20984] netlink: 12 bytes leftover after parsing attributes in process `syz.5.5868'. [ 386.419181][ T29] audit: type=1326 audit(1742978980.746:16694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20977 comm="syz.7.5864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5b5cabd169 code=0x7ffc0000 [ 386.451721][ T29] audit: type=1326 audit(1742978980.746:16695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20977 comm="syz.7.5864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b5cabd169 code=0x7ffc0000 [ 386.475460][ T29] audit: type=1326 audit(1742978980.746:16696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20977 comm="syz.7.5864" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5b5cabbc1f code=0x7ffc0000 [ 386.585831][T20999] FAULT_INJECTION: forcing a failure. [ 386.585831][T20999] name failslab, interval 1, probability 0, space 0, times 0 [ 386.598553][T20999] CPU: 0 UID: 0 PID: 20999 Comm: syz.6.5874 Not tainted 6.14.0-syzkaller-01103-g2df0c02dab82 #0 PREEMPT(voluntary) [ 386.598593][T20999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 386.598609][T20999] Call Trace: [ 386.598616][T20999] [ 386.598625][T20999] dump_stack_lvl+0xf6/0x150 [ 386.598652][T20999] dump_stack+0x15/0x1a [ 386.598671][T20999] should_fail_ex+0x261/0x270 [ 386.598701][T20999] should_failslab+0x8f/0xb0 [ 386.598724][T20999] kmem_cache_alloc_noprof+0x59/0x340 [ 386.598754][T20999] ? vm_area_alloc+0x2c/0x130 [ 386.598780][T20999] vm_area_alloc+0x2c/0x130 [ 386.598803][T20999] mmap_region+0x824/0x1630 [ 386.598855][T20999] do_mmap+0x9ef/0xc80 [ 386.598880][T20999] vm_mmap_pgoff+0x16d/0x2d0 [ 386.598907][T20999] ksys_mmap_pgoff+0xd0/0x340 [ 386.598928][T20999] ? fpregs_assert_state_consistent+0x83/0xa0 [ 386.598967][T20999] x64_sys_call+0x1945/0x2e10 [ 386.598993][T20999] do_syscall_64+0xc9/0x1c0 [ 386.599024][T20999] ? clear_bhb_loop+0x25/0x80 [ 386.599049][T20999] ? clear_bhb_loop+0x25/0x80 [ 386.599075][T20999] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 386.599100][T20999] RIP: 0033:0x7fa3c307d169 [ 386.599118][T20999] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 386.599140][T20999] RSP: 002b:00007fa3c16e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 386.599163][T20999] RAX: ffffffffffffffda RBX: 00007fa3c3295fa0 RCX: 00007fa3c307d169 [ 386.599178][T20999] RDX: 0000000003000003 RSI: 0000000000fbe000 RDI: 0000200000000000 [ 386.599193][T20999] RBP: 00007fa3c16e7090 R08: ffffffffffffffff R09: 0000000000000000 [ 386.599208][T20999] R10: 0000000000004031 R11: 0000000000000246 R12: 0000000000000001 [ 386.599223][T20999] R13: 0000000000000001 R14: 00007fa3c3295fa0 R15: 00007ffe372ae578 [ 386.599245][T20999] [ 386.831874][T21008] netlink: 144 bytes leftover after parsing attributes in process `syz.7.5878'. [ 386.885082][T21012] lo speed is unknown, defaulting to 1000 [ 387.255560][T21031] lo speed is unknown, defaulting to 1000 [ 387.386419][T21032] SELinux: policydb magic number 0x4c5047 does not match expected magic number 0xf97cff8c [ 387.455055][T21032] SELinux: failed to load policy [ 387.756276][T21042] lo speed is unknown, defaulting to 1000 [ 387.807795][T21048] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5895'. [ 387.944149][T21038] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 388.444124][T21090] lo speed is unknown, defaulting to 1000 [ 388.793542][T21093] SELinux: failed to load policy [ 388.814550][T21094] lo speed is unknown, defaulting to 1000 [ 389.004834][T21112] lo speed is unknown, defaulting to 1000 [ 389.294163][T21127] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5921'. [ 389.307061][T21125] netlink: 'syz.4.5923': attribute type 13 has an invalid length. [ 389.315964][T21105] Set syz1 is full, maxelem 65536 reached [ 389.430254][T21125] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 389.441040][T21125] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 389.473666][T21125] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 389.482779][T21125] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 389.491849][T21125] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 389.501054][T21125] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 389.710434][T21161] lo speed is unknown, defaulting to 1000 [ 389.818702][T21170] x_tables: duplicate underflow at hook 1 [ 389.835076][T21164] netlink: 32 bytes leftover after parsing attributes in process `syz.1.5931'. [ 389.844243][T21164] netlink: 32 bytes leftover after parsing attributes in process `syz.1.5931'. [ 389.906480][T21186] FAULT_INJECTION: forcing a failure. [ 389.906480][T21186] name failslab, interval 1, probability 0, space 0, times 0 [ 389.919205][T21186] CPU: 0 UID: 0 PID: 21186 Comm: syz.7.5937 Not tainted 6.14.0-syzkaller-01103-g2df0c02dab82 #0 PREEMPT(voluntary) [ 389.919235][T21186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 389.919307][T21186] Call Trace: [ 389.919315][T21186] [ 389.919325][T21186] dump_stack_lvl+0xf6/0x150 [ 389.919351][T21186] dump_stack+0x15/0x1a [ 389.919366][T21186] should_fail_ex+0x261/0x270 [ 389.919389][T21186] should_failslab+0x8f/0xb0 [ 389.919406][T21186] __kmalloc_cache_noprof+0x55/0x320 [ 389.919503][T21186] ? audit_log_d_path+0x8e/0x150 [ 389.919527][T21186] audit_log_d_path+0x8e/0x150 [ 389.919546][T21186] audit_log_d_path_exe+0x42/0x70 [ 389.919624][T21186] audit_log_task+0x1f1/0x250 [ 389.919661][T21186] audit_seccomp+0x68/0x130 [ 389.919691][T21186] __seccomp_filter+0x694/0x10e0 [ 389.919786][T21186] ? __se_sys_keyctl+0x214/0xbe0 [ 389.919824][T21186] ? putname+0xe1/0x100 [ 389.919855][T21186] __secure_computing+0x7e/0x160 [ 389.919886][T21186] syscall_trace_enter+0xcf/0x1f0 [ 389.919917][T21186] ? fpregs_assert_state_consistent+0x83/0xa0 [ 389.919953][T21186] do_syscall_64+0xaa/0x1c0 [ 389.920058][T21186] ? clear_bhb_loop+0x25/0x80 [ 389.920128][T21186] ? clear_bhb_loop+0x25/0x80 [ 389.920173][T21186] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 389.920193][T21186] RIP: 0033:0x7f5b5cabbb7c [ 389.920211][T21186] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 389.920234][T21186] RSP: 002b:00007f5b5b121030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 389.920257][T21186] RAX: ffffffffffffffda RBX: 00007f5b5ccd5fa0 RCX: 00007f5b5cabbb7c [ 389.920272][T21186] RDX: 000000000000000f RSI: 00007f5b5b1210a0 RDI: 0000000000000005 [ 389.920289][T21186] RBP: 00007f5b5b121090 R08: 0000000000000000 R09: 0000000000000000 [ 389.920300][T21186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 389.920311][T21186] R13: 0000000000000000 R14: 00007f5b5ccd5fa0 R15: 00007ffd9e0d4b08 [ 389.920327][T21186] [ 390.247162][T21185] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5938'. [ 390.326654][T21168] Set syz1 is full, maxelem 65536 reached [ 390.384160][T21206] A link change request failed with some changes committed already. Interface ip6gretap0 may have been left with an inconsistent configuration, please check. [ 390.405359][ T9] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 390.665719][ T1051] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 390.695460][T21224] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5952'. [ 391.145290][T21239] FAULT_INJECTION: forcing a failure. [ 391.145290][T21239] name failslab, interval 1, probability 0, space 0, times 0 [ 391.158008][T21239] CPU: 1 UID: 0 PID: 21239 Comm: syz.5.5957 Not tainted 6.14.0-syzkaller-01103-g2df0c02dab82 #0 PREEMPT(voluntary) [ 391.158098][T21239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 391.158165][T21239] Call Trace: [ 391.158172][T21239] [ 391.158179][T21239] dump_stack_lvl+0xf6/0x150 [ 391.158206][T21239] dump_stack+0x15/0x1a [ 391.158226][T21239] should_fail_ex+0x261/0x270 [ 391.158254][T21239] should_failslab+0x8f/0xb0 [ 391.158273][T21239] __kmalloc_cache_noprof+0x55/0x320 [ 391.158367][T21239] ? tcp_sendmsg_fastopen+0x163/0x500 [ 391.158392][T21239] tcp_sendmsg_fastopen+0x163/0x500 [ 391.158418][T21239] tcp_sendmsg_locked+0x2500/0x26e0 [ 391.158443][T21239] ? mntput+0x49/0x70 [ 391.158470][T21239] ? __rcu_read_unlock+0x4e/0x70 [ 391.158533][T21239] ? avc_has_perm_noaudit+0x1cc/0x210 [ 391.158572][T21239] ? avc_has_perm+0xd6/0x150 [ 391.158600][T21239] ? _raw_spin_unlock_bh+0x36/0x40 [ 391.158636][T21239] ? __pfx_tcp_sendmsg+0x10/0x10 [ 391.158718][T21239] tcp_sendmsg+0x30/0x50 [ 391.158740][T21239] inet6_sendmsg+0x77/0xd0 [ 391.158813][T21239] __sock_sendmsg+0x8b/0x180 [ 391.158838][T21239] __sys_sendto+0x1aa/0x230 [ 391.158945][T21239] __x64_sys_sendto+0x78/0x90 [ 391.158984][T21239] x64_sys_call+0x2bcb/0x2e10 [ 391.159007][T21239] do_syscall_64+0xc9/0x1c0 [ 391.159030][T21239] ? clear_bhb_loop+0x25/0x80 [ 391.159056][T21239] ? clear_bhb_loop+0x25/0x80 [ 391.159117][T21239] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 391.159142][T21239] RIP: 0033:0x7fc18298d169 [ 391.159161][T21239] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 391.159259][T21239] RSP: 002b:00007fc180ff7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 391.159279][T21239] RAX: ffffffffffffffda RBX: 00007fc182ba5fa0 RCX: 00007fc18298d169 [ 391.159298][T21239] RDX: 0000000000000001 RSI: 0000200000000240 RDI: 0000000000000008 [ 391.159310][T21239] RBP: 00007fc180ff7090 R08: 00002000000001c0 R09: 000000000000001c [ 391.159373][T21239] R10: 0000000020000045 R11: 0000000000000246 R12: 0000000000000001 [ 391.159386][T21239] R13: 0000000000000000 R14: 00007fc182ba5fa0 R15: 00007fffba870438 [ 391.159402][T21239] [ 391.209791][T21242] netlink: 32 bytes leftover after parsing attributes in process `syz.1.5956'. [ 391.400346][T21242] netlink: 32 bytes leftover after parsing attributes in process `syz.1.5956'. [ 391.542101][T21256] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5963'. [ 391.551633][T21256] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 391.560527][T21256] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 391.822992][T21266] raw_sendmsg: syz.5.5967 forgot to set AF_INET. Fix it! [ 391.831904][T21266] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(5) [ 391.838530][T21266] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 391.846077][T21266] vhci_hcd vhci_hcd.0: Device attached [ 391.852049][T21269] vhci_hcd: connection closed [ 391.852371][ T12] vhci_hcd: stop threads [ 391.861560][ T12] vhci_hcd: release socket [ 391.866263][ T12] vhci_hcd: disconnect device [ 392.392302][T21287] SELinux: ebitmap: truncated map [ 392.398787][T21287] SELinux: failed to load policy [ 392.441306][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 392.441324][ T29] audit: type=1326 audit(1742978986.936:16741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21290 comm="syz.5.5976" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc18298d169 code=0x7ffc0000 [ 392.441690][T21291] FAULT_INJECTION: forcing a failure. [ 392.441690][T21291] name failslab, interval 1, probability 0, space 0, times 0 [ 392.447485][ T29] audit: type=1326 audit(1742978986.936:16742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21290 comm="syz.5.5976" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fc18298bad0 code=0x7ffc0000 [ 392.471084][T21291] CPU: 0 UID: 0 PID: 21291 Comm: syz.5.5976 Not tainted 6.14.0-syzkaller-01103-g2df0c02dab82 #0 PREEMPT(voluntary) [ 392.471119][T21291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 392.471143][T21291] Call Trace: [ 392.471152][T21291] [ 392.471163][T21291] dump_stack_lvl+0xf6/0x150 [ 392.471248][T21291] dump_stack+0x15/0x1a [ 392.471269][T21291] should_fail_ex+0x261/0x270 [ 392.471377][T21291] should_failslab+0x8f/0xb0 [ 392.471402][T21291] __kvmalloc_node_noprof+0x12c/0x520 [ 392.471437][T21291] ? do_semtimedop+0xf0/0x220 [ 392.471472][T21291] ? audit_log_end+0x1d0/0x1e0 [ 392.471570][T21291] do_semtimedop+0xf0/0x220 [ 392.471623][T21291] __x64_sys_semop+0x43/0x50 [ 392.471715][T21291] x64_sys_call+0x1b0e/0x2e10 [ 392.471742][T21291] do_syscall_64+0xc9/0x1c0 [ 392.471776][T21291] ? clear_bhb_loop+0x25/0x80 [ 392.471802][T21291] ? clear_bhb_loop+0x25/0x80 [ 392.471884][T21291] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 392.471906][T21291] RIP: 0033:0x7fc18298d169 [ 392.471920][T21291] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 392.471937][T21291] RSP: 002b:00007fc180ff7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000041 [ 392.471966][T21291] RAX: ffffffffffffffda RBX: 00007fc182ba5fa0 RCX: 00007fc18298d169 [ 392.471982][T21291] RDX: 00000000000001f4 RSI: 0000000000000000 RDI: 0000000000000000 [ 392.472031][T21291] RBP: 00007fc180ff7090 R08: 0000000000000000 R09: 0000000000000000 [ 392.472046][T21291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 