last executing test programs: 6.493240275s ago: executing program 1 (id=1143): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000005800)={0x18, 0xf, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000020000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f00000006c0)={"6ff1fa501884d511291fb3fbd7c86391", r3, 0x0, {0xa39, 0x4}, {0x2, 0x101}, 0xfffffffffffffffe, [0x2c, 0x2, 0x9, 0x5, 0xffffffffffffffbe, 0x101, 0x6, 0x8000, 0x9, 0x5, 0x4, 0xfffffffffffffff9, 0x10000, 0x5, 0xf25, 0x9]}) add_key(&(0x7f0000000280)='rxrpc\x00', 0x0, &(0x7f0000000100)="01000000020000000000006bb55a2a630bf7c045f94cd977", 0x18, 0xffffffffffffffff) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newqdisc={0x9c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x6c, 0x2, {{}, [@TCA_NETEM_LOSS={0x30, 0x2, 0x0, 0x1, [@NETEM_LOSS_GE={0x18}, @NETEM_LOSS_GI={0x18}]}, @TCA_NETEM_RATE={0x4, 0xd}, @TCA_NETEM_CORRUPT={0xc, 0x2}]}}}]}, 0x9c}}, 0x0) 5.488253325s ago: executing program 1 (id=1150): bpf$MAP_CREATE(0x0, &(0x7f0000004080)=ANY=[], 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=ANY=[], &(0x7f00000000c0)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00', r0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$smc(0x0, 0xffffffffffffffff) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x1, 0x800001, 0x0, 0x0, 0x0) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) mlock2(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') pread64(r3, &(0x7f0000000200)=""/102400, 0x19000, 0x1000000000) 3.813261737s ago: executing program 4 (id=1166): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x8, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000b00), 0x1, 0x55f, &(0x7f0000000580)="$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") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x11, 0x6, &(0x7f0000000580)=@framed={{0x18, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @initr0]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x45}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r1, 0x0, 0x200000000000006}, 0x18) r3 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x1, 0xffffffff, 0x0, 0x2, 0x3, 0x0}) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x9, 0x3, 0x3, 0xd1, 0x0, 0xc, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff8001, 0x4, @perf_bp={&(0x7f0000000080)}, 0x4808, 0xffffffff, 0x4, 0x1, 0x100000, 0x7, 0x2, 0x0, 0x5, 0x0, 0x1}, r4, 0x5, r2, 0xd5485419bc0689c1) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r3, &(0x7f0000000740)=@pppol2tpv3={0x18, 0x1, {0x3, r5, {0x2, 0x4e23, @broadcast}, 0x2, 0x0, 0x4}}, 0x2e) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x34, r6, 0x1, 0x1070bd0c, 0x4, {0x5}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0xaa8}, @L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x40811}, 0x20) 3.724169238s ago: executing program 4 (id=1167): gettid() r0 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xd, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043"], 0x0, 0x18, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000049c0)={0x3, 0xc, &(0x7f0000000340)=@framed={{0x18, 0x2, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0xe}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r4}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="19400000040000000800000000000000000000007148046279dda9211cff9f247d23d0da51096d197617433352819b0c0ae8e8567ae3e33378b0f1cb1875796e6f9b202b64c0ae7bb3aaf6e9aa802eb609734a9e64d5f41442b40aad7f14b2b1e60c6b5a82bbecbd6574766ea5f388f5c853d55d8b0cc8e3bee162a24ea0077bc358efdd1b3500d88fc1548f0754b57c803b638700b62a8bfb33f8c0437421f08a4e4fd0f02200ecb2497a68a58af846367832999b7e8029dafa038c82275641703ccd8a0cdb4be719f55d56c34800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, @perf_config_ext={0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) fcntl$setsig(r0, 0xa, 0x13) 3.549024862s ago: executing program 0 (id=1169): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000003c0)={'ip6_vti0\x00', &(0x7f0000000340)={'syztnl0\x00', 0x0, 0x4, 0x81, 0x0, 0x1, 0x24, @private2={0xfc, 0x2, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x37}, 0x7800, 0x7, 0x7f, 0xede}}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2400000070000100000000000000000007000000", @ANYRES32=r3, @ANYBLOB="0c000280060001"], 0x24}}, 0x0) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, &(0x7f0000000380)=0x20000, 0x4) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/5, 0x204000, 0x1000}, 0x20) r5 = socket$phonet(0x23, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000180)=0x20, 0x4) setsockopt$XDP_UMEM_FILL_RING(r4, 0x11b, 0x5, &(0x7f0000000040)=0x4000, 0x4) bind$xdp(r4, &(0x7f00000002c0)={0x2c, 0x4, r6, 0x30, r4}, 0x10) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000005a40)=ANY=[@ANYBLOB="b400000010000904000000000000000000002200", @ANYRES32=0x0, @ANYBLOB="fffffffed9526cfd8400128009000100766c616e000000007400028006000100000600000c000200367da1650e000000280003800c00010001800000002000000c000100a1000000c84200000c0001000800000008000000340004800c00010006000000ff0300000c00010004000000080000000c000100040000000200", @ANYRES32=r8, @ANYBLOB='\b\x00\n\x00', @ANYRESOCT], 0xb4}}, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket(0x1, 0x803, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x30, 0x10, 0x403, 0xfffffffc, 0x3f, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINK={0x8, 0x5, r12}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x30}, 0x1, 0x300000000000000, 0x0, 0x4004}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000480)={'syztnl0\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000004c0)={@private1, 0x0}, &(0x7f0000000500)=0x14) r14 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r14, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r14, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@newqdisc={0x38, 0x24, 0x3fe3aa0262d8c583, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, r15, {0x0, 0xffe0}, {0xffff, 0xffff}, {0x10, 0xe}}, [@qdisc_kind_options=@q_fq={{0x7}, {0xc, 0x2, [@TCA_FQ_FLOW_DEFAULT_RATE={0x8, 0x6, 0xffffffff}]}}]}, 0x38}}, 0x4048000) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000800)={&(0x7f0000000540)={0x290, 0x0, 0x20, 0x70bd25, 0x25dfdbfd, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x4}]}, 0x290}, 0x1, 0x0, 0x0, 0x4048000}, 0x20088004) r16 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r16, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="9000000010000305000000000000000000000700", @ANYRES32=0x0, @ANYBLOB="996e06004d4c0700540012800800010068737200480002800500030008000000050003000500000005000300fd00000008000200", @ANYRES32=r16, @ANYBLOB="080001"], 0x90}}, 0x0) 3.406399904s ago: executing program 0 (id=1174): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="18010000bc0000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r0, 0x0, 0x80000}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000080)}, 0x400, 0x0, 0x0, 0x0, 0x0, 0x1fffffff, 0x0, 0x0, 0x40, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) ioprio_set$pid(0x2, 0x0, 0x4007) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101842, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000fdffffff18110000", @ANYRES32, @ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x82, &(0x7f0000000000)=@assoc_value, &(0x7f00000001c0)=0x8) getsockopt$bt_sco_SCO_OPTIONS(r2, 0x11, 0x1, &(0x7f0000000500)=""/30, &(0x7f0000000680)=0x1e) kexec_load(0x3e00, 0x0, 0x0, 0x0) r6 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) ftruncate(r6, 0x2007ffc) sendfile(r6, r6, 0x0, 0x800000009) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32, @ANYRES32=r1, @ANYRES32=0x0, @ANYBLOB="f8c113aef68b0f7c5e7bbbf85ef25dcdc0adb865096eb937d0ac976a7897f29faba3e0f8515f6ddb54ef9cc11b0ba5f7350371cbcfcbe40e46c449b1bbd5de78a5386804b658a4037c3a0293e6c2a7ddab922b161b07281a20f8831ca0e57cfe65fa506405bdec8f6393e92a1c8ce5d9d925f6f371f4bdf344850d293753fb2c3e659390c956ea82c7435ed01a0901e93640bdced8c87496385f567f998ee27635c0faff48b5ce394fd2ab8356c7d98a1162253f6b8e533508fd9206cc3cc0b0a179219cd454850b4ea6ca37ad34e61041c293571374e345da9cf733cc3ff8abb8e0e91160dbd798bc59dc7fe443cbd18f6093a458049cbbdc", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r7, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xe, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="453cdb20b11733f3a03c5601c0a4428a63cb6c182cdbaf4567a0919674adf9f2ec0b76c82d2ae68675a580c727c42303627a232e6295efe7a6730ff78260c07dad0ce4d81c376ce11e27e660a25a5f9696ffc639fcd3e554dda412accbb79ebb4646fff00e19a1022a46eab322a5d0e7291d041614813b93384b9731d1e2", @ANYRES8, @ANYRES8=r8], &(0x7f0000000240)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa9) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x62181) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r9, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x1, 0x0, 'queue0\x00'}) r10 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0xa8c01) write$sndseq(r10, &(0x7f0000000080)=[{0x1e, 0x0, 0x8, 0xfd, @time={0x6, 0x9}, {}, {}, @result}], 0x1c) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000005c0)) 3.353949125s ago: executing program 2 (id=1176): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x4, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'macvlan1\x00', 0x0}) setsockopt$packet_int(r2, 0x107, 0x14, &(0x7f0000000200)=0x2, 0x4) sendto$packet(r2, &(0x7f00000000c0)="3f03fe7f37e9140006001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c153cfdf9435e3ffe46", 0xe955, 0x0, &(0x7f0000000540)={0xc9, 0x0, r3, 0x1, 0x0, 0x6, @multicast}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYBLOB="03000000010000000400"/28], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) 3.261228727s ago: executing program 2 (id=1178): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x8, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000b00), 0x1, 0x55f, &(0x7f0000000580)="$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") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x11, 0x6, &(0x7f0000000580)=@framed={{0x18, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @initr0]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x45}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r1, 0x0, 0x200000000000006}, 0x18) r3 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x1, 0xffffffff, 0x0, 0x2, 0x3, 0x0}) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x9, 0x3, 0x3, 0xd1, 0x0, 0xc, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff8001, 0x4, @perf_bp={&(0x7f0000000080)}, 0x4808, 0xffffffff, 0x4, 0x1, 0x100000, 0x7, 0x2, 0x0, 0x5, 0x0, 0x1}, r4, 0x5, r2, 0xd5485419bc0689c1) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r3, &(0x7f0000000740)=@pppol2tpv3={0x18, 0x1, {0x3, r5, {0x2, 0x4e23, @broadcast}, 0x2, 0x0, 0x4}}, 0x2e) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x34, r6, 0x1, 0x1070bd0c, 0x4, {0x5}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0xaa8}, @L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x40811}, 0x20) 3.242941388s ago: executing program 2 (id=1179): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="18010000bc0000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r0, 0x0, 0x80000}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000080)}, 0x400, 0x0, 0x0, 0x0, 0x0, 0x1fffffff, 0x0, 0x0, 0x40, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) ioprio_set$pid(0x2, 0x0, 0x4007) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101842, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000fdffffff18110000", @ANYRES32, @ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x82, &(0x7f0000000000)=@assoc_value, &(0x7f00000001c0)=0x8) getsockopt$bt_sco_SCO_OPTIONS(r2, 0x11, 0x1, &(0x7f0000000500)=""/30, &(0x7f0000000680)=0x1e) kexec_load(0x3e00, 0x0, 0x0, 0x0) r6 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) ftruncate(r6, 0x2007ffc) sendfile(r6, r6, 0x0, 0x800000009) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32, @ANYRES32=r1, @ANYRES32=0x0, @ANYBLOB="f8c113aef68b0f7c5e7bbbf85ef25dcdc0adb865096eb937d0ac976a7897f29faba3e0f8515f6ddb54ef9cc11b0ba5f7350371cbcfcbe40e46c449b1bbd5de78a5386804b658a4037c3a0293e6c2a7ddab922b161b07281a20f8831ca0e57cfe65fa506405bdec8f6393e92a1c8ce5d9d925f6f371f4bdf344850d293753fb2c3e659390c956ea82c7435ed01a0901e93640bdced8c87496385f567f998ee27635c0faff48b5ce394fd2ab8356c7d98a1162253f6b8e533508fd9206cc3cc0b0a179219cd454850b4ea6ca37ad34e61041c293571374e345da9cf733cc3ff8abb8e0e91160dbd798bc59dc7fe443cbd18f6093a458049cbbdc", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r7, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xe, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="453cdb20b11733f3a03c5601c0a4428a63cb6c182cdbaf4567a0919674adf9f2ec0b76c82d2ae68675a580c727c42303627a232e6295efe7a6730ff78260c07dad0ce4d81c376ce11e27e660a25a5f9696ffc639fcd3e554dda412accbb79ebb4646fff00e19a1022a46eab322a5d0e7291d041614813b93384b9731d1e2", @ANYRES8, @ANYRES8=r8], &(0x7f0000000240)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000880)='sched_switch\x00', r9}, 0x18) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x1, 0x0, 'queue0\x00'}) r10 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0xa8c01) write$sndseq(r10, &(0x7f0000000080)=[{0x1e, 0x0, 0x8, 0xfd, @time={0x6, 0x9}, {}, {}, @result}], 0x1c) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000005c0)) 2.918178534s ago: executing program 1 (id=1180): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000780)=[{0x200000000006, 0xf, 0x6, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) getpgrp(0x0) 2.57197546s ago: executing program 1 (id=1181): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0], 0x0, 0x8b, &(0x7f0000000240)=[{}], 0x8, 0x10, &(0x7f00000002c0), &(0x7f0000000340), 0x8, 0x33, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000000)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41100, 0x10, '\x00', r0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r1, 0x0, 0x1000000000000}, 0x18) r2 = syz_io_uring_setup(0x74d, &(0x7f0000000100)={0x0, 0x59c4, 0x8, 0x1000, 0x5cc}, &(0x7f0000000780), &(0x7f0000000080)) socket$key(0xf, 0x3, 0x2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3, 0x0, 0x1000}, 0x18) r4 = syz_open_dev$usbfs(&(0x7f0000000080), 0x74, 0x101301) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r7 = socket(0xa, 0x2400000001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r7, 0x29, 0x2a, &(0x7f0000034000)={0x3, {{0xa, 0x4e23, 0x3, @mcast2, 0x10000000}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r7, 