last executing test programs: 3.072438164s ago: executing program 1 (id=522): bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a9a4850000000400000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e21, @local}], 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000600)=0x9, 0x4) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) io_uring_setup(0x56ab, &(0x7f0000000040)={0x0, 0x36d, 0xc000, 0xc, 0xa0002f5}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000000000800000000000"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8001}}]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x10) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) bind$bt_hci(r1, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x8f0, &(0x7f0000002400)=0x0) io_submit(r4, 0x1, &(0x7f0000000340)=[&(0x7f0000000500)={0x2002000000, 0x4, 0x0, 0x3, 0x0, r1, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x2}]) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x26}}], 0x10) listen(r0, 0x7) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYBLOB="01002abd7000fcdbdf2501000000000000000b000000000600147379"], 0x28}, 0x1, 0x0, 0x0, 0x20000894}, 0x800) 2.900843831s ago: executing program 1 (id=526): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000080000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000100000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x20, 0x0, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, 0x3, 0x7, 0x187a67a68afe9213, 0x0, 0x0, {0x7, 0x0, 0x9}}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x40048c0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040), 0x0) rt_tgsigqueueinfo(0x0, 0xffffffffffffffff, 0x4, 0x0) 2.661152094s ago: executing program 1 (id=527): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000300000001"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18010000008000000000000000000004850000006d00000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000200)={0x0, &(0x7f0000000440)=""/179, &(0x7f0000000500), &(0x7f00000006c0), 0x3, r0}, 0x38) (fail_nth: 2) 2.364827764s ago: executing program 1 (id=529): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000740), 0x1, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="11bdc8614e571ac98649cdb07b647a89278b52710012ae248db168054a457b328fea31a32427543ae069fd9a9d5ebf6853937e46765a2b2b9121abc4c7ad22502957fcda33abcb0c11"], &(0x7f0000000200)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='kfree\x00', r1}, 0x18) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) close(r2) r3 = syz_io_uring_setup(0x49a, &(0x7f00000000c0)={0x0, 0x79af, 0x3180, 0x8000, 0x400252}, &(0x7f0000000180)=0x0, &(0x7f0000000300)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x33, 0x4000, @fd_index=0x1, 0x5, 0x0, 0x0, 0x2, 0x1, {0x2}}) io_uring_enter(r3, 0x627, 0x4c1, 0x43, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000540)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r6}, 0x10) close(r6) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) 2.337514647s ago: executing program 1 (id=531): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000300000001"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000780)=[{0x200000000006, 0xf, 0x6, 0x7ffc1ffb}]}) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r1, &(0x7f00000009c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) shutdown(r1, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r2}, 0x10) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'/20, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r4 = open_tree(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) move_mount(r4, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, 0x0, 0x262) ioctl$HIDIOCSUSAGES(r4, 0x501c4814, &(0x7f0000000a00)={{0x3, 0x100, 0xb9e, 0x0, 0x7fffffff, 0x5}, 0x274, [0x2, 0x2, 0xff, 0x7fff, 0x1, 0x7e, 0x2, 0xf, 0x5, 0x61f3, 0x7, 0x4, 0x1, 0x7ff, 0x9, 0x8, 0x3, 0x80000001, 0x9, 0xfffffff8, 0x3, 0x80000000, 0x0, 0x80, 0xffff, 0x4, 0x40, 0x9, 0x2, 0x3ff, 0x7, 0x3, 0xf, 0x6, 0x8, 0xfffffff3, 0x1, 0xffff, 0x5, 0x4, 0x8b5, 0x1, 0xc8, 0x3, 0x7, 0x8, 0x6, 0x8, 0x6, 0x9f71, 0x9, 0x401, 0x40, 0x7ff, 0xffff, 0x3ff, 0x3, 0x1, 0x10000, 0x4, 0x5, 0x9, 0xd6, 0x200, 0xffffffff, 0xa8, 0x7, 0xffffff48, 0x7, 0x2, 0x4f, 0x7, 0x9, 0x1, 0x520e5f75, 0x3, 0x7, 0x800, 0x1, 0x1000, 0x0, 0x5, 0x7, 0x6, 0xc, 0x1, 0xd, 0x9, 0x80000001, 0xfffffff8, 0x10001, 0xe0000000, 0x2, 0xfffffc00, 0xffffff58, 0x8, 0x1, 0x2, 0x4, 0x6, 0x4800000, 0xc, 0x4, 0x2, 0x0, 0x81, 0x6, 0xff, 0x0, 0x4, 0x6, 0xa47, 0x1, 0x1ff, 0xaf8ab0, 0xfffffffd, 0x2, 0x8, 0x7, 0x1000, 0x2, 0x6, 0x4, 0x4, 0x7f, 0x8, 0x2c, 0x10000, 0x8001, 0x5, 0xd4, 0x8, 0xde4, 0xc2c, 0x10000, 0x4, 0x4, 0x3ff, 0x5, 0x10000, 0x9, 0x5, 0x8, 0xffffff3c, 0x0, 0x5, 0x3, 0x5, 0x5, 0x100, 0x6af9, 0xfff, 0x8, 0x101, 0x4, 0xfffffff7, 0x8, 0x9, 0x2, 0x1, 0x7, 0x7, 0x80000001, 0xc, 0xab84, 0x80000000, 0x101, 0xee, 0x3, 0x4, 0xbb, 0xfffffffd, 0x7, 0x2, 0x6, 0x71f3, 0x7, 0x3, 0x3, 0x8, 0x0, 0x800, 0x3, 0x6, 0xa, 0x8, 0x20fbcb, 0x2, 0x8, 0x7, 0x8, 0x85, 0x3ff, 0x8, 0x6, 0x0, 0xfffff216, 0x9, 0x200, 0xa1, 0x3, 0x401, 0x9, 0x3, 0x6, 0x6, 0x6, 0x71d, 0x3, 0x6, 0x9, 0x0, 0x4, 0x9, 0xeb, 0xfffffffe, 0x400, 0x8, 0x4, 0xc, 0x9, 0x3, 0x8, 0xe404, 0x701c, 0xffffff08, 0xae, 0x0, 0x6, 0x50a, 0x4cd, 0x5, 0x85, 0x7, 0x3, 0x2, 0x6, 0x80, 0x9, 0x6, 0x80000000, 0x7, 0x8, 0x4, 0x8, 0x400, 0x1, 0xb000, 0x10001, 0x5, 0x2, 0x3ff, 0x1c, 0x6, 0xc, 0xdf7, 0x4, 0x9, 0x5, 0x2, 0x1, 0x4, 0x74000000, 0x8, 0x2b91, 0x5, 0x0, 0x8, 0x3800, 0xfb4, 0x3, 0x3, 0x8, 0x3da5b633, 0x0, 0x8, 0xfffffd7a, 0xd2, 0x9, 0x3, 0x9, 0x4, 0xf, 0x0, 0x6, 0x3, 0x5, 0x1, 0x100, 0x7, 0x4000000, 0x48, 0x8a1, 0x4, 0xfffffff9, 0x1, 0x1a, 0x40, 0x5, 0xb1, 0x1, 0xbbf9, 0x101, 0x3, 0x7ebd, 0x6, 0x2, 0x400040, 0xf, 0x80000000, 0x5, 0x9596, 0x8, 0x9, 0xfffffffd, 0x9, 0x17, 0x7, 0xfffffff8, 0x800, 0xdb, 0x5, 0xd, 0x9, 0x0, 0x27, 0x4, 0x0, 0x2, 0x2, 0x1e, 0x6, 0x7, 0x1, 0xe, 0x3, 0xffffffff, 0x8, 0x4, 0xe983, 0xffff, 0x3, 0xf, 0x9, 0xa2, 0x1, 0x80, 0x3, 0x0, 0x2800000, 0x5, 0xb, 0x5, 0x9, 0xdcc, 0x6, 0x20, 0x9, 0x10, 0x6, 0x3, 0x6, 0x5, 0xe00000, 0x3ff, 0x3, 0x7f, 0x8001, 0x3, 0x2, 0x4, 0x1, 0x7, 0xcc, 0x75d, 0x1, 0xa, 0x5d, 0xe58, 0xe, 0x401, 0x0, 0x1, 0x1, 0xe, 0x1, 0x3, 0x7, 0x2, 0x5, 0x9, 0xfffffffc, 0x1ff, 0xfffffff9, 0x5, 0x5, 0x6, 0x401, 0x1, 0x8, 0x3, 0x6, 0x510, 0x4dec, 0x80000001, 0x8, 0x9, 0x7, 0x3, 0x3, 0xffff6fd9, 0xe96f, 0x8001, 0x8, 0x40, 0x6, 0x4, 0x9, 0x7, 0xb, 0x5, 0x3, 0x8, 0xffff, 0xa8e, 0x58, 0x7, 0x1, 0x2, 0x33, 0x8, 0x100, 0xff, 0x0, 0xffd, 0xffff, 0x7ff, 0x13, 0x7, 0x352, 0x6, 0x1, 0x4, 0xffffffff, 0x5, 0x2, 0x0, 0x2, 0x5, 0x6, 0x8, 0x2c9, 0x8, 0x8, 0x7fff, 0x1e9, 0x101, 0xfffffffd, 0x80, 0xfffffffb, 0x26, 0x1000, 0x6, 0xd2b4, 0x7, 0x3, 0x5, 0x6356, 0x80000000, 0x3, 0x80, 0xffffffff, 0x8, 0x10000, 0x80, 0x3, 0x81, 0xffffff3f, 0x6, 0x6, 0x200, 0x7, 0x8a3, 0x1ff, 0x4, 0xff, 0xbb7, 0x5, 0xfffffff0, 0x8, 0xfffffff8, 0x3, 0x4, 0x3, 0x8001, 0x3, 0x19b8, 0x6, 0xfffffffd, 0x2, 0x7, 0x7, 0x2, 0x3d791e3d, 0x0, 0x7fff, 0x2, 0x4, 0x80000000, 0x0, 0x5, 0xffffff7f, 0x9, 0x6, 0x2, 0x4, 0x6, 0x0, 0xa, 0xe25, 0x400, 0x3, 0xe, 0x10, 0x1f7, 0x953e, 0x1, 0x2, 0x3ff, 0x10, 0x9, 0x9, 0x0, 0x6, 0x6, 0x8, 0x0, 0x0, 0x4, 0x10001, 0x10001, 0x9, 0x2, 0x587, 0x8fa, 0x8, 0x6, 0x7f, 0xb, 0x4, 0x100, 0xfffffffd, 0x6, 0x0, 0x1, 0xbb4, 0x800, 0xaaa1, 0x0, 0x7, 0x613, 0x3, 0x80, 0x4, 0x10, 0x9, 0x8001, 0xfffffffc, 0x4, 0x0, 0x2, 0x6, 0xfffff7ed, 0xf, 0x613387b1, 0x4, 0xd31d, 0x1, 0xab, 0xfffffffd, 0x5, 0x7, 0x4, 0x40, 0x2, 0x8000, 0x2a, 0x7, 0x4, 0x4, 0xac6, 0xff, 0xb, 0x7ff, 0xc11, 0x0, 0x0, 0x800, 0xfff, 0x7, 0x4, 0xce, 0xc, 0x282, 0xfffffffc, 0x8001, 0x3, 0x9, 0x4, 0x8, 0x8, 0x9, 0x9, 0x2, 0xcb, 0x7ff, 0x6, 0x3, 0x5471656c, 0xa901, 0x7, 0x0, 0x7c51, 0x1, 0x9, 0xd34c, 0x84b56276, 0x0, 0xfff, 0xfffff931, 0x8, 0x6, 0x9, 0x6, 0x3344, 0x2f7e, 0x1, 0x3, 0x0, 0xb, 0x7, 0x2, 0x4, 0xfffffff8, 0x64, 0x0, 0xd2, 0xfff, 0x2, 0x2, 0x4, 0x1d2, 0xb1, 0x7f, 0x6, 0x100, 0xffffffff, 0x8, 0x1, 0x4, 0x7f, 0x8, 0x1000009, 0xa88e, 0xc, 0x58f, 0xff, 0xe9, 0x8, 0x5, 0x9, 0x8, 0x5, 0xb1, 0x9, 0xfffffffd, 0xd23a, 0xffff44d7, 0x9, 0x401, 0xfff, 0x7, 0x28c0, 0x9, 0xffffffff, 0xfff, 0x6, 0x100, 0x0, 0x43, 0x93, 0x36b4, 0x0, 0x4, 0xffffffff, 0x3f, 0x1d7, 0x2, 0xb1, 0x3, 0x7, 0x0, 0x8, 0x8, 0x3, 0xc, 0x6c, 0x80, 0x6, 0x7, 0xe2e, 0x8, 0x4, 0x1000, 0xf, 0x9, 0x7f2086dc, 0xf, 0x3, 0x1, 0x9, 0x80000000, 0x40, 0x5, 0x2, 0x8, 0xe84c, 0x5, 0x9, 0x4, 0x8, 0x9, 0x8, 0x81, 0x2, 0xb, 0x2243, 0x2, 0x10001, 0x3, 0x6, 0x8, 0x7, 0xc3, 0x36, 0x1, 0x3, 0x3, 0x4, 0xffffffff, 0x8, 0x865, 0x10001, 0x800, 0x0, 0x7, 0x7, 0x6, 0x0, 0x3, 0x4, 0x837a, 0x9, 0xbd, 0x1, 0x0, 0x8, 0x3, 0x6ef, 0x2, 0x52, 0x400, 0xff, 0x7, 0x5, 0xaba, 0x9, 0x5, 0x8, 0x3, 0x0, 0x400, 0x5, 0x200, 0x7fff, 0xfffff0fd, 0x4, 0x4, 0x10000, 0x5, 0xff, 0x6, 0x4, 0x0, 0x7, 0xa, 0x3, 0x6f2503d3, 0x799, 0x40, 0x8, 0x10000, 0x5, 0x68e, 0xfffffe01, 0x4, 0x5, 0x401, 0x2, 0x7, 0x16e, 0x2, 0x1, 0x6, 0x3, 0x6, 0x18b3, 0x9, 0x6b7f, 0x7, 0x1ff, 0x0, 0x6, 0xa25, 0xff, 0x10000, 0xffffffff, 0x9, 0x1c0, 0x5, 0xb74, 0xc, 0x400, 0x8, 0x2, 0x2, 0x7ff, 0x1, 0x1ff, 0xcb1e, 0x1, 0x800, 0x2, 0xd, 0x3, 0xf, 0x7, 0x4e04b1b4, 0x2, 0x100, 0x40, 0xf1, 0x2, 0xe, 0xffff, 0x6, 0x8, 0x0, 0xbf745da, 0xffff, 0x1, 0x7, 0x3, 0xb, 0x8001, 0x3, 0x80000, 0x6, 0x8001, 0x81, 0xa, 0x4, 0x8d, 0x7, 0x4, 0x7ff, 0x5, 0xf97, 0xffffffff, 0x0, 0x401, 0x6, 0x1ff, 0x0, 0x2, 0x7f, 0x7ff, 0x2, 0x4, 0xffffffff, 0x167d, 0x400, 0x2, 0x6, 0x3, 0x5, 0x4ead, 0x2, 0x7f, 0x21fd7d94, 0x0, 0x400, 0xb846, 0x6020184, 0x2f99, 0x0, 0x10, 0x1, 0x7, 0xc, 0x8000, 0x8, 0x0, 0x5, 0x6, 0xa, 0xfffffffe, 0x8729, 0xfb, 0x9, 0x6, 0x6, 0xff, 0x101, 0x40, 0x7, 0x52, 0xc, 0x7, 0xffffffff, 0x3, 0x4, 0x2, 0x1, 0x5, 0x3, 0x1, 0x9, 0x2, 0x2, 0xe5, 0xfffffff8, 0xc731, 0x9, 0x400, 0x401, 0x8, 0x10000, 0x80000001, 0xe, 0x8, 0x4, 0x7, 0x9, 0x6, 0x8, 0x3459, 0x9, 0x400, 0x2, 0x0, 0x7fff, 0x5, 0x400, 0x29ce000, 0x8, 0x1, 0xf, 0x3ff, 0x3, 0xb, 0x1, 0x67e2, 0x7, 0x40, 0xfffffffa, 0x101, 0x2, 0x18000, 0xa, 0xb106, 0x8482, 0xff18, 0x9, 0x100, 0x5558, 0x4, 0x9b, 0x7, 0x5, 0x2, 0x8, 0x7ff, 0x7, 0xf, 0x200, 0xc, 0x100, 0x2, 0x10000, 0xfff, 0x813, 0x5, 0xe47, 0x4, 0x10001, 0xff, 0xefc, 0x1, 0x9, 0x7e, 0x0, 0x7, 0x5, 0x9, 0xfff, 0x4, 0x3, 0x0, 0x1, 0x6, 0x2, 0x1]}) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1b, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1004}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xeb48195b69e85694, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r6, 0x0, 0x5}, 0x18) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a300000000048000000030a05020000000000000000010000000900030073797a320000000014000480080002400000000008000140000000000900010073797a3000000000080007006e6174"], 0xcc}, 0x1, 0x0, 0x0, 0x880}, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r8, &(0x7f0000001080)={0xa, 0x4e20, 0x7f, @empty, 0x2}, 0x1c) setsockopt$inet6_int(r8, 0x29, 0x3, &(0x7f0000004240)=0x40000006, 0x4) recvmmsg(r8, &(0x7f0000000ac0)=[{{0x0, 0x0, 0x0}, 0x6}], 0x1, 0x10100, 0x0) setsockopt$inet6_int(r8, 0x29, 0x4, &(0x7f0000000000)=0x7f, 0x4) sendto$inet6(r8, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) setitimer(0x0, 0x0, 0x0) r9 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r9, &(0x7f0000000400)={0x18, 0x0, {0x2, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xa}, 'lo\x00'}}, 0x1e) memfd_create(&(0x7f0000000040)='lo\x00a\xa5Hb<\x94\x0e\xb4\x86\xf1\x8f\x03\xa9\xb2\x8fUy\xb9X\xe8#\x1a\xa9\ad\x8e\xd1\x9c@\x9e\xdax\xf2l\xc0\xde%\x97<\xcf\x9a\f\xd8E\x03\x81i\xa8cOR\x8b`\n9\xfa\xb9R\xdb\xd9\xabq\x00\x9f\x0fn\xd8Z\x9a{s\xb7\xe0C\x9d\xab\xa4\xda\xf9R\xf3\x01\xd93\xfc\xfa\x85\xcd\xca\x8eO\xa4\x99\v0\xd0\xee;#\xd4\\7\x87\x10o\xdb\xfb?ed\xa9G\xccP\x99Td\xa4\x1e\x9d\xc6]\xa7j\\\x94\xa8\x11H\'T\x0e\x15|d,\xd0\xfdaT\x02\xf7\xa8E\xbaRb\x9d\xee\xd9\xe2d\xfdW\xde\x1b\x9fy\xab\xdc\f\xf2\xaac\x82XE\xd4', 0x5) 1.780934623s ago: executing program 3 (id=534): mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0xffffffff) r0 = open(&(0x7f00000003c0)='./file0\x00', 0x8060, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000002001000001"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_buf(r3, 0x1, 0x1c, 0x0, &(0x7f00000000c0)) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="020900000700000000000000000000000500", @ANYRES64], 0x38}}, 0x20000004) r5 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') r6 = syz_io_uring_setup(0xbda, &(0x7f0000000100)={0x0, 0xec25, 0x8, 0x10000001, 0x40000333}, &(0x7f0000000dc0)=0x0, &(0x7f00000004c0)=0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a58000000160a0302000200000000000002000000090002"], 0x80}}, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="700f000000000000000000000000000000f10000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000d40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r11}, 0x18) sendmsg$NFT_BATCH(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a30000000006c000000160a01000000000000000000010000000900010073797a30000000000900020073797a3000000000400003800800014000000000080002400000fbff2b0003801400010067656e6576653000000000000000000014000100776732000000000000000000c6e49c0f5c000000180a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c"], 0x110}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) r12 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240), r0) r13 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r13, 0x107, 0x12, &(0x7f0000000080)={0xfffd, 0x3}, 0x4) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="b0000000", @ANYRES16=r12, @ANYBLOB="08002dbd7000ffdbdf2503008008000100000000000000000c00040005000000000000000c0003005b0000000000000008000200020000000c00030000000000000000800c000300060000000000000008000200090000000c000300060000000000000024000301080003000600000008000300c356000002000300660a0000080003000700000014000980080001005dffffff08000200000000300000000000000000000000000000f8bb04e9fd72227a2a898c3a422fde3c9d350ef8ba232260b3bdd98a53d811"], 0xb0}, 0x1, 0x0, 0x0, 0x44000}, 0x20000040) syz_io_uring_submit(r7, r8, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}) io_uring_enter(r6, 0x847ba, 0x0, 0xe, 0x0, 0x0) vmsplice(r5, &(0x7f0000000380)=[{&(0x7f0000000080)="9b", 0x1}], 0x1, 0x6) 1.743052246s ago: executing program 3 (id=535): r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB='\v\x00\x00'], 0x119) 1.725557988s ago: executing program 3 (id=536): bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a9a4850000000400000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e21, @local}], 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000600)=0x9, 0x4) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) io_uring_setup(0x56ab, &(0x7f0000000040)={0x0, 0x36d, 0xc000, 0xc, 0xa0002f5}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000000000800000000000"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8001}}]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x10) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) bind$bt_hci(r1, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x8f0, &(0x7f0000002400)=0x0) io_submit(r4, 0x1, &(0x7f0000000340)=[&(0x7f0000000500)={0x2002000000, 0x4, 0x0, 0x3, 0x0, r1, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x2}]) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x26}}], 0x10) listen(r0, 0x7) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYRES16=r6, @ANYBLOB="01002abd7000fcdbdf2501000000000000000b000000000600147379"], 0x28}, 0x1, 0x0, 0x0, 0x20000894}, 0x800) 1.641011707s ago: executing program 2 (id=537): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000080000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000100000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x20, 0x0, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, 0x3, 0x7, 0x187a67a68afe9213, 0x0, 0x0, {0x7, 0x0, 0x9}}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x40048c0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040), 0x0) rt_tgsigqueueinfo(0x0, 0xffffffffffffffff, 0x4, 0x0) 1.629476648s ago: executing program 3 (id=538): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec8500000050000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000003c0)='kfree\x00', r0}, 0x18) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000380)=0x20000, 0x4) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/5, 0x204000, 0x1000}, 0x20) r2 = socket$phonet(0x23, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x20, 0x4) timer_create(0x3, &(0x7f0000533fa0)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000040)=0x4000, 0x4) bind$xdp(r1, &(0x7f00000002c0)={0x2c, 0x4, r3, 0x30, r1}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) r5 = socket$nl_route(0x10, 0x3, 0x0) statfs(&(0x7f0000000040)='./cgroup.net/cgroup.procs\x00', &(0x7f00000002c0)=""/166) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'dvmrp1\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000640)=@newtfilter={0x24, 0x11, 0xd27, 0x70bd29, 0x0, {0x0, 0x0, 0x74, r6, {0x0, 0x6}, {0x0, 0x1}, {0xfff2}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x8004}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00f6ff9afaff14ffffd06038dae8b2ca2b76fde56dc099544134d918e56a6635cf6b90441b66ab32822200"/73, @ANYRES32=0x0, @ANYBLOB="54320900221b01001c0012800b00010062726964676500000c0002800800020002000000"], 0x3c}, 0x1, 0x0, 0x0, 0x600}, 0x92) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4005, &(0x7f0000000040)=0x81, 0x5, 0x0) set_mempolicy_home_node(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0) r8 = fspick(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1) r9 = syz_io_uring_setup(0xec5, &(0x7f00000008c0), &(0x7f0000000080)=0x0, &(0x7f0000000340)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r10, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) io_uring_enter(r9, 0x95d, 0xfa39, 0x61, 0x0, 0x0) io_uring_enter(r9, 0xedd, 0x8acb, 0x41, 0x0, 0x0) io_uring_register$IORING_REGISTER_IOWQ_MAX_WORKERS(r9, 0x13, &(0x7f0000000040)=[0x1, 0xf], 0x2) fsconfig$FSCONFIG_SET_FD(r8, 0x5, &(0x7f0000000140)='sched_switch\x00', 0x0, r5) 1.627845108s ago: executing program 2 (id=539): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000800000095000000000000009500a5050000000077d8f3b423cdac8d8000000000000020e16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f68a7d06d10bfe150a7487535f7866907dc6751dfb261a0e3ccae669e173a649c1cfd6587d452d46b7c57d77578f4c35235138d5521f9453559c3421eed73d5661cfeecf9c66c54c3b3ffe1b4ce25d7c983c044c03bf3ff03fe3e26e7a23129d6606fd28a7f9105f82317874b33d96b39fa4e045469989d552af6200000003a00000000000000abecc2f4a3799af2551ce935b0f327cb3f011a7d06602e2fd5234712596b696418f1623ed38ae89d24e14b40234756ddcebfba2f87925bfacba83109753f543ad027edd68149ee99eebc6f7d6dd4aed4afe1f44ccb19e810879b70a70900000000000000000000d7900a820b6327944e9a217b9800e02a92895614cd50cbf83a1ed25268816b004519c9c5cff097d8000000000009d27d753a30a147b24a48435bd8a568669596e9e08679b3ce48e90defb6670c3d6209000000c773713a66b223fa8b148871c8d31d24000025449f106b99893ed20fa7a050fbbef90327e827e513e9606800000000e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e69ee52b59d13182e1f24ed208ada12f7a1525320e71666f472a972d5eb1affb87ba55b2d72078e9f40b4ae7dc3b2aeb0d11cd22c35d32940f19dff00ffffffff080000ff003853e59de7621e348955735264f34b1046a1813668297a7edad187ef106ae7fcbb25090f17d0baadeb8ae190a1fb5a315f8347fb0379659500000000000000000000000000000000000000002fdf0193ec79c90ed210ebc2fbed6d4216770c1b0dec886b388d138c2b69c6aacb714e7264093061c660a5100b7cc165889eb94c8d7c77b6fa06f1a4d8e4a6b6cb37e319c5c22f276b03cae853f42b07ca0b03b1eb32a6b1a81cd511fd0b59d57a11c6a3ebf9731464ad21f07f618efc31023ac60007426162b57e803519954d7c952197b0a508c0e16fda392fa84be38e937d36af1c35138e05a9e8d6dc0272de72c41500000000304402e22af23437126f330f8eb4075daaeae3134ece35cd86d95bd9836bd186c4b6565e967a4e3e86f299b7400994ba136b4eccf3b0f001a266c0d160b3ce1182001d64b52a5ce7f506295d59eea6903b84ffbabf5a5b91c1d6ecce8728a224aec66c610e3becd60a35e848c224f8251947eed20e2b612cb099bfe8924d33ba7f0691fed04a43e9c64b7a1e3165e86cdb9871c678a6bbb14821f441c6c14d1bd78d8ffdfea12c19ea04264335d60b6b7a7da6fb83f33101db32f6ab137d943dd3c1e8db9f3e1263573dc721ae82fe0bc63598751a5092c9f7dbfc39d564834e3703492c2a651643d8ce5c36d97a4812cf73fc8ea0d6"], &(0x7f0000000080)='GPL\x00', 0x5, 0xbf, &(0x7f000000cf3d)=""/191, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0xb) r1 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) listen(r1, 0x0) r2 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r2, &(0x7f0000000080)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r5}, 0x38) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r5], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000180)='kfree\x00', r6}, 0x18) setsockopt$SO_BINDTODEVICE_wg(r2, 0x1, 0x19, &(0x7f00000002c0)='wg1\x00', 0x4) sendmsg$ETHTOOL_MSG_WOL_GET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01002dbd7000000000001b000000180001801400020064756d6d7930"], 0x2c}}, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f00000000c0)=@req3={0x80000000, 0x0, 0x2}, 0x1c) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000000040)={0x4000000, 0x0, &(0x7f0000000000)={&(0x7f0000000380)={0x2, 0x9, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x26, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x1, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@empty, @in6=@private2={0xfc, 0x2, '\x00', 0xff}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x300, @multicast1}}]}, 0x80}}, 0x0) accept4$inet6(r1, 0x0, 0x0, 0x0) sendmsg$tipc(r2, &(0x7f0000000640)={&(0x7f0000000300)=@nameseq={0x1e, 0x1, 0x2, {0x43, 0x0, 0x3}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)=0x0) setreuid(r8, r9) 1.597927691s ago: executing program 