392.472061][T21291] R13: 0000000000000000 R14: 00007fc182ba5fa0 R15: 00007fffba870438 [ 392.472124][T21291] [ 392.679764][ T29] audit: type=1326 audit(1742978986.936:16743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21290 comm="syz.5.5976" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fc18298bc1f code=0x7ffc0000 [ 392.703279][ T29] audit: type=1326 audit(1742978986.936:16744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21290 comm="syz.5.5976" exe="/root/syz-executor" sig=0 arch=c000003e syscall=65 compat=0 ip=0x7fc18298d169 code=0x7ffc0000 [ 392.727457][ T29] audit: type=1326 audit(1742978986.966:16745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21290 comm="syz.5.5976" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7fc18298bb7c code=0x7ffc0000 [ 392.751028][ T29] audit: type=1326 audit(1742978986.966:16746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21290 comm="syz.5.5976" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fc18298bc1f code=0x7ffc0000 [ 392.774505][ T29] audit: type=1326 audit(1742978986.966:16747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21290 comm="syz.5.5976" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fc18298bdca code=0x7ffc0000 [ 392.798004][ T29] audit: type=1326 audit(1742978986.966:16748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21290 comm="syz.5.5976" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc18298d169 code=0x7ffc0000 [ 393.012492][ T29] audit: type=1326 audit(1742978987.506:16749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21306 comm="syz.7.5983" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b5cabd169 code=0x7ffc0000 [ 393.036345][ T29] audit: type=1326 audit(1742978987.506:16750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21306 comm="syz.7.5983" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5b5cabd169 code=0x7ffc0000 [ 393.037952][T21308] netlink: 32 bytes leftover after parsing attributes in process `syz.5.5979'. [ 393.069352][T21308] netlink: 32 bytes leftover after parsing attributes in process `syz.5.5979'. [ 393.082019][T21310] FAULT_INJECTION: forcing a failure. [ 393.082019][T21310] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 393.095454][T21310] CPU: 1 UID: 0 PID: 21310 Comm: syz.7.5984 Not tainted 6.14.0-syzkaller-01103-g2df0c02dab82 #0 PREEMPT(voluntary) [ 393.095486][T21310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 393.095501][T21310] Call Trace: [ 393.095508][T21310] [ 393.095517][T21310] dump_stack_lvl+0xf6/0x150 [ 393.095542][T21310] dump_stack+0x15/0x1a [ 393.095561][T21310] should_fail_ex+0x261/0x270 [ 393.095634][T21310] should_fail_alloc_page+0xfd/0x110 [ 393.095654][T21310] __alloc_frozen_pages_noprof+0x11e/0x340 [ 393.095691][T21310] alloc_pages_mpol+0xb6/0x260 [ 393.095744][T21310] alloc_pages_noprof+0xe8/0x130 [ 393.095881][T21310] pte_alloc_one+0x2f/0x110 [ 393.095918][T21310] __pte_alloc+0x36/0x2b0 [ 393.095957][T21310] handle_mm_fault+0x1b97/0x2b10 [ 393.095996][T21310] exc_page_fault+0x296/0x650 [ 393.096048][T21310] asm_exc_page_fault+0x26/0x30 [ 393.096073][T21310] RIP: 0010:rep_movs_alternative+0x33/0x70 [ 393.096127][T21310] Code: 73 25 85 c9 74 0f 8a 06 88 07 48 ff c7 48 ff c6 48 ff c9 75 f1 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 8b 06 <48> 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 db 83 f9 08 73 e8 eb [ 393.096223][T21310] RSP: 0018:ffffc90007e47e68 EFLAGS: 00050212 [ 393.096243][T21310] RAX: 0000000000000000 RBX: 0000200000000410 RCX: 0000000000000010 [ 393.096258][T21310] RDX: 0000000000000000 RSI: ffffc90007e47ea0 RDI: 0000200000000400 [ 393.096273][T21310] RBP: ffffc90007e47f48 R08: 0000000080000000 R09: 0000000000000000 [ 393.096288][T21310] R10: 0001c90007e47ea0 R11: 0001c90007e47eaf R12: 0000000000000010 [ 393.096300][T21310] R13: 00007ffffffff000 R14: 0000200000000400 R15: ffffc90007e47ea0 [ 393.096318][T21310] _copy_to_user+0x7c/0xa0 [ 393.096399][T21310] put_timespec64+0x69/0xb0 [ 393.096422][T21310] __x64_sys_sched_rr_get_interval+0x4c/0x70 [ 393.096450][T21310] x64_sys_call+0x15b9/0x2e10 [ 393.096476][T21310] do_syscall_64+0xc9/0x1c0 [ 393.096531][T21310] ? clear_bhb_loop+0x25/0x80 [ 393.096559][T21310] ? clear_bhb_loop+0x25/0x80 [ 393.096582][T21310] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 393.096602][T21310] RIP: 0033:0x7f5b5cabd169 [ 393.096615][T21310] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 393.096695][T21310] RSP: 002b:00007f5b5b121038 EFLAGS: 00000246 ORIG_RAX: 0000000000000094 [ 393.096712][T21310] RAX: ffffffffffffffda RBX: 00007f5b5ccd5fa0 RCX: 00007f5b5cabd169 [ 393.096726][T21310] RDX: 0000000000000000 RSI: 0000200000000400 RDI: 0000000000000000 [ 393.096741][T21310] RBP: 00007f5b5b121090 R08: 0000000000000000 R09: 0000000000000000 [ 393.096792][T21310] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 393.096806][T21310] R13: 0000000000000001 R14: 00007f5b5ccd5fa0 R15: 00007ffd9e0d4b08 [ 393.096827][T21310] [ 393.414118][T21312] SELinux: ebitmap: truncated map [ 393.448471][T21312] SELinux: failed to load policy [ 393.462616][T21318] bond_slave_1: entered promiscuous mode [ 393.473175][T21318] bond_slave_1 (unregistering): left promiscuous mode [ 393.575428][T21327] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 393.633429][T21332] SELinux: ebitmap: truncated map [ 393.642561][T21332] SELinux: failed to load policy [ 393.736489][T21344] FAULT_INJECTION: forcing a failure. [ 393.736489][T21344] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 393.738384][T21345] lo speed is unknown, defaulting to 1000 [ 393.749739][T21344] CPU: 0 UID: 0 PID: 21344 Comm: syz.1.6000 Not tainted 6.14.0-syzkaller-01103-g2df0c02dab82 #0 PREEMPT(voluntary) [ 393.749819][T21344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 393.749835][T21344] Call Trace: [ 393.749842][T21344] [ 393.749851][T21344] dump_stack_lvl+0xf6/0x150 [ 393.749881][T21344] dump_stack+0x15/0x1a [ 393.749902][T21344] should_fail_ex+0x261/0x270 [ 393.749935][T21344] should_fail+0xb/0x10 [ 393.750031][T21344] should_fail_usercopy+0x1a/0x20 [ 393.750063][T21344] _copy_from_user+0x1c/0xa0 [ 393.750126][T21344] copy_msghdr_from_user+0x54/0x2b0 [ 393.750226][T21344] ? __fget_files+0x186/0x1c0 [ 393.750313][T21344] __sys_sendmmsg+0x1eb/0x4b0 [ 393.750363][T21344] __x64_sys_sendmmsg+0x57/0x70 [ 393.750433][T21344] x64_sys_call+0x2b53/0x2e10 [ 393.750460][T21344] do_syscall_64+0xc9/0x1c0 [ 393.750496][T21344] ? clear_bhb_loop+0x25/0x80 [ 393.750524][T21344] ? clear_bhb_loop+0x25/0x80 [ 393.750551][T21344] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 393.750577][T21344] RIP: 0033:0x7f9d4e89d169 [ 393.750598][T21344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 393.750678][T21344] RSP: 002b:00007f9d4cf01038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 393.750702][T21344] RAX: ffffffffffffffda RBX: 00007f9d4eab5fa0 RCX: 00007f9d4e89d169 [ 393.750717][T21344] RDX: 0000000004000095 RSI: 0000200000005240 RDI: 0000000000000003 [ 393.750733][T21344] RBP: 00007f9d4cf01090 R08: 0000000000000000 R09: 0000000000000000 [ 393.750803][T21344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 393.750819][T21344] R13: 0000000000000000 R14: 00007f9d4eab5fa0 R15: 00007ffcb5f0f888 [ 393.750841][T21344] [ 393.960264][T21347] lo speed is unknown, defaulting to 1000 [ 394.130465][T21363] lo speed is unknown, defaulting to 1000 [ 394.212343][T21355] lo speed is unknown, defaulting to 1000 [ 394.286909][T21355] chnl_net:caif_netlink_parms(): no params data found [ 394.341108][T21355] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.348402][T21355] bridge0: port 1(bridge_slave_0) entered disabled state [ 394.355907][T21355] bridge_slave_0: entered allmulticast mode [ 394.362678][T21355] bridge_slave_0: entered promiscuous mode [ 394.369745][T21355] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.376945][T21355] bridge0: port 2(bridge_slave_1) entered disabled state [ 394.384338][T21355] bridge_slave_1: entered allmulticast mode [ 394.390934][T21355] bridge_slave_1: entered promiscuous mode [ 394.411115][ T4003] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 394.428413][T21355] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 394.439416][T21355] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 394.496885][T21395] FAULT_INJECTION: forcing a failure. [ 394.496885][T21395] name failslab, interval 1, probability 0, space 0, times 0 [ 394.509565][T21395] CPU: 0 UID: 0 PID: 21395 Comm: syz.7.6012 Not tainted 6.14.0-syzkaller-01103-g2df0c02dab82 #0 PREEMPT(voluntary) [ 394.509643][T21395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 394.509656][T21395] Call Trace: [ 394.509665][T21395] [ 394.509674][T21395] dump_stack_lvl+0xf6/0x150 [ 394.509717][T21395] dump_stack+0x15/0x1a [ 394.509736][T21395] should_fail_ex+0x261/0x270 [ 394.509795][T21395] should_failslab+0x8f/0xb0 [ 394.509818][T21395] kmem_cache_alloc_node_noprof+0x5c/0x340 [ 394.509845][T21395] ? dup_task_struct+0x73/0x710 [ 394.509904][T21395] dup_task_struct+0x73/0x710 [ 394.509968][T21395] ? kstrtoull+0x115/0x140 [ 394.509992][T21395] copy_process+0x39e/0x1f60 [ 394.510097][T21395] ? __rcu_read_unlock+0x4e/0x70 [ 394.510131][T21395] kernel_clone+0x168/0x5d0 [ 394.510214][T21395] __x64_sys_clone+0xe9/0x120 [ 394.510251][T21395] x64_sys_call+0x2dc9/0x2e10 [ 394.510277][T21395] do_syscall_64+0xc9/0x1c0 [ 394.510307][T21395] ? clear_bhb_loop+0x25/0x80 [ 394.510332][T21395] ? clear_bhb_loop+0x25/0x80 [ 394.510372][T21395] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 394.510393][T21395] RIP: 0033:0x7f5b5cabd169 [ 394.510411][T21395] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 394.510433][T21395] RSP: 002b:00007f5b5b120fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 394.510454][T21395] RAX: ffffffffffffffda RBX: 00007f5b5ccd5fa0 RCX: 00007f5b5cabd169 [ 394.510469][T21395] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 394.510483][T21395] RBP: 00007f5b5b121090 R08: 0000000000000000 R09: 0000000000000000 [ 394.510560][T21395] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 394.510571][T21395] R13: 0000000000000000 R14: 00007f5b5ccd5fa0 R15: 00007ffd9e0d4b08 [ 394.510588][T21395] [ 394.702988][T21355] team0: Port device team_slave_0 added [ 394.714703][ T4003] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 394.730751][T21355] team0: Port device team_slave_1 added [ 394.756454][ T4003] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 394.768223][T21355] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 394.775224][T21355] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 394.801258][T21355] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 394.817216][T21399] lo speed is unknown, defaulting to 1000 [ 394.833621][ T4003] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 394.844498][T21401] __nla_validate_parse: 3 callbacks suppressed [ 394.844514][T21401] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6015'. [ 394.861023][T21355] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 394.868197][T21355] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 394.894307][T21355] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 394.937833][T21355] hsr_slave_0: entered promiscuous mode [ 394.944247][T21355] hsr_slave_1: entered promiscuous mode [ 394.950409][T21355] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 394.958225][T21355] Cannot create hsr debugfs directory [ 395.082185][ T4003]  (unregistering): Released all slaves [ 395.090831][ T4003] bond0 (unregistering): Released all slaves [ 395.099757][ T4003] bond1 (unregistering): Released all slaves [ 395.109262][T21425] SELinux: policydb version 212129154 does not match my version range 15-34 [ 395.118754][T21425] SELinux: failed to load policy [ 395.141560][T21423] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 395.211962][ T4003] hsr_slave_0: left promiscuous mode [ 395.219347][ T4003] hsr_slave_1: left promiscuous mode [ 395.228203][ T4003] veth1_macvtap: left promiscuous mode [ 395.235133][ T4003] veth0_macvtap: left promiscuous mode [ 395.380140][T21454] SELinux: ebitmap: truncated map [ 395.394176][T21454] SELinux: failed to load policy [ 395.434659][T21461] lo speed is unknown, defaulting to 1000 [ 395.851652][T21521] FAULT_INJECTION: forcing a failure. [ 395.851652][T21521] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 395.872402][T21521] CPU: 0 UID: 0 PID: 21521 Comm: syz.4.6033 Not tainted 6.14.0-syzkaller-01103-g2df0c02dab82 #0 PREEMPT(voluntary) [ 395.872437][T21521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 395.872470][T21521] Call