0x29, 0x2a, &(0x7f00000003c0)={0x3, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r7, 0x29, 0x2e, &(0x7f0000000180)={0x4, {{0xa, 0x4e24, 0x3, @mcast1, 0x5}}, {{0xa, 0x4e21, 0x8b5f, @private1={0xfc, 0x1, '\x00', 0x1}, 0xe57}}}, 0x108) getsockopt$inet6_buf(r7, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000e5f000)=0x90) r8 = gettid() capset(&(0x7f0000000000)={0x19980330, r8}, &(0x7f0000000040)={0x4, 0x4, 0x5, 0x7, 0x2, 0x8}) prlimit64(r8, 0x5, &(0x7f0000000600)={0x7, 0x4}, &(0x7f0000000640)) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) socket$phonet(0x23, 0x2, 0x1) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001400)=@newtaction={0xe78, 0x30, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [{0xe64, 0x1, [@m_pedit={0xe60, 0x1, 0x0, 0x0, {{0xa}, {0xe34, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{0x101, 0x5c, 0x0, 0xb, 0x9}, 0x8, 0x7}, [{0x7, 0x8, 0xb6f8, 0x8, 0x101, 0x3}, {0x9, 0x6, 0x6, 0xfffffff7, 0xd, 0xed7}, {0xaabee86, 0x100, 0x4, 0x8, 0x8, 0xb6d}, {0x66, 0x80000000, 0xfffffffd, 0x2, 0x10000, 0x9}, {0x2, 0xfffffffc, 0x9, 0x1, 0x9}, {0x3, 0x8, 0x9, 0x400, 0x800, 0x939b}, {0xdc11, 0xfffffff9, 0x3ff, 0xfada, 0x401, 0x10000}, {0x15, 0x9, 0x7, 0x81, 0x7, 0x1}, {0x5, 0x1, 0x2, 0x80000001, 0xfff, 0x8}, {0xb73, 0x5, 0x3, 0xfffffff7, 0x0, 0xd}, {0xffffff80, 0x3, 0x1, 0x80000001, 0x4, 0x4}, {0x519, 0xf0, 0x66, 0x3, 0x5, 0xfffffff7}, {0x400, 0x200, 0x1ff, 0x3, 0x5, 0x5}, {0x3, 0x5, 0x1, 0x101, 0x200}, {0x4, 0x7, 0x1, 0x9, 0x7, 0x1}, {0x401, 0x433, 0x7, 0xffffff7f, 0x9, 0x7}, {0x10, 0x6, 0x9, 0x0, 0x5, 0x2}, {0x5, 0x1, 0x8, 0x3, 0x3, 0xfffffffc}, {0x0, 0x80000000, 0x2, 0xce6, 0x1ff, 0x2}, {0x1400, 0x2, 0x5, 0x3ff, 0xfffffffe, 0x8}, {0xa177, 0x8, 0x1, 0x7, 0x9, 0x8000}, {0xce0, 0x4, 0x1ff, 0xd7, 0x7, 0x6}, {0xffff4234, 0x4f9, 0xfffffff9, 0x1, 0xc, 0xffffffdd}, {0x81, 0x2c, 0xc13, 0x7d1, 0x4, 0x6}, {0x5, 0x7, 0x7, 0x1000, 0x2, 0x7f}, {0x400, 0x6, 0x7, 0x6, 0x120, 0x6}, {0x6, 0x3, 0x4, 0x7ff, 0x0, 0x3}, {0x6, 0x0, 0x3, 0x2, 0xfff, 0x2}, {0x8, 0x3, 0x6, 0x5c6a, 0x5, 0x9}, {0x8, 0x1, 0x8, 0x8, 0x8, 0x95}, {0xf80, 0x8, 0x10000, 0x8, 0xe, 0xfffeffff}, {0x4, 0x8000, 0x3, 0x8aa6, 0xfffffff7, 0x5}, {0x8, 0x7, 0xfffffff7, 0x3ff, 0xd7d, 0x5}, {0xd50, 0x2, 0x8, 0x4, 0x8, 0x3}, {0x2, 0x6, 0x7f, 0x9, 0xfffffff9, 0x1}, {0x162, 0x0, 0x4b3, 0xcb5, 0x5, 0x7fffffdf}, {0x80000000, 0x0, 0x1, 0x2, 0x100, 0x3}, {0x8, 0x8, 0x1, 0xffffffff, 0x3ff, 0x5d1}, {0x3, 0xd054, 0x9, 0x5, 0xfffff801, 0x1}, {0x7, 0x8, 0x983, 0x0, 0x6, 0x200}, {0x47, 0x200, 0x8, 0x9, 0x2, 0x9}, {0x1, 0xfffffff9, 0x2, 0x7, 0x7, 0x1000}, {0x10000, 0x24056a58, 0x8, 0x8, 0x0, 0x8}, {0x2, 0x1ff, 0x3ff, 0x0, 0x2, 0x40000000}, {0x7ff, 0x7ff, 0x0, 0x3, 0x9ca, 0xffffffff}, {0x80000000, 0x9, 0x2, 0x4, 0xdd9f, 0x40}, {0xa, 0x9, 0x3, 0x0, 0xe00, 0x7fff}, {0x4, 0x7, 0x3, 0x0, 0x7f, 0x8}, {0x7, 0x8, 0x10, 0x4, 0x0, 0x80000000}, {0x7, 0x5, 0xfffff801, 0x1ff, 0x1, 0x10000}, {0x80000001, 0x2, 0x2, 0x3, 0x4}, {0x40, 0x0, 0x7, 0xc, 0x1, 0xffff0001}, {0x6, 0x0, 0x2, 0x5, 0x742}, {0x4, 0x401, 0xc0, 0xffffffff, 0x8, 0x2}, {0x7, 0x6, 0x5, 0x4d2b, 0x4, 0x8001}, {0x6, 0xf731, 0x2b1, 0xfffffffa, 0x1, 0x101}, {0x5, 0x7, 0x101, 0x0, 0x7, 0x8}, {0x3, 0x7, 0x8, 0x8, 0x7, 0xa0}, {0x1a, 0xe, 0x3ff, 0x0, 0x3, 0xfe}, {0x2, 0x7, 0xcf0, 0x5, 0x7, 0x6}, {0xfff, 0x6, 0x0, 0x1000, 0x0, 0xf}, {0x9, 0xfffffbff, 0x2, 0x5}, {0x0, 0x22f, 0x2, 0xe7b, 0xba, 0x7ff}, {0x1, 0x7b7, 0x0, 0xcb2d, 0xe, 0x6}, {0x0, 0x30000, 0x50, 0x5, 0x5, 0x8000}, {0xf9, 0x5b, 0x8, 0x3, 0x3, 0xff36}, {0x2de, 0x6, 0x5, 0xa4, 0x6, 0x7}, {0xe65a, 0x9, 0xd32, 0xd4, 0x100, 0x1d}, {0x0, 0x10000b, 0xec36, 0x0, 0x7, 0xe}, {0x80000000, 0x7f, 0x80, 0x4, 0x35b3, 0x5}, {0x8, 0x7, 0x44c9bfe0, 0x40, 0x4, 0x1}, {0xffff7fff, 0xf7af, 0x1ff, 0x21, 0x81, 0xa}, {0x2, 0x4, 0x7fffffff, 0x2, 0x1ff, 0x800}, {0x9, 0x9, 0x8, 0x2, 0x9, 0x6}, {0x6, 0x9, 0xafb, 0x3, 0x9, 0x5}, {0x2b20, 0x9, 0x7fffffff, 0x7c82, 0x7f, 0x8}, {0x1ff, 0x0, 0x0, 0x6, 0x8, 0x2}, {0x3, 0x6, 0x1c97600f, 0x6, 0xd, 0x800}, {0x1, 0x0, 0x0, 0x9, 0x19, 0x2}, {0x3, 0x7, 0xd, 0x7fffffff, 0x4}, {0x7f, 0x3, 0x5, 0x1, 0x75, 0x100}, {0xfff, 0x1, 0x1d, 0x40, 0x472, 0x1}, {0xe, 0x48f, 0x7, 0xfffffffc, 0x6, 0x7}, {0x9, 0x9, 0x401, 0x6, 0x1ff, 0x1}, {0xdd4, 0x100, 0x9, 0x6, 0x7, 0x7e27a179}, {0x3134, 0xfffffff9, 0x7, 0x6, 0x2, 0x1ff}, {0x6, 0x9, 0x611, 0x3, 0x2, 0x1}, {0x9, 0x3, 0x2, 0x9e7, 0x6, 0x4}, {0x5, 0x7, 0x1, 0x10000, 0xa, 0x1}, {0x9, 0x8, 0x0, 0x5, 0x3, 0x80000001}, {0x8, 0x9, 0x2, 0x5, 0x6, 0xd888}, {0x1, 0xdc13, 0x8, 0x6, 0x5, 0x1}, {0xfffffff8, 0x7, 0xb13, 0x7f, 0x81, 0x2}, {0x2da, 0x0, 0x9, 0xa748, 0x4, 0x1}, {0x1, 0x5, 0x1, 0x6, 0x6, 0x4f}, {0x2a, 0x7, 0x1, 0x0, 0x2, 0x80000001}, {0x8, 0x2f, 0xfffffff9, 0x4, 0x200, 0x800}, {0x40, 0x6, 0xc, 0xa1f7, 0x9, 0x1000}, {0x4, 0x101, 0x3, 0x401, 0x0, 0xfff}, {0x1, 0x0, 0x9, 0xf, 0x1000, 0x40}, {0x3, 0x3, 0x1, 0x8, 0x600, 0x8}, {0x2, 0x1000, 0x5, 0x8, 0x200, 0x66d4}, {0x7, 0x2b914a38, 0xda2, 0x0, 0x2, 0x6}, {0x95, 0x9, 0x6, 0x3, 0x5, 0xfffffffb}, {0x3eb, 0x9, 0x4, 0x2, 0xfffff801, 0x9}, {0xf48, 0x80000000, 0x1000, 0x1, 0x9, 0x3}, {0x5, 0xffffffff, 0x3, 0xf, 0x8, 0x2}, {0x10000000, 0xbc9, 0x0, 0x6, 0x1}, {0x3ff, 0x0, 0x6, 0x3, 0x892, 0xffff5833}, {0x2, 0x5, 0x8, 0x8, 0xbcb7, 0x8}, {0x5, 0x7, 0x1, 0x7, 0x8, 0xfffffffb}, {0x6, 0x2, 0x8, 0x1, 0x9, 0x40}, {0x73d, 0x81, 0x4, 0x4c, 0x2, 0x10000}, {0x4, 0x1, 0x401, 0x4, 0x3}, {0x99, 0x1, 0xfffffffb, 0x0, 0xd, 0x4}, {0x100, 0xfffffffd, 0x5, 0xa, 0x7, 0x5cf4}, {0x8, 0x5, 0x81, 0x1000, 0x1ff, 0x80}, {0x800, 0x10000, 0x2, 0xd3, 0xe, 0xfffffffd}, {0x4, 0x3, 0x46, 0x727b, 0xc, 0x5}, {0x6, 0x2bf3, 0x3, 0x100035, 0xd, 0xf24}, {0x9, 0x890c, 0xcf3, 0x87ee, 0x5, 0xfffffffc}, {0x49424b5d, 0xf, 0x3, 0x7, 0x2d219f14, 0x1ff}, {0x3, 0x5, 0x9, 0xfffffc00, 0xffffffff, 0x4}, {0x6, 0x5, 0x4, 0x80, 0x7fffffff, 0x8000}, {0x5, 0xfffff404, 0x1, 0x8, 0x879, 0x3}, {0x5, 0xc, 0x6, 0xfffffffb, 0x8, 0x2}, {0x4, 0x600, 0x39846a8c, 0x1, 0x7fff, 0xb}, {0xfffffff1, 0x8, 0x3, 0x3, 0x2, 0x3}], [{0x5, 0x1}, {}, {0x5, 0x1}, {0x1}, {}, {0x1, 0x4fa8102eea1673da}, {0x4}, {0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x5}, {0x4, 0x1}, {0x1}, {0x2, 0x1}, {0x5}, {0x3, 0x1}, {0x1, 0x1}, {0x1, 0x1}, {0x2}, {0x3, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x4}, {0x5}, {0x3}, {0x4, 0x1}, {0x0, 0x1}, {0x5, 0x1a2b73033141e383}, {0x3, 0x1}, {0x2}, {0x5}, {0x4, 0x1}, {}, {}, {0x3, 0x1}, {0x3, 0x1}, {0x1}, {0x3}, {0x3, 0x1}, {0x5}, {0x2}, {0x3, 0x1}, {0x7, 0x1}, {0x4}, {0x5}, {0x2}, {0x4, 0x1}, {}, {0x2}, {0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x5}, {0x1, 0x1}, {0x3}, {}, {0x2, 0x1}, {0x0, 0x1}, {0x7}, {0x1, 0x1}, {0x3}, {0x2}, {0x1}, {0x8, 0x1}, {0x3}, {0x1}, {0x2}, {0x4, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x5}, {0x3}, {0x3, 0x1}, {0x1}, {0x0, 0xbfb90171edaf7461}, {0x5, 0x1}, {0x1, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x5}, {0x3, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x5}, {0x4, 0x1}, {0x5}, {0x0, 0x1}, {0x5}, {}, {0x2}, {0x3, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x2}, {0x2}, {0x1}, {0x1, 0x1}, {}, {0x4, 0x1}, {0x5, 0x1}, {0x5}, {0x3}, {}, {0x0, 0x1}, {0x4}, {0x5}, {0x4, 0x1}, {0x1}, {0x4}, {0x5, 0x1}, {0x5}, {0x2}, {0x5, 0x1}, {0x5}, {}, {0x3}, {0x4}, {}, {0x0, 0x1}, {0x2}]}}, @TCA_PEDIT_KEYS_EX={0x10, 0x5, 0x0, 0x1, [{0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x500}]}]}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x3}}}}]}]}, 0xe78}, 0x1, 0x0, 0x0, 0x4081}, 0x2400c800) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f0000000740)=[{&(0x7f00000003c0)=""/201, 0xc9}], 0x1) 1.942564693s ago: executing program 0 (id=1184): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000003c0)={'ip6_vti0\x00', &(0x7f0000000340)={'syztnl0\x00', 0x0, 0x4, 0x81, 0x0, 0x1, 0x24, @private2={0xfc, 0x2, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x37}, 0x7800, 0x7, 0x7f, 0xede}}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2400000070000100000000000000000007000000", @ANYRES32=r3, @ANYBLOB="0c000280060001"], 0x24}}, 0x0) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, &(0x7f0000000380)=0x20000, 0x4) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/5, 0x204000, 0x1000}, 0x20) r5 = socket$phonet(0x23, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000180)=0x20, 0x4) setsockopt$XDP_UMEM_FILL_RING(r4, 0x11b, 0x5, &(0x7f0000000040)=0x4000, 0x4) bind$xdp(r4, &(0x7f00000002c0)={0x2c, 0x4, r6, 0x30, r4}, 0x10) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000005a40)=ANY=[@ANYBLOB="b400000010000904000000000000000000002200", @ANYRES32=0x0, @ANYBLOB="fffffffed9526cfd8400128009000100766c616e000000007400028006000100000600000c000200367da1650e000000280003800c00010001800000002000000c000100a1000000c84200000c0001000800000008000000340004800c00010006000000ff0300000c00010004000000080000000c000100040000000200", @ANYRES32=r8, @ANYBLOB='\b\x00\n\x00', @ANYRESOCT], 0xb4}}, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket(0x1, 0x803, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x30, 0x10, 0x403, 0xfffffffc, 0x3f, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINK={0x8, 0x5, r12}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x30}, 0x1, 0x300000000000000, 0x0, 0x4004}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000480)={'syztnl0\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000004c0)={@private1, 0x0}, &(0x7f0000000500)=0x14) r14 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r14, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r14, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@newqdisc={0x38, 0x24, 0x3fe3aa0262d8c583, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, r15, {0x0, 0xffe0}, {0xffff, 0xffff}, {0x10, 0xe}}, [@qdisc_kind_options=@q_fq={{0x7}, {0xc, 0x2, [@TCA_FQ_FLOW_DEFAULT_RATE={0x8, 0x6, 0xffffffff}]}}]}, 0x38}}, 0x4048000) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000800)={&(0x7f0000000540)={0x290, 0x0, 0x20, 0x70bd25, 0x25dfdbfd, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x4}]}, 0x290}, 0x1, 0x0, 0x0, 0x4048000}, 0x20088004) r16 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r16, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="9000000010000305000000000000000000000700", @ANYRES32=0x0, @ANYBLOB="996e06004d4c0700540012800800010068737200480002800500030008000000050003000500000005000300fd00000008000200", @ANYRES32=r16, @ANYBLOB="080001"], 0x90}}, 0x0) 1.686361668s ago: executing program 1 (id=1186): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = syz_io_uring_setup(0x49a, &(0x7f0000000400)={0x0, 0x79af, 0x3180, 0x8000, 0x400246}, &(0x7f0000000340)=0x0, &(0x7f00000006c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) epoll_create1(0x0) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_MSG_RING={0x28, 0x40, 0x0, r0, 0x0, 0x0, 0x0, 0x2}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) mount_setattr(0xffffffffffffffff, 0x0, 0x100, 0x0, 0x2000) io_uring_enter(r0, 0x4c6e, 0xc67a, 0x8, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) munmap(&(0x7f0000002000/0x2000)=nil, 0x2000) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e21, 0x9, @empty, 0xff}, 0x1c) r5 = fcntl$dupfd(r4, 0x406, r4) write$cgroup_pid(r5, &(0x7f0000000240), 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) statx(0xffffffffffffff9c, 0x0, 0x400, 0x20, 0x0) lsetxattr$security_selinux(&(0x7f0000000900)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000940), 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) setrlimit(0x9, &(0x7f0000000380)) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) io_setup(0x2004, &(0x7f0000000680)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000280)={@ipv4={'\x00', '\xff\xff', @local}, 0x800, 0x0, 0x1, 0x8}, 0x20) 1.53705812s ago: executing program 2 (id=1197): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000003c0)={'ip6_vti0\x00', &(0x7f0000000340)={'syztnl0\x00', 0x0, 0x4, 0x81, 0x0, 0x1, 0x24, @private2={0xfc, 0x2, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x37}, 0x7800, 0x7, 0x7f, 0xede}}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2400000070000100000000000000000007000000", @ANYRES32=r3, @ANYBLOB="0c000280060001"], 0x24}}, 0x0) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, &(0x7f0000000380)=0x20000, 0x4) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/5, 0x204000, 0x1000}, 0x20) r5 = socket$phonet(0x23, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000180)=0x20, 0x4) setsockopt$XDP_UMEM_FILL_RING(r4, 0x11b, 0x5, &(0x7f0000000040)=0x4000, 0x4) bind$xdp(r4, &(0x7f00000002c0)={0x2c, 0x4, r6, 0x30, r4}, 0x10) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000005a40)=ANY=[@ANYBLOB="b400000010000904000000000000000000002200", @ANYRES32=0x0, @ANYBLOB="fffffffed9526cfd8400128009000100766c616e000000007400028006000100000600000c000200367da1650e000000280003800c00010001800000002000000c000100a1000000c84200000c0001000800000008000000340004800c00010006000000ff0300000c00010004000000080000000c00010004000000020000000c000100050000000300000008000500", @ANYRES32=r8, @ANYBLOB='\b\x00\n\x00', @ANYRESOCT], 0xb4}}, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket(0x1, 0x803, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r10, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000480)={'syztnl0\x00', &(0x7f0000000400)={'ip6tnl0\x00', 0x0, 0x29, 0x2, 0xd7, 0x6, 0x40, @loopback, @loopback, 0x8, 0x40, 0x9, 0x2}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000004c0)={@private1, 0x0}, &(0x7f0000000500)=0x14) r15 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r15, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r15, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@newqdisc={0x38, 0x24, 0x3fe3aa0262d8c583, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, r16, {0x0, 0xffe0}, {0xffff, 0xffff}, {0x10, 0xe}}, [@qdisc_kind_options=@q_fq={{0x7}, {0xc, 0x2, [@TCA_FQ_FLOW_DEFAULT_RATE={0x8, 0x6, 0xffffffff}]}}]}, 0x38}}, 0x4048000) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000800)={&(0x7f0000000540)={0x290, 0x0, 0x20, 0x70bd25, 0x25dfdbfd, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r16}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x4}]}, 0x290}, 0x1, 0x0, 0x0, 0x4048000}, 0x20088004) socket$nl_route(0x10, 0x3, 0x0) 1.445195142s ago: executing program 1 (id=1188): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="18010000bc0000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r0, 0x0, 0x80000}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000080)}, 0x400, 0x0, 0x0, 0x0, 0x0, 0x1fffffff, 0x0, 0x0, 