2 (id=540): prctl$PR_SET_PDEATHSIG(0x1, 0x16) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x70, r1, 0x800, 0x70bd2d, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x2, 0x70}}}}, [@mon_options=[@NL80211_ATTR_MNTR_FLAGS={0xc, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_ACTIVE={0x4}]}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "0bb1c04de742a3b7165a18e18bedf7234cd86e53a2930110"}], @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x5}, @NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_MESH_ID={0xa}]}, 0x70}}, 0x0) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), r0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000200)={@multicast1, @remote, 0x0}, &(0x7f0000000240)=0xc) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000280)={'wg2\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={@mcast2, 0x0}, &(0x7f0000000300)=0x14) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, r2, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x8000}, 0x4044) getegid() r6 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r7 = inotify_add_watch(r6, &(0x7f0000000480)='./file0\x00', 0x22) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000500)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r6, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x30, r1, 0x1, 0x70bd2d, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r8}, @val={0xc, 0x99, {0x8, 0x69}}}}, [@NL80211_ATTR_OPER_CLASS={0x5, 0xd6, 0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4004}, 0x40044) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000680)={{r6, 0xffffffffffffffff}, &(0x7f0000000600), &(0x7f0000000640)='%-010d \x00'}, 0x20) close_range(r9, r0, 0x2) r10 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_NAN(r10, &(0x7f0000000780)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x28, r1, 0x800, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r8}, @val={0xc, 0x99, {0x8, 0x29}}}}, ["", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4000) unshare(0x200) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001880)={r6, &(0x7f00000007c0)="2698bec023656084ab591b196d8f6b39f725de6dbdb49619263b35ff3ceb3777563d53f4b043cd94ca6e4d41df109fa980d35f9015f830c03eb9c9e5282209b5529d494a87c3589ca4f8e336bfddf9c6167ff6c7f62fb8bb83d652edd44a51b3eebc8c079e923da5867721f7c780c76123bf71fddc6ecd60e54921c0532fa1b3605d62e8f62a85fa57068dfa5cc2473ec8a444ac5163381f2eb0d52bdf8138c4e0ad82ff7e211758d699d7c058d3e55bd3210ffa", &(0x7f0000000880)=""/4096}, 0x20) ioctl$TIOCGSID(r6, 0x5429, &(0x7f00000018c0)=0x0) sched_setscheduler(r11, 0x2, &(0x7f0000001900)=0xffffffff) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000001940)={0x46, 0x0, 0x0, 0xab, 0x1, 0x400, 0xc32, 0x10001}, 0x20) inotify_rm_watch(r6, r7) lstat(&(0x7f0000001980)='./file0\x00', &(0x7f00000019c0)) r12 = openat$nvram(0xffffffffffffff9c, &(0x7f0000001a40), 0x2000, 0x0) sendmsg$NL80211_CMD_JOIN_IBSS(r12, &(0x7f0000001b80)={&(0x7f0000001a80)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001b40)={&(0x7f0000001ac0)={0x50, r1, 0x400, 0x70bd25, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_HT_CAPABILITY_MASK={0x1e, 0x94, {0x2, 0x1, 0x0, 0x0, {0x7ff, 0x40, 0x0, 0xe, 0x0, 0x0, 0x0, 0x2}, 0x1, 0x0, 0x4}}, @NL80211_ATTR_CONTROL_PORT_OVER_NL80211={0x4}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ibss_ssid}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000010}, 0x4001) r13 = accept4(r10, &(0x7f0000001bc0)=@hci, &(0x7f0000001c40)=0x80, 0x80000) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r12, 0x84, 0x9, &(0x7f0000001c80)={0x0, @in={{0x2, 0x4e24, @loopback}}, 0x205b, 0x10, 0x3, 0xfff, 0x9, 0x3ff, 0xbd}, &(0x7f0000001d40)=0x9c) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r13, 0x84, 0x77, &(0x7f0000001d80)={r14, 0x1f7, 0x3, [0xb6, 0x9, 0x4]}, 0xe) 1.396865761s ago: executing program 1 (id=541): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0xae, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={0x0, r0}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) setreuid(0xee01, 0x0) (fail_nth: 1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = getpid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r3, 0x1, 0x70bd26, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r1}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040010}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r4 = syz_pidfd_open(r1, 0x0) process_mrelease(r4, 0x0) r5 = timerfd_create(0x9, 0x800) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r6}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0xe000, 0x0) timerfd_gettime(r5, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x400000, 0x3, &(0x7f0000000000/0x400000)=nil) munmap(&(0x7f00003fe000/0xc00000)=nil, 0xc00000) 1.396442681s ago: executing program 2 (id=542): r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x3f}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYRESOCT=r1, @ANYRES16=r1, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x48c0) 1.390572141s ago: executing program 2 (id=543): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0xae, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x19, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={0x0, r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) setreuid(0xee01, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000200"/24], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001cc0)=ANY=[@ANYRES8=r0], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='kfree\x00', r2, 0x0, 0x8ce}, 0x18) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000240)='asymmetric\x00', &(0x7f00000000c0)=@chain) keyctl$restrict_keyring(0x1d, r3, 0x0, 0x0) r4 = getpid() r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010026bd7000000000000700000000000000000000e4657e7bdd7f6a42e0a78ad1305869dc76736953f52b2a644b0abae0d1", @ANYRES32=r4, @ANYBLOB], 0x3c}, 0x1, 0x0, 0x0, 0x4040010}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r7 = syz_pidfd_open(r4, 0x0) process_mrelease(r7, 0x0) r8 = timerfd_create(0x9, 0x800) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r9}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0xe000, 0x0) timerfd_gettime(r8, 0x0) 962.993454ms ago: executing program 0 (id=546): mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0xffffffff) r0 = open(&(0x7f00000003c0)='./file0\x00', 0x8060, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000002001000001"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_buf(r3, 0x1, 0x1c, 0x0, &(0x7f00000000c0)) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="020900000700000000000000000000000500", @ANYRES64], 0x38}}, 0x20000004) r5 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') r6 = syz_io_uring_setup(0xbda, &(0x7f0000000100)={0x0, 0xec25, 0x8, 0x10000001, 0x40000333}, &(0x7f0000000dc0)=0x0, &(0x7f00000004c0)=0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a58000000160a0302000200000000000002000000090002"], 0x80}}, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="700f000000000000000000000000000000f10000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000d40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r11}, 0x18) sendmsg$NFT_BATCH(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a30000000006c000000160a01000000000000000000010000000900010073797a30000000000900020073797a3000000000400003800800014000000000080002400000fbff2b0003801400010067656e6576653000000000000000000014000100776732000000000000000000c6e49c0f5c000000180a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c000380"], 0x110}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) r12 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240), r0) r13 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r13, 0x107, 0x12, &(0x7f0000000080)={0xfffd, 0x3}, 0x4) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="b0000000", @ANYRES16=r12, @ANYBLOB="08002dbd7000ffdbdf2503008008000100000000000000000c00040005000000000000000c0003005b0000000000000008000200020000000c00030000000000000000800c000300060000000000000008000200090000000c000300060000000000000024000301080003000600000008000300c356000002000300660a0000080003000700000014000980080001005dffffff08000200000000300000000000000000000000000000f8bb04e9fd72227a2a898c3a422fde3c9d350ef8ba232260b3bdd98a53d811"], 0xb0}, 0x1, 0x0, 0x0, 0x44000}, 0x20000040) syz_io_uring_submit(r7, r8, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}) io_uring_enter(r6, 0x847ba, 0x0, 0xe, 0x0, 0x0) vmsplice(r5, &(0x7f0000000380)=[{&(0x7f0000000080)="9b", 0x1}], 0x1, 0x6) 946.685166ms ago: executing program 4 (id=547): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x281442, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xe}, 0x8) (async) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x8800, 0x0) ioctl$TCSETSW2(r3, 0x5453, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5, 0x0, 0xffffffffffff8001}, 0x18) syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x1a00404, &(0x7f0000000080)={[{@grpquota}, {@nomblk_io_submit}]}, 0x1, 0xbac, &(0x7f00000017c0)="$eJzs3M1rXOUaAPDnnEy+c5v0crn3tggGpCqK07QpFbpqXYsKunDZmExKyPTDJIIJXaR1ry5EXBSkf4Lg3m5cCS7qQutfUMQiRTdtFyNnPtKxk5nGdGaOSX8/eHPe97wn8zxPTmfOe2BOA3hqTWc/0ohDEXE2iZis708jYqjaG4nYrB13/+7l+awlUam8/VsSSUTcu3t5vvFaSX07Xh+MRMTN15L490etcVfXN5bnyuXSSn18dO38paOr6xuvLJ2fO1c6V7pwYvbVE7MnZ2e7WOvtS+998cwPbzx/9frHM29+fuC7JE7HRH2uuY5umY7prb9Js0JEzHU7WE4G6vU015kUckwIAICO0qY13H9jMgbi4eJtMr79MdfkAAAAgK6oDERUAAAAgH0ucf8PAAAA+1zjewD37l6eb7R8v5HQX3fORMRUrf7G8821mUJsVrcjMRgRY78n0fxYa1L7tSc2nUX6+vtS1qJHzyF3snklIv6/3flPqvVPVZ/ibq0/jYiZLsSffmS8l+o/3YX4edcPwNPpxpnahaz1+pdurX9im+tfYZtr127kff1rrP/ut6z/HtY/0Gb999YOYxx+8NLNdnPN6793P/l5IYufbZ+oqL/hzpWIw4Xt6k+26k/a1H92hzHG529fazeX1Z/V22j9rr9yPeJIdTXXWn9D0un/Jzq6uFQuzdR+bvP66yc7x28+/1nL4jfuBfohO/9jsbvzf2mHMab+9+uhdnOPrz/9ZSh5p9obqu/5cG5tbeVYxFDyeuv+451zaRzTeI2s/hef6/z+367+7DNhs/53yP71XKlvs/HVR2KOHzn+1e7r762s/oVdnv9Pdxjjy2+uvd9uLu/6AQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANgb0oiYiCQtbvXTtFiMGI+I/8RYWr64uvby4sUPLixkcxFTMZguLpVLMxExWRsn2fhYtf9wfPyR8WxEHIyIzyZHq+Pi/MXyQt7FAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAsGU8IiYiSYsRkUbEH5NpWizmnRUAAADQdVN5JwAAAAD0nPt/AAAA2P9a7v8LfxmN9DMXAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA9qWDz964lUTE5qnRassM1ecGc80M6LV0Z4eN9ToPoP8G8k4AyE2hqV+pVCo5pgL0mXt8IHnM/EjbmeGu5wIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAP9cLh27cSiJi89RotWWG6nODuWYG9FqadwJAbgY6TSaP3QHsYYW8EwBy4x4fqK3sH1RqWudH2v7m8BNHBQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGDvmKi2JC1GRFrtp2mxGPGviJiKwWRxqVyaiYgDEfHT5OBwNj6Wd9IAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB03er6xvJcuVxa0dHR6WJnNPoWa7T+Zm5zzHD7qQ6dnD+YAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIxer6xvJcuVxaWc07EwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACBvq+sby3Plcmmlh528awQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAID9/BgAA///GyAmy") (async) r6 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x42, 0x0) pwrite64(r6, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) lseek(r6, 0x5, 0x4) (async) socket$nl_route(0x10, 0x3, 0x0) (async) r7 = socket$netlink(0x10, 0x3, 0xf) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r7, 0x10e, 0x4, &(0x7f0000000080)=0x100, 0x4) (async) bind$netlink(r7, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0xfff, 0x0, 0x3, 0x8, 0x20005, 0x8, 0x0, 0x0, 0x0, 0x64f1}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) setsockopt$sock_int(r7, 0x1, 0x8, &(0x7f0000000000), 0x4) (async) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="58000000100000000000000000000000050000030500010007"], 0x58}, 0x1, 0x0, 0x0, 0x8040}, 0x4004010) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00'}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x6, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18020000a8ffffff00000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) (async) creat(&(0x7f0000000080)='./bus\x00', 0x0) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x8c, &(0x7f0000000300)='trans=rdma,') (async) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea1100200005000000", 0x29}], 0x1) 816.927119ms ago: executing program 0 (id=548): bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a9a4850000000400000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e21, @local}], 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000600)=0x9, 0x4) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) io_uring_setup(0x56ab, &(0x7f0000000040)={0x0, 0x36d, 0xc000, 0xc, 0xa0002f5}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000000000800000000000"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8001}}]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x10) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) bind$bt_hci(r1, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x8f0, &(0x7f0000002400)=0x0) io_submit(r4, 0x1, &(0x7f0000000340)=[&(0x7f0000000500)={0x2002000000, 0x4, 0x0, 0x3, 0x0, r1, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x2}]) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x26}}], 0x10) listen(r0, 0x7) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES16=r6, @ANYBLOB="01002abd7000fcdbdf2501000000000000000b000000000600147379"], 0x28}, 0x1, 0x0, 0x0, 0x20000894}, 0x800) 791.381302ms ago: executing program 4 (id=549): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000080000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000100000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x20, 0x0, 0x7, 0x201, 0x0, 0x0, {}, [@NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) sendmsg$NFNL_MSG_ACCT_DEL(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)={0x14, 0x3, 0x7, 0x187a67a68afe9213, 0x0, 0x0, {0x7, 0x0, 0x9}}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x40048c0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040), 0x0) rt_tgsigqueueinfo(0x0, 0xffffffffffffffff, 0x4, 0x0) 768.710634ms ago: executing program 0 (id=550): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xbf, &(0x7f000000cf3d)=""/191, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0xb) r1 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) listen(r1, 0x0) r2 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r2, &(0x7f0000000080)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r5}, 0x38) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r5], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000180)='kfree\x00', r6}, 0x18) setsockopt$SO_BINDTODEVICE_wg(r2, 0x1, 0x19, &(0x7f00000002c0)='wg1\x00', 0x4) sendmsg$ETHTOOL_MSG_WOL_GET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01002dbd7000000000001b000000180001801400020064756d6d7930"], 0x2c}}, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f00000000c0)=@req3={0x80000000, 0x0, 0x2}, 0x1c) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000000040)={0x4000000, 0x0, &(0x7f0000000000)={&(0x7f0000000380)={0x2, 0x9, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x26, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @broadcast}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x1, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@empty, @in6=@private2={0xfc, 0x2, '\x00', 0xff}}}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x300, @multicast1}}]}, 0x80}}, 0x0) accept4$inet6(r1, 0x0, 0x0, 0x0) sendmsg$tipc(r2, &(0x7f0000000640)={&(0x7f0000000300)=@nameseq={0x1e, 0x1, 0x2, {0x43, 0x0, 0x3}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000180)=0xc) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)=0x0) setreuid(r8, r9) 524.039378ms ago: executing program 3 (id=551): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./bus\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="73686f72746e616d653d77696e39352c73686f72746e616d653d77696e6e742c756e695f786c6174653d302c756e695f786c6174653d312c757466383d312c757466383d312c646973636172642c757466383d302c756e695f786c6174653d302c666c7573682c73686f72746e616d653d6d697865642c73686f72746e616d653d6c6f7765722c646f733178666c6f7070792c73686f72746e616d653d77696e6e742c73686f72746e616d653d6c6f7765722c757466382c0014697a7960fb374b723f64329787434c6c9f891d2e309efaf1d4e529e1ba0f697fedffb095592bc19d5a8f8141ee9bf46262f3a2b1452bf206c0e2ae8a465e6e1be6eeb5d588035a24458d476fc1f9a234cdc4ba352a4185614ce67df4870bff796357ee95fffb99cde9", @ANYBLOB="e452e995d21822ad2908bc53b1eee5c91d58ff79db72ee73a3e3d070e14b096e9e42c315786ee2d798ef1954d87d7ab7b26d51ae2625b5b12ae4132e201622bfc52953909cd0aba5b57dfe9c6869905d7c86f68821eaa3de803bbf9929969cf93650fe523e9a1f37"], 0x1, 0x2c7, &(0x7f00000000c0)="$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") set_mempolicy(0x3, &(0x7f0000000580)=0x4b9, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000190001000000000000000000021800000000fd000000ed0008000100ac141400080008"], 0x2c}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) setsockopt$ARPT_SO_SET_REPLACE(r0, 0xa02000000000000, 0x60, &(0x7f0000000000)={'filter\x00', 0xb001, 0x4, 0x3e8, 0x218, 0x218, 0x0, 0x300, 0x300, 0x300, 0x7fffffe, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {@empty, {[0x0, 0x0, 0xff]}}, {@mac=@local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pimreg\x00', 'pimreg1\x00'}, 0xc0, 0x130}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f67b23ffdfa27f907a03732da3acbc6518e62a77ca06f258762e88c0d9f9d2f413b94a105f4bdf01425ce81c5d000000000000000500ffffffff00"}}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_team\x00', 'ip6tnl0\x00'}, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) (fail_nth: 1) 492.295871ms ago: executing program 4 (id=552): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./bus\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYBLOB="e452e995d21822ad2908bc53b1eee5c91d58ff79db72ee73a3e3d070e14b096e9e42c315786ee2d798ef1954d87d7ab7b26d51ae2625b5b12ae4132e201622bfc52953909cd0aba5b57dfe9c6869905d7c86f68821eaa3de803bbf9929969cf93650fe523e9a1f37"], 0x1, 0x2c7, &(0x7f00000000c0)="$eJzs3c+KW1UYAPDvZpI7qbOYLFyJ4F104cahU3DlwhQZQZyVkoV/QIttoUxCYQKBqhi66hO4cOF7uHMvuBF8AMEHcGeRwpGbe/OnmTQ2UzOV8ffb9PQ733fvOTlnJovLPfP5q4OTW/eGdx58/Vu021k0utGNR1l0ohFTqRYAwKXwKKX441zf783GtsYEAGzXwvd/6ykpu2dDb297WADAFn340cfv3zg+PvqgKNoRg4ejXhbVv1X/jTtxN/pxO67FfjyePwtIqWq/+97xUTSLUieuDsajXlk5+OznWWoek/rD2I/O6vrDorJQPx71WvHSbmRZxN1uOZDrsR8vLzyLqOrL/qPrK+qjl8fr7XqS5f0PYj9++SLuRT9uTZ5pzO//TR7FO+nbP7/6pEwu67PxqLc7yZtLOxe9NgAAAAAAAAAAAAAAAAAAAAAAXF4HxUwnrg7KUH3+zs7jSf/BE/2T83Uak/6qPovIJ42l84HGKb6fnq9zrSiKlFX5s/N9rjTjlWY0X9jEAQAAAAAAAAAAAAAAAAAA4D9keP/Lk5v9/u3Tf6VRv+Q/e63/vNfpLkRei/XJuxvdK3bq9HKsyzmHP306mEXKSZxn8KNWEbFuzK0zkSvleNZc+ddqmf5KKaUsi3i+ZWqtvdezNfbW55Qf8I/f7b1xcjP7p8+wPV24Hxa78jgd3l9a08g2GWHaaPvlC5F2vUOmkbz+/zNdZ+85f4je+r26WR3J1s3i4ZtPbJtW3Yinbb/2Rvv5Yn7/AAAAAAAAAAAAAAAAAAAAc/OXfld0Plhb2tjaoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADggs3//v+8EWciS41xXbw6J6U0nkXyOB2+4CkCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADwP/B3AAAA//9sOWek") set_mempolicy(0x3, &(0x7f0000000580)=0x4b9, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000190001000000000000000000021800000000fd000000ed0008000100ac141400080008"], 0x2c}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0), 0x0, 0x104, r1}, 0x38) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) setsockopt$ARPT_SO_SET_REPLACE(r0, 0xa02000000000000, 0x60, &(0x7f0000000000)={'filter\x00', 0xb001, 0x4, 0x3e8, 0x218, 0x218, 0x0, 0x300, 0x300, 0x300, 0x7fffffe, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {@empty, {[0x0, 0x0, 0xff]}}, {@mac=@local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pimreg\x00', 'pimreg1\x00'}, 0xc0, 0x130}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f67b23ffdfa27f907a03732da3acbc6518e62a77ca06f258762e88c0d9f9d2f413b94a105f4bdf01425ce81c5d000000000000000500ffffffff00"}}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_team\x00', 'ip6tnl0\x00'}, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 486.111602ms ago: executing program 0 (id=553): munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) setns(r1, 0x24020000) mount_setattr(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x8000, &(0x7f0000001dc0)={0x89, 0x72, 0x20000}, 0x20) r2 = socket$unix(0x1, 0x1, 0x0) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x4c, 0x0, 0x0) connect$unix(r2, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r3 = open(0x0, 0x145142, 0x0) ftruncate(r3, 0x2007ffc) socket$nl_generic(0x10, 0x3, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xb, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000080000000000000003000000180600000000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x3000410, &(0x7f0000000340)={[{@errors_remount}, {@nodioread_nolock}]}, 0xfd, 0x512, &(0x7f0000000380)="$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") syz_mount_image$msdos(&(0x7f0000000240), &(0x7f00000002c0)='.\x00', 0x1b4a438, &(0x7f00000008c0)=ANY=[], 0x1, 0x0, &(0x7f0000000000)) sendfile(r3, r3, 0x0, 0x800000009) getdents(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222}, 0x94) 404.94307ms ago: executing program 0 (id=554): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0x7fff}, 0x18) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000480)='gtp\x00') r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x4, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) io_uring_setup(0x1de0, &(0x7f00000000c0)={0x0, 0x45d6}) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) r3 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) flock(r3, 0x2) r4 = open(&(0x7f0000000300)='.