Trace: [ 395.872478][T21521] [ 395.872486][T21521] dump_stack_lvl+0xf6/0x150 [ 395.872515][T21521] dump_stack+0x15/0x1a [ 395.872535][T21521] should_fail_ex+0x261/0x270 [ 395.872561][T21521] should_fail+0xb/0x10 [ 395.872586][T21521] should_fail_usercopy+0x1a/0x20 [ 395.872617][T21521] _copy_from_user+0x1c/0xa0 [ 395.872658][T21521] copy_msghdr_from_user+0x54/0x2b0 [ 395.872691][T21521] ? __fget_files+0x186/0x1c0 [ 395.872722][T21521] __sys_sendmsg+0x141/0x240 [ 395.872792][T21521] __x64_sys_sendmsg+0x46/0x50 [ 395.872816][T21521] x64_sys_call+0x26f3/0x2e10 [ 395.872840][T21521] do_syscall_64+0xc9/0x1c0 [ 395.872869][T21521] ? clear_bhb_loop+0x25/0x80 [ 395.872964][T21521] ? clear_bhb_loop+0x25/0x80 [ 395.873033][T21521] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 395.873092][T21521] RIP: 0033:0x7f89cd4dd169 [ 395.873110][T21521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 395.873133][T21521] RSP: 002b:00007f89cbb47038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 395.873156][T21521] RAX: ffffffffffffffda RBX: 00007f89cd6f5fa0 RCX: 00007f89cd4dd169 [ 395.873171][T21521] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000005 [ 395.873186][T21521] RBP: 00007f89cbb47090 R08: 0000000000000000 R09: 0000000000000000 [ 395.873199][T21521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 395.873217][T21521] R13: 0000000000000000 R14: 00007f89cd6f5fa0 R15: 00007ffd8c54ce08 [ 395.873264][T21521] [ 396.091686][T21523] bond1: entered promiscuous mode [ 396.097654][T21523] bond1: entered allmulticast mode [ 396.105709][T21523] 8021q: adding VLAN 0 to HW filter on device bond1 [ 396.139466][T21523] bond1 (unregistering): Released all slaves [ 396.183110][T21535] SELinux: ebitmap: truncated map [ 396.190375][T21535] SELinux: failed to load policy [ 396.199701][T21537] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 396.233510][T21355] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 396.244976][T21355] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 396.273827][T21355] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 396.303048][T21355] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 396.348210][T21557] lo speed is unknown, defaulting to 1000 [ 396.400475][T21355] 8021q: adding VLAN 0 to HW filter on device bond0 [ 396.419229][T21355] 8021q: adding VLAN 0 to HW filter on device team0 [ 396.457935][T11470] bridge0: port 1(bridge_slave_0) entered blocking state [ 396.465056][T11470] bridge0: port 1(bridge_slave_0) entered forwarding state [ 396.477842][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 396.485038][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 396.596297][T21355] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 396.708788][T21355] veth0_vlan: entered promiscuous mode [ 396.724497][T21355] veth1_vlan: entered promiscuous mode [ 396.753965][T21355] veth0_macvtap: entered promiscuous mode [ 396.767000][T21355] veth1_macvtap: entered promiscuous mode [ 396.779545][T21355] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 396.793856][T21355] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 396.804663][T21355] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 396.813456][T21355] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 396.822266][T21355] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 396.831221][T21355] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 396.903454][T21579] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 396.955544][T21598] SELinux: ebitmap: truncated map [ 396.966685][T21598] SELinux: failed to load policy [ 397.858915][T21612] lo speed is unknown, defaulting to 1000 [ 397.952694][T21612] chnl_net:caif_netlink_parms(): no params data found [ 397.999088][T21636] SELinux: ebitmap: truncated map [ 398.036863][T21636] SELinux: failed to load policy [ 398.111120][T21612] bridge0: port 1(bridge_slave_0) entered blocking state [ 398.118314][T21612] bridge0: port 1(bridge_slave_0) entered disabled state [ 398.151197][T21612] bridge_slave_0: entered allmulticast mode [ 398.170156][T21612] bridge_slave_0: entered promiscuous mode [ 398.194706][T21612] bridge0: port 2(bridge_slave_1) entered blocking state [ 398.201984][T21612] bridge0: port 2(bridge_slave_1) entered disabled state [ 398.226312][T21612] bridge_slave_1: entered allmulticast mode [ 398.235938][T21612] bridge_slave_1: entered promiscuous mode [ 398.267358][T21612] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 398.286755][T21612] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 398.312795][ T29] kauditd_printk_skb: 108 callbacks suppressed [ 398.312813][ T29] audit: type=1326 audit(1742978992.806:16859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21649 comm="syz.1.6071" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0489ead169 code=0x7ffc0000 [ 398.373187][T21612] team0: Port device team_slave_0 added [ 398.382699][T21612] team0: Port device team_slave_1 added [ 398.390683][ T29] audit: type=1326 audit(1742978992.806:16860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21649 comm="syz.1.6071" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0489ead169 code=0x7ffc0000 [ 398.414341][ T29] audit: type=1326 audit(1742978992.806:16861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21649 comm="syz.1.6071" exe="/root/syz-executor" sig=0 arch=c000003e syscall=12 compat=0 ip=0x7f0489ead169 code=0x7ffc0000 [ 398.437910][ T29] audit: type=1326 audit(1742978992.806:16862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21649 comm="syz.1.6071" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0489ead169 code=0x7ffc0000 [ 398.461550][ T29] audit: type=1326 audit(1742978992.806:16863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21649 comm="syz.1.6071" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0489ead169 code=0x7ffc0000 [ 398.506258][T21612] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 398.513270][T21612] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 398.529003][T21646] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 398.539324][T21612] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 398.570153][T21612] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 398.577224][T21612] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 398.603380][T21612] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 398.665353][T21612] hsr_slave_0: entered promiscuous mode [ 398.695894][ T29] audit: type=1326 audit(1742978993.176:16864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21663 comm="syz.5.6076" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc18298d169 code=0x7ffc0000 [ 398.719595][ T29] audit: type=1326 audit(1742978993.176:16865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21663 comm="syz.5.6076" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc18298d169 code=0x7ffc0000 [ 398.743389][ T29] audit: type=1326 audit(1742978993.186:16866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21663 comm="syz.5.6076" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc18298d169 code=0x7ffc0000 [ 398.767218][ T29] audit: type=1326 audit(1742978993.186:16867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21663 comm="syz.5.6076" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc18298d169 code=0x7ffc0000 [ 398.791001][ T29] audit: type=1326 audit(1742978993.186:16868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21663 comm="syz.5.6076" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc18298d169 code=0x7ffc0000 [ 398.826449][T21612] hsr_slave_1: entered promiscuous mode [ 398.832609][T21612] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 398.845393][T21612] Cannot create hsr debugfs directory [ 398.860989][T21670] SELinux: ebitmap: truncated map [ 398.874382][T21670] SELinux: failed to load policy [ 398.942205][T21612] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 398.968157][T21612] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 399.028178][T21612] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 399.088084][T21612] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 399.162133][T21612] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 399.171877][T21612] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 399.181184][T21612] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 399.190448][T21612] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 399.234894][T21612] 8021q: adding VLAN 0 to HW filter on device bond0 [ 399.249932][T21612] 8021q: adding VLAN 0 to HW filter on device team0 [ 399.260480][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 399.267674][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 399.278777][ T4003] bridge0: port 2(bridge_slave_1) entered blocking state [ 399.285978][ T4003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 399.400168][ T4003]  (unregistering): Released all slaves [ 399.411889][ T4003] bond0 (unregistering): Released all slaves [ 399.421697][ T4003] bond1 (unregistering): Released all slaves [ 399.436477][T21612] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 399.473530][T21695] lo speed is unknown, defaulting to 1000 [ 399.540064][ T4003] hsr_slave_0: left promiscuous mode [ 399.551495][ T4003] hsr_slave_1: left promiscuous mode [ 399.562375][ T4003] veth1_macvtap: left promiscuous mode [ 399.568065][ T4003] veth0_macvtap: left promiscuous mode [ 399.573792][ T4003] veth1_vlan: left promiscuous mode [ 399.579113][ T4003] veth0_vlan: left promiscuous mode [ 399.643987][T21702] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 399.700469][T21708] SELinux: ebitmap: truncated map [ 399.719346][T21708] SELinux: failed to load policy [ 399.762942][T21710] lo speed is unknown, defaulting to 1000 [ 399.848575][T21716] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6092'. [ 399.849638][T21612] veth0_vlan: entered promiscuous mode [ 399.886050][T21612] veth1_vlan: entered promiscuous mode [ 399.911552][T21612] veth0_macvtap: entered promiscuous mode [ 399.946735][T21731] SELinux: ebitmap: truncated map [ 399.956144][T21731] SELinux: failed to load policy [ 399.985622][ T3378] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 400.033993][T21736] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6096'. [ 400.058498][ T3380] lo speed is unknown, defaulting to 1000 [ 400.067407][T21612] veth1_macvtap: entered promiscuous mode [ 400.084066][T21612] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 400.094583][T21612] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 400.116577][T21612] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 400.141812][T21612] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 400.152552][T21612] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 400.163519][T21612] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 400.193193][T21612] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 400.201981][T21612] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 400.210822][T21612] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 400.219569][T21612] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 400.405921][T21748] SELinux: ebitmap: truncated map [ 400.413146][T21748] SELinux: failed to load policy [ 400.457045][T21756] : renamed from bond0 (while UP) [ 400.498591][T21741] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 400.575472][ T3380] ip6_tunnel: ip6gretap0 xmit: Local address not yet configured! [ 400.727914][T21784] SELinux: ebitmap: truncated map [ 400.734101][T21784] SELinux: failed to load policy [ 400.802687][T21792] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 400.807303][T21794] lo speed is unknown, defaulting to 1000 [ 400.830983][T21778] lo speed is unknown, defaulting to 1000 [ 400.888324][T21802] : renamed from bond0 [ 400.937707][T21778] chnl_net:caif_netlink_parms(): no params data found [ 400.986662][T21778] bridge0: port 1(bridge_slave_0) entered blocking state [ 400.993857][T21778] bridge0: port 1(bridge_slave_0) entered disabled state [ 401.001286][T21778] bridge_slave_0: entered allmulticast mode [ 401.008071][T21778] bridge_slave_0: entered promiscuous mode [ 401.017324][ T12] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 401.029139][T21778] bridge0: port 2(bridge_slave_1) entered blocking state [ 401.036277][T21778] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.043513][T21778] bridge_slave_1: entered allmulticast mode [ 401.050080][T21778] bridge_slave_1: entered promiscuous mode [ 401.069443][T21778] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 401.081915][ T12] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 