0x40, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) ioprio_set$pid(0x2, 0x0, 0x4007) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101842, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r4}, 0x18) r5 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x82, &(0x7f0000000000)=@assoc_value, &(0x7f00000001c0)=0x8) getsockopt$bt_sco_SCO_OPTIONS(r2, 0x11, 0x1, &(0x7f0000000500)=""/30, &(0x7f0000000680)=0x1e) kexec_load(0x3e00, 0x0, 0x0, 0x0) r6 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) ftruncate(r6, 0x2007ffc) sendfile(r6, r6, 0x0, 0x800000009) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32, @ANYRES32=r1, @ANYRES32=0x0, @ANYBLOB="f8c113aef68b0f7c5e7bbbf85ef25dcdc0adb865096eb937d0ac976a7897f29faba3e0f8515f6ddb54ef9cc11b0ba5f7350371cbcfcbe40e46c449b1bbd5de78a5386804b658a4037c3a0293e6c2a7ddab922b161b07281a20f8831ca0e57cfe65fa506405bdec8f6393e92a1c8ce5d9d925f6f371f4bdf344850d293753fb2c3e659390c956ea82c7435ed01a0901e93640bdced8c87496385f567f998ee27635c0faff48b5ce394fd2ab8356c7d98a1162253f6b8e533508fd9206cc3cc0b0a179219cd454850b4ea6ca37ad34e61041c293571374e345da9cf733cc3ff8abb8e0e91160dbd798bc59dc7fe443cbd18f6093a458049cbbdc", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r7, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xe, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="453cdb20b11733f3a03c5601c0a4428a63cb6c182cdbaf4567a0919674adf9f2ec0b76c82d2ae68675a580c727c42303627a232e6295efe7a6730ff78260c07dad0ce4d81c376ce11e27e660a25a5f9696ffc639fcd3e554dda412accbb79ebb4646fff00e19a1022a46eab322a5d0e7291d041614813b93384b9731d1e2", @ANYRES8, @ANYRES8=r8], &(0x7f0000000240)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000880)='sched_switch\x00', r9}, 0x18) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x62181) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r10, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x1, 0x0, 'queue0\x00'}) write$sndseq(0xffffffffffffffff, &(0x7f0000000540), 0x0) r11 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0xa8c01) write$sndseq(r11, &(0x7f0000000080)=[{0x1e, 0x0, 0x8, 0xfd, @time={0x6, 0x9}, {}, {}, @result}], 0x1c) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000005c0)) 1.444401322s ago: executing program 0 (id=1189): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="18010000bc0000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r0, 0x0, 0x80000}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000080)}, 0x400, 0x0, 0x0, 0x0, 0x0, 0x1fffffff, 0x0, 0x0, 0x40, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) ioprio_set$pid(0x2, 0x0, 0x4007) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101842, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000fdffffff18110000", @ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r4}, 0x18) r5 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x82, &(0x7f0000000000)=@assoc_value, &(0x7f00000001c0)=0x8) getsockopt$bt_sco_SCO_OPTIONS(r2, 0x11, 0x1, &(0x7f0000000500)=""/30, &(0x7f0000000680)=0x1e) kexec_load(0x3e00, 0x0, 0x0, 0x0) r6 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) ftruncate(r6, 0x2007ffc) sendfile(r6, r6, 0x0, 0x800000009) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32, @ANYRES32=r1, @ANYRES32=0x0, @ANYBLOB="f8c113aef68b0f7c5e7bbbf85ef25dcdc0adb865096eb937d0ac976a7897f29faba3e0f8515f6ddb54ef9cc11b0ba5f7350371cbcfcbe40e46c449b1bbd5de78a5386804b658a4037c3a0293e6c2a7ddab922b161b07281a20f8831ca0e57cfe65fa506405bdec8f6393e92a1c8ce5d9d925f6f371f4bdf344850d293753fb2c3e659390c956ea82c7435ed01a0901e93640bdced8c87496385f567f998ee27635c0faff48b5ce394fd2ab8356c7d98a1162253f6b8e533508fd9206cc3cc0b0a179219cd454850b4ea6ca37ad34e61041c293571374e345da9cf733cc3ff8abb8e0e91160dbd798bc59dc7fe443cbd18f6093a458049cbbdc", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r7, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xe, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="453cdb20b11733f3a03c5601c0a4428a63cb6c182cdbaf4567a0919674adf9f2ec0b76c82d2ae68675a580c727c42303627a232e6295efe7a6730ff78260c07dad0ce4d81c376ce11e27e660a25a5f9696ffc639fcd3e554dda412accbb79ebb4646fff00e19a1022a46eab322a5d0e7291d041614813b93384b9731d1e2", @ANYRES8, @ANYRES8=r8], &(0x7f0000000240)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000880)='sched_switch\x00', r9}, 0x18) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x62181) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r10, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x1, 0x0, 'queue0\x00'}) write$sndseq(0xffffffffffffffff, &(0x7f0000000540), 0x0) r11 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0xa8c01) write$sndseq(r11, &(0x7f0000000080)=[{0x1e, 0x0, 0x8, 0xfd, @time={0x6, 0x9}, {}, {}, @result}], 0x1c) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000005c0)) 1.212888096s ago: executing program 2 (id=1191): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b70300000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000005800)={0x18, 0xf, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000020000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)) add_key(&(0x7f0000000280)='rxrpc\x00', 0x0, &(0x7f0000000100)="01000000020000000000006bb55a2a630bf7c045f94cd977", 0x18, 0xffffffffffffffff) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newqdisc={0x9c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x6c, 0x2, {{}, [@TCA_NETEM_LOSS={0x30, 0x2, 0x0, 0x1, [@NETEM_LOSS_GE={0x18}, @NETEM_LOSS_GI={0x18}]}, @TCA_NETEM_RATE={0x4, 0xd}, @TCA_NETEM_CORRUPT={0xc, 0x2}]}}}]}, 0x9c}}, 0x0) 1.081862339s ago: executing program 3 (id=1193): syz_io_uring_setup(0x49f, &(0x7f0000000400)={0x0, 0xfc76, 0x1, 0x7ffe, 0x40024e}, &(0x7f0000000280)=0x0, &(0x7f0000000bc0)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) eventfd2(0xff, 0x80001) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRESOCT=r2], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = syz_io_uring_setup(0x4b5, &(0x7f0000010400)={0x0, 0x86e1, 0x1, 0x8}, &(0x7f0000010080), &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r4, 0x0, &(0x7f0000000140)=[{0x0}, {0x0}], 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00"/11], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000d80)=ANY=[@ANYBLOB="18000000000000000000000000000000f5110000dd10b70b5145f21b33c4aeebef4dc5ea874153a865ef555e37812a4d13d4fb817d9f6b83e36f898a313cc0af31241dcc03357fb136faa5c8a31aaddc5c4ac67bb4dc0c4c88ab261afc4502761a45f01b512ca39a0d795908e43047bea234d96a58fdb23066", @ANYBLOB="ca2eea0c862c346a1a1a20a49451081f6e0cb5ecea0304d38af2703bd0f1ed753c7124092c6a117d981468bf51acf297b36f2001a8e9346498e1814f74b153e58b", @ANYRESOCT=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='kfree\x00', r5, 0x0, 0x6}, 0x18) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r4, 0x10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340), 0xa002a0}], &(0x7f00000005c0), 0x2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) r6 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_udp_int(r6, 0x11, 0x67, &(0x7f0000000940)=0x28, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x400ad80, &(0x7f0000000080)={0xa, 0x4621, 0x0, @local}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000006780), 0x0, 0x40048c0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) sendmsg$NFT_BATCH(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x2d4}}, 0x4048010) 977.182141ms ago: executing program 3 (id=1194): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x8, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000b00), 0x1, 0x55f, &(0x7f0000000580)="$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") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x11, 0x5, &(0x7f0000000580)=@framed={{0x18, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @generic={0x65}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x45}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r1, 0x0, 0x200000000000006}, 0x18) r3 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x1, 0xffffffff, 0x0, 0x2, 0x3, 0x0}) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x9, 0x3, 0x3, 0xd1, 0x0, 0xc, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff8001, 0x4, @perf_bp={&(0x7f0000000080)}, 0x4808, 0xffffffff, 0x4, 0x1, 0x100000, 0x7, 0x2, 0x0, 0x5, 0x0, 0x1}, r4, 0x5, r2, 0xd5485419bc0689c1) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r3, &(0x7f0000000740)=@pppol2tpv3={0x18, 0x1, {0x3, r5, {0x2, 0x4e23, @broadcast}, 0x2, 0x0, 0x4}}, 0x2e) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x34, r6, 0x1, 0x1070bd0c, 0x4, {0x5}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0xaa8}, @L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x40811}, 0x20) 920.392082ms ago: executing program 3 (id=1195): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000005a40)=ANY=[@ANYBLOB="b400000010000904000000000000000000002200", @ANYRES32=0x0, @ANYBLOB="fffffffed9526cfd8400128009000100766c616e000000007400028006000100000600000c000200367da1650e000000280003800c00010001800000002000000c000100a1000000c84200000c0001000800000008000000340004800c00010006000000ff0300000c00010004000000080000000c00010004000000020000000c000100050000", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRESOCT], 0xb4}, 0x1, 0x0, 0x0, 0x14000}, 0x0) 886.314703ms ago: executing program 4 (id=1196): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002b2000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x41101, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@newlink={0x38, 0x10, 0x439, 0x70bd2a, 0xffffffea, {0x0, 0x0, 0xe403, 0x0, 0x3, 0x61003}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_PROTO={0x5, 0x9, 0x29}]}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x4008040) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000004c0)='rpcgss_upcall_msg\x00', r1, 0x0, 0x1ffffffff}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r3}, 0x10) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) gettid() r4 = gettid() r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r6 = syz_open_pts(0xffffffffffffffff, 0x1a1000) ioctl$TIOCGETD(r6, 0x5424, &(0x7f0000000240)) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) tkill(r4, 0x14) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r9}, 0x10) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) syz_emit_ethernet(0xfdef, &(0x7f0000000180)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xfde1, 0x300, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e22, 0x4d, 0x0, @wg=@data}}}}}, 0x0) 846.490913ms ago: executing program 3 (id=1198): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000003c0)={'ip6_vti0\x00', &(0x7f0000000340)={'syztnl0\x00', 0x0, 0x4, 0x81, 0x0, 0x1, 0x24, @private2={0xfc, 0x2, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x37}, 0x7800, 0x7, 0x7f, 0xede}}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2400000070000100000000000000000007000000", @ANYRES32=r3, @ANYBLOB="0c000280060001"], 0x24}}, 0x0) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, &(0x7f0000000380)=0x20000, 0x4) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/5, 0x204000, 0x1000}, 0x20) socket$phonet(0x23, 0x2, 0x1) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(r4, 0x11b, 0x5, &(0x7f0000000040)=0x4000, 0x4) bind$xdp(r4, &(0x7f00000002c0)={0x2c, 0x4, 0x0, 0x30, r4}, 0x10) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000005a40)=ANY=[@ANYBLOB="b400000010000904000000000000000000002200", @ANYRES32=0x0, @ANYBLOB="fffffffed9526cfd8400128009000100766c616e000000007400028006000100000600000c000200367da1650e000000280003800c00010001800000002000000c000100a1000000c84200000c0001000800000008000000340004800c00010006000000ff0300000c00010004000000080000000c00010004000000020000000c000100050000000300000008000500", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRESOCT], 0xb4}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x1, 0x803, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x403, 0xfffffffc, 0x3f, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4803}}}, @IFLA_LINK={0x8, 0x5, r10}, @IFLA_MASTER={0x8, 0xa, r10}]}, 0x44}, 0x1, 0x300000000000000, 0x0, 0x4004}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000480)={'syztnl0\x00', &(0x7f0000000400)={'ip6tnl0\x00', 0x0, 0x29, 0x2, 0xd7, 0x6, 0x40, @loopback, @loopback, 0x8, 0x40, 0x9, 0x2}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000004c0)={@private1, 0x0}, &(0x7f0000000500)=0x14) r13 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r13, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@newqdisc={0x38, 0x24, 0x3fe3aa0262d8c583, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, r14, {0x0, 0xffe0}, {0xffff, 0xffff}, {0x10, 0xe}}, [@qdisc_kind_options=@q_fq={{0x7}, {0xc, 0x2, [@TCA_FQ_FLOW_DEFAULT_RATE={0x8, 0x6, 0xffffffff}]}}]}, 0x38}}, 0x4048000) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000800)={&(0x7f0000000540)={0x290, 0x0, 0x20, 0x70bd25, 0x25dfdbfd, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x4}]}, 0x290}, 0x1, 0x0, 0x0, 0x4048000}, 0x20088004) r15 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r15, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="9000000010000305000000000000000000000700", @ANYRES32=0x0, @ANYBLOB="996e06004d4c0700540012800800010068737200480002800500030008000000050003000500000005000300fd00000008000200", @ANYRES32=r15, @ANYBLOB="080001"], 0x90}}, 0x0) 501.21599ms ago: executing program 2 (id=1199): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="18010000bc0000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r0, 0x0, 0x80000}, 0x18) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000080)}, 0x400, 0x0, 0x0, 0x0, 0x0, 0x1fffffff, 0x0, 0x0, 0x40, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) ioprio_set$pid(0x2, 0x0, 0x4007) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101842, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000fdffffff18110000", @ANYRES32, @ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x82, &(0x7f0000000000)=@assoc_value, &(0x7f00000001c0)=0x8) getsockopt$bt_sco_SCO_OPTIONS(r2, 0x11, 0x1, &(0x7f0000000500)=""/30, &(0x7f0000000680)=0x1e) kexec_load(0x3e00, 0x0, 0x0, 0x0) r6 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) ftruncate(r6, 0x2007ffc) sendfile(r6, r6, 0x0, 