\x00', 0x100000, 0x0) flock(r4, 0x1) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), 0xffffffffffffffff) recvmmsg(r5, &(0x7f0000001a00)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000340)=""/145, 0x91}, {&(0x7f00000000c0)=""/183, 0xb7}, {&(0x7f0000000200)=""/128, 0x80}, {&(0x7f0000000600)=""/200, 0xc8}, {&(0x7f0000000a00)=""/4092, 0xffc}], 0x5}, 0xc}], 0x1, 0x40010080, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000", @ANYRES16=r6, @ANYBLOB="030704707900000000000100040004000180"], 0x18}}, 0x0) r7 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) flock(r7, 0x2) flock(r4, 0x2) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r2, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x1, 0xfc, 0x7ffc1ffb}]}) 404.52302ms ago: executing program 4 (id=555): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000001000000080000000c"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x4a, &(0x7f0000000240)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '@\x00', 0x14, 0x6, 0x1, @empty, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x7, 0x0, 0x0, 0xf}}}}}}}, 0x0) 370.561773ms ago: executing program 0 (id=556): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, 0x2}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0x6, 0x8, 0x8}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0xfffff000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000040)}, {&(0x7f0000000100)="6ac15b83a7d4171099156b1464b396293427c156bfd4579311ce0fa41374dc8655b466ac4c70fd3f953716bf66eef7259a6159e45f47c3d3309429e4c55d9b0f18", 0x41}], 0x2) 342.971676ms ago: executing program 4 (id=557): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x7fff}, 0x18) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$selinux_access(r2, &(0x7f0000001a80)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a7570647077645f657865635f742073797374656d5f753a73797374656d5f723afaffffffffffffff3a73302030"], 0x56) (fail_nth: 3) 867.56µs ago: executing program 2 (id=558): mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0xffffffff) r0 = open(&(0x7f00000003c0)='./file0\x00', 0x8060, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000002001000001"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_buf(r3, 0x1, 0x1c, 0x0, &(0x7f00000000c0)) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="020900000700000000000000000000000500", @ANYRES64], 0x38}}, 0x20000004) r5 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') r6 = syz_io_uring_setup(0xbda, &(0x7f0000000100)={0x0, 0xec25, 0x8, 0x10000001, 0x40000333}, &(0x7f0000000dc0)=0x0, &(0x7f00000004c0)=0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a58000000160a0302000200000000000002000000090002"], 0x80}}, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="700f000000000000000000000000000000f10000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000d40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r11}, 0x18) sendmsg$NFT_BATCH(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a30000000006c000000160a01000000000000000000010000000900010073797a30000000000900020073797a3000000000400003800800014000000000080002400000fbff2b0003801400010067656e6576653000000000000000000014000100776732000000000000000000c6e49c0f5c000000180a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c000380"], 0x110}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) r12 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240), r0) r13 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r13, 0x107, 0x12, &(0x7f0000000080)={0xfffd, 0x3}, 0x4) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="b0000000", @ANYRES16=r12, @ANYBLOB="08002dbd7000ffdbdf2503008008000100000000000000000c00040005000000000000000c0003005b0000000000000008000200020000000c00030000000000000000800c000300060000000000000008000200090000000c000300060000000000000024000301080003000600000008000300c356000002000300660a0000080003000700000014000980080001005dffffff08000200000000300000000000000000000000000000f8bb04e9fd72227a2a898c3a422fde3c9d350ef8ba232260b3bdd98a53d811"], 0xb0}, 0x1, 0x0, 0x0, 0x44000}, 0x20000040) syz_io_uring_submit(r7, r8, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}) io_uring_enter(r6, 0x847ba, 0x0, 0xe, 0x0, 0x0) vmsplice(r5, &(0x7f0000000380)=[{&(0x7f0000000080)="9b", 0x1}], 0x1, 0x6) 489.43µs ago: executing program 3 (id=559): socket$inet6(0xa, 0x2, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYRES8], 0x1, 0x0, 0xfffffffffffffffe) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0f00000004000000080000000100000000000000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000003be70062261f83cf7ed41d9ba692b2917ba89beb8f11f38dc4cf7f0fe77acb45b9c6f482edb41d0024d08dcd37a5e68446fd0072cd8170406a10d07106222a70d3cca214a7d1970830bb2c4166e1a1dd937d90ff75a0f0948fb4db181d716dab968a5e47e1aecefec6148a1b447018d68c83ff4a1dd17286e552d5e26b246663dc28c05f8026b48f60cdb5b68f0750690f14ee24dafbb2456e2bf89ff193e22163ee16547c", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/13], 0x50) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x18) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./bus\x00', 0x289c2, 0x1) fcntl$setlease(r4, 0x400, 0x1) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r6 = socket(0x400000000010, 0x3, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r8}, 0x10) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@newqdisc={0x78, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r9, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xffe0, 0xf}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0x6, 0x3, 0xc06a2f6, 0x1, 0x7}, 0x6, 0x0, 0xa, 0x4, 0x6, 0x8, 0x18, 0x9, 0x3, 0x4, {0x0, 0x2, 0x9, 0x800, 0x8704, 0x27000000}}}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newtfilter={0x48, 0x2c, 0xd2b, 0x800, 0x25dfdbfb, {0x0, 0x0, 0x0, r9, {0x740b85e921414c2e, 0x6}, {}, {0x7, 0xb}}, [@filter_kind_options=@f_flower={{0xb}, {0x18, 0x2, [@TCA_FLOWER_KEY_ENC_IPV6_DST={0x14, 0x21, @mcast2}]}}]}, 0x48}}, 0x24044094) 0s ago: executing program 4 (id=560): bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a9a4850000000400000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e21, @local}], 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000600)=0x9, 0x4) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) io_uring_setup(0x56ab, &(0x7f0000000040)={0x0, 0x36d, 0xc000, 0xc, 0xa0002f5}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000000000800000000000"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x6}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8001}}]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r3}, 0x10) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) bind$bt_hci(r1, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x8f0, &(0x7f0000002400)=0x0) io_submit(r4, 0x1, &(0x7f0000000340)=[&(0x7f0000000500)={0x2002000000, 0x4, 0x0, 0x3, 0x0, r1, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x2}]) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x26}}], 0x10) listen(r0, 0x7) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES16=r6, @ANYBLOB="01002abd7000fcdbdf2501000000000000000b000000000600147379"], 0x28}, 0x1, 0x0, 0x0, 0x20000894}, 0x800) kernel console output (not intermixed with test programs): t:caif_netlink_parms(): no params data found [ 35.025654][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 35.042827][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 35.099058][ T3323] chnl_net:caif_netlink_parms(): no params data found [ 35.116211][ T3317] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.124007][ T3317] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.131292][ T3317] bridge_slave_0: entered allmulticast mode [ 35.137943][ T3317] bridge_slave_0: entered promiscuous mode [ 35.164667][ T3317] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.172170][ T3317] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.179810][ T3317] bridge_slave_1: entered allmulticast mode [ 35.186660][ T3317] bridge_slave_1: entered promiscuous mode [ 35.195613][ T3316] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.202786][ T3316] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.210001][ T3316] bridge_slave_0: entered allmulticast mode [ 35.216619][ T3316] bridge_slave_0: entered promiscuous mode [ 35.227645][ T3316] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.235075][ T3316] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.242242][ T3316] bridge_slave_1: entered allmulticast mode [ 35.248727][ T3316] bridge_slave_1: entered promiscuous mode [ 35.255285][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.262639][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.270086][ T3312] bridge_slave_0: entered allmulticast mode [ 35.277317][ T3312] bridge_slave_0: entered promiscuous mode [ 35.302536][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.309896][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.317251][ T3312] bridge_slave_1: entered allmulticast mode [ 35.323859][ T3312] bridge_slave_1: entered promiscuous mode [ 35.350593][ T3316] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.372816][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.386841][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.394232][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.401742][ T3313] bridge_slave_0: entered allmulticast mode [ 35.408246][ T3313] bridge_slave_0: entered promiscuous mode [ 35.418489][ T3316] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.429139][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.445570][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.460687][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.468306][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.476254][ T3313] bridge_slave_1: entered allmulticast mode [ 35.483290][ T3313] bridge_slave_1: entered promiscuous mode [ 35.495717][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.530674][ T3323] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.538037][ T3323] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.545758][ T3323] bridge_slave_0: entered allmulticast mode [ 35.552833][ T3323] bridge_slave_0: entered promiscuous mode [ 35.560509][ T3316] team0: Port device team_slave_0 added [ 35.566914][ T3323] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.575022][ T3323] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.582930][ T3323] bridge_slave_1: entered allmulticast mode [ 35.590067][ T3323] bridge_slave_1: entered promiscuous mode [ 35.597119][ T3317] team0: Port device team_slave_0 added [ 35.609965][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.625764][ T3316] team0: Port device team_slave_1 added [ 35.638141][ T3317] team0: Port device team_slave_1 added [ 35.645729][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.661560][ T3312] team0: Port device team_slave_0 added [ 35.689806][ T3312] team0: Port device team_slave_1 added [ 35.702147][ T3323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.711639][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.718807][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 35.746077][ T3316] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.762686][ T3313] team0: Port device team_slave_0 added [ 35.768879][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.776899][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 35.805546][ T3317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.823578][ T3323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.839376][ T3316] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.846902][ T3316] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 35.873579][ T3316] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.886946][ T3313] team0: Port device team_slave_1 added [ 35.893296][ T3317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.900719][ T3317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 35.927849][ T3317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.944886][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.952520][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 35.979667][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.014160][ T3323] team0: Port device team_slave_0 added [ 36.023411][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.030800][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.057486][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.082302][ T3323] team0: Port device team_slave_1 added [ 36.101563][ T3316] hsr_slave_0: entered promiscuous mode [ 36.108411][ T3316] hsr_slave_1: entered promiscuous mode [ 36.115494][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.123028][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.150198][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.178796][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.185961][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.212462][ T3323] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.224408][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.231448][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.257876][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.271355][ T3317] hsr_slave_0: entered promiscuous mode [ 36.277555][ T3317] hsr_slave_1: entered promiscuous mode [ 36.283828][ T3317] debugfs: 'hsr0' already exists in 'hsr' [ 36.289924][ T3317] Cannot create hsr debugfs directory [ 36.307182][ T3323] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.314813][ T3323] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.341384][ T3323] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.373117][ T3312] hsr_slave_0: entered promiscuous mode [ 36.379442][ T3312] hsr_slave_1: entered promiscuous mode [ 36.385881][ T3312] debugfs: 'hsr0' already exists in 'hsr' [ 36.392152][ T3312] Cannot create hsr debugfs directory [ 36.421652][ T3323] hsr_slave_0: entered promiscuous mode [ 36.427815][ T3323] hsr_slave_1: entered promiscuous mode [ 36.434703][ T3323] debugfs: 'hsr0' already exists in 'hsr' [ 36.440879][ T3323] Cannot create hsr debugfs directory [ 36.454850][ T3313] hsr_slave_0: entered promiscuous mode [ 36.461300][ T3313] hsr_slave_1: entered promiscuous mode [ 36.467137][ T3313] debugfs: 'hsr0' already exists in 'hsr' [ 36.472960][ T3313] Cannot create hsr debugfs directory [ 36.673767][ T3316] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 36.689543][ T3316] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 36.698528][ T3316] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 36.712505][ T3316] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 36.734125][ T3323] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 36.743663][ T3323] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 36.758955][ T3323] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 36.769024][ T3323] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 36.796873][ T3312] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 36.817153][ T3312] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 36.827306][ T3312] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 36.842803][ T3312] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 36.877841][ T3317] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 36.887203][ T3317] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 36.896918][ T3317] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 36.916203][ T3317] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 36.937361][ T3313] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 36.947340][ T3313] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 36.964358][ T3313] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 36.978478][ T3323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.987088][ T3313] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 36.999556][ T3316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.027126][ T3323] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.038807][ T3316] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.056500][ T35] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.064017][ T35] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.075153][ T35] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.082715][ T35] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.099157][ T35] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.106904][ T35] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.122167][ T35] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.129756][ T35] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.155035][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.189267][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.204467][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.217198][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.224660][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.249067][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.258503][ T58] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.265746][ T58] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.287249][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.295772][ T3317] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.320523][ T35] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.327815][ T35] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.341075][ T35] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.348363][ T35] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.358048][ T35] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.366203][ T35] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.402095][ T35] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.409528][ T35] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.458457][ T3323] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.469829][ T3316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.485209][ T3313] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 37.496010][ T3313] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.537226][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.651723][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.672876][ T3323] veth0_vlan: entered promiscuous mode [ 37.714082][ T3316] veth0_vlan: entered promiscuous mode [ 37.720948][ T3312] veth0_vlan: entered promiscuous mode [ 37.727653][ T3323] veth1_vlan: entered promiscuous mode [ 37.735932][ T3317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.751729][ T3316] veth1_vlan: entered promiscuous mode [ 37.763522][ T3312] veth1_vlan: entered promiscuous mode [ 37.793971][ T3316] veth0_macvtap: entered promiscuous mode [ 37.817497][ T3316] veth1_macvtap: entered promiscuous mode [ 37.827029][ T3323] veth0_macvtap: entered promiscuous mode [ 37.847983][ T3312] veth0_macvtap: entered promiscuous mode [ 37.856902][ T3323] veth1_macvtap: entered promiscuous mode [ 37.868128][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.891390][ T3312] veth1_macvtap: entered promiscuous mode [ 37.902806][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.912605][ T3316] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.929619][ T3323] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.942955][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.950615][ T411] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.971897][ T52] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.981050][ T52] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.990885][ T52] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.002313][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.015232][ T411] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.038256][ T411] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.047841][ T411] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.059358][ T3317] veth0_vlan: entered promiscuous mode [ 38.066321][ T3323] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 38.086140][ T411] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.097503][ T411] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.123504][ T3317] veth1_vlan: entered promiscuous mode [ 38.130649][ T411] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.163678][ T3317] veth0_macvtap: entered promiscuous mode [ 38.181533][ T3313] veth0_vlan: entered promiscuous mode [ 38.196252][ T411] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.196307][ T411] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.208667][ T3313] veth1_vlan: entered promiscuous mode [ 38.228886][ T3317] veth1_macvtap: entered promiscuous mode [ 38.254721][ T3313] veth0_macvtap: entered promiscuous mode [ 38.257330][ T3313] veth1_macvtap: entered promiscuous mode [ 38.275710][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.277989][ T3317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.312570][ T29] kauditd_printk_skb: 28 callbacks suppressed [ 38.312610][ T29] audit: type=1400 audit(1759978944.472:100): avc: denied { prog_run } for pid=3486 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 38.326526][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.356371][ T386] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.366043][ T386] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.376505][ T386] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.389593][ T386] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.400438][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.420738][ T386] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.438838][ T386] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.448041][ T386] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.458276][ T386] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.593485][ T29] audit: type=1400 audit(1759978944.752:101): avc: denied { create } for pid=3500 comm="syz.4.