401.096613][T21778] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 401.121273][T21778] team0: Port device team_slave_0 added [ 401.128857][T21778] team0: Port device team_slave_1 added [ 401.145933][T21778] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 401.152904][T21778] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 401.178859][T21778] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 401.193684][ T12] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 401.206950][T21778] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 401.213946][T21778] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 401.239980][T21778] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 401.276732][T21778] hsr_slave_0: entered promiscuous mode [ 401.283066][T21778] hsr_slave_1: entered promiscuous mode [ 401.306252][T21778] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 401.319446][T21778] Cannot create hsr debugfs directory [ 401.328876][ T12] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 401.542242][ T12]  (unregistering): Released all slaves [ 401.564810][ T12] bond0 (unregistering): Released all slaves [ 401.601901][T21832] FAULT_INJECTION: forcing a failure. [ 401.601901][T21832] name failslab, interval 1, probability 0, space 0, times 0 [ 401.614790][T21832] CPU: 0 UID: 0 PID: 21832 Comm: syz.1.6129 Not tainted 6.14.0-syzkaller-01103-g2df0c02dab82 #0 PREEMPT(voluntary) [ 401.614824][T21832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 401.614877][T21832] Call Trace: [ 401.614883][T21832] [ 401.614890][T21832] dump_stack_lvl+0xf6/0x150 [ 401.614911][T21832] dump_stack+0x15/0x1a [ 401.614926][T21832] should_fail_ex+0x261/0x270 [ 401.614954][T21832] should_failslab+0x8f/0xb0 [ 401.614977][T21832] __kmalloc_node_track_caller_noprof+0xaa/0x410 [ 401.615078][T21832] ? kstrdup_const+0x3e/0x50 [ 401.615118][T21832] kstrdup+0x3d/0xd0 [ 401.615154][T21832] kstrdup_const+0x3e/0x50 [ 401.615197][T21832] alloc_vfsmnt+0xe5/0x340 [ 401.615281][T21832] clone_mnt+0x45/0x7a0 [ 401.615319][T21832] copy_tree+0x2ff/0x850 [ 401.615387][T21832] copy_mnt_ns+0x121/0x5e0 [ 401.615419][T21832] ? kmem_cache_alloc_noprof+0x237/0x340 [ 401.615450][T21832] ? create_new_namespaces+0x3c/0x430 [ 401.615476][T21832] create_new_namespaces+0x89/0x430 [ 401.615525][T21832] ? security_capable+0x81/0x90 [ 401.615554][T21832] unshare_nsproxy_namespaces+0xe6/0x120 [ 401.615581][T21832] ksys_unshare+0x3d3/0x700 [ 401.615618][T21832] __x64_sys_unshare+0x1f/0x30 [ 401.615678][T21832] x64_sys_call+0x2c93/0x2e10 [ 401.615698][T21832] do_syscall_64+0xc9/0x1c0 [ 401.615723][T21832] ? clear_bhb_loop+0x25/0x80 [ 401.615746][T21832] ? clear_bhb_loop+0x25/0x80 [ 401.615798][T21832] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 401.615825][T21832] RIP: 0033:0x7f0489ead169 [ 401.615843][T21832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 401.615864][T21832] RSP: 002b:00007f0488517038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 401.615924][T21832] RAX: ffffffffffffffda RBX: 00007f048a0c5fa0 RCX: 00007f0489ead169 [ 401.615937][T21832] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000002c020400 [ 401.615948][T21832] RBP: 00007f0488517090 R08: 0000000000000000 R09: 0000000000000000 [ 401.615960][T21832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 401.615975][T21832] R13: 0000000000000000 R14: 00007f048a0c5fa0 R15: 00007ffedec96bf8 [ 401.615997][T21832] [ 401.936434][T21833] lo speed is unknown, defaulting to 1000 [ 401.964389][ T12] hsr_slave_0: left promiscuous mode [ 401.970686][ T12] hsr_slave_1: left promiscuous mode [ 401.977535][ T12] veth1_macvtap: left promiscuous mode [ 401.983214][ T12] veth0_macvtap: left promiscuous mode [ 401.993207][ T12] veth1_vlan: left promiscuous mode [ 401.993914][T21846] block device autoloading is deprecated and will be removed. [ 402.002788][ T12] veth0_vlan: left promiscuous mode [ 402.015691][T21846] syz.5.6131: attempt to access beyond end of device [ 402.015691][T21846] loop11: rw=0, sector=0, nr_sectors = 1 limit=0 [ 402.036086][T21846] FAT-fs (loop11): unable to read boot sector [ 402.233241][T21864] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6135'. [ 402.245210][ T3380] lo speed is unknown, defaulting to 1000 [ 402.249940][T21864] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 402.251062][ T3380] infiniband syz0: ib_query_port failed (-19) [ 402.258473][T21864] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 402.279016][T21864] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 402.286560][T21864] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 402.301910][T21865] netlink: 32 bytes leftover after parsing attributes in process `syz.4.6134'. [ 402.311352][T21865] netlink: 32 bytes leftover after parsing attributes in process `syz.4.6134'. [ 402.493403][T21895] netlink: 144 bytes leftover after parsing attributes in process `syz.7.6143'. [ 402.830502][T21935] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6150'. [ 402.874223][T21778] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 402.887345][T21778] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 402.907536][T21778] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 402.918990][T21945] SELinux: ebitmap: truncated map [ 402.930185][T21900] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 402.946860][T21945] SELinux: failed to load policy [ 402.947717][T21778] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 403.041137][T21778] 8021q: adding VLAN 0 to HW filter on device bond0 [ 403.070432][T21778] 8021q: adding VLAN 0 to HW filter on device team0 [ 403.088160][ T4003] bridge0: port 1(bridge_slave_0) entered blocking state [ 403.095344][ T4003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 403.145168][ T4003] bridge0: port 2(bridge_slave_1) entered blocking state [ 403.152437][ T4003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 403.182825][T21967] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6154'. [ 403.198487][T21967] netlink: 16215 bytes leftover after parsing attributes in process `syz.1.6154'. [ 403.222392][T21967] netlink: 20 bytes leftover after parsing attributes in process `syz.1.6154'. [ 403.277086][T21778] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 403.403839][T21778] veth0_vlan: entered promiscuous mode [ 403.414191][T21778] veth1_vlan: entered promiscuous mode [ 403.432844][T21778] veth0_macvtap: entered promiscuous mode [ 403.440788][T21778] veth1_macvtap: entered promiscuous mode [ 403.458524][T21778] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 403.469046][T21778] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 403.480252][T21778] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 403.491621][T21778] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 403.502225][T21778] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 403.513619][T21778] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 403.527839][T21778] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 403.536720][T21778] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 403.545561][T21778] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 403.554346][T21778] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 403.640034][T21992] bridge_slave_0: left allmulticast mode [ 403.646015][T21992] bridge_slave_0: left promiscuous mode [ 403.651746][T21992] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.662037][T21992] bridge_slave_1: left allmulticast mode [ 403.667796][T21992] bridge_slave_1: left promiscuous mode [ 403.673494][T21992] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.685583][T21992] bond0: (slave bond_slave_0): Releasing backup interface [ 403.696174][T21992] bond0: (slave bond_slave_1): Releasing backup interface [ 403.708730][T21992] team0: Failed to send port change of device team_slave_0 via netlink (err -105) [ 403.718691][T21992] team0: Port device team_slave_0 removed [ 403.727098][T21992] team0: Failed to send options change via netlink (err -105) [ 403.734921][T21992] team0: Failed to send port change of device team_slave_1 via netlink (err -105) [ 403.744745][T21992] team0: Port device team_slave_1 removed [ 403.752510][T21992] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 403.759991][T21992] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 403.769077][T21992] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 403.776552][T21992] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 403.860881][T21999] SELinux: ebitmap: truncated map [ 403.871227][T21999] SELinux: failed to load policy [ 403.987888][T22006] : renamed from bond0 (while UP) [ 404.050617][T22003] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 404.097858][ T29] kauditd_printk_skb: 149 callbacks suppressed [ 404.097876][ T29] audit: type=1326 audit(1742978998.586:17018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22013 comm="syz.4.6168" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 404.127969][ T29] audit: type=1326 audit(1742978998.586:17019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22013 comm="syz.4.6168" exe="/root/syz-executor" sig=0 arch=c000003e syscall=12 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 404.151805][ T29] audit: type=1326 audit(1742978998.586:17020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22013 comm="syz.4.6168" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 404.176250][T22020] : (slave bond_slave_0): Releasing backup interface [ 404.186408][T22020] : (slave bond_slave_1): Releasing backup interface [ 404.194889][T22020] team0: Port device team_slave_0 removed [ 404.210286][T22020] team0: Port device team_slave_1 removed [ 404.254163][T22025] smc: net device bond0 applied user defined pnetid SYZ0 [ 404.262876][T22025] smc: net device bond0 erased user defined pnetid SYZ0 [ 404.764629][ T29] audit: type=1326 audit(1742978999.256:17021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22043 comm="syz.6.6178" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22f8a3d169 code=0x7ffc0000 [ 404.790192][ T29] audit: type=1326 audit(1742978999.256:17022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22043 comm="syz.6.6178" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f22f8a3d169 code=0x7ffc0000 [ 404.813921][ T29] audit: type=1326 audit(1742978999.256:17023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22043 comm="syz.6.6178" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22f8a3d169 code=0x7ffc0000 [ 404.837584][ T29] audit: type=1326 audit(1742978999.256:17024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22043 comm="syz.6.6178" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f22f8a3d169 code=0x7ffc0000 [ 404.861293][ T29] audit: type=1326 audit(1742978999.256:17025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22043 comm="syz.6.6178" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22f8a3d169 code=0x7ffc0000 [ 404.884990][ T29] audit: type=1326 audit(1742978999.256:17026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22043 comm="syz.6.6178" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f22f8a3d169 code=0x7ffc0000 [ 404.908754][ T29] audit: type=1326 audit(1742978999.266:17027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22043 comm="syz.6.6178" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22f8a3d169 code=0x7ffc0000 [ 405.282438][T22069] __nla_validate_parse: 2 callbacks suppressed [ 405.282454][T22069] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6188'. [ 405.389204][T22078] bridge_slave_0: left allmulticast mode [ 405.395002][T22078] bridge_slave_0: left promiscuous mode [ 405.400746][T22078] bridge0: port 1(bridge_slave_0) entered disabled state [ 405.460277][T22078] bridge_slave_1: left allmulticast mode [ 405.466116][T22078] bridge_slave_1: left promiscuous mode [ 405.471833][T22078] bridge0: port 2(bridge_slave_1) entered disabled state [ 405.622896][T22078] : (slave bond_slave_0): Releasing backup interface [ 405.676302][T22071] Set syz1 is full, maxelem 65536 reached [ 405.695575][T22078] : (slave bond_slave_1): Releasing backup interface [ 405.709954][T22078] team0: Failed to send options change via netlink (err -105) [ 405.718278][T22078] team0: Failed to send port change of device team_slave_0 via netlink (err -105) [ 405.728375][T22078] team0: Port device team_slave_0 removed [ 405.737809][T22078] team0: Failed to send options change via netlink (err -105) [ 405.747151][T22078] team0: Failed to send port change of device team_slave_1 via netlink (err -105) [ 405.757564][T22078] team0: Port device team_slave_1 removed [ 406.548356][T22126] FAULT_INJECTION: forcing a failure. [ 406.548356][T22126] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 406.561594][T22126] CPU: 0 UID: 0 PID: 22126 Comm: syz.5.6208 Not tainted 6.14.0-syzkaller-01103-g2df0c02dab82 #0 PREEMPT(voluntary) [ 406.561623][T22126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 406.561635][T22126] Call Trace: [ 406.561641][T22126] [ 406.561649][T22126] dump_stack_lvl+0xf6/0x150 [ 406.561671][T22126] dump_stack+0x15/0x1a [ 406.561691][T22126] should_fail_ex+0x261/0x270 [ 406.561793][T22126] should_fail+0xb/0x10 [ 406.561812][T22126] should_fail_usercopy+0x1a/0x20 [ 406.561842][T22126] _copy_from_user+0x1c/0xa0 [ 406.561885][T22126] copy_from_sockptr+0x65/0xb0 [ 406.561991][T22126] packet_setsockopt+0x8c3/0xfe0 [ 406.562017][T22126] ? __pfx_packet_setsockopt+0x10/0x10 [ 406.562083][T22126] __sys_setsockopt+0x187/0x200 [ 406.562164][T22126] __x64_sys_setsockopt+0x66/0x80 [ 406.562197][T22126] x64_sys_call+0x2a09/0x2e10 [ 406.562217][T22126] do_syscall_64+0xc9/0x1c0 [ 406.562247][T22126] ? clear_bhb_loop+0x25/0x80 [ 406.562341][T22126] ? clear_bhb_loop+0x25/0x80 [ 406.562460][T22126] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 406.562478][T22126] RIP: 0033:0x7fc18298d169 [ 406.562491][T22126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 406.562537][T22126] RSP: 002b:00007fc180ff7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 406.562553][T22126] RAX: ffffffffffffffda RBX: 00007fc182ba5fa0 RCX: 00007fc18298d169 [ 406.562564][T22126] RDX: 0000000000000012 RSI: 0000000000000107 RDI: 0000000000000005 [ 406.562575][T22126] RBP: 00007fc180ff7090 R08: 0000000000000004 R09: 0000000000000000 [ 406.562591][T22126] R10: 0000200000000140 R11: 0000000000000246 R12: 0000000000000001 [ 406.562649][T22126] R13: 0000000000000000 R14: 00007fc182ba5fa0 R15: 00007fffba870438 [ 406.562666][T22126] [ 406.796172][T22135] syz.7.6212 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 406.807572][T22135] netlink: 'syz.7.6212': attribute type 10 has an invalid length. [ 406.815639][T22135] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.823065][T22135] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.833599][T22135] bridge0: port 2(bridge_slave_1) entered blocking state [ 406.840718][T22135] bridge0: port 2(bridge_slave_1) entered forwarding state [ 406.848073][T22135] bridge0: port 1(bridge_slave_0) entered blocking state [ 406.855341][T22135] bridge0: port 1(bridge_slave_0) entered forwarding state [ 406.868375][T22135] : (slave bridge0): Enslaving as an active interface with an up link [ 406.902546][T22139] netlink: 8 bytes leftover after parsing attributes in process `syz.7.6213'. [ 406.929949][T22139] netlink: 60 bytes leftover after parsing attributes in process `syz.7.6213'. [ 407.037909][T22142] program syz.1.6215 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 407.137962][T22148] : (slave bridge0): Releasing backup interface [ 407.151673][T22148] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.158816][T22148] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.191454][T22148] bridge_slave_0: left allmulticast mode [ 407.197219][T22148] bridge_slave_0: left promiscuous mode [ 407.202931][T22148] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.214119][T22148] bridge_slave_1: left allmulticast mode [ 407.219974][T22148] bridge_slave_1: left promiscuous mode [ 407.225750][T22148] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.240785][T22148] : (slave bond_slave_0): Releasing backup interface [ 407.250378][T22148] : (slave bond_slave_1): Releasing backup interface [ 407.261420][T22148] team0: Failed to send options change via netlink (err -105) [ 407.269695][T22148] team0: Failed to send port change of device team_slave_0 via netlink (err -105) [ 407.279223][T22148] team0: Port device team_slave_0 removed [ 407.288173][T22148] team0: Failed to send options change via netlink (err -105) [ 407.296165][T22148] team0: Failed to send port change of device team_slave_1 via netlink (err -105) [ 407.305681][T22148] team0: Port device team_slave_1 removed [ 407.312648][T22148] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 407.320139][T22148] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 407.329111][T22148] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 407.336588][T22148] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 407.513826][T22163] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 407.696739][T22185] FAULT_INJECTION: forcing a failure. [ 407.696739][T22185] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 407.710060][T22185] CPU: 0 UID: 0 PID: 22185 Comm: syz.5.6229 Not tainted 6.14.0-syzkaller-01103-g2df0c02dab82 #0 PREEMPT(voluntary) [ 407.710093][T22185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 407.710136][T22185] Call Trace: [ 407.710143][T22185] [ 407.710153][T22185] dump_stack_lvl+0xf6/0x150 [ 407.710181][T22185] dump_stack+0x15/0x1a [ 407.710200][T22185] should_fail_ex+0x261/0x270 [ 407.710238][T22185] should_fail+0xb/0x10 [ 407.710261][T22185] should_fail_usercopy+0x1a/0x20 [ 407.710291][T22185] _copy_from_user+0x1c/0xa0 [ 407.710325][T22185] copy_msghdr_from_user+0x54/0x2b0 [ 407.710416][T22185] ? __fget_files+0x186/0x1c0 [ 407.710446][T22185] __sys_sendmsg+0x141/0x240 [ 407.710505][T22185] __x64_sys_sendmsg+0x46/0x50 [ 407.710528][T22185] x64_sys_call+0x26f3/0x2e10 [ 407.710607][T22185] do_syscall_64+0xc9/0x1c0 [ 407.710639][T22185] ? clear_bhb_loop+0x25/0x80 [ 407.710665][T22185] ? clear_bhb_loop+0x25/0x80 [ 407.710696][T22185] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 407.710769][T22185] RIP: 0033:0x7fc18298d169 [ 407.710796][T22185] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 407.710819][T22185] RSP: 002b:00007fc180ff7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 407.710842][T22185] RAX: ffffffffffffffda RBX: 00007fc182ba5fa0 RCX: 00007fc18298d169 [ 407.710857][T22185] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000004 [ 407.710871][T22185] RBP: 00007fc180ff7090 R08: 0000000000000000 R09: 0000000000000000 [ 407.710917][T22185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 407.710932][T22185] R13: 0000000000000000 R14: 00007fc182ba5fa0 R15: 00007fffba870438 [ 407.710954][T22185] [ 408.175686][T22196] netlink: 32 bytes leftover after parsing attributes in process `syz.5.6233'. [ 408.184989][T22196] netlink: 32 bytes leftover after parsing attributes in process `syz.5.6233'. [ 408.366017][T22207] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6238'. [ 408.401273][T22195] Set syz1 is full, maxelem 65536 reached [ 408.443599][T22212] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6239'. [ 408.650526][T22224] team0: Mode changed to "loadbalance" [ 408.664447][T22225] netlink: 12 bytes leftover after parsing attributes in process `syz.7.6243'. [ 408.717488][T22227] : renamed from bond0 (while UP) [ 408.953005][T22243] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6251'. [ 408.982313][T22248] netlink: 180900 bytes leftover after parsing attributes in process `syz.1.6252'. [ 408.991831][T22248] netlink: zone id is out of range [ 408.997064][T22248] netlink: zone id is out of range [ 409.002849][T22248] netlink: zone id is out of range [ 409.008482][T22248] netlink: zone id is out of range [ 409.021813][T22248] netlink: set zone limit has 8 unknown bytes [ 409.257443][ T29] kauditd_printk_skb: 105 callbacks suppressed [ 409.257463][ T29] audit: type=1326 audit(1742979003.626:17133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22237 comm="syz.7.6249" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe629d2d169 code=0x7ffc0000 [ 409.287848][ T29] audit: type=1326 audit(1742979003.626:17134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22237 comm="syz.7.6249" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe629d2d169 code=0x7ffc0000 [ 409.311700][ T29] audit: type=1326 audit(1742979003.626:17135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22237 comm="syz.7.6249" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fe629d2f087 code=0x7ffc0000 [ 409.335355][ T29] audit: type=1326 audit(1742979003.626:17136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22237 comm="syz.7.6249" exe="/root/syz-executor" sig=0 arch=c000003e syscall=44 compat=0 ip=0x7fe629d2effc code=0x7ffc0000 [ 409.359039][ T29] audit: type=1326 audit(1742979003.626:17137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22237 comm="syz.7.6249" exe="/root/syz-executor" sig=0 arch=c000003e syscall=45 compat=0 ip=0x7fe629d2ef34 code=0x7ffc0000 [ 409.382707][ T29] audit: type=1326 audit(1742979003.626:17138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22237 comm="syz.7.6249" exe="/root/syz-executor" sig=0 arch=c000003e syscall=45 compat=0 ip=0x7fe629d2ef34 code=0x7ffc0000 [ 409.406256][ T29] audit: type=1326 audit(1742979003.626:17139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22237 comm="syz.7.6249" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fe629d2bdca code=0x7ffc0000 [ 409.429877][ T29] audit: type=1326 audit(1742979003.626:17140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22237 comm="syz.7.6249" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe629d2d169 code=0x7ffc0000 [ 409.453587][ T29] audit: type=1326 audit(1742979003.626:17141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22237 comm="syz.7.6249" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe629d2d169 code=0x7ffc0000 [ 409.477417][ T29] audit: type=1326 audit(1742979003.636:17142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22237 comm="syz.7.6249" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe629d2d169 code=0x7ffc0000 [ 409.777331][T22271] FAULT_INJECTION: forcing a failure. [ 409.777331][T22271] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 409.790514][T22271] CPU: 1 UID: 0 PID: 22271 Comm: syz.6.6259 Not tainted 6.14.0-syzkaller-01103-g2df0c02dab82 #0 PREEMPT(voluntary) [ 409.790543][T22271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 409.790596][T22271] Call Trace: [ 409.790604][T22271] [ 409.790612][T22271] dump_stack_lvl+0xf6/0x150 [ 409.790643][T22271] dump_stack+0x15/0x1a [ 409.790675][T22271] should_fail_ex+0x261/0x270 [ 409.790705][T22271] should_fail+0xb/0x10 [ 409.790729][T22271] should_fail_usercopy+0x1a/0x20 [ 409.790758][T22271] _copy_to_user+0x20/0xa0 [ 409.790864][T22271] simple_read_from_buffer+0xb2/0x130 [ 409.790934][T22271] proc_fail_nth_read+0x103/0x140 [ 409.790963][T22271] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 409.790991][T22271] vfs_read+0x1b2/0x710 [ 409.791024][T22271] ? __rcu_read_unlock+0x4e/0x70 [ 409.791104][T22271] ? __fget_files+0x186/0x1c0 [ 409.791127][T22271] ksys_read+0xeb/0x1b0 [ 409.791214][T22271] __x64_sys_read+0x42/0x50 [ 409.791283][T22271] x64_sys_call+0x2a3b/0x2e10 [ 409.791309][T22271] do_syscall_64+0xc9/0x1c0 [ 409.791345][T22271] ? clear_bhb_loop+0x25/0x80 [ 409.791373][T22271] ? clear_bhb_loop+0x25/0x80 [ 409.791454][T22271] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 409.791476][T22271] RIP: 0033:0x7f22f8a3bb7c [ 409.791495][T22271] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 409.791518][T22271] RSP: 002b:00007f22f70a1030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 409.791538][T22271] RAX: ffffffffffffffda RBX: 00007f22f8c55fa0 RCX: 00007f22f8a3bb7c [ 409.791549][T22271] RDX: 000000000000000f RSI: 00007f22f70a10a0 RDI: 0000000000000007 [ 409.791560][T22271] RBP: 00007f22f70a1090 R08: 0000000000000000 R09: 0000000000000000 [ 409.791643][T22271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 409.791658][T22271] R13: 0000000000000000 R14: 00007f22f8c55fa0 R15: 00007ffd162efbb8 [ 409.791719][T22271] [ 410.020325][T22284] FAULT_INJECTION: forcing a failure. [ 410.020325][T22284] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 410.033507][T22284] CPU: 0 UID: 0 PID: 22284 Comm: syz.1.6264 Not tainted 6.14.0-syzkaller-01103-g2df0c02dab82 #0 PREEMPT(voluntary) [ 410.033552][T22284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 410.033563][T22284] Call Trace: [ 410.033568][T22284] [ 410.033575][T22284] dump_stack_lvl+0xf6/0x150 [ 410.033669][T22284] dump_stack+0x15/0x1a [ 410.033683][T22284] should_fail_ex+0x261/0x270 [ 410.033708][T22284] should_fail+0xb/0x10 [ 410.033732][T22284] should_fail_usercopy+0x1a/0x20 [ 410.033761][T22284] _copy_to_user+0x20/0xa0 [ 410.033855][T22284] simple_read_from_buffer+0xb2/0x130 [ 410.033892][T22284] proc_fail_nth_read+0x103/0x140 [ 410.033918][T22284] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 410.033940][T22284] vfs_read+0x1b2/0x710 [ 