0x800000009) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0a00000004000000080000000800000000000000", @ANYRES32, @ANYRES32=r1, @ANYRES32=0x0, @ANYBLOB="f8c113aef68b0f7c5e7bbbf85ef25dcdc0adb865096eb937d0ac976a7897f29faba3e0f8515f6ddb54ef9cc11b0ba5f7350371cbcfcbe40e46c449b1bbd5de78a5386804b658a4037c3a0293e6c2a7ddab922b161b07281a20f8831ca0e57cfe65fa506405bdec8f6393e92a1c8ce5d9d925f6f371f4bdf344850d293753fb2c3e659390c956ea82c7435ed01a0901e93640bdced8c87496385f567f998ee27635c0faff48b5ce394fd2ab8356c7d98a1162253f6b8e533508fd9206cc3cc0b0a179219cd454850b4ea6ca37ad34e61041c293571374e345da9cf733cc3ff8abb8e0e91160dbd798bc59dc7fe443cbd18f6093a458049cbbdc", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r7, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xe, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="453cdb20b11733f3a03c5601c0a4428a63cb6c182cdbaf4567a0919674adf9f2ec0b76c82d2ae68675a580c727c42303627a232e6295efe7a6730ff78260c07dad0ce4d81c376ce11e27e660a25a5f9696ffc639fcd3e554dda412accbb79ebb4646fff00e19a1022a46eab322a5d0e7291d041614813b93384b9731d1e2", @ANYRES8, @ANYRES8=r8], &(0x7f0000000240)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000880)='sched_switch\x00', r9}, 0x18) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x1, 0x0, 'queue0\x00'}) r10 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0xa8c01) write$sndseq(r10, &(0x7f0000000080)=[{0x1e, 0x0, 0x8, 0xfd, @time={0x6, 0x9}, {}, {}, @result}], 0x1c) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000005c0)) 497.2958ms ago: executing program 4 (id=1200): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = syz_io_uring_setup(0x49a, &(0x7f0000000400)={0x0, 0x79af, 0x3180, 0x8000, 0x400246}, &(0x7f0000000340)=0x0, &(0x7f00000006c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) epoll_create1(0x0) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_MSG_RING={0x28, 0x40, 0x0, r0, 0x0, 0x0, 0x0, 0x2}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) mount_setattr(0xffffffffffffffff, 0x0, 0x100, 0x0, 0x2000) io_uring_enter(r0, 0x4c6e, 0xc67a, 0x8, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) munmap(&(0x7f0000002000/0x2000)=nil, 0x2000) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e21, 0x9, @empty, 0xff}, 0x1c) r5 = fcntl$dupfd(r4, 0x406, r4) write$cgroup_pid(r5, &(0x7f0000000240), 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) statx(0xffffffffffffff9c, 0x0, 0x400, 0x20, 0x0) lsetxattr$security_selinux(&(0x7f0000000900)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000940), 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) setrlimit(0x9, &(0x7f0000000380)) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) io_setup(0x2004, &(0x7f0000000680)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000280)={@ipv4={'\x00', '\xff\xff', @local}, 0x800, 0x0, 0x1, 0x8}, 0x20) 466.76291ms ago: executing program 3 (id=1201): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000003c0)={'ip6_vti0\x00', &(0x7f0000000340)={'syztnl0\x00', 0x0, 0x4, 0x81, 0x0, 0x1, 0x24, @private2={0xfc, 0x2, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x37}, 0x7800, 0x7, 0x7f, 0xede}}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2400000070000100000000000000000007000000", @ANYRES32=r3, @ANYBLOB="0c000280060001"], 0x24}}, 0x0) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, &(0x7f0000000380)=0x20000, 0x4) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/5, 0x204000, 0x1000}, 0x20) r5 = socket$phonet(0x23, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000180)=0x20, 0x4) setsockopt$XDP_UMEM_FILL_RING(r4, 0x11b, 0x5, &(0x7f0000000040)=0x4000, 0x4) bind$xdp(r4, &(0x7f00000002c0)={0x2c, 0x4, r6, 0x30, r4}, 0x10) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000005a40)=ANY=[@ANYBLOB="b400000010000904000000000000000000002200", @ANYRES32=0x0, @ANYBLOB="fffffffed9526cfd8400128009000100766c616e000000007400028006000100000600000c000200367da1650e000000280003800c00010001800000002000000c000100a1000000c84200000c0001000800000008000000340004800c00010006000000ff0300000c00010004000000080000000c000100040000000200", @ANYRES32=r8, @ANYBLOB='\b\x00\n\x00', @ANYRESOCT], 0xb4}}, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket(0x1, 0x803, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x30, 0x10, 0x403, 0xfffffffc, 0x3f, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINK={0x8, 0x5, r12}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x30}, 0x1, 0x300000000000000, 0x0, 0x4004}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000480)={'syztnl0\x00', &(0x7f0000000400)={'ip6tnl0\x00', 0x0, 0x29, 0x2, 0xd7, 0x6, 0x40, @loopback, @loopback, 0x8, 0x40, 0x9, 0x2}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, 0x0, &(0x7f0000000500)) r14 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r14, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r14, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@newqdisc={0x38, 0x24, 0x3fe3aa0262d8c583, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, r15, {0x0, 0xffe0}, {0xffff, 0xffff}, {0x10, 0xe}}, [@qdisc_kind_options=@q_fq={{0x7}, {0xc, 0x2, [@TCA_FQ_FLOW_DEFAULT_RATE={0x8, 0x6, 0xffffffff}]}}]}, 0x38}}, 0x4048000) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000800)={&(0x7f0000000540)={0x290, 0x0, 0x20, 0x70bd25, 0x25dfdbfd, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x4}]}, 0x290}, 0x1, 0x0, 0x0, 0x4048000}, 0x20088004) r16 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r16, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="9000000010000305000000000000000000000700", @ANYRES32=0x0, @ANYBLOB="996e06004d4c0700540012800800010068737200480002800500030008000000050003000500000005000300fd00000008000200", @ANYRES32=r16, @ANYBLOB="080001"], 0x90}}, 0x0) 371.179253ms ago: executing program 3 (id=1202): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000005800)={0x18, 0xf, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000020000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000300)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f00000006c0)={"6ff1fa501884d511291fb3fbd7c86391", r3, 0x0, {0xa39, 0x4}, {0x2, 0x101}, 0xfffffffffffffffe, [0x2c, 0x2, 0x9, 0x5, 0xffffffffffffffbe, 0x101, 0x6, 0x8000, 0x9, 0x5, 0x4, 0xfffffffffffffff9, 0x10000, 0x5, 0xf25, 0x9]}) add_key(&(0x7f0000000280)='rxrpc\x00', 0x0, &(0x7f0000000100)="01000000020000000000006bb55a2a630bf7c045f94cd977", 0x18, 0xffffffffffffffff) syz_clone(0x400c0000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newqdisc={0x9c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x6c, 0x2, {{}, [@TCA_NETEM_LOSS={0x30, 0x2, 0x0, 0x1, [@NETEM_LOSS_GE={0x18}, @NETEM_LOSS_GI={0x18}]}, @TCA_NETEM_RATE={0x4, 0xd}, @TCA_NETEM_CORRUPT={0xc, 0x2}]}}}]}, 0x9c}}, 0x0) 368.999902ms ago: executing program 0 (id=1203): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000003c0)={'ip6_vti0\x00', &(0x7f0000000340)={'syztnl0\x00', 0x0, 0x4, 0x81, 0x0, 0x1, 0x24, @private2={0xfc, 0x2, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x37}, 0x7800, 0x7, 0x7f, 0xede}}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="2400000070000100000000000000000007000000", @ANYRES32=r3, @ANYBLOB="0c000280060001"], 0x24}}, 0x0) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r4, 0x11b, 0x3, &(0x7f0000000380)=0x20000, 0x4) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/5, 0x204000, 0x1000}, 0x20) r5 = socket$phonet(0x23, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000180)=0x20, 0x4) setsockopt$XDP_UMEM_FILL_RING(r4, 0x11b, 0x5, &(0x7f0000000040)=0x4000, 0x4) bind$xdp(r4, 0x0, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000005a40)=ANY=[@ANYBLOB="b400000010000904000000000000000000002200", @ANYRES32=0x0, @ANYBLOB="fffffffed9526cfd8400128009000100766c616e000000007400028006000100000600000c000200367da1650e000000280003800c00010001800000002000000c000100a1000000c84200000c0001000800000008000000340004800c00010006000000ff0300000c00010004000000080000000c00010004000000020000000c000100050000000300000008000500", @ANYRES32=r8, @ANYBLOB='\b\x00\n\x00', @ANYRESOCT], 0xb4}}, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket(0x1, 0x803, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x44, 0x10, 0x403, 0xfffffffc, 0x3f, {0x0, 0x0, 0x0, 0x0, 0x88adfda5}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4803}}}, @IFLA_LINK={0x8, 0x5, r12}, @IFLA_MASTER={0x8, 0xa, r12}]}, 0x44}, 0x1, 0x300000000000000, 0x0, 0x4004}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000480)={'syztnl0\x00', &(0x7f0000000400)={'ip6tnl0\x00', 0x0, 0x29, 0x2, 0xd7, 0x6, 0x40, @loopback, @loopback, 0x8, 0x40, 0x9, 0x2}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000004c0)={@private1, 0x0}, &(0x7f0000000500)=0x14) r15 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r15, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r15, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@newqdisc={0x38, 0x24, 0x3fe3aa0262d8c583, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, r16, {0x0, 0xffe0}, {0xffff, 0xffff}, {0x10, 0xe}}, [@qdisc_kind_options=@q_fq={{0x7}, {0xc, 0x2, [@TCA_FQ_FLOW_DEFAULT_RATE={0x8, 0x6, 0xffffffff}]}}]}, 0x38}}, 0x4048000) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000800)={&(0x7f0000000540)={0x290, 0x0, 0x20, 0x70bd25, 0x25dfdbfd, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x74, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pimreg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nicvf0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r16}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}, @HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x4}]}, 0x290}, 0x1, 0x0, 0x0, 0x4048000}, 0x20088004) r17 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r17, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="9000000010000305000000000000000000000700", @ANYRES32=0x0, @ANYBLOB="996e06004d4c0700540012800800010068737200480002800500030008000000050003000500000005000300fd00000008000200", @ANYRES32=r17, @ANYBLOB="080001"], 0x90}}, 0x0) 273.179455ms ago: executing program 4 (id=1204): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000001000/0x4000)=nil) prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffc000/0x4000)=nil) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x275a, 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000300), 0x2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000942afc11322a737c000100000028000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x6, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000feffffff0000000000000000850000002a00000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='mmap_lock_acquire_returned\x00', r4}, 0x18) move_pages(0x0, 0x20a0, &(0x7f0000000040), &(0x7f0000001180), &(0x7f0000000000), 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000003c0)='mm_page_alloc\x00', r5, 0x0, 0xffffffffffffffff}, 0x18) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x9, 0x7, 0x0, 0x0, 0x0, 0x40008, 0x590, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x4c58, 0x4, 0x0, 0x0, 0x8, 0x4ac, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000003, 0x13, r6, 0x0) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1f, 0x2, @perf_bp={0x0, 0x1}, 0x100410, 0x200, 0x2, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/devices.allow\x00', 0x2, 0x118) write$cgroup_devices(r7, &(0x7f0000000000)=ANY=[@ANYBLOB='b '], 0x9) pwritev2(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000080)="ff", 0xfdef}], 0x1, 0xe7b, 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000400)='kfree\x00', r0}, 0x18) 77.498748ms ago: executing program 4 (id=1205): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000001000/0x4000)=nil) prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffc000/0x4000)=nil) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffb000/0x2000)=nil) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x275a, 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000300), 0x2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000942afc11322a737c000100000028000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x6, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000feffffff0000000000000000850000002a00000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='mmap_lock_acquire_returned\x00', r4}, 0x18) move_pages(0x0, 0x20a0, &(0x7f0000000040), &(0x7f0000001180), &(0x7f0000000000), 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000003c0)='mm_page_alloc\x00', r5, 0x0, 0xffffffffffffffff}, 0x18) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x9, 0x7, 0x0, 0x0, 0x0, 0x40008, 0x590, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x4c58, 0x4, 0x0, 0x0, 0x8, 0x4ac, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000003, 0x13, r6, 0x0) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1f, 0x2, @perf_bp={0x0, 0x1}, 0x100410, 0x200, 0x2, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/devices.allow\x00', 0x2, 0x118) write$cgroup_devices(r7, &(0x7f0000000000)=ANY=[@ANYBLOB='b '], 0x9) pwritev2(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000080)="ff", 0xfdef}], 0x1, 0xe7b, 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000400)='kfree\x00', r0}, 0x18) 0s ago: executing program 0 (id=1206): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000001000/0x4000)=nil) prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffc000/0x4000)=nil) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffb000/0x2000)=nil) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x275a, 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000300), 0x2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000942afc11322a737c000100000028000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x6, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000feffffff0000000000000000850000002a00000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='mmap_lock_acquire_returned\x00', r4}, 0x18) move_pages(0x0, 0x20a0, &(0x7f0000000040), &(0x7f0000001180), &(0x7f0000000000), 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000003c0)='mm_page_alloc\x00', r5, 0x0, 0xffffffffffffffff}, 0x18) r6 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x9, 0x7, 0x0, 0x0, 0x0, 0x40008, 0x590, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x4c58, 0x4, 0x0, 0x0, 0x8, 0x4ac, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000003, 0x13, r6, 0x0) perf_event_open(&(0x7f0000004cc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x9, 0x400, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xaf1f, 0x2, @perf_bp={0x0, 0x1}, 0x100410, 0x200, 0x2, 0x1, 0x9, 0x9, 0xfffd, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/devices.allow\x00', 0x2, 0x118) write$cgroup_devices(r7, &(0x7f0000000000)=ANY=[@ANYBLOB='b '], 0x9) pwritev2(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000080)="ff", 0xfdef}], 0x1, 0xe7b, 