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.834902][ T3501] netlink: 5452 bytes leftover after parsing attributes in process `syz.4.7'. [ 38.835837][ T29] audit: type=1400 audit(1759978944.992:102): avc: denied { write } for pid=3500 comm="syz.4.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 38.899035][ T29] audit: type=1400 audit(1759978945.042:103): avc: denied { create } for pid=3500 comm="syz.4.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 38.921080][ T29] audit: type=1400 audit(1759978945.042:104): avc: denied { write } for pid=3500 comm="syz.4.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 38.943466][ T29] audit: type=1400 audit(1759978945.052:105): avc: denied { map_create } for pid=3500 comm="syz.4.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 38.963167][ T29] audit: type=1400 audit(1759978945.052:106): avc: denied { bpf } for pid=3500 comm="syz.4.7" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 38.984311][ T29] audit: type=1400 audit(1759978945.052:107): avc: denied { prog_load } for pid=3500 comm="syz.4.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 39.062683][ T29] audit: type=1400 audit(1759978945.222:108): avc: denied { read write } for pid=3316 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 39.087927][ T29] audit: type=1400 audit(1759978945.222:109): avc: denied { open } for pid=3316 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 39.387237][ T3506] loop0: detected capacity change from 0 to 128 [ 39.395049][ T3506] FAT-fs (loop0): bogus number of FAT sectors [ 39.401358][ T3506] FAT-fs (loop0): Can't find a valid FAT filesystem [ 39.598275][ T3505] syz.0.9 (3505) used greatest stack depth: 10656 bytes left [ 39.635717][ T3522] loop1: detected capacity change from 0 to 512 [ 39.656133][ T3522] EXT4-fs: Ignoring removed oldalloc option [ 39.679389][ T3522] EXT4-fs error (device loop1): ext4_xattr_inode_iget:437: comm syz.1.14: Parent and EA inode have the same ino 15 [ 39.697314][ T3522] EXT4-fs (loop1): Remounting filesystem read-only [ 39.706289][ T3522] EXT4-fs warning (device loop1): ext4_evict_inode:274: xattr delete (err -30) [ 39.716249][ T3522] EXT4-fs (loop1): 1 orphan inode deleted [ 39.722811][ T3522] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.750708][ T3531] netlink: 60 bytes leftover after parsing attributes in process `syz.0.17'. [ 39.790909][ T3530] netlink: 60 bytes leftover after parsing attributes in process `syz.0.17'. [ 39.811357][ T3317] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 39.860020][ C0] hrtimer: interrupt took 27477 ns [ 40.432365][ T3562] mmap: syz.2.28 (3562) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 40.589459][ T3569] bond1: option lacp_rate: mode dependency failed, not supported in mode active-backup(1) [ 40.601855][ T3569] bond1 (unregistering): Released all slaves [ 40.665322][ T3575] wg2: entered promiscuous mode [ 40.670497][ T3575] wg2: entered allmulticast mode [ 40.973549][ T3586] bond1: option lacp_rate: mode dependency failed, not supported in mode active-backup(1) [ 41.002235][ T3586] bond1 (unregistering): Released all slaves [ 41.250620][ T3601] veth1_macvtap: left promiscuous mode [ 41.256187][ T3601] macsec0: entered allmulticast mode [ 41.266131][ T3601] veth1_macvtap: entered promiscuous mode [ 41.272345][ T3601] veth1_macvtap: entered allmulticast mode [ 41.278702][ T3601] macsec0: entered promiscuous mode [ 41.528389][ T3618] bond1: option lacp_rate: mode dependency failed, not supported in mode active-backup(1) [ 41.543595][ T3618] bond1 (unregistering): Released all slaves [ 41.692094][ T3630] veth1_macvtap: left promiscuous mode [ 41.698155][ T3630] macsec0: entered allmulticast mode [ 41.892729][ T3648] FAULT_INJECTION: forcing a failure. [ 41.892729][ T3648] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 41.906814][ T3648] CPU: 0 UID: 0 PID: 3648 Comm: syz.2.62 Not tainted syzkaller #0 PREEMPT(voluntary) [ 41.906840][ T3648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 41.906852][ T3648] Call Trace: [ 41.906857][ T3648] [ 41.906864][ T3648] __dump_stack+0x1d/0x30 [ 41.906883][ T3648] dump_stack_lvl+0xe8/0x140 [ 41.906952][ T3648] dump_stack+0x15/0x1b [ 41.906973][ T3648] should_fail_ex+0x265/0x280 [ 41.907013][ T3648] should_fail+0xb/0x20 [ 41.907052][ T3648] should_fail_usercopy+0x1a/0x20 [ 41.907148][ T3648] _copy_to_user+0x20/0xa0 [ 41.907171][ T3648] simple_read_from_buffer+0xb5/0x130 [ 41.907233][ T3648] proc_fail_nth_read+0x10e/0x150 [ 41.907310][ T3648] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 41.907402][ T3648] vfs_read+0x1a8/0x770 [ 41.907421][ T3648] ? __rcu_read_unlock+0x4f/0x70 [ 41.907445][ T3648] ? __fget_files+0x184/0x1c0 [ 41.907565][ T3648] ksys_read+0xda/0x1a0 [ 41.907586][ T3648] __x64_sys_read+0x40/0x50 [ 41.907606][ T3648] x64_sys_call+0x27c0/0x3000 [ 41.907626][ T3648] do_syscall_64+0xd2/0x200 [ 41.907691][ T3648] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 41.907715][ T3648] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 41.907734][ T3648] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 41.907753][ T3648] RIP: 0033:0x7f218743d8dc [ 41.907767][ T3648] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 41.907810][ T3648] RSP: 002b:00007f2185ea7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 41.907831][ T3648] RAX: ffffffffffffffda RBX: 00007f2187695fa0 RCX: 00007f218743d8dc [ 41.907843][ T3648] RDX: 000000000000000f RSI: 00007f2185ea70a0 RDI: 0000000000000003 [ 41.907862][ T3648] RBP: 00007f2185ea7090 R08: 0000000000000000 R09: 0000000000000000 [ 41.907873][ T3648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 41.907884][ T3648] R13: 00007f2187696038 R14: 00007f2187695fa0 R15: 00007fffbc52f2d8 [ 41.907954][ T3648] [ 42.168833][ T3652] bond1: option lacp_rate: mode dependency failed, not supported in mode active-backup(1) [ 42.192353][ T3652] bond1 (unregistering): Released all slaves [ 42.314783][ T3663] veth1_macvtap: left promiscuous mode [ 42.320572][ T3663] macsec0: entered allmulticast mode [ 42.450712][ T3682] bond1: option lacp_rate: mode dependency failed, not supported in mode active-backup(1) [ 42.462668][ T3682] bond1 (unregistering): Released all slaves [ 42.574011][ T3692] veth1_macvtap: left allmulticast mode [ 42.579797][ T3692] veth1_macvtap: left promiscuous mode [ 42.585468][ T3692] macsec0: left promiscuous mode [ 42.846540][ T3711] bond1: option lacp_rate: mode dependency failed, not supported in mode active-backup(1) [ 42.859197][ T3711] bond1 (unregistering): Released all slaves [ 42.988077][ T3721] wg2: left promiscuous mode [ 42.993207][ T3721] wg2: left allmulticast mode [ 43.011420][ T3721] wg2: entered promiscuous mode [ 43.016532][ T3721] wg2: entered allmulticast mode [ 43.240711][ T3735] bond1: option lacp_rate: mode dependency failed, not supported in mode active-backup(1) [ 43.276592][ T3735] bond1 (unregistering): Released all slaves [ 43.323018][ T29] kauditd_printk_skb: 1124 callbacks suppressed [ 43.323038][ T29] audit: type=1400 audit(1759978949.482:1234): avc: denied { read } for pid=3741 comm="syz.2.101" dev="nsfs" ino=4026532651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 43.420683][ T29] audit: type=1400 audit(1759978949.512:1235): avc: denied { prog_load } for pid=3741 comm="syz.2.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 43.441402][ T29] audit: type=1400 audit(1759978949.512:1236): avc: denied { read } for pid=3741 comm="syz.2.101" dev="nsfs" ino=4026532651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 43.464300][ T29] audit: type=1400 audit(1759978949.512:1237): avc: denied { create } for pid=3741 comm="syz.2.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 43.485728][ T29] audit: type=1400 audit(1759978949.512:1238): avc: denied { read } for pid=3741 comm="syz.2.101" dev="nsfs" ino=4026532651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 43.507913][ T29] audit: type=1400 audit(1759978949.512:1239): avc: denied { create } for pid=3741 comm="syz.2.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 43.528880][ T29] audit: type=1400 audit(1759978949.512:1240): avc: denied { read write } for pid=3741 comm="syz.2.101" name="virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 43.554496][ T29] audit: type=1400 audit(1759978949.512:1241): avc: denied { read } for pid=3741 comm="syz.2.101" dev="nsfs" ino=4026532651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 43.577413][ T29] audit: type=1400 audit(1759978949.512:1242): avc: denied { create } for pid=3741 comm="syz.2.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 43.598907][ T29] audit: type=1400 audit(1759978949.512:1243): avc: denied { read } for pid=3741 comm="syz.2.101" dev="nsfs" ino=4026532651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 43.738515][ T3754] wg2: entered promiscuous mode [ 43.743999][ T3754] wg2: entered allmulticast mode [ 43.807994][ T3758] netlink: 'syz.0.108': attribute type 21 has an invalid length. [ 43.816990][ T3758] netlink: 132 bytes leftover after parsing attributes in process `syz.0.108'. [ 43.991040][ T3771] bond1: option lacp_rate: mode dependency failed, not supported in mode active-backup(1) [ 44.003169][ T3771] bond1 (unregistering): Released all slaves [ 44.035748][ T3782] wg2: entered promiscuous mode [ 44.041117][ T3782] wg2: entered allmulticast mode [ 44.196149][ T3801] FAULT_INJECTION: forcing a failure. [ 44.196149][ T3801] name failslab, interval 1, probability 0, space 0, times 1 [ 44.208991][ T3801] CPU: 1 UID: 0 PID: 3801 Comm: syz.3.126 Not tainted syzkaller #0 PREEMPT(voluntary) [ 44.209032][ T3801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 44.209046][ T3801] Call Trace: [ 44.209051][ T3801] [ 44.209084][ T3801] __dump_stack+0x1d/0x30 [ 44.209103][ T3801] dump_stack_lvl+0xe8/0x140 [ 44.209120][ T3801] dump_stack+0x15/0x1b [ 44.209135][ T3801] should_fail_ex+0x265/0x280 [ 44.209192][ T3801] ? __se_sys_mount+0xef/0x2e0 [ 44.209212][ T3801] should_failslab+0x8c/0xb0 [ 44.209237][ T3801] __kmalloc_cache_noprof+0x4c/0x4a0 [ 44.209335][ T3801] ? memdup_user+0x99/0xd0 [ 44.209358][ T3801] __se_sys_mount+0xef/0x2e0 [ 44.209377][ T3801] ? fput+0x8f/0xc0 [ 44.209459][ T3801] ? ksys_write+0x192/0x1a0 [ 44.209480][ T3801] __x64_sys_mount+0x67/0x80 [ 44.209533][ T3801] x64_sys_call+0x2b51/0x3000 [ 44.209555][ T3801] do_syscall_64+0xd2/0x200 [ 44.209584][ T3801] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 44.209633][ T3801] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 44.209653][ T3801] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 44.209673][ T3801] RIP: 0033:0x7fb546faeec9 [ 44.209687][ T3801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 44.209703][ T3801] RSP: 002b:00007fb545a0f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 44.209796][ T3801] RAX: ffffffffffffffda RBX: 00007fb547205fa0 RCX: 00007fb546faeec9 [ 44.209807][ T3801] RDX: 0000200000000040 RSI: 0000200000000080 RDI: 0000000000000000 [ 44.209818][ T3801] RBP: 00007fb545a0f090 R08: 0000200000000400 R09: 0000000000000000 [ 44.209828][ T3801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 44.209897][ T3801] R13: 00007fb547206038 R14: 00007fb547205fa0 R15: 00007ffdddf97278 [ 44.209913][ T3801] [ 44.471298][ T3810] wg2: left promiscuous mode [ 44.476017][ T3810] wg2: left allmulticast mode [ 44.476420][ T3812] FAULT_INJECTION: forcing a failure. [ 44.476420][ T3812] name failslab, interval 1, probability 0, space 0, times 0 [ 44.493875][ T3812] CPU: 1 UID: 0 PID: 3812 Comm: syz.3.130 Not tainted syzkaller #0 PREEMPT(voluntary) [ 44.493916][ T3812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 44.493934][ T3812] Call Trace: [ 44.494024][ T3812] [ 44.494034][ T3812] __dump_stack+0x1d/0x30 [ 44.494063][ T3812] dump_stack_lvl+0xe8/0x140 [ 44.494119][ T3812] dump_stack+0x15/0x1b [ 44.494143][ T3812] should_fail_ex+0x265/0x280 [ 44.494192][ T3812] ? __se_sys_mount+0xef/0x2e0 [ 44.494294][ T3812] should_failslab+0x8c/0xb0 [ 44.494331][ T3812] __kmalloc_cache_noprof+0x4c/0x4a0 [ 44.494397][ T3812] ? memdup_user+0x99/0xd0 [ 44.494431][ T3812] __se_sys_mount+0xef/0x2e0 [ 44.494503][ T3812] ? restore_fpregs_from_fpstate+0x61/0x120 [ 44.494535][ T3812] __x64_sys_mount+0x67/0x80 [ 44.494619][ T3812] x64_sys_call+0x2b51/0x3000 [ 44.494649][ T3812] do_syscall_64+0xd2/0x200 [ 44.494681][ T3812] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 44.494710][ T3812] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 44.494739][ T3812] RIP: 0033:0x7fb546faeec9 [ 44.494795][ T3812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 44.494870][ T3812] RSP: 002b:00007fb545a0f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 44.494905][ T3812] RAX: ffffffffffffffda RBX: 00007fb547205fa0 RCX: 00007fb546faeec9 [ 44.494922][ T3812] RDX: 0000200000000040 RSI: 0000200000000080 RDI: 0000000000000000 [ 44.494939][ T3812] RBP: 00007fb545a0f090 R08: 0000200000000400 R09: 0000000000000000 [ 44.494957][ T3812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 44.494973][ T3812] R13: 00007fb547206038 R14: 00007fb547205fa0 R15: 00007ffdddf97278 [ 44.494997][ T3812] [ 44.681126][ T3810] wg2: entered promiscuous mode [ 44.686160][ T3810] wg2: entered allmulticast mode [ 44.730850][ T3815] bond1: option lacp_rate: mode dependency failed, not supported in mode active-backup(1) [ 44.744623][ T3815] bond1 (unregistering): Released all slaves [ 45.178866][ T3850] bond1: option lacp_rate: mode dependency failed, not supported in mode active-backup(1) [ 45.197003][ T3850] bond1 (unregistering): Released all slaves [ 45.510579][ T3886] bond1: option lacp_rate: mode dependency failed, not supported in mode active-backup(1) [ 45.521842][ T3886] bond1 (unregistering): Released all slaves [ 45.626203][ T3895] +*:à|sŽPEÉt†° uses obsolete (PF_INET,SOCK_PACKET) [ 46.089942][ T3918] bond1: option lacp_rate: mode dependency failed, not supported in mode active-backup(1) [ 46.109692][ T3918] bond1 (unregistering): Released all slaves [ 46.391586][ T3937] FAULT_INJECTION: forcing a failure. [ 46.391586][ T3937] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 46.405198][ T3937] CPU: 1 UID: 0 PID: 3937 Comm: syz.4.184 Not tainted syzkaller #0 PREEMPT(voluntary) [ 46.405236][ T3937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 46.405253][ T3937] Call Trace: [ 46.405263][ T3937] [ 46.405273][ T3937] __dump_stack+0x1d/0x30 [ 46.405299][ T3937] dump_stack_lvl+0xe8/0x140 [ 46.405326][ T3937] dump_stack+0x15/0x1b [ 46.405409][ T3937] should_fail_ex+0x265/0x280 [ 46.405479][ T3937] should_fail+0xb/0x20 [ 46.405520][ T3937] should_fail_usercopy+0x1a/0x20 [ 46.405606][ T3937] _copy_from_user+0x1c/0xb0 [ 46.405644][ T3937] kstrtouint_from_user+0x69/0xf0 [ 46.405722][ T3937] ? 0xffffffff81000000 [ 46.405748][ T3937] ? selinux_file_permission+0x1e4/0x320 [ 46.405788][ T3937] proc_fail_nth_write+0x50/0x160 [ 46.405876][ T3937] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 46.405925][ T3937] vfs_write+0x269/0x960 [ 46.405954][ T3937] ? vfs_read+0x4e6/0x770 [ 46.405981][ T3937] ? __rcu_read_unlock+0x4f/0x70 [ 46.406057][ T3937] ? __fget_files+0x184/0x1c0 [ 46.406094][ T3937] ksys_write+0xda/0x1a0 [ 46.406127][ T3937] __x64_sys_write+0x40/0x50 [ 46.406218][ T3937] x64_sys_call+0x2802/0x3000 [ 46.406248][ T3937] do_syscall_64+0xd2/0x200 [ 46.406280][ T3937] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 46.406310][ T3937] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 46.406362][ T3937] RIP: 0033:0x7fd79fb3d97f [ 46.406382][ T3937] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 46.406482][ T3937] RSP: 002b:00007fd79e5a7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 46.406574][ T3937] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd79fb3d97f [ 46.406591][ T3937] RDX: 0000000000000001 RSI: 00007fd79e5a70a0 RDI: 0000000000000004 [ 46.406606][ T3937] RBP: 00007fd79e5a7090 R08: 0000000000000000 R09: 0000000000000000 [ 46.406617][ T3937] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 46.406629][ T3937] R13: 00007fd79fd96038 R14: 00007fd79fd95fa0 R15: 00007ffdc54155e8 [ 46.406701][ T3937] [ 46.758182][ T3946] bond1: option lacp_rate: mode dependency failed, not supported in mode active-backup(1) [ 46.770627][ T3946] bond1 (unregistering): Released all slaves [ 46.859459][ T3957] FAULT_INJECTION: forcing a failure. [ 46.859459][ T3957] name failslab, interval 1, probability 0, space 0, times 0 [ 46.872349][ T3957] CPU: 0 UID: 0 PID: 3957 Comm: syz.2.192 Not tainted syzkaller #0 PREEMPT(voluntary) [ 46.872377][ T3957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 46.872390][ T3957] Call Trace: [ 46.872398][ T3957] [ 46.872406][ T3957] __dump_stack+0x1d/0x30 [ 46.872426][ T3957] dump_stack_lvl+0xe8/0x140 [ 46.872446][ T3957] dump_stack+0x15/0x1b [ 46.872462][ T3957] should_fail_ex+0x265/0x280 [ 46.872566][ T3957] should_failslab+0x8c/0xb0 [ 46.872592][ T3957] __kmalloc_noprof+0xa5/0x570 [ 46.872619][ T3957] ? sock_kmalloc+0x85/0xc0 [ 46.872710][ T3957] sock_kmalloc+0x85/0xc0 [ 46.872740][ T3957] ____sys_sendmsg+0xf8/0x4e0 [ 46.872805][ T3957] ___sys_sendmsg+0x17b/0x1d0 [ 46.872847][ T3957] __x64_sys_sendmsg+0xd4/0x160 [ 46.872880][ T3957] x64_sys_call+0x191e/0x3000 [ 46.872958][ T3957] do_syscall_64+0xd2/0x200 [ 46.872982][ T3957] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 46.873010][ T3957] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 46.873031][ T3957] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 46.873131][ T3957] RIP: 0033:0x7f218743eec9 [ 46.873146][ T3957] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 46.873164][ T3957] RSP: 002b:00007f2185ea7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 46.873183][ T3957] RAX: ffffffffffffffda RBX: 00007f2187695fa0 RCX: 00007f218743eec9 [ 46.873196][ T3957] RDX: 0000000000000000 RSI: 0000200000000600 RDI: 0000000000000003 [ 46.873228][ T3957] RBP: 00007f2185ea7090 R08: 0000000000000000 R09: 0000000000000000 [ 46.873246][ T3957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 46.873264][ T3957] R13: 00007f2187696038 R14: 00007f2187695fa0 R15: 00007fffbc52f2d8 [ 46.873290][ T3957] [ 47.170213][ T3964] FAULT_INJECTION: forcing a failure. [ 47.170213][ T3964] name failslab, interval 1, probability 0, space 0, times 0 [ 47.184178][ T3964] CPU: 1 UID: 0 PID: 3964 Comm: syz.0.194 Not tainted syzkaller #0 PREEMPT(voluntary) [ 47.184218][ T3964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 47.184234][ T3964] Call Trace: [ 47.184243][ T3964] [ 47.184252][ T3964] __dump_stack+0x1d/0x30 [ 47.184295][ T3964] dump_stack_lvl+0xe8/0x140 [ 47.184312][ T3964] dump_stack+0x15/0x1b [ 47.184335][ T3964] should_fail_ex+0x265/0x280 [ 47.184433][ T3964] should_failslab+0x8c/0xb0 [ 47.184584][ T3964] __kmalloc_cache_node_noprof+0x54/0x4a0 [ 47.184617][ T3964] ? __get_vm_area_node+0x106/0x1d0 [ 47.184666][ T3964] __get_vm_area_node+0x106/0x1d0 [ 47.184694][ T3964] __vmalloc_node_range_noprof+0x28c/0xed0 [ 47.184723][ T3964] ? copy_process+0x399/0x2000 [ 47.184751][ T3964] ? obj_cgroup_charge_account+0xba/0x1a0 [ 47.184820][ T3964] __vmalloc_node_noprof+0x89/0xc0 [ 47.184907][ T3964] ? copy_process+0x399/0x2000 [ 47.184949][ T3964] ? copy_process+0x399/0x2000 [ 47.185010][ T3964] dup_task_struct+0x433/0x6b0 [ 47.185035][ T3964] ? path_openat+0x1bf8/0x2170 [ 47.185087][ T3964] copy_process+0x399/0x2000 [ 47.185114][ T3964] ? copy_clone_args_from_user+0x3ce/0x490 [ 47.185198][ T3964] kernel_clone+0x16c/0x5c0 [ 47.185249][ T3964] __se_sys_clone3+0x1c2/0x200 [ 47.185292][ T3964] __x64_sys_clone3+0x31/0x40 [ 47.185350][ T3964] x64_sys_call+0x1fc9/0x3000 [ 47.185371][ T3964] do_syscall_64+0xd2/0x200 [ 47.185420][ T3964] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 47.185445][ T3964] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 47.185464][ T3964] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 47.185484][ T3964] RIP: 0033:0x7fcc8621eec9 [ 47.185523][ T3964] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 47.185564][ T3964] RSP: 002b:00007fcc84c65f08 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 47.185580][ T3964] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fcc8621eec9 [ 47.185592][ T3964] RDX: 00007fcc84c65f20 RSI: 0000000000000058 RDI: 00007fcc84c65f20 [ 47.185603][ T3964] RBP: 00007fcc84c66090 R08: 0000000000000000 R09: 0000000000000058 [ 47.185614][ T3964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 47.185624][ T3964] R13: 00007fcc86476128 R14: 00007fcc86476090 R15: 00007ffe496b6598 [ 47.185640][ T3964] [ 47.185648][ T3964] syz.0.194: vmalloc error: size 16384, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 47.366724][ T3977] netlink: 60 bytes leftover after parsing attributes in process `syz.4.196'. [ 47.371173][ T3964] ,cpuset=/,mems_allowed=0 [ 47.371290][ T3964] CPU: 1 UID: 0 PID: 3964 Comm: syz.0.194 Not tainted syzkaller #0 PREEMPT(voluntary) [ 47.371320][ T3964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 47.371339][ T3964] Call Trace: [ 47.371348][ T3964] [ 47.371360][ T3964] __dump_stack+0x1d/0x30 [ 47.371390][ T3964] dump_stack_lvl+0xe8/0x140 [ 47.371419][ T3964] dump_stack+0x15/0x1b [ 47.371442][ T3964] warn_alloc+0x12b/0x1a0 [ 47.371528][ T3964] __vmalloc_node_range_noprof+0x2b1/0xed0 [ 47.371577][ T3964] ? obj_cgroup_charge_account+0xba/0x1a0 [ 47.371661][ T3964] __vmalloc_node_noprof+0x89/0xc0 [ 47.371700][ T3964] ? copy_process+0x399/0x2000 [ 47.371737][ T3964] ? copy_process+0x399/0x2000 [ 47.371777][ T3964] dup_task_struct+0x433/0x6b0 [ 47.371928][ T3964] ? path_openat+0x1bf8/0x2170 [ 47.371971][ T3964] copy_process+0x399/0x2000 [ 47.372047][ T3964] ? copy_clone_args_from_user+0x3ce/0x490 [ 47.372110][ T3964] kernel_clone+0x16c/0x5c0 [ 47.372222][ T3964] __se_sys_clone3+0x1c2/0x200 [ 47.372300][ T3964] __x64_sys_clone3+0x31/0x40 [ 47.372347][ T3964] x64_sys_call+0x1fc9/0x3000 [ 47.372386][ T3964] do_syscall_64+0xd2/0x200 [ 47.372505][ T3964] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 47.372539][ T3964] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 47.372628][ T3964] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 47.372659][ T3964] RIP: 0033:0x7fcc8621eec9 [ 47.372679][ T3964] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 47.372705][ T3964] RSP: 002b:00007fcc84c65f08 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 47.372731][ T3964] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007fcc8621eec9 [ 47.372762][ T3964] RDX: 00007fcc84c65f20 RSI: 0000000000000058 RDI: 00007fcc84c65f20 [ 47.372779][ T3964] RBP: 00007fcc84c66090 R08: 0000000000000000 R09: 0000000000000058 [ 47.372797][ T3964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 47.372813][ T3964] R13: 00007fcc86476128 R14: 00007fcc86476090 R15: 00007ffe496b6598 [ 47.372837][ T3964] [ 47.372861][ T3964] Mem-Info: [ 47.380811][ T3970] netlink: 60 bytes leftover after parsing attributes in process `syz.4.196'. [ 47.388259][ T3964] active_anon:6560 inactive_anon:1 isolated_anon:0 [ 47.388259][ T3964] active_file:9195 inactive_file:2232 isolated_file:0 [ 47.388259][ T3964] unevictable:0 dirty:1638 writeback:0 [ 47.388259][ T3964] slab_reclaimable:3081 slab_unreclaimable:13593 [ 47.388259][ T3964] mapped:29200 shmem:204 pagetables:1146 [ 47.388259][ T3964] sec_pagetables:0 bounce:0 [ 47.388259][ T3964] kernel_misc_reclaimable:0 [ 47.388259][ T3964] free:1902915 free_pcp:8718 free_cma:0 [ 47.723433][ T3964] Node 0 active_anon:26356kB inactive_anon:4kB active_file:36780kB inactive_file:8928kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:124920kB dirty:6552kB writeback:0kB shmem:816kB kernel_stack:3392kB pagetables:4932kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 47.754354][ T3964] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 47.786649][ T3964] lowmem_reserve[]: 0 2883 7862 7862 [ 47.792108][ T3964] Node 0 DMA32 free:2949160kB boost:0kB min:4132kB low:7064kB high:9996kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:3129332kB managed:2952692kB mlocked:0kB bounce:0kB free_pcp:3532kB local_pcp:0kB free_cma:0kB [ 47.823748][ T3964] lowmem_reserve[]: 0 0 4978 4978 [ 47.828936][ T3964] Node 0 Normal free:4646636kB boost:0kB min:7184kB low:12280kB high:17376kB reserved_highatomic:0KB free_highatomic:0KB active_anon:26232kB inactive_anon:4kB active_file:37012kB inactive_file:8928kB unevictable:0kB writepending:6552kB zspages:0kB present:5242880kB managed:5098240kB mlocked:0kB bounce:0kB free_pcp:31044kB local_pcp:7760kB free_cma:0kB [ 47.862553][ T3964] lowmem_reserve[]: 0 0 0 0 [ 47.867376][ T3964] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 47.880497][ T3964] Node 0 DMA32: 4*4kB (M) 3*8kB (M) 6*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 3*1024kB (M) 3*2048kB (M) 717*4096kB (M) = 2949160kB [ 47.897323][ T3964] Node 0 Normal: 1*4kB (E) 3*8kB (UME) 1*16kB (U) 2*32kB (UM) 2*64kB (UM) 2*128kB (UE) 3*256kB (UME) 3*512kB (UME) 1*1024kB (U) 3*2048kB (UME) 1132*4096kB (M) = 4646636kB [ 47.915067][ T3964] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 47.924849][ T3964] 11667 total pagecache pages [ 47.929566][ T3964] 1 pages in swap cache [ 47.933852][ T3964] Free swap = 124992kB [ 47.938104][ T3964] Total swap = 124996kB [ 47.942344][ T3964] 2097051 pages RAM [ 47.946231][ T3964] 0 pages HighMem/MovableOnly [ 47.951082][ T3964] 80478 pages reserved [ 47.979223][ T3990] wg2: left promiscuous mode [ 47.984152][ T3990] wg2: left allmulticast mode [ 48.026634][ T3990] wg2: entered promiscuous mode [ 48.031752][ T3990] wg2: entered allmulticast mode [ 48.093863][ T3997] netlink: 4 bytes leftover after parsing attributes in process `syz.4.205'. [ 48.131916][ T3997] team1: entered promiscuous mode [ 48.137170][ T3997] team1: entered allmulticast mode [ 48.158777][ T3997] Zero length message leads to an empty skb [ 48.336127][ T29] kauditd_printk_skb: 1294 callbacks suppressed [ 48.336143][ T29] audit: type=1400 audit(1759978954.492:2487): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.366365][ T4018] FAULT_INJECTION: forcing a failure. [ 48.366365][ T4018] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 48.368793][ T29] audit: type=1400 audit(1759978954.512:2488): avc: denied { map_create } for pid=4015 comm="syz.3.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 48.380757][ T4018] CPU: 1 UID: 0 PID: 4018 Comm: syz.3.214 Not tainted syzkaller #0 PREEMPT(voluntary) [ 48.380785][ T4018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 48.380803][ T4018] Call Trace: [ 48.380813][ T4018] [ 48.380822][ T4018] __dump_stack+0x1d/0x30 [ 48.380927][ T4018] dump_stack_lvl+0xe8/0x140 [ 48.380957][ T4018] dump_stack+0x15/0x1b [ 48.380997][ T4018] should_fail_ex+0x265/0x280 [ 48.381044][ T4018] should_fail_alloc_page+0xf2/0x100 [ 48.381085][ T4018] __alloc_frozen_pages_noprof+0xff/0x360 [ 48.381132][ T4018] alloc_pages_mpol+0xb3/0x260 [ 48.381173][ T4018] vma_alloc_folio_noprof+0x1aa/0x300 [ 48.381234][ T4018] handle_mm_fault+0xec2/0x2be0 [ 48.381301][ T4018] ? vma_start_read+0x141/0x1f0 [ 48.381346][ T4018] do_user_addr_fault+0x630/0x1080 [ 48.381394][ T4018] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 48.381486][ T4018] exc_page_fault+0x62/0xa0 [ 48.381534][ T4018] asm_exc_page_fault+0x26/0x30 [ 48.381562][ T4018] RIP: 0033:0x7fb546e7a75b [ 48.381584][ T4018] Code: 00 00 00 48 8d 3d dd 39 19 00 48 89 c1 31 c0 e8 fb 3a ff ff eb d2 66 0f 1f 84 00 00 00 00 00 55 31 c0 53 48 81 ec 68 10 00 00 <48> 89 7c 24 08 48 8d 3d 11 3a 19 00 48 89 34 24 48 8b 14 24 48 8b [ 48.381626][ T4018] RSP: 002b:00007fb545a0dfb0 EFLAGS: 00010202 [ 48.381684][ T4018] RAX: 0000000000000000 RBX: 00007fb547205fa0 RCX: 0000000000000000 [ 48.381702][ T4018] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000000000000 [ 48.381719][ T4018] RBP: 00007fb545a0f090 R08: 0000000000000000 R09: 0000000000000000 [ 48.381742][ T4018] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 [ 48.381759][ T4018] R13: 00007fb547206038 R14: 00007fb547205fa0 R15: 00007ffdddf97278 [ 48.381784][ T4018] [ 48.381798][ T4018] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 48.400087][ T29] audit: type=1400 audit(1759978954.512:2489): avc: denied { prog_load } for pid=4015 comm="syz.3.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 48.400113][ T29] audit: type=1400 audit(1759978954.512:2490): avc: denied { prog_load } for pid=4015 comm="syz.3.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 48.409941][ T4019] netlink: 60 bytes leftover after parsing attributes in process `syz.4.212'. [ 48.420092][ T29] audit: type=1400 audit(1759978954.512:2491): avc: denied { create } for pid=4015 comm="syz.3.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 48.423851][ T4014] netlink: 60 bytes leftover after parsing attributes in process `syz.4.212'. [ 48.426618][ T29] audit: type=1400 audit(1759978954.512:2492): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.681888][ T29] audit: type=1400 audit(1759978954.512:2493): avc: denied { map_create } for pid=4017 comm="syz.3.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 48.681921][ T29] audit: type=1400 audit(1759978954.512:2494): avc: denied { prog_load } for pid=4017 comm="syz.3.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 48.681942][ T29] audit: type=1400 audit(1759978954.512:2495): avc: denied { prog_load } for pid=4017 comm="syz.3.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 48.682029][ T29] audit: type=1400 audit(1759978954.592:2496): avc: denied { create } for pid=4017 comm="syz.3.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 48.701895][ T4023] wg2: entered promiscuous mode [ 48.766520][ T4023] wg2: entered allmulticast mode [ 49.362116][ T4062] wg2: left promiscuous mode [ 49.366977][ T4062] wg2: left allmulticast mode [ 49.484316][ T4064] wg2: entered promiscuous mode [ 49.489269][ T4064] wg2: entered allmulticast mode [ 49.528633][ T4070] netlink: 60 bytes leftover after parsing attributes in process `syz.3.227'. [ 49.537902][ T4063] netlink: 60 bytes leftover after parsing attributes in process `syz.3.227'. [ 49.728728][ T4084] netlink: 12 bytes leftover after parsing attributes in process `syz.2.237'. [ 49.744620][ T4084] 8021q: adding VLAN 0 to HW filter on device bond1 [ 49.758799][ T4085] vlan2: entered allmulticast mode [ 49.764216][ T4085] bond1: entered allmulticast mode [ 49.875944][ T4090] FAULT_INJECTION: forcing a failure. [ 49.875944][ T4090] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 49.889220][ T4090] CPU: 0 UID: 0 PID: 4090 Comm: syz.2.238 Not tainted syzkaller #0 PREEMPT(voluntary) [ 49.889292][ T4090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 49.889305][ T4090] Call Trace: [ 49.889313][ T4090] [ 49.889322][ T4090] __dump_stack+0x1d/0x30 [ 49.889349][ T4090] dump_stack_lvl+0xe8/0x140 [ 49.889438][ T4090] dump_stack+0x15/0x1b [ 49.889457][ T4090] should_fail_ex+0x265/0x280 [ 49.889501][ T4090] should_fail+0xb/0x20 [ 49.889606][ T4090] should_fail_usercopy+0x1a/0x20 [ 49.889645][ T4090] _copy_from_user+0x1c/0xb0 [ 49.889678][ T4090] ___sys_sendmsg+0xc1/0x1d0 [ 49.889743][ T4090] __x64_sys_sendmsg+0xd4/0x160 [ 49.889784][ T4090] x64_sys_call+0x191e/0x3000 [ 49.889813][ T4090] do_syscall_64+0xd2/0x200 [ 49.889849][ T4090] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 49.889905][ T4090] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 49.889933][ T4090] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 49.889963][ T4090] RIP: 0033:0x7f218743eec9 [ 49.889978][ T4090] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 49.890037][ T4090] RSP: 002b:00007f2185ea7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 49.890066][ T4090] RAX: ffffffffffffffda RBX: 00007f2187695fa0 RCX: 00007f218743eec9 [ 49.890083][ T4090] RDX: 0000000000000000 RSI: 0000200000000300 RDI: 0000000000000003 [ 49.890099][ T4090] RBP: 00007f2185ea7090 R08: 0000000000000000 R09: 0000000000000000 [ 49.890116][ T4090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 49.890137][ T4090] R13: 00007f2187696038 R14: 00007f2187695fa0 R15: 00007fffbc52f2d8 [ 49.890159][ T4090] [ 50.114195][ T4097] wg2: left promiscuous mode [ 50.118960][ T4097] wg2: left allmulticast mode [ 50.126806][ T4097] wg2: entered promiscuous mode [ 50.132073][ T4097] wg2: entered allmulticast mode [ 50.259433][ T4114] netlink: 28 bytes leftover after parsing attributes in process `syz.0.248'. [ 50.268653][ T4114] netlink: 196 bytes leftover after parsing attributes in process `syz.0.248'. [ 50.389592][ T4132] wg2: left promiscuous mode [ 50.394536][ T4132] wg2: left allmulticast mode [ 50.404433][ T4132] wg2: entered promiscuous mode [ 50.409452][ T4132] wg2: entered allmulticast mode [ 50.754010][ T4159] netlink: 'syz.1.266': attribute type 1 has an invalid length. [ 50.774225][ T4159] bond1: (slave bridge1): making interface the new active one [ 50.782652][ T4159] bond1: (slave bridge1): Enslaving as an active interface with an up link [ 51.080209][ T4166] wg2: left promiscuous mode [ 51.085050][ T4166] wg2: left allmulticast mode [ 51.092919][ T4166] wg2: entered promiscuous mode [ 51.097818][ T4166] wg2: entered allmulticast mode [ 51.537216][ T4195] FAULT_INJECTION: forcing a failure. [ 51.537216][ T4195] name failslab, interval 1, probability 0, space 0, times 0 [ 51.550089][ T4195] CPU: 0 UID: 0 PID: 4195 Comm: syz.2.281 Not tainted syzkaller #0 PREEMPT(voluntary) [ 51.550123][ T4195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 51.550140][ T4195] Call Trace: [ 51.550147][ T4195] [ 51.550156][ T4195] __dump_stack+0x1d/0x30 [ 51.550183][ T4195] dump_stack_lvl+0xe8/0x140 [ 51.550276][ T4195] dump_stack+0x15/0x1b [ 51.550293][ T4195] should_fail_ex+0x265/0x280 [ 51.550345][ T4195] should_failslab+0x8c/0xb0 [ 51.550380][ T4195] kmem_cache_alloc_noprof+0x50/0x480 [ 51.550481][ T4195] ? alloc_empty_file+0x76/0x200 [ 51.550528][ T4195] ? mntput+0x4b/0x80 [ 51.550665][ T4195] alloc_empty_file+0x76/0x200 [ 51.550695][ T4195] path_openat+0x68/0x2170 [ 51.550714][ T4195] ? _parse_integer_limit+0x170/0x190 [ 51.550758][ T4195] ? kstrtoull+0x111/0x140 [ 51.550849][ T4195] ? kstrtouint+0x76/0xc0 [ 51.550897][ T4195] do_filp_open+0x109/0x230 [ 51.550925][ T4195] do_sys_openat2+0xa6/0x110 [ 51.550961][ T4195] __x64_sys_openat+0xf2/0x120 [ 51.551006][ T4195] x64_sys_call+0x2eab/0x3000 [ 51.551098][ T4195] do_syscall_64+0xd2/0x200 [ 51.551129][ T4195] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 51.551161][ T4195] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 51.551258][ T4195] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 51.551346][ T4195] RIP: 0033:0x7f218743d710 [ 51.551366][ T4195] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 51.551418][ T4195] RSP: 002b:00007f2185ea6f70 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 51.551441][ T4195] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f218743d710 [ 51.551457][ T4195] RDX: 0000000000000000 RSI: 00007f21874c207e RDI: 00000000ffffff9c [ 51.551469][ T4195] RBP: 00007f21874c207e R08: 0000000000000000 R09: 0000000000000000 [ 51.551494][ T4195] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 51.551511][ T4195] R13: 00007f2187696038 R14: 00007f2187695fa0 R15: 00007fffbc52f2d8 [ 51.551534][ T4195] [ 51.759355][ T4199] wg2: left promiscuous mode [ 51.764258][ T4199] wg2: left allmulticast mode [ 51.773232][ T4201] wg2: entered promiscuous mode [ 51.778138][ T4201] wg2: entered allmulticast mode [ 52.447001][ T4242] wg2: entered promiscuous mode [ 52.451947][ T4242] wg2: entered allmulticast mode [ 52.543486][ T4250] FAULT_INJECTION: forcing a failure. [ 52.543486][ T4250] name failslab, interval 1, probability 0, space 0, times 0 [ 52.556844][ T4250] CPU: 1 UID: 0 PID: 4250 Comm: syz.4.297 Not tainted syzkaller #0 PREEMPT(voluntary) [ 52.556881][ T4250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 52.556941][ T4250] Call Trace: [ 52.556950][ T4250] [ 52.556961][ T4250] __dump_stack+0x1d/0x30 [ 52.557021][ T4250] dump_stack_lvl+0xe8/0x140 [ 52.557046][ T4250] dump_stack+0x15/0x1b [ 52.557069][ T4250] should_fail_ex+0x265/0x280 [ 52.557278][ T4250] should_failslab+0x8c/0xb0 [ 52.557315][ T4250] kmem_cache_alloc_noprof+0x50/0x480 [ 52.557403][ T4250] ? audit_log_start+0x342/0x720 [ 52.557430][ T4250] audit_log_start+0x342/0x720 [ 52.557456][ T4250] ? kstrtouint+0x76/0xc0 [ 52.557499][ T4250] audit_seccomp+0x48/0x100 [ 52.557596][ T4250] ? __seccomp_filter+0x82d/0x1250 [ 52.557649][ T4250] __seccomp_filter+0x83e/0x1250 [ 52.557685][ T4250] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 52.557725][ T4250] ? vfs_write+0x7e8/0x960 [ 52.557790][ T4250] ? __rcu_read_unlock+0x4f/0x70 [ 52.557821][ T4250] ? __fget_files+0x184/0x1c0 [ 52.557858][ T4250] __secure_computing+0x82/0x150 [ 52.557893][ T4250] syscall_trace_enter+0xcf/0x1e0 [ 52.557961][ T4250] do_syscall_64+0xac/0x200 [ 52.557989][ T4250] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 52.558069][ T4250] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 52.558100][ T4250] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 52.558193][ T4250] RIP: 0033:0x7fd79fb3eec9 [ 52.558209][ T4250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 52.558234][ T4250] RSP: 002b:00007fd79e586038 EFLAGS: 00000246 ORIG_RAX: 00000000000000de [ 52.558260][ T4250] RAX: ffffffffffffffda RBX: 00007fd79fd96090 RCX: 00007fd79fb3eec9 [ 52.558277][ T4250] RDX: 0000200000bbdffc RSI: 0000200000533fa0 RDI: 0000000000000000 [ 52.558315][ T4250] RBP: 00007fd79e586090 R08: 0000000000000000 R09: 0000000000000000 [ 52.558332][ T4250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 52.558348][ T4250] R13: 00007fd79fd96128 R14: 00007fd79fd96090 R15: 00007ffdc54155e8 [ 52.558400][ T4250] [ 53.202435][ T4261] veth1_macvtap: entered promiscuous mode [ 53.208351][ T4261] veth1_macvtap: entered allmulticast mode [ 53.214508][ T4261] macsec0: entered promiscuous mode [ 53.340453][ T29] kauditd_printk_skb: 1003 callbacks suppressed [ 53.340472][ T29] audit: type=1400 audit(1759978959.502:3498): avc: denied { prog_load } for pid=4270 comm="syz.4.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 53.366908][ T4272] wg2: left promiscuous mode [ 53.371748][ T4272] wg2: left allmulticast mode [ 53.401733][ T4273] wg2: entered promiscuous mode [ 53.406689][ T4273] wg2: entered allmulticast mode [ 53.580179][ T29] audit: type=1400 audit(1759978959.502:3499): avc: denied { map_create } for pid=4270 comm="syz.4.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 53.584699][ T4280] __nla_validate_parse: 9 callbacks suppressed [ 53.584785][ T4280] netlink: 60 bytes leftover after parsing attributes in process `syz.1.309'. [ 53.599499][ T29] audit: type=1400 audit(1759978959.502:3500): avc: denied { prog_load } for pid=4270 comm="syz.4.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 53.599533][ T29] audit: type=1400 audit(1759978959.552:3501): avc: denied { prog_load } for pid=4270 comm="syz.4.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 53.653816][ T29] audit: type=1400 audit(1759978959.552:3502): avc: denied { mounton } for pid=4270 comm="syz.4.308" path="/49/file0" dev="tmpfs" ino=279 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 53.676434][ T29] audit: type=1400 audit(1759978959.552:3503): avc: denied { prog_load } for pid=4270 comm="syz.4.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 53.687422][ T4275] netlink: 60 bytes leftover after parsing attributes in process `syz.1.309'. [ 53.695621][ T29] audit: type=1400 audit(1759978959.552:3504): avc: denied { read } for pid=4270 comm="syz.4.308" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=0 [ 53.727942][ T29] audit: type=1400 audit(1759978959.622:3505): avc: denied { create } for pid=4270 comm="syz.4.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 53.748639][ T29] audit: type=1400 audit(1759978959.622:3506): avc: denied { create } for pid=4270 comm="syz.4.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 53.768255][ T29] audit: type=1400 audit(1759978959.672:3507): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 54.361221][ T4303] FAULT_INJECTION: forcing a failure. [ 54.361221][ T4303] name failslab, interval 1, probability 0, space 0, times 0 [ 54.374196][ T4303] CPU: 1 UID: 0 PID: 4303 Comm: syz.2.315 Not tainted syzkaller #0 PREEMPT(voluntary) [ 54.374303][ T4303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 54.374321][ T4303] Call Trace: [ 54.374330][ T4303] [ 54.374339][ T4303] __dump_stack+0x1d/0x30 [ 54.374366][ T4303] dump_stack_lvl+0xe8/0x140 [ 54.374392][ T4303] dump_stack+0x15/0x1b [ 54.374415][ T4303] should_fail_ex+0x265/0x280 [ 54.374466][ T4303] should_failslab+0x8c/0xb0 [ 54.374502][ T4303] kmem_cache_alloc_noprof+0x50/0x480 [ 54.374531][ T4303] ? audit_log_start+0x342/0x720 [ 54.374551][ T4303] audit_log_start+0x342/0x720 [ 54.374577][ T4303] ? kstrtouint+0x76/0xc0 [ 54.374622][ T4303] audit_seccomp+0x48/0x100 [ 54.374728][ T4303] ? __seccomp_filter+0x82d/0x1250 [ 54.374763][ T4303] __seccomp_filter+0x83e/0x1250 [ 54.374800][ T4303] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 54.374833][ T4303] ? vfs_write+0x7e8/0x960 [ 54.374882][ T4303] __secure_computing+0x82/0x150 [ 54.374918][ T4303] syscall_trace_enter+0xcf/0x1e0 [ 54.375064][ T4303] do_syscall_64+0xac/0x200 [ 54.375097][ T4303] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 54.375125][ T4303] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 54.375210][ T4303] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 54.375268][ T4303] RIP: 0033:0x7f218743eec9 [ 54.375289][ T4303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 54.375311][ T4303] RSP: 002b:00007f2185ea7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 54.375408][ T4303] RAX: ffffffffffffffda RBX: 00007f2187695fa0 RCX: 00007f218743eec9 [ 54.375423][ T4303] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00002000000002c0 [ 54.375435][ T4303] RBP: 00007f2185ea7090 R08: 0000000000000000 R09: 0000000000000000 [ 54.375447][ T4303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 54.375462][ T4303] R13: 00007f2187696038 R14: 00007f2187695fa0 R15: 00007fffbc52f2d8 [ 54.375486][ T4303] [ 54.590053][ T4310] wg2: left promiscuous mode [ 54.594769][ T4310] wg2: left allmulticast mode [ 54.631427][ T4311] wg2: entered promiscuous mode [ 54.636376][ T4311] wg2: entered allmulticast mode [ 54.932633][ T4326] netlink: 60 bytes leftover after parsing attributes in process `syz.4.324'. [ 55.011136][ T4321] netlink: 60 bytes leftover after parsing attributes in process `syz.4.324'. [ 55.137818][ T4342] FAULT_INJECTION: forcing a failure. [ 55.137818][ T4342] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 55.151329][ T4342] CPU: 1 UID: 0 PID: 4342 Comm: syz.1.332 Not tainted syzkaller #0 PREEMPT(voluntary) [ 55.151438][ T4342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 55.151455][ T4342] Call Trace: [ 55.151463][ T4342] [ 55.151472][ T4342] __dump_stack+0x1d/0x30 [ 55.151500][ T4342] dump_stack_lvl+0xe8/0x140 [ 55.151569][ T4342] dump_stack+0x15/0x1b [ 55.151585][ T4342] should_fail_ex+0x265/0x280 [ 55.151624][ T4342] should_fail+0xb/0x20 [ 55.151711][ T4342] should_fail_usercopy+0x1a/0x20 [ 55.151731][ T4342] strncpy_from_user+0x25/0x230 [ 55.151764][ T4342] ? kmem_cache_alloc_noprof+0x242/0x480 [ 55.151800][ T4342] ? getname_flags+0x80/0x3b0 [ 55.151857][ T4342] getname_flags+0xae/0x3b0 [ 55.151895][ T4342] __x64_sys_link+0x33/0x70 [ 55.151926][ T4342] x64_sys_call+0x12a7/0x3000 [ 55.152005][ T4342] do_syscall_64+0xd2/0x200 [ 55.152037][ T4342] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 55.152073][ T4342] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 55.152101][ T4342] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 55.152139][ T4342] RIP: 0033:0x7f0a9f87eec9 [ 55.152207][ T4342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 55.152231][ T4342] RSP: 002b:00007f0a9e2df038 EFLAGS: 00000246 ORIG_RAX: 0000000000000056 [ 55.152250][ T4342] RAX: ffffffffffffffda RBX: 00007f0a9fad5fa0 RCX: 00007f0a9f87eec9 [ 55.152262][ T4342] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000000 [ 55.152274][ T4342] RBP: 00007f0a9e2df090 R08: 0000000000000000 R09: 0000000000000000 [ 55.152288][ T4342] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 55.152304][ T4342] R13: 00007f0a9fad6038 R14: 00007f0a9fad5fa0 R15: 00007ffe043e4358 [ 55.152356][ T4342] [ 55.412172][ T4345] wg2: left promiscuous mode [ 55.416902][ T4345] wg2: left allmulticast mode [ 55.448308][ T4345] wg2: entered promiscuous mode [ 55.453455][ T4345] wg2: entered allmulticast mode [ 56.523989][ T4380] netlink: 60 bytes leftover after parsing attributes in process `syz.1.346'. [ 56.536997][ T4378] netlink: 60 bytes leftover after parsing attributes in process `syz.1.346'. [ 56.632745][ T4382] wg2: left promiscuous mode [ 56.637511][ T4382] wg2: left allmulticast mode [ 56.644967][ T4382] wg2: entered promiscuous mode [ 56.649990][ T4382] wg2: entered allmulticast mode [ 56.995547][ T4408] FAULT_INJECTION: forcing a failure. [ 56.995547][ T4408] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 57.008802][ T4408] CPU: 1 UID: 0 PID: 4408 Comm: syz.0.355 Not tainted syzkaller #0 PREEMPT(voluntary) [ 57.008838][ T4408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 57.008855][ T4408] Call Trace: [ 57.008864][ T4408] [ 57.008874][ T4408] __dump_stack+0x1d/0x30 [ 57.008931][ T4408] dump_stack_lvl+0xe8/0x140 [ 57.008950][ T4408] dump_stack+0x15/0x1b [ 57.008966][ T4408] should_fail_ex+0x265/0x280 [ 57.009079][ T4408] should_fail+0xb/0x20 [ 57.009115][ T4408] should_fail_usercopy+0x1a/0x20 [ 57.009135][ T4408] strncpy_from_user+0x25/0x230 [ 57.009195][ T4408] ? kmem_cache_alloc_noprof+0x242/0x480 [ 57.009225][ T4408] ? getname_flags+0x80/0x3b0 [ 57.009300][ T4408] getname_flags+0xae/0x3b0 [ 57.009334][ T4408] __x64_sys_mknodat+0x4f/0x70 [ 57.009360][ T4408] x64_sys_call+0x2ed7/0x3000 [ 57.009389][ T4408] do_syscall_64+0xd2/0x200 [ 57.009535][ T4408] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 57.009563][ T4408] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 57.009591][ T4408] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 57.009650][ T4408] RIP: 0033:0x7fcc8621eec9 [ 57.009670][ T4408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 57.009688][ T4408] RSP: 002b:00007fcc84c66038 EFLAGS: 00000246 ORIG_RAX: 0000000000000103 [ 57.009707][ T4408] RAX: ffffffffffffffda RBX: 00007fcc86476090 RCX: 00007fcc8621eec9 [ 57.009720][ T4408] RDX: b0a54e68b1cd2fdb RSI: 0000200000000040 RDI: ffffffffffffff9c [ 57.009736][ T4408] RBP: 00007fcc84c66090 R08: 0000000000000000 R09: 0000000000000000 [ 57.009750][ T4408] R10: 0000000000000103 R11: 0000000000000246 R12: 0000000000000001 [ 57.009832][ T4408] R13: 00007fcc86476128 R14: 00007fcc86476090 R15: 00007ffe496b6598 [ 57.009854][ T4408] [ 57.711283][ T4422] syz.3.360 (4422) used greatest stack depth: 10192 bytes left [ 57.872836][ T4428] netlink: 60 bytes leftover after parsing attributes in process `syz.1.363'. [ 57.887674][ T4426] netlink: 60 bytes leftover after parsing attributes in process `syz.1.363'. [ 58.002907][ T4429] wg2: left promiscuous mode [ 58.007598][ T4429] wg2: left allmulticast mode [ 58.025394][ T4429] wg2: entered promiscuous mode [ 58.030373][ T4429] wg2: entered allmulticast mode [ 58.270414][ T4437] netlink: 'syz.3.366': attribute type 4 has an invalid length. [ 58.300279][ T4437] netlink: 'syz.3.366': attribute type 4 has an invalid length. [ 58.355692][ T4440] FAULT_INJECTION: forcing a failure. [ 58.355692][ T4440] name failslab, interval 1, probability 0, space 0, times 0 [ 58.355818][ T4440] CPU: 1 UID: 0 PID: 4440 Comm: syz.3.367 Not tainted syzkaller #0 PREEMPT(voluntary) [ 58.355858][ T4440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 58.355906][ T4440] Call Trace: [ 58.355914][ T4440] [ 58.355924][ T4440] __dump_stack+0x1d/0x30 [ 58.355956][ T4440] dump_stack_lvl+0xe8/0x140 [ 58.355976][ T4440] dump_stack+0x15/0x1b [ 58.355992][ T4440] should_fail_ex+0x265/0x280 [ 58.356091][ T4440] should_failslab+0x8c/0xb0 [ 58.356231][ T4440] kmem_cache_alloc_noprof+0x50/0x480 [ 58.356338][ T4440] ? getname_flags+0x80/0x3b0 [ 58.356376][ T4440] getname_flags+0x80/0x3b0 [ 58.356451][ T4440] __x64_sys_unlink+0x21/0x40 [ 58.356473][ T4440] x64_sys_call+0x2dcf/0x3000 [ 58.356494][ T4440] do_syscall_64+0xd2/0x200 [ 58.356519][ T4440] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 58.356555][ T4440] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 58.356620][ T4440] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 58.356643][ T4440] RIP: 0033:0x7fb546faeec9 [ 58.356722][ T4440] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 58.356740][ T4440] RSP: 002b:00007fb545a0f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 58.356826][ T4440] RAX: ffffffffffffffda RBX: 00007fb547205fa0 RCX: 00007fb546faeec9 [ 58.356843][ T4440] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 58.356860][ T4440] RBP: 00007fb545a0f090 R08: 0000000000000000 R09: 0000000000000000 [ 58.356876][ T4440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 58.356899][ T4440] R13: 00007fb547206038 R14: 00007fb547205fa0 R15: 00007ffdddf97278 [ 58.356921][ T4440] [ 58.379635][ T29] kauditd_printk_skb: 5027 callbacks suppressed [ 58.379652][ T29] audit: type=1400 audit(1759978964.532:8054): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 58.380414][ T29] audit: type=1400 audit(1759978964.532:8055): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 58.380441][ T29] audit: type=1400 audit(1759978964.532:8056): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 58.380528][ T29] audit: type=1400 audit(1759978964.532:8057): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 58.380594][ T29] audit: type=1400 audit(1759978964.542:8058): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 58.380659][ T29] audit: type=1400 audit(1759978964.542:8059): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 58.380854][ T29] audit: type=1400 audit(1759978964.542:8060): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 58.381063][ T29] audit: type=1400 audit(1759978964.542:8061): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 58.381187][ T29] audit: type=1400 audit(1759978964.542:8062): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 58.381374][ T29] audit: type=1400 audit(1759978964.542:8063): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 59.168592][ T4465] netlink: 60 bytes leftover after parsing attributes in process `syz.1.375'. [ 59.177994][ T4460] netlink: 60 bytes leftover after parsing attributes in process `syz.1.375'. [ 59.318218][ T4475] ALSA: seq fatal error: cannot create timer (-22) [ 59.362838][ T4480] FAULT_INJECTION: forcing a failure. [ 59.362838][ T4480] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 59.376559][ T4480] CPU: 0 UID: 0 PID: 4480 Comm: syz.3.384 Not tainted syzkaller #0 PREEMPT(voluntary) [ 59.376614][ T4480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 59.376630][ T4480] Call Trace: [ 59.376648][ T4480] [ 59.376657][ T4480] __dump_stack+0x1d/0x30 [ 59.376720][ T4480] dump_stack_lvl+0xe8/0x140 [ 59.376818][ T4480] dump_stack+0x15/0x1b [ 59.376841][ T4480] should_fail_ex+0x265/0x280 [ 59.376967][ T4480] should_fail+0xb/0x20 [ 59.377010][ T4480] should_fail_usercopy+0x1a/0x20 [ 59.377036][ T4480] _copy_to_user+0x20/0xa0 [ 59.377068][ T4480] simple_read_from_buffer+0xb5/0x130 [ 59.377098][ T4480] proc_fail_nth_read+0x10e/0x150 [ 59.377139][ T4480] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 59.377179][ T4480] vfs_read+0x1a8/0x770 [ 59.377207][ T4480] ? __rcu_read_unlock+0x4f/0x70 [ 59.377239][ T4480] ? __fget_files+0x184/0x1c0 [ 59.377308][ T4480] ksys_read+0xda/0x1a0 [ 59.377331][ T4480] __x64_sys_read+0x40/0x50 [ 59.377360][ T4480] x64_sys_call+0x27c0/0x3000 [ 59.377382][ T4480] do_syscall_64+0xd2/0x200 [ 59.377456][ T4480] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 59.377493][ T4480] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 59.377522][ T4480] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 59.377549][ T4480] RIP: 0033:0x7fb546fad8dc [ 59.377639][ T4480] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 59.377784][ T4480] RSP: 002b:00007fb545a0f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 59.377810][ T4480] RAX: ffffffffffffffda RBX: 00007fb547205fa0 RCX: 00007fb546fad8dc [ 59.377827][ T4480] RDX: 000000000000000f RSI: 00007fb545a0f0a0 RDI: 0000000000000003 [ 59.377841][ T4480] RBP: 00007fb545a0f090 R08: 0000000000000000 R09: 0000000000000000 [ 59.377853][ T4480] R10: 0000200000000100 R11: 0000000000000246 R12: 0000000000000001 [ 59.377865][ T4480] R13: 00007fb547206038 R14: 00007fb547205fa0 R15: 00007ffdddf97278 [ 59.377882][ T4480] [ 59.734984][ T4494] FAULT_INJECTION: forcing a failure. [ 59.734984][ T4494] name failslab, interval 1, probability 0, space 0, times 0 [ 59.747713][ T4494] CPU: 1 UID: 0 PID: 4494 Comm: syz.3.389 Not tainted syzkaller #0 PREEMPT(voluntary) [ 59.747827][ T4494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 59.747845][ T4494] Call Trace: [ 59.747853][ T4494] [ 59.747863][ T4494] __dump_stack+0x1d/0x30 [ 59.747966][ T4494] dump_stack_lvl+0xe8/0x140 [ 59.747992][ T4494] dump_stack+0x15/0x1b [ 59.748012][ T4494] should_fail_ex+0x265/0x280 [ 59.748048][ T4494] should_failslab+0x8c/0xb0 [ 59.748075][ T4494] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 59.748136][ T4494] ? __alloc_skb+0x101/0x320 [ 59.748166][ T4494] __alloc_skb+0x101/0x320 [ 59.748197][ T4494] netlink_alloc_large_skb+0xbf/0xf0 [ 59.748330][ T4494] netlink_sendmsg+0x3cf/0x6b0 [ 59.748377][ T4494] ? __pfx_netlink_sendmsg+0x10/0x10 [ 59.748444][ T4494] __sock_sendmsg+0x142/0x180 [ 59.748486][ T4494] ____sys_sendmsg+0x31e/0x4e0 [ 59.748526][ T4494] ___sys_sendmsg+0x17b/0x1d0 [ 59.748574][ T4494] __x64_sys_sendmsg+0xd4/0x160 [ 59.748639][ T4494] x64_sys_call+0x191e/0x3000 [ 59.748689][ T4494] do_syscall_64+0xd2/0x200 [ 59.748719][ T4494] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 59.748749][ T4494] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 59.748781][ T4494] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 59.748809][ T4494] RIP: 0033:0x7fb546faeec9 [ 59.748885][ T4494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 59.748909][ T4494] RSP: 002b:00007fb545a0f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 59.748928][ T4494] RAX: ffffffffffffffda RBX: 00007fb547205fa0 RCX: 00007fb546faeec9 [ 59.748940][ T4494] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000003 [ 59.748952][ T4494] RBP: 00007fb545a0f090 R08: 0000000000000000 R09: 0000000000000000 [ 59.748964][ T4494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 59.748979][ T4494] R13: 00007fb547206038 R14: 00007fb547205fa0 R15: 00007ffdddf97278 [ 59.749002][ T4494] [ 60.237400][ T4502] FAULT_INJECTION: forcing a failure. [ 60.237400][ T4502] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 60.250742][ T4502] CPU: 1 UID: 0 PID: 4502 Comm: syz.4.394 Not tainted syzkaller #0 PREEMPT(voluntary) [ 60.250773][ T4502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 60.250865][ T4502] Call Trace: [ 60.250872][ T4502] [ 60.250882][ T4502] __dump_stack+0x1d/0x30 [ 60.250910][ T4502] dump_stack_lvl+0xe8/0x140 [ 60.250932][ T4502] dump_stack+0x15/0x1b [ 60.250948][ T4502] should_fail_ex+0x265/0x280 [ 60.250998][ T4502] should_fail+0xb/0x20 [ 60.251039][ T4502] should_fail_usercopy+0x1a/0x20 [ 60.251109][ T4502] _copy_to_user+0x20/0xa0 [ 60.251141][ T4502] simple_read_from_buffer+0xb5/0x130 [ 60.251165][ T4502] proc_fail_nth_read+0x10e/0x150 [ 60.251194][ T4502] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 60.251276][ T4502] vfs_read+0x1a8/0x770 [ 60.251297][ T4502] ? __rcu_read_unlock+0x4f/0x70 [ 60.251324][ T4502] ? __fget_files+0x184/0x1c0 [ 60.251358][ T4502] ksys_read+0xda/0x1a0 [ 60.251444][ T4502] __x64_sys_read+0x40/0x50 [ 60.251546][ T4502] x64_sys_call+0x27c0/0x3000 [ 60.251575][ T4502] do_syscall_64+0xd2/0x200 [ 60.251604][ T4502] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 60.251661][ T4502] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 60.251687][ T4502] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 60.251787][ T4502] RIP: 0033:0x7fd79fb3d8dc [ 60.251802][ T4502] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 60.251820][ T4502] RSP: 002b:00007fd79e5a7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 60.251843][ T4502] RAX: ffffffffffffffda RBX: 00007fd79fd95fa0 RCX: 00007fd79fb3d8dc [ 60.251858][ T4502] RDX: 000000000000000f RSI: 00007fd79e5a70a0 RDI: 0000000000000004 [ 60.251872][ T4502] RBP: 00007fd79e5a7090 R08: 0000000000000000 R09: 0000000000000000 [ 60.251935][ T4502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 60.251955][ T4502] R13: 00007fd79fd96038 R14: 00007fd79fd95fa0 R15: 00007ffdc54155e8 [ 60.251975][ T4502] [ 60.253120][ T4503] bond1: option lacp_rate: mode dependency failed, not supported in mode active-backup(1) [ 60.474374][ T4503] bond1 (unregistering): Released all slaves [ 60.641351][ T4523] netlink: 12 bytes leftover after parsing attributes in process `syz.2.401'. [ 60.666857][ T4523] 8021q: adding VLAN 0 to HW filter on device bond2 [ 60.686599][ T4525] netlink: 4 bytes leftover after parsing attributes in process `syz.2.401'. [ 60.720431][ T4525] bond2 (unregistering): Released all slaves [ 60.912480][ T4539] netlink: 60 bytes leftover after parsing attributes in process `syz.2.406'. [ 60.922064][ T4537] netlink: 60 bytes leftover after parsing attributes in process `syz.2.406'. [ 61.343834][ T4554] bond1: option lacp_rate: mode dependency failed, not supported in mode active-backup(1) [ 61.372729][ T4556] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 61.372729][ T4556] The task syz.2.410 (4556) triggered the difference, watch for misbehavior. [ 61.522532][ T4554] bond1 (unregistering): Released all slaves [ 61.771814][ T4575] FAULT_INJECTION: forcing a failure. [ 61.771814][ T4575] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 61.785366][ T4575] CPU: 0 UID: 0 PID: 4575 Comm: syz.4.418 Not tainted syzkaller #0 PREEMPT(voluntary) [ 61.785403][ T4575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 61.785421][ T4575] Call Trace: [ 61.785436][ T4575] [ 61.785446][ T4575] __dump_stack+0x1d/0x30 [ 61.785475][ T4575] dump_stack_lvl+0xe8/0x140 [ 61.785501][ T4575] dump_stack+0x15/0x1b [ 61.785619][ T4575] should_fail_ex+0x265/0x280 [ 61.785704][ T4575] should_fail+0xb/0x20 [ 61.785746][ T4575] should_fail_usercopy+0x1a/0x20 [ 61.785775][ T4575] _copy_from_user+0x1c/0xb0 [ 61.785809][ T4575] kstrtouint_from_user+0x69/0xf0 [ 61.785854][ T4575] ? 0xffffffff81000000 [ 61.785896][ T4575] ? selinux_file_permission+0x1e4/0x320 [ 61.786000][ T4575] proc_fail_nth_write+0x50/0x160 [ 61.786039][ T4575] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 61.786128][ T4575] vfs_write+0x269/0x960 [ 61.786217][ T4575] ? vfs_read+0x4e6/0x770 [ 61.786254][ T4575] ? __rcu_read_unlock+0x4f/0x70 [ 61.786289][ T4575] ? __fget_files+0x184/0x1c0 [ 61.786325][ T4575] ksys_write+0xda/0x1a0 [ 61.786357][ T4575] __x64_sys_write+0x40/0x50 [ 61.786389][ T4575] x64_sys_call+0x2802/0x3000 [ 61.786486][ T4575] do_syscall_64+0xd2/0x200 [ 61.786517][ T4575] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 61.786555][ T4575] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 61.786617][ T4575] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 61.786648][ T4575] RIP: 0033:0x7fd79fb3d97f [ 61.786667][ T4575] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 61.786692][ T4575] RSP: 002b:00007fd79e5a7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 61.786717][ T4575] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd79fb3d97f [ 61.786734][ T4575] RDX: 0000000000000001 RSI: 00007fd79e5a70a0 RDI: 0000000000000003 [ 61.786853][ T4575] RBP: 00007fd79e5a7090 R08: 0000000000000000 R09: 0000000000000000 [ 61.786870][ T4575] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 61.786886][ T4575] R13: 00007fd79fd96038 R14: 00007fd79fd95fa0 R15: 00007ffdc54155e8 [ 61.786910][ T4575] [ 62.058087][ T4578] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 62.122555][ T4584] netlink: 60 bytes leftover after parsing attributes in process `syz.1.420'. [ 62.160288][ T4581] netlink: 60 bytes leftover after parsing attributes in process `syz.1.420'. [ 62.245108][ T4595] bond1: option lacp_rate: mode dependency failed, not supported in mode active-backup(1) [ 62.281439][ T4595] bond1 (unregistering): Released all slaves [ 62.508172][ T4610] netlink: 4 bytes leftover after parsing attributes in process `syz.3.431'. [ 62.548637][ T4615] FAULT_INJECTION: forcing a failure. [ 62.548637][ T4615] name failslab, interval 1, probability 0, space 0, times 0 [ 62.561563][ T4615] CPU: 1 UID: 0 PID: 4615 Comm: syz.1.433 Not tainted syzkaller #0 PREEMPT(voluntary) [ 62.561594][ T4615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 62.561669][ T4615] Call Trace: [ 62.561677][ T4615] [ 62.561686][ T4615] __dump_stack+0x1d/0x30 [ 62.561712][ T4615] dump_stack_lvl+0xe8/0x140 [ 62.561731][ T4615] dump_stack+0x15/0x1b [ 62.561747][ T4615] should_fail_ex+0x265/0x280 [ 62.561849][ T4615] should_failslab+0x8c/0xb0 [ 62.561885][ T4615] kmem_cache_alloc_noprof+0x50/0x480 [ 62.561922][ T4615] ? getname_flags+0x80/0x3b0 [ 62.561953][ T4615] getname_flags+0x80/0x3b0 [ 62.561991][ T4615] __x64_sys_linkat+0x66/0xa0 [ 62.562048][ T4615] x64_sys_call+0x28ff/0x3000 [ 62.562078][ T4615] do_syscall_64+0xd2/0x200 [ 62.562184][ T4615] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 62.562241][ T4615] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 62.562268][ T4615] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 62.562290][ T4615] RIP: 0033:0x7f0a9f87eec9 [ 62.562305][ T4615] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 62.562322][ T4615] RSP: 002b:00007f0a9e2df038 EFLAGS: 00000246 ORIG_RAX: 0000000000000109 [ 62.562420][ T4615] RAX: ffffffffffffffda RBX: 00007f0a9fad5fa0 RCX: 00007f0a9f87eec9 [ 62.562453][ T4615] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: ffffffffffffffff [ 62.562471][ T4615] RBP: 00007f0a9e2df090 R08: 0000000000001400 R09: 0000000000000000 [ 62.562487][ T4615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 62.562500][ T4615] R13: 00007f0a9fad6038 R14: 00007f0a9fad5fa0 R15: 00007ffe043e4358 [ 62.562518][ T4615] [ 62.812877][ T4622] bond1: option lacp_rate: mode dependency failed, not supported in mode active-backup(1) [ 62.824962][ T4622] bond1 (unregistering): Released all slaves [ 63.009181][ T4637] FAULT_INJECTION: forcing a failure. [ 63.009181][ T4637] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 63.022552][ T4637] CPU: 0 UID: 0 PID: 4637 Comm: syz.2.441 Not tainted syzkaller #0 PREEMPT(voluntary) [ 63.022638][ T4637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 63.022652][ T4637] Call Trace: [ 63.022661][ T4637] [ 63.022671][ T4637] __dump_stack+0x1d/0x30 [ 63.022709][ T4637] dump_stack_lvl+0xe8/0x140 [ 63.022741][ T4637] dump_stack+0x15/0x1b [ 63.022763][ T4637] should_fail_ex+0x265/0x280 [ 63.022951][ T4637] should_fail+0xb/0x20 [ 63.022993][ T4637] should_fail_usercopy+0x1a/0x20 [ 63.023087][ T4637] _copy_from_user+0x1c/0xb0 [ 63.023121][ T4637] kstrtouint_from_user+0x69/0xf0 [ 63.023167][ T4637] ? 