410.033970][T22284] ? __rcu_read_unlock+0x4e/0x70 [ 410.034056][T22284] ? __fget_files+0x186/0x1c0 [ 410.034083][T22284] ksys_read+0xeb/0x1b0 [ 410.034120][T22284] __x64_sys_read+0x42/0x50 [ 410.034151][T22284] x64_sys_call+0x2a3b/0x2e10 [ 410.034202][T22284] do_syscall_64+0xc9/0x1c0 [ 410.034233][T22284] ? clear_bhb_loop+0x25/0x80 [ 410.034254][T22284] ? clear_bhb_loop+0x25/0x80 [ 410.034274][T22284] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 410.034294][T22284] RIP: 0033:0x7f0489eabb7c [ 410.034316][T22284] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 410.034398][T22284] RSP: 002b:00007f0488517030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 410.034416][T22284] RAX: ffffffffffffffda RBX: 00007f048a0c5fa0 RCX: 00007f0489eabb7c [ 410.034427][T22284] RDX: 000000000000000f RSI: 00007f04885170a0 RDI: 0000000000000007 [ 410.034439][T22284] RBP: 00007f0488517090 R08: 0000000000000000 R09: 0000000000000000 [ 410.034451][T22284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 410.034466][T22284] R13: 0000000000000000 R14: 00007f048a0c5fa0 R15: 00007ffedec96bf8 [ 410.034487][T22284] [ 410.563192][T22313] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 410.644560][T22318] bond_slave_1: entered promiscuous mode [ 410.650838][T22318] __nla_validate_parse: 5 callbacks suppressed [ 410.650851][T22318] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6277'. [ 410.699676][T22318] bond_slave_1 (unregistering): left promiscuous mode [ 410.784417][T22335] netlink: 28 bytes leftover after parsing attributes in process `syz.5.6283'. [ 411.241911][T22356] netlink: 32 bytes leftover after parsing attributes in process `syz.5.6286'. [ 411.594054][T22356] netlink: 32 bytes leftover after parsing attributes in process `syz.5.6286'. [ 411.604787][T22361] SELinux: policydb magic number 0x4c5047 does not match expected magic number 0xf97cff8c [ 411.629940][T22361] SELinux: failed to load policy [ 412.006267][T22344] Set syz1 is full, maxelem 65536 reached [ 412.195631][T22373] Falling back ldisc for ttyS3. [ 412.202012][T22383] FAULT_INJECTION: forcing a failure. [ 412.202012][T22383] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 412.215128][T22383] CPU: 1 UID: 0 PID: 22383 Comm: syz.7.6297 Not tainted 6.14.0-syzkaller-01103-g2df0c02dab82 #0 PREEMPT(voluntary) [ 412.215233][T22383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 412.215245][T22383] Call Trace: [ 412.215252][T22383] [ 412.215259][T22383] dump_stack_lvl+0xf6/0x150 [ 412.215284][T22383] dump_stack+0x15/0x1a [ 412.215306][T22383] should_fail_ex+0x261/0x270 [ 412.215357][T22383] should_fail+0xb/0x10 [ 412.215376][T22383] should_fail_usercopy+0x1a/0x20 [ 412.215450][T22383] _copy_from_user+0x1c/0xa0 [ 412.215477][T22383] copy_msghdr_from_user+0x54/0x2b0 [ 412.215502][T22383] ? __fget_files+0x186/0x1c0 [ 412.215527][T22383] __sys_sendmsg+0x141/0x240 [ 412.215630][T22383] __x64_sys_sendmsg+0x46/0x50 [ 412.215648][T22383] x64_sys_call+0x26f3/0x2e10 [ 412.215750][T22383] do_syscall_64+0xc9/0x1c0 [ 412.215830][T22383] ? clear_bhb_loop+0x25/0x80 [ 412.215857][T22383] ? clear_bhb_loop+0x25/0x80 [ 412.215885][T22383] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 412.215906][T22383] RIP: 0033:0x7fe629d2d169 [ 412.215924][T22383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 412.215966][T22383] RSP: 002b:00007fe628397038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 412.215983][T22383] RAX: ffffffffffffffda RBX: 00007fe629f45fa0 RCX: 00007fe629d2d169 [ 412.215995][T22383] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000006 [ 412.216007][T22383] RBP: 00007fe628397090 R08: 0000000000000000 R09: 0000000000000000 [ 412.216022][T22383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 412.216036][T22383] R13: 0000000000000000 R14: 00007fe629f45fa0 R15: 00007fffd3b95618 [ 412.216058][T22383] [ 412.586373][T22388] SELinux: ebitmap: truncated map [ 412.619906][T22388] SELinux: failed to load policy [ 413.104845][T22394] Set syz1 is full, maxelem 65536 reached [ 413.206162][T22413] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6309'. [ 413.227971][T22419] SELinux: ebitmap: truncated map [ 413.234639][T22419] SELinux: failed to load policy [ 413.267733][T22425] netlink: 4 bytes leftover after parsing attributes in process `syz.7.6313'. [ 413.518243][T22439] 9p: Unknown access argument ‹ăU: -22 [ 413.637081][T22444] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6321'. [ 413.900682][T22465] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6329'. [ 413.980604][T22457] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 414.443952][T22485] Set syz1 is full, maxelem 65536 reached [ 414.516405][T22505] netlink: 4 bytes leftover after parsing attributes in process `syz.7.6341'. [ 414.782267][T22513] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 414.902092][ T29] kauditd_printk_skb: 130 callbacks suppressed [ 414.902107][ T29] audit: type=1400 audit(1742979009.396:17273): avc: denied { mounton } for pid=22519 comm="syz.5.6347" path="/syzcgroup/cpu/syz5/cgroup.procs" dev="cgroup" ino=445 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=file permissive=1 [ 414.954070][T22518] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 415.227863][ T29] audit: type=1326 audit(1742979009.696:17274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22534 comm="syz.4.6352" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 415.251542][ T29] audit: type=1326 audit(1742979009.696:17275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22534 comm="syz.4.6352" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 415.275199][ T29] audit: type=1326 audit(1742979009.696:17276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22534 comm="syz.4.6352" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 415.298720][ T29] audit: type=1326 audit(1742979009.696:17277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22534 comm="syz.4.6352" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 415.322324][ T29] audit: type=1326 audit(1742979009.696:17278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22534 comm="syz.4.6352" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 415.346150][ T29] audit: type=1326 audit(1742979009.696:17279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22534 comm="syz.4.6352" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 415.369809][ T29] audit: type=1326 audit(1742979009.696:17280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22534 comm="syz.4.6352" exe="/root/syz-executor" sig=0 arch=c000003e syscall=310 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 415.601680][T22556] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 415.669769][T22557] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6359'. [ 416.023187][ T29] audit: type=1326 audit(1742979010.126:17281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22534 comm="syz.4.6352" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 416.046958][ T29] audit: type=1326 audit(1742979010.156:17282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22534 comm="syz.4.6352" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 416.321315][T22568] netlink: 24 bytes leftover after parsing attributes in process `syz.4.6363'. [ 416.421438][T22568] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6363'. [ 416.541751][T22573] SELinux: ebitmap: truncated map [ 416.548351][T22573] SELinux: failed to load policy [ 416.749377][T22561] Set syz1 is full, maxelem 65536 reached [ 417.197996][T22611] SELinux: ebitmap: truncated map [ 417.209170][T22611] SELinux: failed to load policy [ 418.201878][T22645] FAULT_INJECTION: forcing a failure. [ 418.201878][T22645] name failslab, interval 1, probability 0, space 0, times 0 [ 418.214620][T22645] CPU: 0 UID: 0 PID: 22645 Comm: +}[@ Not tainted 6.14.0-syzkaller-01103-g2df0c02dab82 #0 PREEMPT(voluntary) [ 418.214653][T22645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 418.214668][T22645] Call Trace: [ 418.214676][T22645] [ 418.214684][T22645] dump_stack_lvl+0xf6/0x150 [ 418.214753][T22645] dump_stack+0x15/0x1a [ 418.214772][T22645] should_fail_ex+0x261/0x270 [ 418.214869][T22645] should_failslab+0x8f/0xb0 [ 418.214973][T22645] __kmalloc_node_track_caller_noprof+0xaa/0x410 [ 418.215005][T22645] ? sidtab_sid2str_get+0xb8/0x140 [ 418.215060][T22645] ? vsnprintf+0x84d/0x8a0 [ 418.215100][T22645] kmemdup_noprof+0x2b/0x70 [ 418.215140][T22645] sidtab_sid2str_get+0xb8/0x140 [ 418.215170][T22645] security_sid_to_context_core+0x1eb/0x2f0 [ 418.215205][T22645] security_sid_to_context+0x27/0x30 [ 418.215230][T22645] selinux_lsmprop_to_secctx+0x6c/0xf0 [ 418.215258][T22645] security_lsmprop_to_secctx+0x40/0x80 [ 418.215296][T22645] audit_log_task_context+0x7a/0x180 [ 418.215444][T22645] audit_log_task+0xfb/0x250 [ 418.215481][T22645] audit_seccomp+0x68/0x130 [ 418.215511][T22645] __seccomp_filter+0x694/0x10e0 [ 418.215603][T22645] ? vfs_write+0x669/0x950 [ 418.215638][T22645] __secure_computing+0x7e/0x160 [ 418.215663][T22645] syscall_trace_enter+0xcf/0x1f0 [ 418.215694][T22645] do_syscall_64+0xaa/0x1c0 [ 418.215725][T22645] ? clear_bhb_loop+0x25/0x80 [ 418.215751][T22645] ? clear_bhb_loop+0x25/0x80 [ 418.215777][T22645] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 418.215827][T22645] RIP: 0033:0x7f0489ead169 [ 418.215843][T22645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 418.215866][T22645] RSP: 002b:00007f04884f6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 418.215897][T22645] RAX: ffffffffffffffda RBX: 00007f048a0c6080 RCX: 00007f0489ead169 [ 418.215912][T22645] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000005 [ 418.215927][T22645] RBP: 00007f04884f6090 R08: 0000000000000470 R09: 0000000000000000 [ 418.215989][T22645] R10: 0000200000000a00 R11: 0000000000000246 R12: 0000000000000001 [ 418.216004][T22645] R13: 0000000000000000 R14: 00007f048a0c6080 R15: 00007ffedec96bf8 [ 418.216025][T22645] [ 418.447930][T22645] x_tables: duplicate underflow at hook 2 [ 418.477487][T22629] Set syz1 is full, maxelem 65536 reached [ 418.780453][T22650] SELinux: ebitmap: truncated map [ 418.786202][T22650] SELinux: failed to load policy [ 419.011666][T22677] FAULT_INJECTION: forcing a failure. [ 419.011666][T22677] name failslab, interval 1, probability 0, space 0, times 0 [ 419.024605][T22677] CPU: 1 UID: 0 PID: 22677 Comm: Not tainted 6.14.0-syzkaller-01103-g2df0c02dab82 #0 PREEMPT(voluntary) [ 419.024639][T22677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 419.024655][T22677] Call Trace: [ 419.024737][T22677] [ 419.024747][T22677] dump_stack_lvl+0xf6/0x150 [ 419.024775][T22677] dump_stack+0x15/0x1a [ 419.024795][T22677] should_fail_ex+0x261/0x270 [ 419.024898][T22677] should_failslab+0x8f/0xb0 [ 419.024920][T22677] __kvmalloc_node_noprof+0x12c/0x520 [ 419.024960][T22677] ? io_alloc_cache_init+0x33/0xa0 [ 419.025002][T22677] io_alloc_cache_init+0x33/0xa0 [ 419.025027][T22677] io_ring_ctx_alloc+0x360/0x730 [ 419.025111][T22677] io_uring_create+0x40/0x6d0 [ 419.025141][T22677] __se_sys_io_uring_setup+0x1d5/0x1e0 [ 419.025179][T22677] __x64_sys_io_uring_setup+0x31/0x40 [ 419.025212][T22677] x64_sys_call+0x1741/0x2e10 [ 419.025267][T22677] do_syscall_64+0xc9/0x1c0 [ 419.025299][T22677] ? clear_bhb_loop+0x25/0x80 [ 419.025341][T22677] ? clear_bhb_loop+0x25/0x80 [ 419.025367][T22677] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 419.025391][T22677] RIP: 0033:0x7f22f8a3d169 [ 419.025406][T22677] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 419.025429][T22677] RSP: 002b:00007f22f70a0fc8 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 419.025522][T22677] RAX: ffffffffffffffda RBX: 00007f22f8c55fa0 RCX: 00007f22f8a3d169 [ 419.025539][T22677] RDX: 0000000000000000 RSI: 0000200000000340 RDI: 0000000000000111 [ 419.025597][T22677] RBP: 0000200000000340 R08: 0000000000000000 R09: 0000000000000000 [ 419.025609][T22677] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001 [ 419.025623][T22677] R13: 0000000000000000 R14: 0000000000000111 R15: 0000000000000000 [ 419.025696][T22677] [ 419.541789][T22684] Set syz1 is full, maxelem 65536 reached [ 420.185973][T22706] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6409'. [ 420.222906][T22714] netlink: 32 bytes leftover after parsing attributes in process `syz.1.6408'. [ 420.232697][T22714] netlink: 32 bytes leftover after parsing attributes in process `syz.1.6408'. [ 420.292273][ T29] kauditd_printk_skb: 252 callbacks suppressed [ 420.292290][ T29] audit: type=1326 audit(1742979014.786:17534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22715 