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000400)='kfree\x00', r0}, 0x18) kernel console output (not intermixed with test programs): ware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 75.912357][ T4748] Call Trace: [ 75.912366][ T4748] [ 75.912375][ T4748] __dump_stack+0x1d/0x30 [ 75.912518][ T4748] dump_stack_lvl+0xe8/0x140 [ 75.912577][ T4748] dump_stack+0x15/0x1b [ 75.912636][ T4748] should_fail_ex+0x265/0x280 [ 75.912733][ T4748] should_fail+0xb/0x20 [ 75.912804][ T4748] should_fail_usercopy+0x1a/0x20 [ 75.912866][ T4748] copy_folio_from_iter_atomic+0x278/0x11b0 [ 75.912905][ T4748] ? shmem_write_begin+0xa8/0x190 [ 75.912946][ T4748] ? shmem_write_begin+0xe1/0x190 [ 75.913048][ T4748] generic_perform_write+0x2c2/0x490 [ 75.913126][ T4748] shmem_file_write_iter+0xc5/0xf0 [ 75.913148][ T4748] do_iter_readv_writev+0x4a1/0x540 [ 75.913180][ T4748] vfs_writev+0x2df/0x8b0 [ 75.913219][ T4748] __se_sys_pwritev2+0xfc/0x1c0 [ 75.913292][ T4748] __x64_sys_pwritev2+0x67/0x80 [ 75.913370][ T4748] x64_sys_call+0x2c59/0x3000 [ 75.913391][ T4748] do_syscall_64+0xd2/0x200 [ 75.913418][ T4748] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 75.913446][ T4748] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 75.913510][ T4748] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 75.913562][ T4748] RIP: 0033:0x7effc74ceec9 [ 75.913578][ T4748] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 75.913599][ T4748] RSP: 002b:00007effc5f37038 EFLAGS: 00000246 ORIG_RAX: 0000000000000148 [ 75.913619][ T4748] RAX: ffffffffffffffda RBX: 00007effc7725fa0 RCX: 00007effc74ceec9 [ 75.913632][ T4748] RDX: 0000000000000001 RSI: 0000200000000240 RDI: 0000000000000003 [ 75.913645][ T4748] RBP: 00007effc5f37090 R08: 0000000000000000 R09: 0000000000000003 [ 75.913657][ T4748] R10: 0000000000007c00 R11: 0000000000000246 R12: 0000000000000001 [ 75.913727][ T4748] R13: 00007effc7726038 R14: 00007effc7725fa0 R15: 00007ffcfef7d388 [ 75.913745][ T4748] [ 76.178994][ T4756] netlink: 8 bytes leftover after parsing attributes in process `syz.2.487'. [ 76.196127][ T4758] fq_change: 4 callbacks suppressed [ 76.196145][ T4758] sch_fq: defrate 4294967295 ignored. [ 76.318354][ T4775] netlink: 'syz.3.495': attribute type 21 has an invalid length. [ 76.354211][ T4775] netlink: 'syz.3.495': attribute type 6 has an invalid length. [ 76.412548][ T4772] sch_fq: defrate 4294967295 ignored. [ 76.621210][ T4808] sch_fq: defrate 4294967295 ignored. [ 76.821413][ T4824] sch_fq: defrate 4294967295 ignored. [ 76.913793][ T4822] veth0_to_team: entered promiscuous mode [ 76.973148][ T4822] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=4822 comm=syz.2.513 [ 77.578016][ T4868] mmap: syz.4.530 (4868) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 78.078758][ T4880] FAULT_INJECTION: forcing a failure. [ 78.078758][ T4880] name failslab, interval 1, probability 0, space 0, times 0 [ 78.091786][ T4880] CPU: 1 UID: 0 PID: 4880 Comm: syz.0.535 Not tainted syzkaller #0 PREEMPT(voluntary) [ 78.091835][ T4880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 78.091850][ T4880] Call Trace: [ 78.091858][ T4880] [ 78.091875][ T4880] __dump_stack+0x1d/0x30 [ 78.091923][ T4880] dump_stack_lvl+0xe8/0x140 [ 78.091974][ T4880] dump_stack+0x15/0x1b [ 78.092029][ T4880] should_fail_ex+0x265/0x280 [ 78.092066][ T4880] ? rtnl_newlink+0x5c/0x12d0 [ 78.092097][ T4880] should_failslab+0x8c/0xb0 [ 78.092130][ T4880] __kmalloc_cache_noprof+0x4c/0x4a0 [ 78.092278][ T4880] rtnl_newlink+0x5c/0x12d0 [ 78.092310][ T4880] ? xas_load+0x413/0x430 [ 78.092334][ T4880] ? xas_load+0x413/0x430 [ 78.092363][ T4880] ? __memcg_slab_free_hook+0x135/0x230 [ 78.092435][ T4880] ? __rcu_read_unlock+0x4f/0x70 [ 78.092459][ T4880] ? avc_has_perm_noaudit+0x1b1/0x200 [ 78.092547][ T4880] ? cred_has_capability+0x210/0x280 [ 78.092644][ T4880] ? selinux_capable+0x31/0x40 [ 78.092676][ T4880] ? security_capable+0x83/0x90 [ 78.092718][ T4880] ? ns_capable+0x7d/0xb0 [ 78.092746][ T4880] ? __pfx_rtnl_newlink+0x10/0x10 [ 78.092798][ T4880] rtnetlink_rcv_msg+0x5fe/0x6d0 [ 78.092825][ T4880] netlink_rcv_skb+0x123/0x220 [ 78.092873][ T4880] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 78.092904][ T4880] rtnetlink_rcv+0x1c/0x30 [ 78.092968][ T4880] netlink_unicast+0x5c0/0x690 [ 78.093005][ T4880] netlink_sendmsg+0x58b/0x6b0 [ 78.093078][ T4880] ? __pfx_netlink_sendmsg+0x10/0x10 [ 78.093100][ T4880] __sock_sendmsg+0x145/0x180 [ 78.093134][ T4880] ____sys_sendmsg+0x31e/0x4e0 [ 78.093161][ T4880] ___sys_sendmsg+0x17b/0x1d0 [ 78.093283][ T4880] __x64_sys_sendmsg+0xd4/0x160 [ 78.093337][ T4880] x64_sys_call+0x191e/0x3000 [ 78.093358][ T4880] do_syscall_64+0xd2/0x200 [ 78.093384][ T4880] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 78.093416][ T4880] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 78.093582][ T4880] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 78.093611][ T4880] RIP: 0033:0x7f0d8401eec9 [ 78.093696][ T4880] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 78.093720][ T4880] RSP: 002b:00007f0d82a7f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 78.093743][ T4880] RAX: ffffffffffffffda RBX: 00007f0d84275fa0 RCX: 00007f0d8401eec9 [ 78.093756][ T4880] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 78.093772][ T4880] RBP: 00007f0d82a7f090 R08: 0000000000000000 R09: 0000000000000000 [ 78.093848][ T4880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 78.093864][ T4880] R13: 00007f0d84276038 R14: 00007f0d84275fa0 R15: 00007ffec413e208 [ 78.093887][ T4880] [ 78.361090][ T29] kauditd_printk_skb: 1031 callbacks suppressed [ 78.361182][ T29] audit: type=1326 audit(1759580023.251:4054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4864 comm="syz.4.530" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f8a79361785 code=0x7ffc0000 [ 78.401476][ T29] audit: type=1326 audit(1759580023.251:4055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4864 comm="syz.4.530" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f8a79361785 code=0x7ffc0000 [ 78.425784][ T29] audit: type=1326 audit(1759580023.251:4056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4864 comm="syz.4.530" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f8a79361785 code=0x7ffc0000 [ 78.449720][ T29] audit: type=1326 audit(1759580023.251:4057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4864 comm="syz.4.530" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f8a79361785 code=0x7ffc0000 [ 78.473405][ T29] audit: type=1326 audit(1759580023.251:4058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4864 comm="syz.4.530" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f8a79361785 code=0x7ffc0000 [ 78.497054][ T29] audit: type=1326 audit(1759580023.251:4059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4864 comm="syz.4.530" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f8a79361785 code=0x7ffc0000 [ 78.520408][ T29] audit: type=1326 audit(1759580023.251:4060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4864 comm="syz.4.530" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f8a79361785 code=0x7ffc0000 [ 78.544732][ T29] audit: type=1326 audit(1759580023.251:4061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4864 comm="syz.4.530" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f8a79361785 code=0x7ffc0000 [ 78.568338][ T29] audit: type=1326 audit(1759580023.251:4062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4864 comm="syz.4.530" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f8a79361785 code=0x7ffc0000 [ 78.591961][ T29] audit: type=1326 audit(1759580023.251:4063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4864 comm="syz.4.530" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f8a79361785 code=0x7ffc0000 [ 78.700179][ T4885] sch_fq: defrate 4294967295 ignored. [ 78.813824][ T4900] sch_fq: defrate 4294967295 ignored. [ 78.830663][ T4902] serio: Serial port ptm0 [ 79.140327][ T4931] sch_fq: defrate 4294967295 ignored. [ 79.415071][ T4949] sch_fq: defrate 4294967295 ignored. [ 79.435145][ T4950] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4950 comm=syz.0.564 [ 79.586466][ T4961] FAULT_INJECTION: forcing a failure. [ 79.586466][ T4961] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 79.599642][ T4961] CPU: 0 UID: 0 PID: 4961 Comm: syz.4.570 Not tainted syzkaller #0 PREEMPT(voluntary) [ 79.599669][ T4961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 79.599747][ T4961] Call Trace: [ 79.599756][ T4961] [ 79.599765][ T4961] __dump_stack+0x1d/0x30 [ 79.599810][ T4961] dump_stack_lvl+0xe8/0x140 [ 79.599888][ T4961] dump_stack+0x15/0x1b [ 79.599921][ T4961] should_fail_ex+0x265/0x280 [ 79.599999][ T4961] should_fail+0xb/0x20 [ 79.600038][ T4961] should_fail_usercopy+0x1a/0x20 [ 79.600066][ T4961] _copy_to_user+0x20/0xa0 [ 79.600177][ T4961] simple_read_from_buffer+0xb5/0x130 [ 79.600209][ T4961] proc_fail_nth_read+0x10e/0x150 [ 79.600249][ T4961] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 79.600288][ T4961] vfs_read+0x1a8/0x770 [ 79.600316][ T4961] ? __rcu_read_unlock+0x4f/0x70 [ 79.600439][ T4961] ? __fget_files+0x184/0x1c0 [ 79.600476][ T4961] ksys_read+0xda/0x1a0 [ 79.600549][ T4961] __x64_sys_read+0x40/0x50 [ 79.600579][ T4961] x64_sys_call+0x27c0/0x3000 [ 79.600607][ T4961] do_syscall_64+0xd2/0x200 [ 79.600667][ T4961] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 79.600702][ T4961] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 79.600733][ T4961] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 79.600904][ T4961] RIP: 0033:0x7f8a7932d8dc [ 79.600923][ T4961] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 79.600943][ T4961] RSP: 002b:00007f8a77d8f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 79.600967][ T4961] RAX: ffffffffffffffda RBX: 00007f8a79585fa0 RCX: 00007f8a7932d8dc [ 79.601063][ T4961] RDX: 000000000000000f RSI: 00007f8a77d8f0a0 RDI: 0000000000000003 [ 79.601081][ T4961] RBP: 00007f8a77d8f090 R08: 0000000000000000 R09: 0000000000000000 [ 79.601097][ T4961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 79.601183][ T4961] R13: 00007f8a79586038 R14: 00007f8a79585fa0 R15: 00007ffd4530a228 [ 79.601207][ T4961] [ 79.602978][ T4963] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 79.858566][ T4973] FAULT_INJECTION: forcing a failure. [ 79.858566][ T4973] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 79.871825][ T4973] CPU: 0 UID: 0 PID: 4973 Comm: syz.3.573 Not tainted syzkaller #0 PREEMPT(voluntary) [ 79.871916][ T4973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 79.871929][ T4973] Call Trace: [ 79.871935][ T4973] [ 79.871941][ T4973] __dump_stack+0x1d/0x30 [ 79.871987][ T4973] dump_stack_lvl+0xe8/0x140 [ 79.872030][ T4973] dump_stack+0x15/0x1b [ 79.872203][ T4973] should_fail_ex+0x265/0x280 [ 79.872249][ T4973] should_fail+0xb/0x20 [ 79.872290][ T4973] should_fail_usercopy+0x1a/0x20 [ 79.872317][ T4973] _copy_to_user+0x20/0xa0 [ 79.872369][ T4973] simple_read_from_buffer+0xb5/0x130 [ 79.872407][ T4973] proc_fail_nth_read+0x10e/0x150 [ 79.872447][ T4973] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 79.872477][ T4973] vfs_read+0x1a8/0x770 [ 79.872569][ T4973] ? __rcu_read_unlock+0x4f/0x70 [ 79.872597][ T4973] ? __fget_files+0x184/0x1c0 [ 79.872632][ T4973] ksys_read+0xda/0x1a0 [ 79.872746][ T4973] __x64_sys_read+0x40/0x50 [ 79.872792][ T4973] x64_sys_call+0x27c0/0x3000 [ 79.872814][ T4973] do_syscall_64+0xd2/0x200 [ 79.872932][ T4973] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 79.872967][ T4973] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 79.873000][ T4973] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 79.873029][ T4973] RIP: 0033:0x7fa0a186d8dc [ 79.873044][ T4973] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 79.873087][ T4973] RSP: 002b:00007fa0a02d7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 79.873106][ T4973] RAX: ffffffffffffffda RBX: 00007fa0a1ac5fa0 RCX: 00007fa0a186d8dc [ 79.873119][ T4973] RDX: 000000000000000f RSI: 00007fa0a02d70a0 RDI: 0000000000000003 [ 79.873134][ T4973] RBP: 00007fa0a02d7090 R08: 0000000000000000 R09: 0000000000000000 [ 79.873145][ T4973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 79.873157][ T4973] R13: 00007fa0a1ac6038 R14: 00007fa0a1ac5fa0 R15: 00007ffd70ef7da8 [ 79.873175][ T4973] [ 80.201561][ T4987] FAULT_INJECTION: forcing a failure. [ 80.201561][ T4987] name failslab, interval 1, probability 0, space 0, times 0 [ 80.214506][ T4987] CPU: 0 UID: 0 PID: 4987 Comm: syz.4.581 Not tainted syzkaller #0 PREEMPT(voluntary) [ 80.214541][ T4987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 80.214555][ T4987] Call Trace: [ 80.214564][ T4987] [ 80.214574][ T4987] __dump_stack+0x1d/0x30 [ 80.214621][ T4987] dump_stack_lvl+0xe8/0x140 [ 80.214736][ T4987] dump_stack+0x15/0x1b [ 80.214806][ T4987] should_fail_ex+0x265/0x280 [ 80.214920][ T4987] should_failslab+0x8c/0xb0 [ 80.214976][ T4987] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 80.215007][ T4987] ? sidtab_sid2str_get+0xa0/0x130 [ 80.215043][ T4987] kmemdup_noprof+0x2b/0x70 [ 80.215137][ T4987] sidtab_sid2str_get+0xa0/0x130 [ 80.215176][ T4987] security_sid_to_context_core+0x1eb/0x2e0 [ 80.215215][ T4987] security_sid_to_context+0x27/0x40 [ 80.215247][ T4987] selinux_lsmprop_to_secctx+0x67/0xf0 [ 80.215282][ T4987] security_lsmprop_to_secctx+0x1a0/0x1c0 [ 80.215307][ T4987] audit_log_subj_ctx+0xa4/0x3e0 [ 80.215332][ T4987] ? skb_put+0xa9/0xf0 [ 80.215463][ T4987] audit_log_task_context+0x48/0x70 [ 80.215491][ T4987] audit_log_task+0xf4/0x250 [ 80.215532][ T4987] ? kstrtouint+0x76/0xc0 [ 80.215573][ T4987] audit_seccomp+0x61/0x100 [ 80.215661][ T4987] ? __seccomp_filter+0x82d/0x1250 [ 80.215694][ T4987] __seccomp_filter+0x83e/0x1250 [ 80.215725][ T4987] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 80.215822][ T4987] ? vfs_write+0x7e8/0x960 [ 80.215846][ T4987] ? __rcu_read_unlock+0x4f/0x70 [ 80.215869][ T4987] ? __fget_files+0x184/0x1c0 [ 80.215902][ T4987] __secure_computing+0x82/0x150 [ 80.215970][ T4987] syscall_trace_enter+0xcf/0x1e0 [ 80.216060][ T4987] do_syscall_64+0xac/0x200 [ 80.216088][ T4987] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 80.216120][ T4987] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 80.216145][ T4987] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 80.216246][ T4987] RIP: 0033:0x7f8a7932eec9 [ 80.216283][ T4987] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 80.216304][ T4987] RSP: 002b:00007f8a77d8f038 EFLAGS: 00000246 ORIG_RAX: 000000000000001d [ 80.216411][ T4987] RAX: ffffffffffffffda RBX: 00007f8a79585fa0 RCX: 00007f8a7932eec9 [ 80.216428][ T4987] RDX: 0000000000000008 RSI: 0000000000001000 RDI: 0000000000000000 [ 80.216443][ T4987] RBP: 00007f8a77d8f090 R08: 0000000000000000 R09: 0000000000000000 [ 80.216460][ T4987] R10: 0000200000ffe000 R11: 0000000000000246 R12: 0000000000000001 [ 80.216476][ T4987] R13: 00007f8a79586038 R14: 00007f8a79585fa0 R15: 00007ffd4530a228 [ 80.216493][ T4987] [ 80.588535][ T4998] __nla_validate_parse: 24 callbacks suppressed [ 80.588556][ T4998] netlink: 28 bytes leftover after parsing attributes in process `syz.3.580'. [ 80.617552][ T4998] netem: change failed [ 80.684461][ T5005] FAULT_INJECTION: forcing a failure. [ 80.684461][ T5005] name failslab, interval 1, probability 0, space 0, times 0 [ 80.697239][ T5005] CPU: 0 UID: 0 PID: 5005 Comm: syz.1.588 Not tainted syzkaller #0 PREEMPT(voluntary) [ 80.697345][ T5005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 80.697360][ T5005] Call Trace: [ 80.697367][ T5005] [ 80.697375][ T5005] __dump_stack+0x1d/0x30 [ 80.697434][ T5005] dump_stack_lvl+0xe8/0x140 [ 80.697476][ T5005] dump_stack+0x15/0x1b [ 80.697515][ T5005] should_fail_ex+0x265/0x280 [ 80.697561][ T5005] ? __se_sys_memfd_create+0x1cc/0x590 [ 80.697592][ T5005] should_failslab+0x8c/0xb0 [ 80.697625][ T5005] __kmalloc_cache_noprof+0x4c/0x4a0 [ 80.697662][ T5005] ? fput+0x8f/0xc0 [ 80.697711][ T5005] __se_sys_memfd_create+0x1cc/0x590 [ 80.697750][ T5005] __x64_sys_memfd_create+0x31/0x40 [ 80.697779][ T5005] x64_sys_call+0x2ac2/0x3000 [ 80.697805][ T5005] do_syscall_64+0xd2/0x200 [ 80.697838][ T5005] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 80.697887][ T5005] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 80.697919][ T5005] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 80.697952][ T5005] RIP: 0033:0x7fb1b58feec9 [ 80.697971][ T5005] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 80.697994][ T5005] RSP: 002b:00007fb1b4366e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 80.698019][ T5005] RAX: ffffffffffffffda RBX: 00000000000001f5 RCX: 00007fb1b58feec9 [ 80.698036][ T5005] RDX: 00007fb1b4366ef0 RSI: 0000000000000000 RDI: 00007fb1b5982960 [ 80.698052][ T5005] RBP: 0000200000000600 R08: 00007fb1b4366bb7 R09: 00007fb1b4366e40 [ 80.698096][ T5005] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000040 [ 80.698112][ T5005] R13: 00007fb1b4366ef0 R14: 00007fb1b4366eb0 R15: 0000200000000280 [ 80.698184][ T5005] [ 80.913787][ T5011] FAULT_INJECTION: forcing a failure. [ 80.913787][ T5011] name failslab, interval 1, probability 0, space 0, times 0 [ 80.926769][ T5011] CPU: 1 UID: 0 PID: 5011 Comm: syz.2.590 Not tainted syzkaller #0 PREEMPT(voluntary) [ 80.926804][ T5011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 80.926820][ T5011] Call Trace: [ 80.926829][ T5011] [ 80.926839][ T5011] __dump_stack+0x1d/0x30 [ 80.926948][ T5011] dump_stack_lvl+0xe8/0x140 [ 80.927030][ T5011] dump_stack+0x15/0x1b [ 80.927089][ T5011] should_fail_ex+0x265/0x280 [ 80.927135][ T5011] should_failslab+0x8c/0xb0 [ 80.927165][ T5011] kmem_cache_alloc_noprof+0x50/0x480 [ 80.927306][ T5011] ? security_file_alloc+0x32/0x100 [ 80.927350][ T5011] security_file_alloc+0x32/0x100 [ 80.927381][ T5011] init_file+0x5c/0x1d0 [ 80.927422][ T5011] alloc_empty_file+0x8b/0x200 [ 80.927477][ T5011] path_openat+0x68/0x2170 [ 80.927499][ T5011] ? _parse_integer_limit+0x170/0x190 [ 80.927542][ T5011] ? kstrtoull+0x111/0x140 [ 80.927583][ T5011] ? kstrtouint+0x76/0xc0 [ 80.927689][ T5011] do_filp_open+0x109/0x230 [ 80.927804][ T5011] do_sys_openat2+0xa6/0x110 [ 80.927889][ T5011] __x64_sys_openat+0xf2/0x120 [ 80.927907][ T5011] x64_sys_call+0x2eab/0x3000 [ 80.928007][ T5011] do_syscall_64+0xd2/0x200 [ 80.928034][ T5011] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 80.928120][ T5011] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 80.928153][ T5011] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 80.928181][ T5011] RIP: 0033:0x7effc74ceec9 [ 80.928196][ T5011] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 80.928253][ T5011] RSP: 002b:00007effc5f37038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 80.928282][ T5011] RAX: ffffffffffffffda RBX: 00007effc7725fa0 RCX: 00007effc74ceec9 [ 80.928299][ T5011] RDX: 0000000000004040 RSI: 0000200000000180 RDI: ffffffffffffff9c [ 80.928316][ T5011] RBP: 00007effc5f37090 R08: 0000000000000000 R09: 0000000000000000 [ 80.928381][ T5011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 80.928396][ T5011] R13: 00007effc7726038 R14: 00007effc7725fa0 R15: 00007ffcfef7d388 [ 80.928420][ T5011] [ 81.179244][ T5018] FAULT_INJECTION: forcing a failure. [ 81.179244][ T5018] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 81.192611][ T5018] CPU: 1 UID: 0 PID: 5018 Comm: syz.1.592 Not tainted syzkaller #0 PREEMPT(voluntary) [ 81.192646][ T5018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 81.192663][ T5018] Call Trace: [ 81.192670][ T5018] [ 81.192679][ T5018] __dump_stack+0x1d/0x30 [ 81.192726][ T5018] dump_stack_lvl+0xe8/0x140 [ 81.192772][ T5018] dump_stack+0x15/0x1b [ 81.192878][ T5018] should_fail_ex+0x265/0x280 [ 81.192923][ T5018] should_fail+0xb/0x20 [ 81.192964][ T5018] should_fail_usercopy+0x1a/0x20 [ 81.192992][ T5018] _copy_to_user+0x20/0xa0 [ 81.193089][ T5018] simple_read_from_buffer+0xb5/0x130 [ 81.193121][ T5018] proc_fail_nth_read+0x10e/0x150 [ 81.193172][ T5018] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 81.193252][ T5018] vfs_read+0x1a8/0x770 [ 81.193280][ T5018] ? __fget_files+0x184/0x1c0 [ 81.193384][ T5018] ? __rcu_read_unlock+0x4f/0x70 [ 81.193415][ T5018] ? __fget_files+0x184/0x1c0 [ 81.193489][ T5018] ksys_read+0xda/0x1a0 [ 81.193573][ T5018] __x64_sys_read+0x40/0x50 [ 81.193603][ T5018] x64_sys_call+0x27c0/0x3000 [ 81.193630][ T5018] do_syscall_64+0xd2/0x200 [ 81.193665][ T5018] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 81.193766][ T5018] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 81.193798][ T5018] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 81.193891][ T5018] RIP: 0033:0x7fb1b58fd8dc [ 81.193910][ T5018] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 81.193933][ T5018] RSP: 002b:00007fb1b4367030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 81.193989][ T5018] RAX: ffffffffffffffda RBX: 00007fb1b5b55fa0 RCX: 00007fb1b58fd8dc [ 81.194005][ T5018] RDX: 000000000000000f RSI: 00007fb1b43670a0 RDI: 0000000000000003 [ 81.194022][ T5018] RBP: 00007fb1b4367090 R08: 0000000000000000 R09: 0000000000000000 [ 81.194038][ T5018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.194054][ T5018] R13: 00007fb1b5b56038 R14: 00007fb1b5b55fa0 R15: 00007ffc8b69db28 [ 81.194132][ T5018] [ 81.252464][ T5025] netlink: 4 bytes leftover after parsing attributes in process `syz.0.595'. [ 81.368936][ T5023] sch_fq: defrate 4294967295 ignored. [ 81.442863][ T5032] netlink: 28 bytes leftover after parsing attributes in process `syz.0.595'. [ 81.452123][ T5032] netlink: 28 bytes leftover after parsing attributes in process `syz.0.595'. [ 81.483844][ T5037] netlink: 4 bytes leftover after parsing attributes in process `syz.2.600'. [ 81.493758][ T5037] sch_fq: defrate 4294967295 ignored. [ 81.499659][ T5037] netlink: 28 bytes leftover after parsing attributes in process `syz.2.600'. [ 81.508689][ T5037] netlink: 28 bytes leftover after parsing attributes in process `syz.2.600'. [ 81.527492][ T5040] netlink: 4 bytes leftover after parsing attributes in process `syz.4.601'. [ 81.537730][ T5040] sch_fq: defrate 4294967295 ignored. [ 81.561806][ T5044] FAULT_INJECTION: forcing a failure. [ 81.561806][ T5044] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 81.575323][ T5044] CPU: 0 UID: 0 PID: 5044 Comm: syz.0.603 Not tainted syzkaller #0 PREEMPT(voluntary) [ 81.575350][ T5044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 81.575363][ T5044] Call Trace: [ 81.575369][ T5044] [ 81.575376][ T5044] __dump_stack+0x1d/0x30 [ 81.575419][ T5044] dump_stack_lvl+0xe8/0x140 [ 81.575452][ T5044] dump_stack+0x15/0x1b [ 81.575488][ T5044] should_fail_ex+0x265/0x280 [ 81.575534][ T5044] should_fail+0xb/0x20 [ 81.575744][ T5044] should_fail_usercopy+0x1a/0x20 [ 81.575771][ T5044] _copy_from_user+0x1c/0xb0 [ 81.575803][ T5044] do_sock_getsockopt+0xf1/0x240 [ 81.575850][ T5044] __x64_sys_getsockopt+0x11e/0x1a0 [ 81.575922][ T5044] x64_sys_call+0x2bca/0x3000 [ 81.575949][ T5044] do_syscall_64+0xd2/0x200 [ 81.576062][ T5044] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 81.576104][ T5044] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 81.576206][ T5044] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 81.576234][ T5044] RIP: 0033:0x7f0d8401eec9 [ 81.576253][ T5044] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 81.576283][ T5044] RSP: 002b:00007f0d82a7f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 81.576308][ T5044] RAX: ffffffffffffffda RBX: 00007f0d84275fa0 RCX: 00007f0d8401eec9 [ 81.576400][ T5044] RDX: 000000000000001f RSI: 0000000000000001 RDI: 0000000000000004 [ 81.576417][ T5044] RBP: 00007f0d82a7f090 R08: 0000200000000080 R09: 0000000000000000 [ 81.576432][ T5044] R10: 00002000000014c0 R11: 0000000000000246 R12: 0000000000000001 [ 81.576444][ T5044] R13: 00007f0d84276038 R14: 00007f0d84275fa0 R15: 00007ffec413e208 [ 81.576463][ T5044] [ 81.805092][ T5058] FAULT_INJECTION: forcing a failure. [ 81.805092][ T5058] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 81.818329][ T5058] CPU: 0 UID: 0 PID: 5058 Comm: syz.3.607 Not tainted syzkaller #0 PREEMPT(voluntary) [ 81.818403][ T5058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 81.818419][ T5058] Call Trace: [ 81.818427][ T5058] [ 81.818440][ T5058] __dump_stack+0x1d/0x30 [ 81.818478][ T5058] dump_stack_lvl+0xe8/0x140 [ 81.818521][ T5058] dump_stack+0x15/0x1b [ 81.818560][ T5058] should_fail_ex+0x265/0x280 [ 81.818613][ T5058] should_fail+0xb/0x20 [ 81.818651][ T5058] should_fail_usercopy+0x1a/0x20 [ 81.818673][ T5058] _copy_to_user+0x20/0xa0 [ 81.818732][ T5058] simple_read_from_buffer+0xb5/0x130 [ 81.818756][ T5058] proc_fail_nth_read+0x10e/0x150 [ 81.818786][ T5058] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 81.818836][ T5058] vfs_read+0x1a8/0x770 [ 81.818865][ T5058] ? __rcu_read_unlock+0x4f/0x70 [ 81.818895][ T5058] ? __fget_files+0x184/0x1c0 [ 81.818928][ T5058] ksys_read+0xda/0x1a0 [ 81.818970][ T5058] __x64_sys_read+0x40/0x50 [ 81.819020][ T5058] x64_sys_call+0x27c0/0x3000 [ 81.819084][ T5058] do_syscall_64+0xd2/0x200 [ 81.819111][ T5058] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 81.819164][ T5058] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 81.819190][ T5058] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 81.819216][ T5058] RIP: 0033:0x7fa0a186d8dc [ 81.819236][ T5058] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 81.819333][ T5058] RSP: 002b:00007fa0a02d7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 81.819358][ T5058] RAX: ffffffffffffffda RBX: 00007fa0a1ac5fa0 RCX: 00007fa0a186d8dc [ 81.819375][ T5058] RDX: 000000000000000f RSI: 00007fa0a02d70a0 RDI: 0000000000000005 [ 81.819391][ T5058] RBP: 00007fa0a02d7090 R08: 0000000000000000 R09: 0000000000000000 [ 81.819407][ T5058] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000001 [ 81.819487][ T5058] R13: 00007fa0a1ac6038 R14: 00007fa0a1ac5fa0 R15: 00007ffd70ef7da8 [ 81.819510][ T5058] [ 82.125292][ T5070] netlink: 4 bytes leftover after parsing attributes in process `syz.3.613'. [ 82.146421][ T5070] sch_fq: defrate 4294967295 ignored. [ 82.157580][ T5070] netlink: 28 bytes leftover after parsing attributes in process `syz.3.613'. [ 82.173368][ T5074] sch_fq: defrate 4294967295 ignored. [ 82.345978][ T5090] netlink: 'syz.1.621': attribute type 13 has an invalid length. [ 82.411152][ T5090] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.418565][ T5090] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.525721][ T5090] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 82.556953][ T5090] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 82.635214][ T5093] netlink: 'syz.0.622': attribute type 29 has an invalid length. [ 82.643404][ T31] netdevsim netdevsim1 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 82.652186][ T31] netdevsim netdevsim1 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 82.660659][ T31] netdevsim netdevsim1 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 82.669490][ T31] netdevsim netdevsim1 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 82.784257][ T5108] sch_fq: defrate 4294967295 ignored. [ 83.242484][ T5134] sch_fq: defrate 4294967295 ignored. [ 83.345159][ T5147] FAULT_INJECTION: forcing a failure. [ 83.345159][ T5147] name failslab, interval 1, probability 0, space 0, times 0 [ 83.357888][ T5147] CPU: 1 UID: 0 PID: 5147 Comm: syz.3.644 Not tainted syzkaller #0 PREEMPT(voluntary) [ 83.357952][ T5147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 83.358044][ T5147] Call Trace: [ 83.358052][ T5147] [ 83.358062][ T5147] __dump_stack+0x1d/0x30 [ 83.358140][ T5147] dump_stack_lvl+0xe8/0x140 [ 83.358251][ T5147] dump_stack+0x15/0x1b [ 83.358292][ T5147] should_fail_ex+0x265/0x280 [ 83.358337][ T5147] should_failslab+0x8c/0xb0 [ 83.358455][ T5147] kmem_cache_alloc_noprof+0x50/0x480 [ 83.358486][ T5147] ? getname_flags+0x80/0x3b0 [ 83.358525][ T5147] getname_flags+0x80/0x3b0 [ 83.358623][ T5147] __x64_sys_rename+0x40/0x70 [ 83.358649][ T5147] x64_sys_call+0x1f9/0x3000 [ 83.358673][ T5147] do_syscall_64+0xd2/0x200 [ 83.358783][ T5147] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 83.358816][ T5147] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 83.358849][ T5147] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 83.358953][ T5147] RIP: 0033:0x7fa0a186eec9 [ 83.358972][ T5147] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 83.358996][ T5147] RSP: 002b:00007fa0a02d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 83.359021][ T5147] RAX: ffffffffffffffda RBX: 00007fa0a1ac5fa0 RCX: 00007fa0a186eec9 [ 83.359038][ T5147] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000200000000080 [ 83.359055][ T5147] RBP: 00007fa0a02d7090 R08: 0000000000000000 R09: 0000000000000000 [ 83.359071][ T5147] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 83.359086][ T5147] R13: 00007fa0a1ac6038 R14: 00007fa0a1ac5fa0 R15: 00007ffd70ef7da8 [ 83.359147][ T5147] [ 83.553300][ T29] kauditd_printk_skb: 1011 callbacks suppressed [ 83.553319][ T29] audit: type=1400 audit(1759580028.701:5072): avc: denied { read write } for pid=3308 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 83.599240][ T29] audit: type=1400 audit(1759580028.741:5073): avc: denied { create } for pid=5143 comm="syz.4.643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 83.630323][ T29] audit: type=1400 audit(1759580028.741:5074): avc: denied { prog_load } for pid=5138 comm="syz.0.641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 83.649468][ T29] audit: type=1400 audit(1759580028.741:5075): avc: denied { kexec_image_load } for pid=5138 comm="syz.0.641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=0 [ 83.680795][ T29] audit: type=1400 audit(1759580028.771:5076): avc: denied { read write } for pid=3305 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 83.705452][ T29] audit: type=1400 audit(1759580028.771:5077): avc: denied { prog_load } for pid=5151 comm="syz.1.