0xffffffff81000000 [ 63.023185][ T4637] ? selinux_file_permission+0x1e4/0x320 [ 63.023249][ T4637] proc_fail_nth_write+0x50/0x160 [ 63.023357][ T4637] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 63.023396][ T4637] vfs_write+0x269/0x960 [ 63.023445][ T4637] ? vfs_read+0x4e6/0x770 [ 63.023469][ T4637] ? __rcu_read_unlock+0x4f/0x70 [ 63.023502][ T4637] ? __fget_files+0x184/0x1c0 [ 63.023628][ T4637] ksys_write+0xda/0x1a0 [ 63.023655][ T4637] __x64_sys_write+0x40/0x50 [ 63.023677][ T4637] x64_sys_call+0x2802/0x3000 [ 63.023775][ T4637] do_syscall_64+0xd2/0x200 [ 63.023834][ T4637] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 63.023872][ T4637] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 63.023900][ T4637] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 63.023929][ T4637] RIP: 0033:0x7f218743d97f [ 63.023949][ T4637] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 63.023971][ T4637] RSP: 002b:00007f2185ea7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 63.023990][ T4637] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f218743d97f [ 63.024010][ T4637] RDX: 0000000000000001 RSI: 00007f2185ea70a0 RDI: 0000000000000003 [ 63.024029][ T4637] RBP: 00007f2185ea7090 R08: 0000000000000000 R09: 0000000000000000 [ 63.024041][ T4637] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 63.024102][ T4637] R13: 00007f2187696038 R14: 00007f2187695fa0 R15: 00007fffbc52f2d8 [ 63.024126][ T4637] [ 63.398449][ T4645] audit_log_start: 18277 callbacks suppressed [ 63.398468][ T4645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 63.411596][ T4645] audit: audit_lost=2097 audit_rate_limit=0 audit_backlog_limit=64 [ 63.419698][ T4645] audit: backlog limit exceeded [ 63.424906][ T29] audit: type=1400 audit(1759978969.552:20590): avc: denied { prog_load } for pid=4644 comm="syz.0.440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 63.444477][ T29] audit: type=1400 audit(1759978969.552:20591): avc: denied { node_bind } for pid=4644 comm="syz.0.440" saddr=::1 src=32769 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=0 [ 63.466503][ T29] audit: type=1400 audit(1759978969.552:20592): avc: denied { prog_load } for pid=4644 comm="syz.0.440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 63.485879][ T29] audit: type=1400 audit(1759978969.552:20593): avc: denied { prog_load } for pid=4644 comm="syz.0.440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 63.505127][ T29] audit: type=1400 audit(1759978969.552:20594): avc: denied { prog_load } for pid=4644 comm="syz.0.440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 63.524591][ T29] audit: type=1400 audit(1759978969.552:20595): avc: denied { prog_load } for pid=4644 comm="syz.0.440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 63.543964][ T29] audit: type=1400 audit(1759978969.552:20596): avc: denied { prog_load } for pid=4644 comm="syz.0.440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 63.627577][ T4647] netlink: 4 bytes leftover after parsing attributes in process `syz.0.440'. [ 64.127230][ T4672] FAULT_INJECTION: forcing a failure. [ 64.127230][ T4672] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 64.140869][ T4672] CPU: 0 UID: 0 PID: 4672 Comm: syz.1.452 Not tainted syzkaller #0 PREEMPT(voluntary) [ 64.140901][ T4672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 64.140915][ T4672] Call Trace: [ 64.140922][ T4672] [ 64.140996][ T4672] __dump_stack+0x1d/0x30 [ 64.141019][ T4672] dump_stack_lvl+0xe8/0x140 [ 64.141039][ T4672] dump_stack+0x15/0x1b [ 64.141104][ T4672] should_fail_ex+0x265/0x280 [ 64.141141][ T4672] should_fail_alloc_page+0xf2/0x100 [ 64.141185][ T4672] __alloc_frozen_pages_noprof+0xff/0x360 [ 64.141231][ T4672] alloc_pages_mpol+0xb3/0x260 [ 64.141268][ T4672] vma_alloc_folio_noprof+0x1aa/0x300 [ 64.141382][ T4672] handle_mm_fault+0xec2/0x2be0 [ 64.141407][ T4672] ? vma_start_read+0x141/0x1f0 [ 64.141499][ T4672] do_user_addr_fault+0x630/0x1080 [ 64.141524][ T4672] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 64.141552][ T4672] exc_page_fault+0x62/0xa0 [ 64.141618][ T4672] asm_exc_page_fault+0x26/0x30 [ 64.141639][ T4672] RIP: 0033:0x7f0a9f74a75b [ 64.141655][ T4672] Code: 00 00 00 48 8d 3d dd 39 19 00 48 89 c1 31 c0 e8 fb 3a ff ff eb d2 66 0f 1f 84 00 00 00 00 00 55 31 c0 53 48 81 ec 68 10 00 00 <48> 89 7c 24 08 48 8d 3d 11 3a 19 00 48 89 34 24 48 8b 14 24 48 8b [ 64.141674][ T4672] RSP: 002b:00007f0a9e2ddfb0 EFLAGS: 00010202 [ 64.141743][ T4672] RAX: 0000000000000000 RBX: 00007f0a9fad5fa0 RCX: 0000000000000000 [ 64.141756][ T4672] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000200000000340 [ 64.141835][ T4672] RBP: 00007f0a9e2df090 R08: 0000000000000000 R09: 0000000000000000 [ 64.141848][ T4672] R10: 0000200000000340 R11: 0000000000000000 R12: 0000000000000001 [ 64.141860][ T4672] R13: 00007f0a9fad6038 R14: 00007f0a9fad5fa0 R15: 00007ffe043e4358 [ 64.141879][ T4672] [ 64.141919][ T4672] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 64.419638][ T4693] FAULT_INJECTION: forcing a failure. [ 64.419638][ T4693] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 64.433483][ T4693] CPU: 0 UID: 0 PID: 4693 Comm: syz.4.462 Not tainted syzkaller #0 PREEMPT(voluntary) [ 64.433511][ T4693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 64.433528][ T4693] Call Trace: [ 64.433536][ T4693] [ 64.433546][ T4693] __dump_stack+0x1d/0x30 [ 64.433626][ T4693] dump_stack_lvl+0xe8/0x140 [ 64.433645][ T4693] dump_stack+0x15/0x1b [ 64.433709][ T4693] should_fail_ex+0x265/0x280 [ 64.433803][ T4693] should_fail+0xb/0x20 [ 64.433843][ T4693] should_fail_usercopy+0x1a/0x20 [ 64.433887][ T4693] _copy_from_user+0x1c/0xb0 [ 64.433916][ T4693] kstrtouint_from_user+0x69/0xf0 [ 64.434039][ T4693] ? 0xffffffff81000000 [ 64.434056][ T4693] ? selinux_file_permission+0x1e4/0x320 [ 64.434095][ T4693] proc_fail_nth_write+0x50/0x160 [ 64.434133][ T4693] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 64.434217][ T4693] vfs_write+0x269/0x960 [ 64.434242][ T4693] ? vfs_read+0x4e6/0x770 [ 64.434265][ T4693] ? __rcu_read_unlock+0x4f/0x70 [ 64.434333][ T4693] ? __fget_files+0x184/0x1c0 [ 64.434368][ T4693] ksys_write+0xda/0x1a0 [ 64.434399][ T4693] __x64_sys_write+0x40/0x50 [ 64.434490][ T4693] x64_sys_call+0x2802/0x3000 [ 64.434512][ T4693] do_syscall_64+0xd2/0x200 [ 64.434535][ T4693] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 64.434565][ T4693] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 64.434646][ T4693] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 64.434675][ T4693] RIP: 0033:0x7fd79fb3d97f [ 64.434690][ T4693] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 64.434719][ T4693] RSP: 002b:00007fd79e5a7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 64.434738][ T4693] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd79fb3d97f [ 64.434750][ T4693] RDX: 0000000000000001 RSI: 00007fd79e5a70a0 RDI: 0000000000000003 [ 64.434764][ T4693] RBP: 00007fd79e5a7090 R08: 0000000000000000 R09: 0000000000000000 [ 64.434779][ T4693] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 64.434793][ T4693] R13: 00007fd79fd96038 R14: 00007fd79fd95fa0 R15: 00007ffdc54155e8 [ 64.434816][ T4693] [ 64.747539][ T4701] __nla_validate_parse: 2 callbacks suppressed [ 64.747557][ T4701] netlink: 60 bytes leftover after parsing attributes in process `syz.4.464'. [ 64.840507][ T4699] netlink: 60 bytes leftover after parsing attributes in process `syz.4.464'. [ 65.134567][ T4709] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(8) [ 65.141375][ T4709] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 65.149423][ T4709] vhci_hcd vhci_hcd.0: Device attached [ 65.190361][ T4709] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 65.214506][ T4709] netlink: 80 bytes leftover after parsing attributes in process `syz.0.466'. [ 65.333019][ T4718] bond1: option lacp_rate: mode dependency failed, not supported in mode active-backup(1) [ 65.356629][ T4718] bond1 (unregistering): Released all slaves [ 65.380357][ T4710] vhci_hcd: connection closed [ 65.382244][ T386] vhci_hcd: stop threads [ 65.391627][ T386] vhci_hcd: release socket [ 65.396260][ T386] vhci_hcd: disconnect device [ 65.401428][ T10] usb 1-1: new low-speed USB device number 2 using vhci_hcd [ 65.409364][ T10] usb 1-1: enqueue for inactive port 0 [ 65.428331][ T10] usb 1-1: enqueue for inactive port 0 [ 65.433167][ T4724] bond2: option lacp_rate: mode dependency failed, not supported in mode active-backup(1) [ 65.434044][ T10] usb 1-1: enqueue for inactive port 0 [ 65.482944][ T4724] bond2 (unregistering): Released all slaves [ 65.530837][ T10] vhci_hcd: vhci_device speed not set [ 65.556913][ T4722] syz.3.472 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 65.610938][ T4738] FAULT_INJECTION: forcing a failure. [ 65.610938][ T4738] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 65.624627][ T4738] CPU: 0 UID: 0 PID: 4738 Comm: syz.4.476 Not tainted syzkaller #0 PREEMPT(voluntary) [ 65.624734][ T4738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 65.624751][ T4738] Call Trace: [ 65.624760][ T4738] [ 65.624769][ T4738] __dump_stack+0x1d/0x30 [ 65.624833][ T4738] dump_stack_lvl+0xe8/0x140 [ 65.624864][ T4738] dump_stack+0x15/0x1b [ 65.624887][ T4738] should_fail_ex+0x265/0x280 [ 65.624926][ T4738] should_fail+0xb/0x20 [ 65.624958][ T4738] should_fail_usercopy+0x1a/0x20 [ 65.624986][ T4738] _copy_from_user+0x1c/0xb0 [ 65.625017][ T4738] ___sys_sendmsg+0xc1/0x1d0 [ 65.625068][ T4738] __sys_sendmmsg+0x178/0x300 [ 65.625153][ T4738] __x64_sys_sendmmsg+0x57/0x70 [ 65.625185][ T4738] x64_sys_call+0x1c4a/0x3000 [ 65.625214][ T4738] do_syscall_64+0xd2/0x200 [ 65.625242][ T4738] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 65.625279][ T4738] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 65.625336][ T4738] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 65.625395][ T4738] RIP: 0033:0x7fd79fb3eec9 [ 65.625414][ T4738] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 65.625438][ T4738] RSP: 002b:00007fd79e5a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 65.625460][ T4738] RAX: ffffffffffffffda RBX: 00007fd79fd95fa0 RCX: 00007fd79fb3eec9 [ 65.625472][ T4738] RDX: 0000000000000318 RSI: 00002000000bd000 RDI: 0000000000000007 [ 65.625484][ T4738] RBP: 00007fd79e5a7090 R08: 0000000000000000 R09: 0000000000000000 [ 65.625542][ T4738] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 65.625553][ T4738] R13: 00007fd79fd96038 R14: 00007fd79fd95fa0 R15: 00007ffdc54155e8 [ 65.625570][ T4738] [ 65.820516][ T4741] netlink: 60 bytes leftover after parsing attributes in process `syz.3.477'. [ 65.829715][ T4740] netlink: 60 bytes leftover after parsing attributes in process `syz.3.477'. [ 66.136485][ T4757] bond2: option lacp_rate: mode dependency failed, not supported in mode active-backup(1) [ 66.208329][ T4757] bond2 (unregistering): Released all slaves [ 66.330438][ T4769] capability: warning: `syz.4.486' uses deprecated v2 capabilities in a way that may be insecure [ 66.430477][ T4779] FAULT_INJECTION: forcing a failure. [ 66.430477][ T4779] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 66.444059][ T4779] CPU: 0 UID: 0 PID: 4779 Comm: syz.4.490 Not tainted syzkaller #0 PREEMPT(voluntary) [ 66.444167][ T4779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 66.444210][ T4779] Call Trace: [ 66.444217][ T4779] [ 66.444225][ T4779] __dump_stack+0x1d/0x30 [ 66.444247][ T4779] dump_stack_lvl+0xe8/0x140 [ 66.444265][ T4779] dump_stack+0x15/0x1b [ 66.444289][ T4779] should_fail_ex+0x265/0x280 [ 66.444330][ T4779] should_fail+0xb/0x20 [ 66.444380][ T4779] should_fail_usercopy+0x1a/0x20 [ 66.444407][ T4779] _copy_to_user+0x20/0xa0 [ 66.444439][ T4779] simple_read_from_buffer+0xb5/0x130 [ 66.444547][ T4779] proc_fail_nth_read+0x10e/0x150 [ 66.444587][ T4779] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 66.444685][ T4779] vfs_read+0x1a8/0x770 [ 66.444706][ T4779] ? __rcu_read_unlock+0x4f/0x70 [ 66.444735][ T4779] ? __fget_files+0x184/0x1c0 [ 66.444777][ T4779] ksys_read+0xda/0x1a0 [ 66.444808][ T4779] __x64_sys_read+0x40/0x50 [ 66.444899][ T4779] x64_sys_call+0x27c0/0x3000 [ 66.444927][ T4779] do_syscall_64+0xd2/0x200 [ 66.444954][ T4779] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 66.444981][ T4779] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 66.445001][ T4779] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 66.445033][ T4779] RIP: 0033:0x7fd79fb3d8dc [ 66.445052][ T4779] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 66.445075][ T4779] RSP: 002b:00007fd79e5a7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 66.445094][ T4779] RAX: ffffffffffffffda RBX: 00007fd79fd95fa0 RCX: 00007fd79fb3d8dc [ 66.445106][ T4779] RDX: 000000000000000f RSI: 00007fd79e5a70a0 RDI: 0000000000000003 [ 66.445161][ T4779] RBP: 00007fd79e5a7090 R08: 0000000000000000 R09: 0000000000000000 [ 66.445177][ T4779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 66.445189][ T4779] R13: 00007fd79fd96038 R14: 00007fd79fd95fa0 R15: 00007ffdc54155e8 [ 66.445206][ T4779] [ 66.880817][ T4801] netlink: 60 bytes leftover after parsing attributes in process `syz.1.495'. [ 66.890500][ T4792] netlink: 60 bytes leftover after parsing attributes in process `syz.1.495'. [ 67.123660][ T4817] FAULT_INJECTION: forcing a failure. [ 67.123660][ T4817] name failslab, interval 1, probability 0, space 0, times 0 [ 67.136841][ T4817] CPU: 0 UID: 0 PID: 4817 Comm: syz.4.503 Not tainted syzkaller #0 PREEMPT(voluntary) [ 67.136872][ T4817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 67.136892][ T4817] Call Trace: [ 67.136965][ T4817] [ 67.136975][ T4817] __dump_stack+0x1d/0x30 [ 67.137004][ T4817] dump_stack_lvl+0xe8/0x140 [ 67.137031][ T4817] dump_stack+0x15/0x1b [ 67.137055][ T4817] should_fail_ex+0x265/0x280 [ 67.137169][ T4817] should_failslab+0x8c/0xb0 [ 67.137206][ T4817] kmem_cache_alloc_noprof+0x50/0x480 [ 67.137242][ T4817] ? audit_log_start+0x342/0x720 [ 67.137270][ T4817] audit_log_start+0x342/0x720 [ 67.137296][ T4817] ? kstrtouint+0x76/0xc0 [ 67.137382][ T4817] audit_seccomp+0x48/0x100 [ 67.137412][ T4817] ? __seccomp_filter+0x82d/0x1250 [ 67.137516][ T4817] __seccomp_filter+0x83e/0x1250 [ 67.137659][ T4817] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 67.137695][ T4817] ? vfs_write+0x7e8/0x960 [ 67.137759][ T4817] ? __rcu_read_unlock+0x4f/0x70 [ 67.137842][ T4817] ? __fget_files+0x184/0x1c0 [ 67.137926][ T4817] __secure_computing+0x82/0x150 [ 67.137960][ T4817] syscall_trace_enter+0xcf/0x1e0 [ 67.137987][ T4817] do_syscall_64+0xac/0x200 [ 67.138075][ T4817] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 67.138111][ T4817] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 67.138166][ T4817] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 67.138196][ T4817] RIP: 0033:0x7fd79fb3eec9 [ 67.138214][ T4817] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 67.138232][ T4817] RSP: 002b:00007fd79e5a7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 67.138252][ T4817] RAX: ffffffffffffffda RBX: 00007fd79fd95fa0 RCX: 00007fd79fb3eec9 [ 67.138270][ T4817] RDX: 0000200000000040 RSI: 0000200000000000 RDI: 0000000000000000 [ 67.138311][ T4817] RBP: 00007fd79e5a7090 R08: 0000000000000000 R09: 0000000000000000 [ 67.138328][ T4817] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000001 [ 67.138383][ T4817] R13: 00007fd79fd96038 R14: 00007fd79fd95fa0 R15: 00007ffdc54155e8 [ 67.138407][ T4817] [ 67.442559][ T4822] FAULT_INJECTION: forcing a failure. [ 67.442559][ T4822] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 67.456482][ T4822] CPU: 1 UID: 0 PID: 4822 Comm: syz.3.506 Not tainted syzkaller #0 PREEMPT(voluntary) [ 67.456548][ T4822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 67.456564][ T4822] Call Trace: [ 67.456571][ T4822] [ 67.456582][ T4822] __dump_stack+0x1d/0x30 [ 67.456616][ T4822] dump_stack_lvl+0xe8/0x140 [ 67.456637][ T4822] dump_stack+0x15/0x1b [ 67.456682][ T4822] should_fail_ex+0x265/0x280 [ 67.456726][ T4822] should_fail+0xb/0x20 [ 67.456766][ T4822] should_fail_usercopy+0x1a/0x20 [ 67.456794][ T4822] _copy_from_user+0x1c/0xb0 [ 67.456903][ T4822] kstrtouint_from_user+0x69/0xf0 [ 67.456950][ T4822] ? 0xffffffff81000000 [ 67.456965][ T4822] ? selinux_file_permission+0x1e4/0x320 [ 67.457074][ T4822] proc_fail_nth_write+0x50/0x160 [ 67.457107][ T4822] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 67.457136][ T4822] vfs_write+0x269/0x960 [ 67.457163][ T4822] ? vfs_read+0x4e6/0x770 [ 67.457188][ T4822] ? __rcu_read_unlock+0x4f/0x70 [ 67.457220][ T4822] ? __fget_files+0x184/0x1c0 [ 67.457254][ T4822] ksys_write+0xda/0x1a0 [ 67.457281][ T4822] __x64_sys_write+0x40/0x50 [ 67.457309][ T4822] x64_sys_call+0x2802/0x3000 [ 67.457336][ T4822] do_syscall_64+0xd2/0x200 [ 67.457365][ T4822] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 67.457464][ T4822] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 67.457489][ T4822] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 67.457510][ T4822] RIP: 0033:0x7fb546fad97f [ 67.457525][ T4822] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 67.457612][ T4822] RSP: 002b:00007fb545a0f030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 67.457632][ T4822] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb546fad97f [ 67.457646][ T4822] RDX: 0000000000000001 RSI: 00007fb545a0f0a0 RDI: 0000000000000003 [ 67.457658][ T4822] RBP: 00007fb545a0f090 R08: 0000000000000000 R09: 0000000000000000 [ 67.457716][ T4822] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 67.457733][ T4822] R13: 00007fb547206038 R14: 00007fb547205fa0 R15: 00007ffdddf97278 [ 67.457757][ T4822] [ 67.919768][ T4851] FAULT_INJECTION: forcing a failure. [ 67.919768][ T4851] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 67.933122][ T4851] CPU: 1 UID: 0 PID: 4851 Comm: syz.3.519 Not tainted syzkaller #0 PREEMPT(voluntary) [ 67.933158][ T4851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 67.933175][ T4851] Call Trace: [ 67.933184][ T4851] [ 67.933195][ T4851] __dump_stack+0x1d/0x30 [ 67.933220][ T4851] dump_stack_lvl+0xe8/0x140 [ 67.933323][ T4851] dump_stack+0x15/0x1b [ 67.933343][ T4851] should_fail_ex+0x265/0x280 [ 67.933429][ T4851] should_fail+0xb/0x20 [ 67.933460][ T4851] should_fail_usercopy+0x1a/0x20 [ 67.933545][ T4851] _copy_from_user+0x1c/0xb0 [ 67.933593][ T4851] kstrtouint_from_user+0x69/0xf0 [ 67.933711][ T4851] ? 0xffffffff81000000 [ 67.933729][ T4851] ? selinux_file_permission+0x1e4/0x320 [ 67.933834][ T4851] proc_fail_nth_write+0x50/0x160 [ 67.933934][ T4851] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 67.933981][ T4851] vfs_write+0x269/0x960 [ 67.934009][ T4851] ? vfs_read+0x4e6/0x770 [ 67.934036][ T4851] ? __rcu_read_unlock+0x4f/0x70 [ 67.934068][ T4851] ? __fget_files+0x184/0x1c0 [ 67.934170][ T4851] ksys_write+0xda/0x1a0 [ 67.934208][ T4851] __x64_sys_write+0x40/0x50 [ 67.934253][ T4851] x64_sys_call+0x2802/0x3000 [ 67.934281][ T4851] do_syscall_64+0xd2/0x200 [ 67.934312][ T4851] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 67.934347][ T4851] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 67.934437][ T4851] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 67.934460][ T4851] RIP: 0033:0x7fb546fad97f [ 67.934475][ T4851] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 67.934498][ T4851] RSP: 002b:00007fb545a0f030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 67.934524][ T4851] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb546fad97f [ 67.934536][ T4851] RDX: 0000000000000001 RSI: 00007fb545a0f0a0 RDI: 0000000000000003 [ 67.934548][ T4851] RBP: 00007fb545a0f090 R08: 0000000000000000 R09: 0000000000000000 [ 67.934699][ T4851] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 67.934714][ T4851] R13: 00007fb547206038 R14: 00007fb547205fa0 R15: 00007ffdddf97278 [ 67.934738][ T4851] [ 68.245991][ T4867] netlink: 60 bytes leftover after parsing attributes in process `syz.3.521'. [ 68.257876][ T4864] netlink: 60 bytes leftover after parsing attributes in process `syz.3.521'. [ 68.401491][ T29] kauditd_printk_skb: 14642 callbacks suppressed [ 68.401544][ T29] audit: type=1400 audit(1759978974.562:28370): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 68.460475][ T4866] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(5) [ 68.467138][ T4866] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 68.474927][ T4866] vhci_hcd vhci_hcd.0: Device attached [ 68.491536][ T3042] audit: audit_backlog=65 > audit_backlog_limit=64 [ 68.498112][ T3042] audit: audit_lost=4388 audit_rate_limit=0 audit_backlog_limit=64 [ 68.506326][ T3042] audit: backlog limit exceeded [ 68.514138][ T29] audit: type=1400 audit(1759978974.602:28371): avc: denied { map_create } for pid=4863 comm="syz.3.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 68.533907][ T29] audit: type=1400 audit(1759978974.602:28372): avc: denied { prog_load } for pid=4863 comm="syz.3.