comm="syz.6.6412" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22f8a3d169 code=0x7ffc0000 [ 420.322705][ T29] audit: type=1326 audit(1742979014.786:17535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22715 comm="syz.6.6412" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22f8a3d169 code=0x7ffc0000 [ 420.346371][ T29] audit: type=1326 audit(1742979014.786:17536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22715 comm="syz.6.6412" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f22f8a3d169 code=0x7ffc0000 [ 420.370006][ T29] audit: type=1326 audit(1742979014.786:17537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22715 comm="syz.6.6412" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22f8a3d169 code=0x7ffc0000 [ 420.393624][ T29] audit: type=1326 audit(1742979014.786:17538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22715 comm="syz.6.6412" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22f8a3d169 code=0x7ffc0000 [ 420.417444][ T29] audit: type=1326 audit(1742979014.786:17539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22715 comm="syz.6.6412" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f22f8a3d169 code=0x7ffc0000 [ 420.441259][ T29] audit: type=1326 audit(1742979014.816:17540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22715 comm="syz.6.6412" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22f8a3d169 code=0x7ffc0000 [ 420.465619][ T29] audit: type=1326 audit(1742979014.816:17541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22715 comm="syz.6.6412" exe="/root/syz-executor" sig=0 arch=c000003e syscall=238 compat=0 ip=0x7f22f8a3d169 code=0x7ffc0000 [ 420.489362][ T29] audit: type=1326 audit(1742979014.816:17542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22715 comm="syz.6.6412" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22f8a3d169 code=0x7ffc0000 [ 420.513128][ T29] audit: type=1326 audit(1742979014.816:17543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22715 comm="syz.6.6412" exe="/root/syz-executor" sig=0 arch=c000003e syscall=2 compat=0 ip=0x7f22f8a3d169 code=0x7ffc0000 [ 420.569596][T22721] FAULT_INJECTION: forcing a failure. [ 420.569596][T22721] name failslab, interval 1, probability 0, space 0, times 0 [ 420.582319][T22721] CPU: 0 UID: 0 PID: 22721 Comm: syz.6.6413 Not tainted 6.14.0-syzkaller-01103-g2df0c02dab82 #0 PREEMPT(voluntary) [ 420.582350][T22721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 420.582365][T22721] Call Trace: [ 420.582373][T22721] [ 420.582383][T22721] dump_stack_lvl+0xf6/0x150 [ 420.582475][T22721] dump_stack+0x15/0x1a [ 420.582495][T22721] should_fail_ex+0x261/0x270 [ 420.582523][T22721] should_failslab+0x8f/0xb0 [ 420.582546][T22721] kmem_cache_alloc_node_noprof+0x5c/0x340 [ 420.582633][T22721] ? __alloc_skb+0x10d/0x320 [ 420.582666][T22721] __alloc_skb+0x10d/0x320 [ 420.582702][T22721] netlink_alloc_large_skb+0xad/0xe0 [ 420.582744][T22721] netlink_sendmsg+0x3da/0x720 [ 420.582781][T22721] ? __pfx_netlink_sendmsg+0x10/0x10 [ 420.582813][T22721] __sock_sendmsg+0x140/0x180 [ 420.582876][T22721] ____sys_sendmsg+0x350/0x4e0 [ 420.582897][T22721] __sys_sendmsg+0x1a0/0x240 [ 420.582928][T22721] __x64_sys_sendmsg+0x46/0x50 [ 420.582952][T22721] x64_sys_call+0x26f3/0x2e10 [ 420.583020][T22721] do_syscall_64+0xc9/0x1c0 [ 420.583052][T22721] ? clear_bhb_loop+0x25/0x80 [ 420.583079][T22721] ? clear_bhb_loop+0x25/0x80 [ 420.583106][T22721] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 420.583132][T22721] RIP: 0033:0x7f22f8a3d169 [ 420.583151][T22721] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 420.583252][T22721] RSP: 002b:00007f22f70a1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 420.583312][T22721] RAX: ffffffffffffffda RBX: 00007f22f8c55fa0 RCX: 00007f22f8a3d169 [ 420.583324][T22721] RDX: 0000000000000000 RSI: 0000200000000440 RDI: 0000000000000006 [ 420.583336][T22721] RBP: 00007f22f70a1090 R08: 0000000000000000 R09: 0000000000000000 [ 420.583347][T22721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 420.583358][T22721] R13: 0000000000000000 R14: 00007f22f8c55fa0 R15: 00007ffd162efbb8 [ 420.583377][T22721] [ 421.382694][T22750] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6422'. [ 421.570215][T22746] Set syz1 is full, maxelem 65536 reached [ 421.571843][T22761] SELinux: ebitmap: truncated map [ 421.589810][T22761] SELinux: failed to load policy [ 421.642699][T22759] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 421.768336][T22768] SELinux: ebitmap: truncated map [ 421.787937][T22768] SELinux: failed to load policy [ 421.830074][T22763] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 421.852559][T22772] SELinux: ebitmap: truncated map [ 421.858783][T22772] SELinux: failed to load policy [ 421.869321][T22774] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6431'. [ 422.060324][T22784] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6435'. [ 422.107790][T22794] netlink: 8 bytes leftover after parsing attributes in process `syz.7.6439'. [ 422.119523][T22794] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 422.178678][T22794] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 422.250081][T22794] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 422.298137][T22794] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 422.371892][T22794] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 422.383403][T22794] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 422.395146][T22794] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 422.406903][T22794] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 422.477778][T22812] FAULT_INJECTION: forcing a failure. [ 422.477778][T22812] name failslab, interval 1, probability 0, space 0, times 0 [ 422.490494][T22812] CPU: 1 UID: 0 PID: 22812 Comm: syz.7.6446 Not tainted 6.14.0-syzkaller-01103-g2df0c02dab82 #0 PREEMPT(voluntary) [ 422.490528][T22812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 422.490544][T22812] Call Trace: [ 422.490560][T22812] [ 422.490567][T22812] dump_stack_lvl+0xf6/0x150 [ 422.490589][T22812] dump_stack+0x15/0x1a [ 422.490603][T22812] should_fail_ex+0x261/0x270 [ 422.490627][T22812] should_failslab+0x8f/0xb0 [ 422.490650][T22812] __kmalloc_noprof+0xad/0x410 [ 422.490690][T22812] ? security_perf_event_alloc+0x45/0x120 [ 422.490721][T22812] ? perf_tp_event_init+0xad/0xd0 [ 422.490756][T22812] security_perf_event_alloc+0x45/0x120 [ 422.490809][T22812] perf_event_alloc+0x1587/0x1680 [ 422.490842][T22812] __se_sys_perf_event_open+0x810/0x2240 [ 422.490874][T22812] ? vfs_write+0x5e1/0x950 [ 422.490946][T22812] ? putname+0xe1/0x100 [ 422.490975][T22812] __x64_sys_perf_event_open+0x67/0x80 [ 422.491000][T22812] x64_sys_call+0x27bb/0x2e10 [ 422.491038][T22812] do_syscall_64+0xc9/0x1c0 [ 422.491068][T22812] ? clear_bhb_loop+0x25/0x80 [ 422.491088][T22812] ? clear_bhb_loop+0x25/0x80 [ 422.491111][T22812] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 422.491217][T22812] RIP: 0033:0x7fe629d2d169 [ 422.491235][T22812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 422.491254][T22812] RSP: 002b:00007fe628397038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 422.491289][T22812] RAX: ffffffffffffffda RBX: 00007fe629f45fa0 RCX: 00007fe629d2d169 [ 422.491304][T22812] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 00002000000000c0 [ 422.491319][T22812] RBP: 00007fe628397090 R08: 0000000000000000 R09: 0000000000000000 [ 422.491334][T22812] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 422.491362][T22812] R13: 0000000000000001 R14: 00007fe629f45fa0 R15: 00007fffd3b95618 [ 422.491383][T22812] [ 422.845747][T22822] netlink: 48 bytes leftover after parsing attributes in process `syz.6.6448'. [ 423.276664][T22844] netlink: 4 bytes leftover after parsing attributes in process `syz.7.6456'. [ 423.457826][T22849] netlink: 32 bytes leftover after parsing attributes in process `syz.6.6457'. [ 423.658297][T22851] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6458'. [ 423.690449][T22849] netlink: 32 bytes leftover after parsing attributes in process `syz.6.6457'. [ 424.246273][T22874] netlink: 40 bytes leftover after parsing attributes in process `syz.1.6467'. [ 425.297302][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 425.297415][ T29] audit: type=1326 audit(1742979019.796:17571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22902 comm="syz.7.6477" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe629d2d169 code=0x7ffc0000 [ 425.327344][ T29] audit: type=1326 audit(1742979019.796:17572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22902 comm="syz.7.6477" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe629d2d169 code=0x7ffc0000 [ 425.353155][ T29] audit: type=1326 audit(1742979019.846:17573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22902 comm="syz.7.6477" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fe629d2f087 code=0x7ffc0000 [ 425.376829][ T29] audit: type=1326 audit(1742979019.846:17574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22902 comm="syz.7.6477" exe="/root/syz-executor" sig=0 arch=c000003e syscall=44 compat=0 ip=0x7fe629d2effc code=0x7ffc0000 [ 425.400389][ T29] audit: type=1326 audit(1742979019.846:17575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22902 comm="syz.7.6477" exe="/root/syz-executor" sig=0 arch=c000003e syscall=45 compat=0 ip=0x7fe629d2ef34 code=0x7ffc0000 [ 425.423916][ T29] audit: type=1326 audit(1742979019.846:17576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22902 comm="syz.7.6477" exe="/root/syz-executor" sig=0 arch=c000003e syscall=45 compat=0 ip=0x7fe629d2ef34 code=0x7ffc0000 [ 425.447463][ T29] audit: type=1326 audit(1742979019.846:17577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22902 comm="syz.7.6477" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fe629d2bdca code=0x7ffc0000 [ 425.470945][ T29] audit: type=1326 audit(1742979019.846:17578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22902 comm="syz.7.6477" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe629d2d169 code=0x7ffc0000 [ 425.494540][ T29] audit: type=1326 audit(1742979019.846:17579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22902 comm="syz.7.6477" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe629d2d169 code=0x7ffc0000 [ 426.201394][ T29] audit: type=1326 audit(1742979020.696:17580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22940 comm="syz.4.6488" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 426.389032][T22945] __nla_validate_parse: 6 callbacks suppressed [ 426.389054][T22945] netlink: 40 bytes leftover after parsing attributes in process `syz.4.6489'. [ 426.865060][T22952] netlink: 32 bytes leftover after parsing attributes in process `syz.1.6491'. [ 426.874544][T22952] netlink: 32 bytes leftover after parsing attributes in process `syz.1.6491'. [ 427.161044][T22956] netlink: 4 bytes leftover after parsing attributes in process `syz.7.6492'. [ 427.789592][T22985] dccp_close: ABORT with 124 bytes unread [ 428.021947][T22994] netlink: 40 bytes leftover after parsing attributes in process `syz.6.6507'. [ 428.100919][T23003] netlink: 32 bytes leftover after parsing attributes in process `syz.7.6506'. [ 428.110248][T23003] netlink: 32 bytes leftover after parsing attributes in process `syz.7.6506'. [ 428.449608][T23021] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6516'. [ 428.967400][T23025] Set syz1 is full, maxelem 65536 reached [ 430.094947][T23089] SELinux: ebitmap: truncated map [ 430.103525][T23089] SELinux: failed to load policy [ 430.730918][ T29] kauditd_printk_skb: 129 callbacks suppressed [ 430.731009][ T29] audit: type=1326 audit(1742979025.226:17710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23124 comm="syz.7.6556" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe629d2d169 code=0x7ffc0000 [ 430.761354][ T29] audit: type=1326 audit(1742979025.246:17711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23124 comm="syz.7.6556" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe629d2d169 code=0x7ffc0000 [ 430.785068][ T29] audit: type=1326 audit(1742979025.246:17712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23124 comm="syz.7.6556" exe="/root/syz-executor" sig=0 arch=c000003e syscall=12 compat=0 ip=0x7fe629d2d169 code=0x7ffc0000 [ 430.808845][ T29] audit: type=1326 audit(1742979025.246:17713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23124 comm="syz.7.6556" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe629d2d169 code=0x7ffc0000 [ 430.965061][ T29] audit: type=1400 audit(1742979025.456:17714): avc: denied { write } for pid=23132 comm="syz.5.6559" path="socket:[74630]" dev="sockfs" ino=74630 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 431.303522][ T29] audit: type=1326 audit(1742979025.796:17715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23151 comm="syz.7.6567" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe629d2d169 code=0x7ffc0000 [ 431.327991][ T29] audit: type=1326 audit(1742979025.826:17716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23151 comm="syz.7.6567" exe="/root/syz-executor" sig=0 arch=c000003e syscall=12 compat=0 ip=0x7fe629d2d169 code=0x7ffc0000 [ 431.351585][ T29] audit: type=1326 audit(1742979025.826:17717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23151 comm="syz.7.6567" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe629d2d169 code=0x7ffc0000 [ 431.375301][ T29] audit: type=1326 audit(1742979025.826:17718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23151 comm="syz.7.6567" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe629d2d169 code=0x7ffc0000 [ 431.853980][ T29] audit: type=1326 audit(1742979026.346:17719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23186 comm="syz.6.6580" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22f8a3d169 code=0x7ffc0000 [ 431.941179][T23171] Set syz1 is full, maxelem 65536 reached [ 431.955834][T23196] syzkaller1: entered promiscuous mode [ 431.961363][T23196] syzkaller1: entered allmulticast mode [ 432.029563][T23201] dccp_close: ABORT with 124 bytes unread [ 432.153923][T23207] netlink: 40 bytes leftover after parsing attributes in process `syz.1.6588'. [ 432.892354][T23245] SELinux: ebitmap: truncated map [ 432.899205][T23245] SELinux: failed to load policy [ 434.084984][T23264] Set syz1 is full, maxelem 65536 reached [ 434.501292][T23288] Set syz1 is full, maxelem 65536 reached [ 435.041835][T23321] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6626'. [ 435.636482][T23339] netlink: 16 bytes leftover after parsing attributes in process `syz.7.6635'. [ 435.681082][T23339] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 435.801890][ T29] kauditd_printk_skb: 39 callbacks suppressed [ 435.801949][ T29] audit: type=1326 audit(1742979030.296:17759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23344 comm="syz.6.6638" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22f8a3d169 code=0x7ffc0000 [ 435.831835][ T29] audit: type=1326 audit(1742979030.296:17760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23344 comm="syz.6.6638" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22f8a3d169 code=0x7ffc0000 [ 435.855467][ T29] audit: type=1326 audit(1742979030.296:17761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23344 comm="syz.6.6638" exe="/root/syz-executor" sig=0 arch=c000003e syscall=12 compat=0 ip=0x7f22f8a3d169 code=0x7ffc0000 [ 435.874189][T23342] SELinux: ebitmap: truncated map [ 435.879069][ T29] audit: type=1326 audit(1742979030.296:17762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23344 comm="syz.6.6638" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22f8a3d169 code=0x7ffc0000 [ 435.884728][T23342] SELinux: failed to load policy [ 435.907616][ T29] audit: type=1326 audit(1742979030.296:17763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23344 comm="syz.6.6638" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f22f8a3d169 code=0x7ffc0000 [ 436.123219][T23361] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6644'. [ 436.278465][T23372] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6643'. [ 436.443440][ T29] audit: type=1326 audit(1742979030.866:17764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23358 comm="syz.1.6643" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0489ead169 code=0x7ffc0000 [ 436.467276][ T29] audit: type=1326 audit(1742979030.866:17765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23358 comm="syz.1.6643" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0489ead169 code=0x7ffc0000 [ 436.490921][ T29] audit: type=1326 audit(1742979030.866:17766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23358 comm="syz.1.6643" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f0489eaf087 code=0x7ffc0000 [ 436.514427][ T29] audit: type=1326 audit(1742979030.866:17767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23358 comm="syz.1.6643" exe="/root/syz-executor" sig=0 arch=c000003e syscall=44 compat=0 ip=0x7f0489eaeffc code=0x7ffc0000 [ 436.537942][ T29] audit: type=1326 audit(1742979030.866:17768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23358 comm="syz.1.6643" exe="/root/syz-executor" sig=0 arch=c000003e syscall=45 compat=0 ip=0x7f0489eaef34 code=0x7ffc0000 [ 436.632600][T23349] Set syz1 is full, maxelem 65536 reached [ 437.084686][T23396] netlink: 32 bytes leftover after parsing attributes in process `syz.6.6653'. [ 437.093796][T23396] netlink: 32 bytes leftover after parsing attributes in process `syz.6.6653'. [ 437.202315][T23400] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6656'. [ 437.314313][T23408] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6659'. [ 437.446065][T23415] bond0: entered promiscuous mode [ 437.451148][T23415] bond0: entered allmulticast mode [ 437.456509][T23415] 8021q: adding VLAN 0 to HW filter on device bond0 [ 437.465296][T23415] bond0 (unregistering): Released all slaves [ 437.830265][T23433] netlink: 4 bytes leftover after parsing attributes in process `syz.7.6664'. [ 438.122157][T23442] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6667'. [ 438.681603][T23475] netlink: 32 bytes leftover after parsing attributes in process `syz.7.6677'. [ 438.691259][T23475] netlink: 32 bytes leftover after parsing attributes in process `syz.7.6677'. [ 439.071309][T23490] SELinux: ebitmap: truncated map [ 439.077087][T23490] SELinux: failed to load policy [ 439.120741][T23494] SELinux: ebitmap: truncated map [ 439.127340][T23494] SELinux: failed to load policy [ 439.818546][T23517] SELinux: ebitmap: truncated map [ 439.824579][T23517] SELinux: failed to load policy [ 440.210603][T23542] netlink: 32 bytes leftover after parsing attributes in process `syz.6.6707'. [ 440.221199][T23542] netlink: 32 bytes leftover after parsing attributes in process `syz.6.6707'. [ 440.718457][T23554] IPv6: Can't replace route, no match found [ 440.748648][T23557] FAULT_INJECTION: forcing a failure. [ 440.748648][T23557] name failslab, interval 1, probability 0, space 0, times 0 [ 440.761453][T23557] CPU: 1 UID: 0 PID: 23557 Comm: syz.5.6712 Not tainted 6.14.0-syzkaller-01103-g2df0c02dab82 #0 PREEMPT(voluntary) [ 440.761563][T23557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 440.761579][T23557] Call Trace: [ 440.761585][T23557] [ 440.761594][T23557] dump_stack_lvl+0xf6/0x150 [ 440.761706][T23557] dump_stack+0x15/0x1a [ 440.761722][T23557] should_fail_ex+0x261/0x270 [ 440.761750][T23557] should_failslab+0x8f/0xb0 [ 440.761773][T23557] kmem_cache_alloc_node_noprof+0x5c/0x340 [ 440.761799][T23557] ? __alloc_skb+0x10d/0x320 [ 440.761873][T23557] __alloc_skb+0x10d/0x320 [ 440.761899][T23557] ? audit_log_start+0x363/0x6d0 [ 440.761924][T23557] audit_log_start+0x37e/0x6d0 [ 440.761952][T23557] audit_seccomp+0x4b/0x130 [ 440.762051][T23557] __seccomp_filter+0x694/0x10e0 [ 440.762094][T23557] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 440.762168][T23557] ? vfs_read+0x4b4/0x710 [ 440.762247][T23557] __secure_computing+0x7e/0x160 [ 440.762279][T23557] syscall_trace_enter+0xcf/0x1f0 [ 440.762310][T23557] do_syscall_64+0xaa/0x1c0 [ 440.762340][T23557] ? clear_bhb_loop+0x25/0x80 [ 440.762441][T23557] ? clear_bhb_loop+0x25/0x80 [ 440.762464][T23557] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 440.762495][T23557] RIP: 0033:0x7fc18298bc1f [ 440.762513][T23557] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 440.762548][T23557] RSP: 002b:00007fc180ff7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 440.762639][T23557] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc18298bc1f [ 440.762654][T23557] RDX: 0000000000000001 RSI: 00007fc180ff70a0 RDI: 0000000000000007 [ 440.762666][T23557] RBP: 00007fc180ff7090 R08: 0000000000000000 R09: 0000000000000000 [ 440.762677][T23557] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 440.762688][T23557] R13: 0000000000000000 R14: 00007fc182ba5fa0 R15: 00007fffba870438 [ 440.762707][T23557] [ 441.158135][ T29] kauditd_printk_skb: 127 callbacks suppressed [ 441.158153][ T29] audit: type=1326 audit(1742979035.656:17894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23565 comm="syz.4.6717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 441.191104][ T29] audit: type=1326 audit(1742979035.686:17895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23565 comm="syz.4.6717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 441.214802][ T29] audit: type=1326 audit(1742979035.686:17896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23565 comm="syz.4.6717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 441.238587][ T29] audit: type=1326 audit(1742979035.686:17897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23565 comm="syz.4.6717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 441.262288][ T29] audit: type=1326 audit(1742979035.686:17898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23565 comm="syz.4.6717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 441.286207][ T29] audit: type=1326 audit(1742979035.686:17899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23565 comm="syz.4.6717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=238 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 441.309801][ T29] audit: type=1326 audit(1742979035.686:17900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23565 comm="syz.4.6717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 441.333433][ T29] audit: type=1326 audit(1742979035.686:17901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23565 comm="syz.4.6717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=2 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 441.356974][ T29] audit: type=1326 audit(1742979035.686:17902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23565 comm="syz.4.6717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 441.381002][ T29] audit: type=1326 audit(1742979035.686:17903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23565 comm="syz.4.6717" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f89cd4dd169 code=0x7ffc0000 [ 441.426980][T23581] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6721'. [ 441.724446][T23594] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 441.760532][T20278] ================================================================== [ 441.768668][T20278] BUG: KCSAN: data-race in shmem_add_to_page_cache / shmem_getattr [ 441.776596][T20278] [ 441.778936][T20278] read-write to 0xffff8881047c33b0 of 8 bytes by task 8192 on cpu 1: [ 441.787016][T20278] shmem_add_to_page_cache+0x3bb/0x4b0 [ 441.792513][T20278] shmem_get_folio_gfp+0x4dd/0xd30 [ 441.797660][T20278] shmem_write_begin+0xa7/0x190 [ 441.802533][T20278] generic_perform_write+0x189/0x4b0 [ 441.807850][T20278] shmem_file_write_iter+0xc2/0xe0 [ 441.813000][T20278] __kernel_write_iter+0x243/0x4c0 [ 441.818169][T20278] dump_user_range+0x5ed/0x8b0 [ 441.822964][T20278] elf_core_dump+0x1d61/0x1ef0 [ 441.827765][T20278] do_coredump+0x1814/0x1f50 [ 441.832370][T20278] get_signal+0xd56/0x1000 [ 441.836820][T20278] arch_do_signal_or_restart+0x9a/0x4b0 [ 441.842409][T20278] irqentry_exit_to_user_mode+0xa7/0x120 [ 441.848088][T20278] irqentry_exit+0x12/0x50 [ 441.852521][T20278] asm_exc_page_fault+0x26/0x30 [ 441.857385][T20278] [ 441.859717][T20278] read to 0xffff8881047c33b0 of 8 bytes by task 20278 on cpu 0: [ 441.867349][T20278] shmem_getattr+0x69/0x200 [ 441.871865][T20278] vfs_getattr+0x172/0x1b0 [ 441.876298][T20278] vfs_statx+0x12c/0x310 [ 441.880901][T20278] vfs_fstatat+0xe4/0x130 [ 441.885240][T20278] __se_sys_newfstatat+0x58/0x260 [ 441.890280][T20278] __x64_sys_newfstatat+0x55/0x70 [ 441.895317][T20278] x64_sys_call+0x2d6f/0x2e10 [ 441.900004][T20278] do_syscall_64+0xc9/0x1c0 [ 441.904519][T20278] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 441.910423][T20278] [ 441.912747][T20278] value changed: 0x00000000000004fb -> 0x00000000000004fd [ 441.919852][T20278] [ 441.922176][T20278] Reported by Kernel Concurrency Sanitizer on: [ 441.928326][T20278] CPU: 0 UID: 0 PID: 20278 Comm: syz-executor Not tainted 6.14.0-syzkaller-01103-g2df0c02dab82 #0 PREEMPT(voluntary) [ 441.940657][T20278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 441.950719][T20278] ==================================================================