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 68.556184][ T29] audit: type=1400 audit(1759978974.602:28373): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 68.577773][ T29] audit: type=1400 audit(1759978974.602:28374): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 68.593205][ T4884] audit: audit_backlog=65 > audit_backlog_limit=64 [ 68.599550][ T29] audit: type=1400 audit(1759978974.602:28375): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 68.654703][ T4888] FAULT_INJECTION: forcing a failure. [ 68.654703][ T4888] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 68.667962][ T4888] CPU: 0 UID: 0 PID: 4888 Comm: syz.1.527 Not tainted syzkaller #0 PREEMPT(voluntary) [ 68.667993][ T4888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 68.668090][ T4888] Call Trace: [ 68.668097][ T4888] [ 68.668106][ T4888] __dump_stack+0x1d/0x30 [ 68.668134][ T4888] dump_stack_lvl+0xe8/0x140 [ 68.668155][ T4888] dump_stack+0x15/0x1b [ 68.668178][ T4888] should_fail_ex+0x265/0x280 [ 68.668224][ T4888] should_fail+0xb/0x20 [ 68.668284][ T4888] should_fail_usercopy+0x1a/0x20 [ 68.668304][ T4888] _copy_to_user+0x20/0xa0 [ 68.668337][ T4888] simple_read_from_buffer+0xb5/0x130 [ 68.668366][ T4888] proc_fail_nth_read+0x10e/0x150 [ 68.668421][ T4888] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 68.668456][ T4888] vfs_read+0x1a8/0x770 [ 68.668482][ T4888] ? __rcu_read_unlock+0x4f/0x70 [ 68.668512][ T4888] ? __fget_files+0x184/0x1c0 [ 68.668606][ T4888] ksys_read+0xda/0x1a0 [ 68.668637][ T4888] __x64_sys_read+0x40/0x50 [ 68.668668][ T4888] x64_sys_call+0x27c0/0x3000 [ 68.668697][ T4888] do_syscall_64+0xd2/0x200 [ 68.668765][ T4888] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 68.668865][ T4888] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 68.668910][ T4888] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 68.668939][ T4888] RIP: 0033:0x7f0a9f87d8dc [ 68.668960][ T4888] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 68.668981][ T4888] RSP: 002b:00007f0a9e2df030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 68.668999][ T4888] RAX: ffffffffffffffda RBX: 00007f0a9fad5fa0 RCX: 00007f0a9f87d8dc [ 68.669012][ T4888] RDX: 000000000000000f RSI: 00007f0a9e2df0a0 RDI: 0000000000000003 [ 68.669057][ T4888] RBP: 00007f0a9e2df090 R08: 0000000000000000 R09: 0000000000000000 [ 68.669074][ T4888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 68.669170][ T4888] R13: 00007f0a9fad6038 R14: 00007f0a9fad5fa0 R15: 00007ffe043e4358 [ 68.669194][ T4888] [ 68.740694][ T3393] vhci_hcd: vhci_device speed not set [ 68.961070][ T4874] vhci_hcd: connection closed [ 68.973700][ T4893] FAULT_INJECTION: forcing a failure. [ 68.973700][ T4893] name failslab, interval 1, probability 0, space 0, times 0 [ 68.981718][ T411] vhci_hcd: stop threads [ 68.992045][ T4893] CPU: 0 UID: 0 PID: 4893 Comm: syz.3.530 Not tainted syzkaller #0 PREEMPT(voluntary) [ 68.992085][ T4893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 68.992103][ T4893] Call Trace: [ 68.992110][ T4893] [ 68.992121][ T4893] __dump_stack+0x1d/0x30 [ 68.992150][ T4893] dump_stack_lvl+0xe8/0x140 [ 68.992178][ T4893] dump_stack+0x15/0x1b [ 68.992274][ T4893] should_fail_ex+0x265/0x280 [ 68.992322][ T4893] should_failslab+0x8c/0xb0 [ 68.992423][ T4893] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 68.992463][ T4893] ? __alloc_skb+0x101/0x320 [ 68.992497][ T4893] __alloc_skb+0x101/0x320 [ 68.992531][ T4893] inet_netconf_notify_devconf+0x173/0x230 [ 68.992719][ T4893] inetdev_event+0x743/0xc10 [ 68.992756][ T4893] ? __pfx_ib_netdevice_event+0x10/0x10 [ 68.992788][ T4893] ? ib_netdevice_event+0x186/0x5f0 [ 68.992868][ T4893] ? __pfx_inetdev_event+0x10/0x10 [ 68.992905][ T4893] raw_notifier_call_chain+0x6f/0x1b0 [ 68.992938][ T4893] ? call_netdevice_notifiers_info+0x9c/0x100 [ 68.993044][ T4893] call_netdevice_notifiers_info+0xae/0x100 [ 68.993094][ T4893] unregister_netdevice_many_notify+0xda9/0x15d0 [ 68.993177][ T4893] unregister_netdevice_queue+0x1f5/0x220 [ 68.993222][ T4893] ip6_tnl_siocdevprivate+0x2e0/0x920 [ 68.993280][ T4893] dev_ifsioc+0x8f8/0xaa0 [ 68.993401][ T4893] dev_ioctl+0x78d/0x960 [ 68.993453][ T4893] sock_ioctl+0x593/0x610 [ 68.993497][ T4893] ? __pfx_sock_ioctl+0x10/0x10 [ 68.993588][ T4893] __se_sys_ioctl+0xcb/0x140 [ 68.993641][ T4893] __x64_sys_ioctl+0x43/0x50 [ 68.993687][ T4893] x64_sys_call+0x1816/0x3000 [ 68.993717][ T4893] do_syscall_64+0xd2/0x200 [ 68.993749][ T4893] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 68.993798][ T4893] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 68.993826][ T4893] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 68.993856][ T4893] RIP: 0033:0x7fb546faeec9 [ 68.993877][ T4893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 68.993902][ T4893] RSP: 002b:00007fb545a0f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 68.993986][ T4893] RAX: ffffffffffffffda RBX: 00007fb547205fa0 RCX: 00007fb546faeec9 [ 68.994003][ T4893] RDX: 0000200000000680 RSI: 00000000000089f2 RDI: 0000000000000003 [ 68.994020][ T4893] RBP: 00007fb545a0f090 R08: 0000000000000000 R09: 0000000000000000 [ 68.994098][ T4893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 68.994115][ T4893] R13: 00007fb547206038 R14: 00007fb547205fa0 R15: 00007ffdddf97278 [ 68.994140][ T4893] [ 69.255724][ T411] vhci_hcd: release socket [ 69.260203][ T411] vhci_hcd: disconnect device [ 69.390193][ T3393] usb 5-1: new full-speed USB device number 2 using vhci_hcd [ 69.397932][ T3393] usb 5-1: enqueue for inactive port 0 [ 69.404423][ T3393] usb 5-1: enqueue for inactive port 0 [ 69.411440][ T3393] usb 5-1: enqueue for inactive port 0 [ 69.480188][ T3393] vhci_hcd: vhci_device speed not set [ 69.747472][ T4916] netlink: 4 bytes leftover after parsing attributes in process `syz.3.538'. [ 69.898201][ T4919] FAULT_INJECTION: forcing a failure. [ 69.898201][ T4919] name failslab, interval 1, probability 0, space 0, times 0 [ 69.911193][ T4919] CPU: 1 UID: 0 PID: 4919 Comm: syz.1.541 Not tainted syzkaller #0 PREEMPT(voluntary) [ 69.911229][ T4919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 69.911324][ T4919] Call Trace: [ 69.911333][ T4919] [ 69.911420][ T4919] __dump_stack+0x1d/0x30 [ 69.911449][ T4919] dump_stack_lvl+0xe8/0x140 [ 69.911474][ T4919] dump_stack+0x15/0x1b [ 69.911496][ T4919] should_fail_ex+0x265/0x280 [ 69.911589][ T4919] should_failslab+0x8c/0xb0 [ 69.911623][ T4919] kmem_cache_alloc_noprof+0x50/0x480 [ 69.911658][ T4919] ? audit_log_start+0x342/0x720 [ 69.911754][ T4919] audit_log_start+0x342/0x720 [ 69.911778][ T4919] ? kstrtouint+0x76/0xc0 [ 69.911820][ T4919] audit_seccomp+0x48/0x100 [ 69.911968][ T4919] ? __seccomp_filter+0x82d/0x1250 [ 69.912002][ T4919] __seccomp_filter+0x83e/0x1250 [ 69.912038][ T4919] ? vfs_write+0x7e8/0x960 [ 69.912096][ T4919] __secure_computing+0x82/0x150 [ 69.912129][ T4919] syscall_trace_enter+0xcf/0x1e0 [ 69.912166][ T4919] do_syscall_64+0xac/0x200 [ 69.912210][ T4919] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 69.912246][ T4919] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 69.912273][ T4919] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 69.912302][ T4919] RIP: 0033:0x7f0a9f87eec9 [ 69.912321][ T4919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 69.912412][ T4919] RSP: 002b:00007f0a9e2df038 EFLAGS: 00000246 ORIG_RAX: 0000000000000071 [ 69.912438][ T4919] RAX: ffffffffffffffda RBX: 00007f0a9fad5fa0 RCX: 00007f0a9f87eec9 [ 69.912454][ T4919] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000ee01 [ 69.912470][ T4919] RBP: 00007f0a9e2df090 R08: 0000000000000000 R09: 0000000000000000 [ 69.912496][ T4919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 69.912512][ T4919] R13: 00007f0a9fad6038 R14: 00007f0a9fad5fa0 R15: 00007ffe043e4358 [ 69.912535][ T4919] [ 70.548801][ T4946] FAULT_INJECTION: forcing a failure. [ 70.548801][ T4946] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 70.562402][ T4946] CPU: 0 UID: 0 PID: 4946 Comm: syz.3.551 Not tainted syzkaller #0 PREEMPT(voluntary) [ 70.562434][ T4946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 70.562475][ T4946] Call Trace: [ 70.562481][ T4946] [ 70.562489][ T4946] __dump_stack+0x1d/0x30 [ 70.562515][ T4946] dump_stack_lvl+0xe8/0x140 [ 70.562535][ T4946] dump_stack+0x15/0x1b [ 70.562615][ T4946] should_fail_ex+0x265/0x280 [ 70.562723][ T4946] should_fail+0xb/0x20 [ 70.562768][ T4946] should_fail_usercopy+0x1a/0x20 [ 70.562789][ T4946] _copy_to_user+0x20/0xa0 [ 70.562821][ T4946] simple_read_from_buffer+0xb5/0x130 [ 70.562919][ T4946] proc_fail_nth_read+0x10e/0x150 [ 70.562958][ T4946] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 70.562997][ T4946] vfs_read+0x1a8/0x770 [ 70.563053][ T4946] ? __rcu_read_unlock+0x4f/0x70 [ 70.563077][ T4946] ? __fget_files+0x184/0x1c0 [ 70.563112][ T4946] ksys_read+0xda/0x1a0 [ 70.563143][ T4946] __x64_sys_read+0x40/0x50 [ 70.563198][ T4946] x64_sys_call+0x27c0/0x3000 [ 70.563275][ T4946] do_syscall_64+0xd2/0x200 [ 70.563371][ T4946] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 70.563403][ T4946] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 70.563507][ T4946] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 70.563533][ T4946] RIP: 0033:0x7fb546fad8dc [ 70.563596][ T4946] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 70.563614][ T4946] RSP: 002b:00007fb545a0f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 70.563634][ T4946] RAX: ffffffffffffffda RBX: 00007fb547205fa0 RCX: 00007fb546fad8dc [ 70.563679][ T4946] RDX: 000000000000000f RSI: 00007fb545a0f0a0 RDI: 0000000000000003 [ 70.563691][ T4946] RBP: 00007fb545a0f090 R08: 0000000000000000 R09: 0000000000000000 [ 70.563703][ T4946] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 70.563720][ T4946] R13: 00007fb547206038 R14: 00007fb547205fa0 R15: 00007ffdddf97278 [ 70.563743][ T4946] [ 70.968025][ T4957] FAULT_INJECTION: forcing a failure. [ 70.968025][ T4957] name failslab, interval 1, probability 0, space 0, times 0 [ 70.980818][ T4957] CPU: 1 UID: 0 PID: 4957 Comm: syz.4.557 Not tainted syzkaller #0 PREEMPT(voluntary) [ 70.980854][ T4957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 70.980868][ T4957] Call Trace: [ 70.980877][ T4957] [ 70.980887][ T4957] __dump_stack+0x1d/0x30 [ 70.980915][ T4957] dump_stack_lvl+0xe8/0x140 [ 70.981006][ T4957] dump_stack+0x15/0x1b [ 70.981023][ T4957] should_fail_ex+0x265/0x280 [ 70.981061][ T4957] should_failslab+0x8c/0xb0 [ 70.981096][ T4957] __kmalloc_noprof+0xa5/0x570 [ 70.981152][ T4957] ? sel_write_relabel+0x177/0x360 [ 70.981190][ T4957] sel_write_relabel+0x177/0x360 [ 70.981253][ T4957] selinux_transaction_write+0xc3/0x110 [ 70.981295][ T4957] ? __pfx_selinux_transaction_write+0x10/0x10 [ 70.981433][ T4957] vfs_write+0x269/0x960 [ 70.981462][ T4957] ? __rcu_read_unlock+0x4f/0x70 [ 70.981493][ T4957] ? __fget_files+0x184/0x1c0 [ 70.981519][ T4957] ksys_write+0xda/0x1a0 [ 70.981606][ T4957] __x64_sys_write+0x40/0x50 [ 70.981636][ T4957] x64_sys_call+0x2802/0x3000 [ 70.981660][ T4957] do_syscall_64+0xd2/0x200 [ 70.981727][ T4957] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 70.981763][ T4957] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 70.981791][ T4957] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 70.981853][ T4957] RIP: 0033:0x7fd79fb3eec9 [ 70.981868][ T4957] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 70.981888][ T4957] RSP: 002b:00007fd79e5a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 70.981914][ T4957] RAX: ffffffffffffffda RBX: 00007fd79fd95fa0 RCX: 00007fd79fb3eec9 [ 70.981931][ T4957] RDX: 0000000000000056 RSI: 0000200000001a80 RDI: 0000000000000003 [ 70.981998][ T4957] RBP: 00007fd79e5a7090 R08: 0000000000000000 R09: 0000000000000000 [ 70.982013][ T4957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 70.982029][ T4957] R13: 00007fd79fd96038 R14: 00007fd79fd95fa0 R15: 00007ffdc54155e8 [ 70.982051][ T4957] [ 71.206577][ T58] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 71.272711][ T4963] ================================================================== [ 71.280891][ T4963] BUG: KCSAN: data-race in __lru_add_drain_all / folios_put_refs [ 71.288948][ T4963] [ 71.291293][ T4963] write to 0xffff888237c25ee8 of 1 bytes by task 4959 on cpu 0: [ 71.298988][ T4963] folios_put_refs+0x285/0x2d0 [ 71.303919][ T4963] folio_batch_move_lru+0x24b/0x280 [ 71.309180][ T4963] folio_add_lru+0x14a/0x1f0 [ 71.313818][ T4963] folio_add_lru_vma+0x49/0x70 [ 71.318627][ T4963] set_pte_range+0x235/0x4f0 [ 71.323244][ T4963] finish_fault+0x855/0xa00 [ 71.327776][ T4963] handle_mm_fault+0x18fe/0x2be0 [ 71.332744][ T4963] do_user_addr_fault+0x630/0x1080 [ 71.337965][ T4963] exc_page_fault+0x62/0xa0 [ 71.342593][ T4963] asm_exc_page_fault+0x26/0x30 [ 71.347465][ T4963] [ 71.349854][ T4963] read to 0xffff888237c25ee8 of 1 bytes by task 4963 on cpu 1: [ 71.357529][ T4963] __lru_add_drain_all+0x17e/0x450 [ 71.362774][ T4963] lru_cache_disable+0x1f/0x30 [ 71.367672][ T4963] __se_sys_mbind+0x496/0xac0 [ 71.372473][ T4963] __x64_sys_mbind+0x78/0x90 [ 71.377362][ T4963] x64_sys_call+0x2936/0x3000 [ 71.382062][ T4963] do_syscall_64+0xd2/0x200 [ 71.386766][ T4963] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 71.392776][ T4963] [ 71.395130][ T4963] value changed: 0x01 -> 0x00 [ 71.400001][ T4963] [ 71.402328][ T4963] Reported by Kernel Concurrency Sanitizer on: [ 71.408670][ T4963] CPU: 1 UID: 0 PID: 4963 Comm: syz.4.560 Not tainted syzkaller #0 PREEMPT(voluntary) [ 71.418505][ T4963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 71.428700][ T4963] ================================================================== [ 71.460847][ T58] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 71.513227][ T58] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 71.584007][ T58] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 71.672082][ T58] bridge_slave_1: left allmulticast mode [ 71.677833][ T58] bridge_slave_1: left promiscuous mode [ 71.683616][ T58] bridge0: port 2(bridge_slave_1) entered disabled state [ 71.692317][ T58] bridge_slave_0: left allmulticast mode [ 71.698291][ T58] bridge_slave_0: left promiscuous mode [ 71.704322][ T58] bridge0: port 1(bridge_slave_0) entered disabled state [ 71.911347][ T58] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 71.925477][ T58] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 71.935524][ T58] bond0 (unregistering): Released all slaves [ 71.984107][ T58] hsr_slave_0: left promiscuous mode [ 72.001265][ T58] hsr_slave_1: left promiscuous mode [ 72.007085][ T58] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 72.014638][ T58] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 72.051109][ T58] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 72.058583][ T58] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 72.080616][ T58] veth1_macvtap: left allmulticast mode [ 72.086365][ T58] veth1_macvtap: left promiscuous mode [ 72.100635][ T58] veth0_macvtap: left promiscuous mode [ 72.106373][ T58] veth1_vlan: left promiscuous mode [ 72.111899][ T58] veth0_vlan: left promiscuous mode [ 72.184194][ T58] team0 (unregistering): Port device team_slave_1 removed [ 72.195812][ T58] team0 (unregistering): Port device team_slave_0 removed [ 72.465982][ T58] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 72.504168][ T58] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 72.543097][ T58] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 72.583508][ T58] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 72.640897][ T58] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 72.683003][ T58] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 72.734189][ T58] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 72.773410][ T58] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 72.826082][ T58] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 72.863408][ T58] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 72.912938][ T58] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 72.963222][ T58] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 73.043127][ T58] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 73.083772][ T58] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 73.133429][ T58] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 73.183072][ T58] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 73.255575][ T58] bridge_slave_1: left allmulticast mode [ 73.261425][ T58] bridge_slave_1: left promiscuous mode [ 73.267220][ T58] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.275906][ T58] bridge_slave_0: left allmulticast mode [ 73.281730][ T58] bridge_slave_0: left promiscuous mode [ 73.287672][ T58] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.296411][ T58] bridge_slave_1: left allmulticast mode [ 73.302249][ T58] bridge_slave_1: left promiscuous mode [ 73.308414][ T58] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.316488][ T58] bridge_slave_0: left allmulticast mode [ 73.322861][ T58] bridge_slave_0: left promiscuous mode [ 73.328721][ T58] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.337675][ T58] bridge_slave_1: left allmulticast mode [ 73.343448][ T58] bridge_slave_1: left promiscuous mode [ 73.349185][ T58] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.357644][ T58] bridge_slave_0: left allmulticast mode [ 73.363945][ T58] bridge_slave_0: left promiscuous mode [ 73.369796][ T58] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.378576][ T58] bridge_slave_1: left allmulticast mode [ 73.384370][ T58] bridge_slave_1: left promiscuous mode [ 73.390546][ T58] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.398980][ T58] bridge_slave_0: left allmulticast mode [ 73.404755][ T58] bridge_slave_0: left promiscuous mode [ 73.410217][ T29] kauditd_printk_skb: 17783 callbacks suppressed [ 73.410238][ T29] audit: type=1400 audit(1759978979.572:43200): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 73.410687][ T58] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.417104][ T29] audit: type=1400 audit(1759978979.572:43201): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 73.453026][ T3042] audit: audit_backlog=65 > audit_backlog_limit=64 [ 73.468345][ T29] audit: type=1400 audit(1759978979.602:43202): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 73.474985][ T3042] audit: audit_lost=5376 audit_rate_limit=0 audit_backlog_limit=64 [ 73.475005][ T3042] audit: backlog limit exceeded [ 73.496667][ T29] audit: type=1400 audit(1759978979.602:43203): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 73.510174][ T3042] audit: audit_backlog=65 > audit_backlog_limit=64 [ 73.531334][ T29] audit: type=1400 audit(1759978979.602:43204): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 73.537929][ T3042] audit: audit_lost=5377 audit_rate_limit=0 audit_backlog_limit=64 [ 73.712886][ T58] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 73.723835][ T58] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 73.733982][ T58] bond0 (unregistering): Released all slaves [ 73.791706][ T58] bond1 (unregistering): (slave bridge1): Releasing active interface [ 73.832650][ T58] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 73.843285][ T58] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 73.853176][ T58] bond0 (unregistering): Released all slaves [ 73.863527][ T58] bond1 (unregistering): Released all slaves [ 73.942498][ T58] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 73.953394][ T58] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 73.963256][ T58] bond0 (unregistering): Released all slaves [ 74.032675][ T58] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 74.043089][ T58] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 74.053158][ T58] bond0 (unregistering): Released all slaves [ 74.063245][ T58] bond1 (unregistering): Released all slaves [ 74.120711][ T58] hsr_slave_0: left promiscuous mode [ 74.126845][ T58] hsr_slave_1: left promiscuous mode [ 74.132949][ T58] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 74.140618][ T58] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 74.149126][ T58] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 74.156744][ T58] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 74.166689][ T58] hsr_slave_0: left promiscuous mode [ 74.172648][ T58] hsr_slave_1: left promiscuous mode [ 74.178569][ T58] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 74.186141][ T58] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 74.202293][ T58] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 74.209762][ T58] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 74.217916][ T58] hsr_slave_0: left promiscuous mode [ 74.223742][ T58] hsr_slave_1: left promiscuous mode [ 74.229484][ T58] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 74.237091][ T58] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 74.244768][ T58] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 74.252258][ T58] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 74.261848][ T58] hsr_slave_0: left promiscuous mode [ 74.267731][ T58] hsr_slave_1: left promiscuous mode [ 74.273506][ T58] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 74.281043][ T58] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 74.288862][ T58] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 74.296310][ T58] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 74.316375][ T58] veth1_macvtap: left promiscuous mode [ 74.322156][ T58] veth0_macvtap: left promiscuous mode [ 74.328067][ T58] veth1_vlan: left promiscuous mode [ 74.333767][ T58] veth0_vlan: left promiscuous mode [ 74.339890][ T58] veth0_macvtap: left promiscuous mode [ 74.345499][ T58] veth1_vlan: left promiscuous mode [ 74.351062][ T58] veth0_vlan: left promiscuous mode [ 74.357144][ T58] veth0_macvtap: left promiscuous mode [ 74.363251][ T58] veth1_macvtap: left promiscuous mode [ 74.369095][ T58] veth0_macvtap: left promiscuous mode [ 74.374793][ T58] veth1_vlan: left promiscuous mode [ 74.380415][ T58] veth0_vlan: left promiscuous mode [ 74.568035][ T58] team0 (unregistering): Port device team_slave_1 removed [ 74.578564][ T58] team0 (unregistering): Port device team_slave_0 removed [ 74.643757][ T58] team0 (unregistering): Port device team_slave_1 removed [ 74.654426][ T58] team0 (unregistering): Port device team_slave_0 removed [ 74.705855][ T58] team0 (unregistering): Port device team_slave_1 removed [ 74.718468][ T58] team0 (unregistering): Port device team_slave_0 removed [ 74.781316][ T58] team0 (unregistering): Port device team_slave_1 removed [ 74.792051][ T58] team0 (unregistering): Port device team_slave_0 removed [ 78.420285][ T29] kauditd_printk_skb: 26868 callbacks suppressed [ 78.420390][ T29] audit: type=1400 audit(1759978984.582:69943): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 78.432866][ T3042] audit: audit_backlog=65 > audit_backlog_limit=64 [ 78.448181][ T29] audit: type=1400 audit(1759978984.582:69944): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 78.454791][ T3042] audit: audit_lost=5421 audit_rate_limit=0 audit_backlog_limit=64 [ 78.475940][ T29] audit: type=1400 audit(1759978984.582:69945): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 78.484094][ T3042] audit: backlog limit exceeded [ 78.484722][ T3042] audit: audit_backlog=65 > audit_backlog_limit=64 [ 78.505730][ T29] audit: type=1400 audit(1759978984.582:69946): avc: denied { read } for pid=3042 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 78.510903][ T3042] audit: audit_lost=5422 audit_rate_limit=0 audit_backlog_limit=64 [ 78.510919][ T3042] audit: backlog limit exceeded