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 83.724749][ T29] audit: type=1326 audit(1759580028.771:5078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5151 comm="syz.1.646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb1b58feec9 code=0x7ffc0000 [ 83.748473][ T29] audit: type=1326 audit(1759580028.801:5079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5151 comm="syz.1.646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb1b58feec9 code=0x7ffc0000 [ 83.772083][ T29] audit: type=1326 audit(1759580028.801:5080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5151 comm="syz.1.646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fb1b58feec9 code=0x7ffc0000 [ 83.795672][ T29] audit: type=1326 audit(1759580028.801:5081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5151 comm="syz.1.646" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fb1b58fef03 code=0x7ffc0000 [ 84.303675][ T5191] FAULT_INJECTION: forcing a failure. [ 84.303675][ T5191] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 84.317124][ T5191] CPU: 1 UID: 0 PID: 5191 Comm: syz.4.661 Not tainted syzkaller #0 PREEMPT(voluntary) [ 84.317159][ T5191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 84.317238][ T5191] Call Trace: [ 84.317243][ T5191] [ 84.317251][ T5191] __dump_stack+0x1d/0x30 [ 84.317297][ T5191] dump_stack_lvl+0xe8/0x140 [ 84.317341][ T5191] dump_stack+0x15/0x1b [ 84.317387][ T5191] should_fail_ex+0x265/0x280 [ 84.317485][ T5191] should_fail+0xb/0x20 [ 84.317525][ T5191] should_fail_usercopy+0x1a/0x20 [ 84.317558][ T5191] _copy_from_user+0x1c/0xb0 [ 84.317583][ T5191] snd_seq_ioctl+0x125/0x300 [ 84.317614][ T5191] ? __pfx_snd_seq_ioctl+0x10/0x10 [ 84.317641][ T5191] __se_sys_ioctl+0xcb/0x140 [ 84.317667][ T5191] __x64_sys_ioctl+0x43/0x50 [ 84.317692][ T5191] x64_sys_call+0x1816/0x3000 [ 84.317751][ T5191] do_syscall_64+0xd2/0x200 [ 84.317778][ T5191] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 84.317861][ T5191] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 84.317894][ T5191] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 84.317922][ T5191] RIP: 0033:0x7f8a7932eec9 [ 84.318003][ T5191] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 84.318027][ T5191] RSP: 002b:00007f8a77d8f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 84.318088][ T5191] RAX: ffffffffffffffda RBX: 00007f8a79585fa0 RCX: 00007f8a7932eec9 [ 84.318102][ T5191] RDX: 0000200000000280 RSI: 0000000040605346 RDI: 0000000000000003 [ 84.318114][ T5191] RBP: 00007f8a77d8f090 R08: 0000000000000000 R09: 0000000000000000 [ 84.318127][ T5191] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 84.318140][ T5191] R13: 00007f8a79586038 R14: 00007f8a79585fa0 R15: 00007ffd4530a228 [ 84.318157][ T5191] [ 85.107232][ T5215] FAULT_INJECTION: forcing a failure. [ 85.107232][ T5215] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 85.120499][ T5215] CPU: 1 UID: 0 PID: 5215 Comm: syz.4.668 Not tainted syzkaller #0 PREEMPT(voluntary) [ 85.120528][ T5215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 85.120556][ T5215] Call Trace: [ 85.120563][ T5215] [ 85.120573][ T5215] __dump_stack+0x1d/0x30 [ 85.120620][ T5215] dump_stack_lvl+0xe8/0x140 [ 85.120662][ T5215] dump_stack+0x15/0x1b [ 85.120765][ T5215] should_fail_ex+0x265/0x280 [ 85.120876][ T5215] should_fail+0xb/0x20 [ 85.120910][ T5215] should_fail_usercopy+0x1a/0x20 [ 85.120962][ T5215] _copy_to_user+0x20/0xa0 [ 85.120999][ T5215] simple_read_from_buffer+0xb5/0x130 [ 85.121064][ T5215] proc_fail_nth_read+0x10e/0x150 [ 85.121095][ T5215] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 85.121130][ T5215] vfs_read+0x1a8/0x770 [ 85.121214][ T5215] ? __fget_files+0x184/0x1c0 [ 85.121326][ T5215] ? __rcu_read_unlock+0x4f/0x70 [ 85.121350][ T5215] ? __fget_files+0x184/0x1c0 [ 85.121383][ T5215] ksys_read+0xda/0x1a0 [ 85.121420][ T5215] __x64_sys_read+0x40/0x50 [ 85.121460][ T5215] x64_sys_call+0x27c0/0x3000 [ 85.121480][ T5215] do_syscall_64+0xd2/0x200 [ 85.121513][ T5215] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 85.121590][ T5215] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 85.121627][ T5215] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 85.121655][ T5215] RIP: 0033:0x7f8a7932d8dc [ 85.121674][ T5215] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 85.121696][ T5215] RSP: 002b:00007f8a77d8f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 85.121719][ T5215] RAX: ffffffffffffffda RBX: 00007f8a79585fa0 RCX: 00007f8a7932d8dc [ 85.121780][ T5215] RDX: 000000000000000f RSI: 00007f8a77d8f0a0 RDI: 0000000000000003 [ 85.121793][ T5215] RBP: 00007f8a77d8f090 R08: 0000000000000000 R09: 0000000000000000 [ 85.121809][ T5215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 85.121825][ T5215] R13: 00007f8a79586038 R14: 00007f8a79585fa0 R15: 00007ffd4530a228 [ 85.121846][ T5215] [ 85.634331][ T5227] __nla_validate_parse: 7 callbacks suppressed [ 85.634349][ T5227] netlink: 4 bytes leftover after parsing attributes in process `syz.4.675'. [ 85.892781][ T5227] netlink: 4 bytes leftover after parsing attributes in process `syz.4.675'. [ 85.931275][ T5227] sch_fq: defrate 4294967295 ignored. [ 85.951453][ T5227] netlink: 28 bytes leftover after parsing attributes in process `syz.4.675'. [ 85.960354][ T5227] netlink: 28 bytes leftover after parsing attributes in process `syz.4.675'. [ 86.097768][ T5248] netlink: 12 bytes leftover after parsing attributes in process `syz.3.680'. [ 86.122096][ T5248] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5248 comm=syz.3.680 [ 86.178697][ T5251] netlink: 4 bytes leftover after parsing attributes in process `syz.3.682'. [ 86.204122][ T5251] sch_fq: defrate 4294967295 ignored. [ 86.210170][ T5251] netlink: 28 bytes leftover after parsing attributes in process `syz.3.682'. [ 86.219428][ T5251] netlink: 28 bytes leftover after parsing attributes in process `syz.3.682'. [ 86.696995][ T5269] netlink: 28 bytes leftover after parsing attributes in process `syz.3.687'. [ 86.747002][ T5269] netem: change failed [ 87.497188][ T5301] FAULT_INJECTION: forcing a failure. [ 87.497188][ T5301] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 87.510432][ T5301] CPU: 0 UID: 0 PID: 5301 Comm: syz.3.701 Not tainted syzkaller #0 PREEMPT(voluntary) [ 87.510468][ T5301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 87.510513][ T5301] Call Trace: [ 87.510521][ T5301] [ 87.510529][ T5301] __dump_stack+0x1d/0x30 [ 87.510612][ T5301] dump_stack_lvl+0xe8/0x140 [ 87.510646][ T5301] dump_stack+0x15/0x1b [ 87.510720][ T5301] should_fail_ex+0x265/0x280 [ 87.510760][ T5301] should_fail+0xb/0x20 [ 87.510795][ T5301] should_fail_usercopy+0x1a/0x20 [ 87.510817][ T5301] _copy_from_user+0x1c/0xb0 [ 87.510855][ T5301] ___sys_sendmsg+0xc1/0x1d0 [ 87.510885][ T5301] __x64_sys_sendmsg+0xd4/0x160 [ 87.510907][ T5301] x64_sys_call+0x191e/0x3000 [ 87.510927][ T5301] do_syscall_64+0xd2/0x200 [ 87.511086][ T5301] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 87.511114][ T5301] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 87.511138][ T5301] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 87.511164][ T5301] RIP: 0033:0x7fa0a186eec9 [ 87.511182][ T5301] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 87.511278][ T5301] RSP: 002b:00007fa0a02d7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 87.511300][ T5301] RAX: ffffffffffffffda RBX: 00007fa0a1ac5fa0 RCX: 00007fa0a186eec9 [ 87.511314][ T5301] RDX: 0000000000000000 RSI: 00002000000037c0 RDI: 0000000000000003 [ 87.511330][ T5301] RBP: 00007fa0a02d7090 R08: 0000000000000000 R09: 0000000000000000 [ 87.511346][ T5301] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 87.511362][ T5301] R13: 00007fa0a1ac6038 R14: 00007fa0a1ac5fa0 R15: 00007ffd70ef7da8 [ 87.511385][ T5301] [ 88.077663][ T5319] netlink: 16 bytes leftover after parsing attributes in process `syz.4.706'. [ 88.108423][ T5319] sch_fq: defrate 4294967295 ignored. [ 88.390244][ T5336] sch_fq: defrate 4294967295 ignored. [ 88.566910][ T29] kauditd_printk_skb: 589 callbacks suppressed [ 88.566927][ T29] audit: type=1400 audit(1759580033.711:5671): avc: denied { prog_load } for pid=5338 comm="syz.0.715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 88.611042][ T29] audit: type=1400 audit(1759580033.711:5672): avc: denied { prog_load } for pid=5338 comm="syz.0.715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 88.672987][ T29] audit: type=1400 audit(1759580033.801:5673): avc: denied { create } for pid=5348 comm="syz.2.717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 88.692888][ T29] audit: type=1400 audit(1759580033.801:5674): avc: denied { map_create } for pid=5348 comm="syz.2.717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 88.711994][ T29] audit: type=1400 audit(1759580033.801:5675): avc: denied { prog_load } for pid=5348 comm="syz.2.717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 88.878137][ T5355] audit: audit_backlog=65 > audit_backlog_limit=64 [ 88.884885][ T5355] audit: audit_lost=5 audit_rate_limit=0 audit_backlog_limit=64 [ 88.892661][ T5355] audit: backlog limit exceeded [ 88.897781][ T5353] audit: audit_backlog=65 > audit_backlog_limit=64 [ 88.904548][ T5353] audit: audit_lost=6 audit_rate_limit=0 audit_backlog_limit=64 [ 88.964044][ T5358] sch_fq: defrate 4294967295 ignored. [ 88.995650][ T5355] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5355 comm=syz.2.719 [ 89.193887][ T5373] bridge0: entered promiscuous mode [ 89.199344][ T5373] macvtap1: entered allmulticast mode [ 89.204945][ T5373] bridge0: entered allmulticast mode [ 89.218807][ T5373] bridge0: port 3(macvtap1) entered blocking state [ 89.225498][ T5373] bridge0: port 3(macvtap1) entered disabled state [ 89.243012][ T5373] bridge0: left allmulticast mode [ 89.248107][ T5373] bridge0: left promiscuous mode [ 89.322587][ T5377] bridge_slave_0: left promiscuous mode [ 89.328334][ T5377] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.342363][ T5377] bridge_slave_1: left allmulticast mode [ 89.348078][ T5377] bridge_slave_1: left promiscuous mode [ 89.353851][ T5377] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.384445][ T5377] bond0: (slave bond_slave_0): Releasing backup interface [ 89.396937][ T5377] bond0: (slave bond_slave_1): Releasing backup interface [ 89.409520][ T5377] team0: Port device team_slave_0 removed [ 89.420929][ T5377] team0: Port device team_slave_1 removed [ 89.428001][ T5377] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 89.435568][ T5377] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 89.444659][ T5377] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 89.452205][ T5377] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 89.462079][ T5377] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 89.680817][ T5390] 8021q: adding VLAN 0 to HW filter on device bond1 [ 89.878342][ T5400] FAULT_INJECTION: forcing a failure. [ 89.878342][ T5400] name failslab, interval 1, probability 0, space 0, times 0 [ 89.891183][ T5400] CPU: 0 UID: 0 PID: 5400 Comm: syz.4.736 Not tainted syzkaller #0 PREEMPT(voluntary) [ 89.891257][ T5400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 89.891272][ T5400] Call Trace: [ 89.891279][ T5400] [ 89.891286][ T5400] __dump_stack+0x1d/0x30 [ 89.891409][ T5400] dump_stack_lvl+0xe8/0x140 [ 89.891443][ T5400] dump_stack+0x15/0x1b [ 89.891530][ T5400] should_fail_ex+0x265/0x280 [ 89.891572][ T5400] should_failslab+0x8c/0xb0 [ 89.891605][ T5400] kmem_cache_alloc_noprof+0x50/0x480 [ 89.891646][ T5400] ? alloc_empty_file+0x76/0x200 [ 89.891755][ T5400] ? mntput+0x4b/0x80 [ 89.891795][ T5400] alloc_empty_file+0x76/0x200 [ 89.891837][ T5400] path_openat+0x68/0x2170 [ 89.891859][ T5400] ? _parse_integer_limit+0x170/0x190 [ 89.891939][ T5400] ? kstrtoull+0x111/0x140 [ 89.891980][ T5400] ? kstrtouint+0x76/0xc0 [ 89.892022][ T5400] do_filp_open+0x109/0x230 [ 89.892135][ T5400] do_sys_openat2+0xa6/0x110 [ 89.892190][ T5400] __x64_sys_openat+0xf2/0x120 [ 89.892284][ T5400] x64_sys_call+0x2eab/0x3000 [ 89.892334][ T5400] do_syscall_64+0xd2/0x200 [ 89.892387][ T5400] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 89.892419][ T5400] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 89.892443][ T5400] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 89.892464][ T5400] RIP: 0033:0x7f8a7932eec9 [ 89.892482][ T5400] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 89.892563][ T5400] RSP: 002b:00007f8a77d8f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 89.892589][ T5400] RAX: ffffffffffffffda RBX: 00007f8a79585fa0 RCX: 00007f8a7932eec9 [ 89.892611][ T5400] RDX: 000000000000275a RSI: 0000200000000840 RDI: ffffffffffffff9c [ 89.892624][ T5400] RBP: 00007f8a77d8f090 R08: 0000000000000000 R09: 0000000000000000 [ 89.892636][ T5400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 89.892648][ T5400] R13: 00007f8a79586038 R14: 00007f8a79585fa0 R15: 00007ffd4530a228 [ 89.892667][ T5400] [ 91.277251][ T5464] __nla_validate_parse: 8 callbacks suppressed [ 91.277268][ T5464] netlink: 20 bytes leftover after parsing attributes in process `syz.2.757'. [ 91.292897][ T5464] netlink: 4 bytes leftover after parsing attributes in process `syz.2.757'. [ 91.631196][ T5473] FAULT_INJECTION: forcing a failure. [ 91.631196][ T5473] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 91.644336][ T5473] CPU: 0 UID: 0 PID: 5473 Comm: syz.4.761 Not tainted syzkaller #0 PREEMPT(voluntary) [ 91.644363][ T5473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 91.644398][ T5473] Call Trace: [ 91.644408][ T5473] [ 91.644416][ T5473] __dump_stack+0x1d/0x30 [ 91.644453][ T5473] dump_stack_lvl+0xe8/0x140 [ 91.644568][ T5473] dump_stack+0x15/0x1b [ 91.644610][ T5473] should_fail_ex+0x265/0x280 [ 91.644728][ T5473] should_fail+0xb/0x20 [ 91.644816][ T5473] should_fail_usercopy+0x1a/0x20 [ 91.644842][ T5473] _copy_from_user+0x1c/0xb0 [ 91.644876][ T5473] __sys_bpf+0x183/0x7c0 [ 91.645046][ T5473] __x64_sys_bpf+0x41/0x50 [ 91.645085][ T5473] x64_sys_call+0x2aee/0x3000 [ 91.645112][ T5473] do_syscall_64+0xd2/0x200 [ 91.645216][ T5473] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 91.645252][ T5473] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 91.645281][ T5473] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 91.645347][ T5473] RIP: 0033:0x7f8a7932eec9 [ 91.645362][ T5473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.645380][ T5473] RSP: 002b:00007f8a77d8f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 91.645400][ T5473] RAX: ffffffffffffffda RBX: 00007f8a79585fa0 RCX: 00007f8a7932eec9 [ 91.645420][ T5473] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 91.645432][ T5473] RBP: 00007f8a77d8f090 R08: 0000000000000000 R09: 0000000000000000 [ 91.645448][ T5473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 91.645465][ T5473] R13: 00007f8a79586038 R14: 00007f8a79585fa0 R15: 00007ffd4530a228 [ 91.645488][ T5473] [ 91.862617][ T5480] FAULT_INJECTION: forcing a failure. [ 91.862617][ T5480] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 91.875787][ T5480] CPU: 0 UID: 0 PID: 5480 Comm: syz.4.764 Not tainted syzkaller #0 PREEMPT(voluntary) [ 91.875824][ T5480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 91.875929][ T5480] Call Trace: [ 91.875937][ T5480] [ 91.875946][ T5480] __dump_stack+0x1d/0x30 [ 91.875982][ T5480] dump_stack_lvl+0xe8/0x140 [ 91.876074][ T5480] dump_stack+0x15/0x1b [ 91.876114][ T5480] should_fail_ex+0x265/0x280 [ 91.876229][ T5480] should_fail+0xb/0x20 [ 91.876271][ T5480] should_fail_usercopy+0x1a/0x20 [ 91.876298][ T5480] _copy_to_user+0x20/0xa0 [ 91.876329][ T5480] simple_read_from_buffer+0xb5/0x130 [ 91.876360][ T5480] proc_fail_nth_read+0x10e/0x150 [ 91.876528][ T5480] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 91.876569][ T5480] vfs_read+0x1a8/0x770 [ 91.876590][ T5480] ? __fget_files+0x184/0x1c0 [ 91.876636][ T5480] ? __rcu_read_unlock+0x4f/0x70 [ 91.876665][ T5480] ? __fget_files+0x184/0x1c0 [ 91.876694][ T5480] ksys_read+0xda/0x1a0 [ 91.876726][ T5480] __x64_sys_read+0x40/0x50 [ 91.876882][ T5480] x64_sys_call+0x27c0/0x3000 [ 91.876903][ T5480] do_syscall_64+0xd2/0x200 [ 91.876935][ T5480] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 91.876968][ T5480] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 91.877016][ T5480] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 91.877038][ T5480] RIP: 0033:0x7f8a7932d8dc [ 91.877053][ T5480] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 91.877080][ T5480] RSP: 002b:00007f8a77d8f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 91.877099][ T5480] RAX: ffffffffffffffda RBX: 00007f8a79585fa0 RCX: 00007f8a7932d8dc [ 91.877114][ T5480] RDX: 000000000000000f RSI: 00007f8a77d8f0a0 RDI: 0000000000000003 [ 91.877130][ T5480] RBP: 00007f8a77d8f090 R08: 0000000000000000 R09: 0000000000000000 [ 91.877142][ T5480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 91.877154][ T5480] R13: 00007f8a79586038 R14: 00007f8a79585fa0 R15: 00007ffd4530a228 [ 91.877184][ T5480] [ 92.276029][ T5489] FAULT_INJECTION: forcing a failure. [ 92.276029][ T5489] name failslab, interval 1, probability 0, space 0, times 0 [ 92.288849][ T5489] CPU: 0 UID: 0 PID: 5489 Comm: syz.2.769 Not tainted syzkaller #0 PREEMPT(voluntary) [ 92.288885][ T5489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 92.288899][ T5489] Call Trace: [ 92.288966][ T5489] [ 92.288976][ T5489] __dump_stack+0x1d/0x30 [ 92.289012][ T5489] dump_stack_lvl+0xe8/0x140 [ 92.289104][ T5489] dump_stack+0x15/0x1b [ 92.289135][ T5489] should_fail_ex+0x265/0x280 [ 92.289169][ T5489] should_failslab+0x8c/0xb0 [ 92.289272][ T5489] kmem_cache_alloc_noprof+0x50/0x480 [ 92.289298][ T5489] ? ioctx_alloc+0xf5/0x4e0 [ 92.289335][ T5489] ? __fget_files+0x184/0x1c0 [ 92.289369][ T5489] ioctx_alloc+0xf5/0x4e0 [ 92.289415][ T5489] ? fput+0x8f/0xc0 [ 92.289483][ T5489] __se_sys_io_setup+0x6b/0x1b0 [ 92.289522][ T5489] __x64_sys_io_setup+0x31/0x40 [ 92.289604][ T5489] x64_sys_call+0x2f0e/0x3000 [ 92.289628][ T5489] do_syscall_64+0xd2/0x200 [ 92.289655][ T5489] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 92.289748][ T5489] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 92.289857][ T5489] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 92.289890][ T5489] RIP: 0033:0x7effc74ceec9 [ 92.289905][ T5489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 92.289929][ T5489] RSP: 002b:00007effc5f37038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce [ 92.289961][ T5489] RAX: ffffffffffffffda RBX: 00007effc7725fa0 RCX: 00007effc74ceec9 [ 92.289978][ T5489] RDX: 0000000000000000 RSI: 0000200000000680 RDI: 0000000000002004 [ 92.289995][ T5489] RBP: 00007effc5f37090 R08: 0000000000000000 R09: 0000000000000000 [ 92.290022][ T5489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.290038][ T5489] R13: 00007effc7726038 R14: 00007effc7725fa0 R15: 00007ffcfef7d388 [ 92.290063][ T5489] [ 92.741985][ T5521] FAULT_INJECTION: forcing a failure. [ 92.741985][ T5521] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 92.755327][ T5521] CPU: 1 UID: 0 PID: 5521 Comm: syz.0.780 Not tainted syzkaller #0 PREEMPT(voluntary) [ 92.755362][ T5521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 92.755379][ T5521] Call Trace: [ 92.755387][ T5521] [ 92.755405][ T5521] __dump_stack+0x1d/0x30 [ 92.755473][ T5521] dump_stack_lvl+0xe8/0x140 [ 92.755512][ T5521] dump_stack+0x15/0x1b [ 92.755559][ T5521] should_fail_ex+0x265/0x280 [ 92.755603][ T5521] should_fail+0xb/0x20 [ 92.755664][ T5521] should_fail_usercopy+0x1a/0x20 [ 92.755691][ T5521] _copy_to_user+0x20/0xa0 [ 92.755724][ T5521] simple_read_from_buffer+0xb5/0x130 [ 92.755809][ T5521] proc_fail_nth_read+0x10e/0x150 [ 92.755842][ T5521] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 92.755871][ T5521] vfs_read+0x1a8/0x770 [ 92.755910][ T5521] ? __fget_files+0x184/0x1c0 [ 92.756009][ T5521] ? __rcu_read_unlock+0x4f/0x70 [ 92.756041][ T5521] ? __fget_files+0x184/0x1c0 [ 92.756071][ T5521] ksys_read+0xda/0x1a0 [ 92.756094][ T5521] __x64_sys_read+0x40/0x50 [ 92.756198][ T5521] x64_sys_call+0x27c0/0x3000 [ 92.756220][ T5521] do_syscall_64+0xd2/0x200 [ 92.756246][ T5521] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 92.756272][ T5521] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 92.756367][ T5521] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 92.756402][ T5521] RIP: 0033:0x7f0d8401d8dc [ 92.756418][ T5521] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 92.756440][ T5521] RSP: 002b:00007f0d82a7f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 92.756534][ T5521] RAX: ffffffffffffffda RBX: 00007f0d84275fa0 RCX: 00007f0d8401d8dc [ 92.756551][ T5521] RDX: 000000000000000f RSI: 00007f0d82a7f0a0 RDI: 0000000000000003 [ 92.756567][ T5521] RBP: 00007f0d82a7f090 R08: 0000000000000000 R09: 0000000000000000 [ 92.756583][ T5521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.756599][ T5521] R13: 00007f0d84276038 R14: 00007f0d84275fa0 R15: 00007ffec413e208 [ 92.756622][ T5521] [ 92.851322][ T5518] bridge1: entered promiscuous mode [ 92.972265][ T5520] netlink: 28 bytes leftover after parsing attributes in process `syz.4.775'. [ 93.327991][ T5542] netlink: 8 bytes leftover after parsing attributes in process `syz.1.789'. [ 93.330947][ T5543] netlink: 4 bytes leftover after parsing attributes in process `syz.4.787'. [ 93.386833][ T5542] netlink: 4 bytes leftover after parsing attributes in process `syz.1.789'. [ 93.408696][ T5551] sch_fq: defrate 4294967295 ignored. [ 93.414865][ T5551] netlink: 28 bytes leftover after parsing attributes in process `syz.4.787'. [ 93.421867][ T5542] sch_fq: defrate 4294967295 ignored. [ 93.424191][ T5551] netlink: 28 bytes leftover after parsing attributes in process `syz.4.787'. [ 93.571144][ T29] kauditd_printk_skb: 9538 callbacks suppressed [ 93.571162][ T29] audit: type=1400 audit(1759580038.721:12030): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 93.615084][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 93.621691][ T3030] audit: audit_lost=1068 audit_rate_limit=0 audit_backlog_limit=64 [ 93.629616][ T3030] audit: backlog limit exceeded [ 93.634873][ T5567] audit: audit_backlog=65 > audit_backlog_limit=64 [ 93.635438][ T5568] audit: audit_backlog=65 > audit_backlog_limit=64 [ 93.641680][ T5567] audit: audit_lost=1069 audit_rate_limit=0 audit_backlog_limit=64 [ 93.648202][ T5568] audit: audit_lost=1070 audit_rate_limit=0 audit_backlog_limit=64 [ 93.656166][ T5567] audit: backlog limit exceeded [ 93.669109][ T5568] audit: backlog limit exceeded [ 93.734581][ T5571] FAULT_INJECTION: forcing a failure. [ 93.734581][ T5571] name failslab, interval 1, probability 0, space 0, times 0 [ 93.747687][ T5571] CPU: 0 UID: 0 PID: 5571 Comm: syz.2.799 Not tainted syzkaller #0 PREEMPT(voluntary) [ 93.747796][ T5571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 93.747813][ T5571] Call Trace: [ 93.747821][ T5571] [ 93.747852][ T5571] __dump_stack+0x1d/0x30 [ 93.747908][ T5571] dump_stack_lvl+0xe8/0x140 [ 93.748012][ T5571] dump_stack+0x15/0x1b [ 93.748045][ T5571] should_fail_ex+0x265/0x280 [ 93.748117][ T5571] should_failslab+0x8c/0xb0 [ 93.748151][ T5571] kmem_cache_alloc_noprof+0x50/0x480 [ 93.748185][ T5571] ? audit_log_start+0x342/0x720 [ 93.748245][ T5571] audit_log_start+0x342/0x720 [ 93.748290][ T5571] ? kstrtouint+0x76/0xc0 [ 93.748406][ T5571] audit_seccomp+0x48/0x100 [ 93.748484][ T5571] ? __seccomp_filter+0x82d/0x1250 [ 93.748513][ T5571] __seccomp_filter+0x83e/0x1250 [ 93.748546][ T5571] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 93.748664][ T5571] ? vfs_write+0x7e8/0x960 [ 93.748693][ T5571] __secure_computing+0x82/0x150 [ 93.748718][ T5571] syscall_trace_enter+0xcf/0x1e0 [ 93.748788][ T5571] do_syscall_64+0xac/0x200 [ 93.748815][ T5571] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 93.748847][ T5571] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 93.748879][ T5571] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 93.748912][ T5571] RIP: 0033:0x7effc74ceec9 [ 93.748931][ T5571] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 93.748962][ T5571] RSP: 002b:00007effc5f37038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce [ 93.748985][ T5571] RAX: ffffffffffffffda RBX: 00007effc7725fa0 RCX: 00007effc74ceec9 [ 93.748997][ T5571] RDX: 0000000000000000 RSI: 0000200000002400 RDI: 0000000000000002 [ 93.749009][ T5571] RBP: 00007effc5f37090 R08: 0000000000000000 R09: 0000000000000000 [ 93.749104][ T5571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 93.749116][ T5571] R13: 00007effc7726038 R14: 00007effc7725fa0 R15: 00007ffcfef7d388 [ 93.749135][ T5571] [ 93.784406][ T5568] netlink: 28 bytes leftover after parsing attributes in process `syz.1.794'. [ 94.046095][ T5581] netlink: 3 bytes leftover after parsing attributes in process `syz.2.803'. [ 94.061102][ T5581] 0ªX¹¦À: renamed from caif0 [ 94.122231][ T5581] 0ªX¹¦À: entered allmulticast mode [ 94.127511][ T5581] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 94.185258][ T5586] sch_fq: defrate 4294967295 ignored. [ 94.234136][ T5583] netlink: 'syz.3.801': attribute type 21 has an invalid length. [ 94.476500][ T5600] sch_fq: defrate 4294967295 ignored. [ 94.728473][ T5613] FAULT_INJECTION: forcing a failure. [ 94.728473][ T5613] name failslab, interval 1, probability 0, space 0, times 0 [ 94.741410][ T5613] CPU: 1 UID: 0 PID: 5613 Comm: syz.2.813 Not tainted syzkaller #0 PREEMPT(voluntary) [ 94.741438][ T5613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 94.741452][ T5613] Call Trace: [ 94.741460][ T5613] [ 94.741532][ T5613] __dump_stack+0x1d/0x30 [ 94.741572][ T5613] dump_stack_lvl+0xe8/0x140 [ 94.741674][ T5613] dump_stack+0x15/0x1b [ 94.741714][ T5613] should_fail_ex+0x265/0x280 [ 94.741784][ T5613] should_failslab+0x8c/0xb0 [ 94.741819][ T5613] kmem_cache_alloc_noprof+0x50/0x480 [ 94.741845][ T5613] ? getname_flags+0x80/0x3b0 [ 94.741962][ T5613] getname_flags+0x80/0x3b0 [ 94.741998][ T5613] __se_sys_newlstat+0x4b/0x280 [ 94.742113][ T5613] ? fput+0x8f/0xc0 [ 94.742164][ T5613] ? ksys_write+0x192/0x1a0 [ 94.742191][ T5613] __x64_sys_newlstat+0x31/0x40 [ 94.742230][ T5613] x64_sys_call+0x1b88/0x3000 [ 94.742314][ T5613] do_syscall_64+0xd2/0x200 [ 94.742345][ T5613] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 94.742372][ T5613] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 94.742425][ T5613] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 94.742454][ T5613] RIP: 0033:0x7effc74ceec9 [ 94.742473][ T5613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 94.742498][ T5613] RSP: 002b:00007effc5f37038 EFLAGS: 00000246 ORIG_RAX: 0000000000000006 [ 94.742520][ T5613] RAX: ffffffffffffffda RBX: 00007effc7725fa0 RCX: 00007effc74ceec9 [ 94.742533][ T5613] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000680 [ 94.742545][ T5613] RBP: 00007effc5f37090 R08: 0000000000000000 R09: 0000000000000000 [ 94.742561][ T5613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 94.742577][ T5613] R13: 00007effc7726038 R14: 00007effc7725fa0 R15: 00007ffcfef7d388 [ 94.742601][ T5613] [ 95.604681][ T5626] netlink: 'syz.0.817': attribute type 30 has an invalid length. [ 95.881251][ T5638] sch_fq: defrate 4294967295 ignored. [ 96.011390][ T5647] sch_fq: defrate 4294967295 ignored. [ 96.066219][ T5650] FAULT_INJECTION: forcing a failure. [ 96.066219][ T5650] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 96.079576][ T5650] CPU: 0 UID: 0 PID: 5650 Comm: syz.0.826 Not tainted syzkaller #0 PREEMPT(voluntary) [ 96.079608][ T5650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 96.079629][ T5650] Call Trace: [ 96.079637][ T5650] [ 96.079648][ T5650] __dump_stack+0x1d/0x30 [ 96.079690][ T5650] dump_stack_lvl+0xe8/0x140 [ 96.079724][ T5650] dump_stack+0x15/0x1b [ 96.079790][ T5650] should_fail_ex+0x265/0x280 [ 96.079835][ T5650] should_fail+0xb/0x20 [ 96.079923][ T5650] should_fail_usercopy+0x1a/0x20 [ 96.079949][ T5650] _copy_from_user+0x1c/0xb0 [ 96.079985][ T5650] ___sys_sendmsg+0xc1/0x1d0 [ 96.080051][ T5650] __sys_sendmmsg+0x178/0x300 [ 96.080078][ T5650] __x64_sys_sendmmsg+0x57/0x70 [ 96.080101][ T5650] x64_sys_call+0x1c4a/0x3000 [ 96.080128][ T5650] do_syscall_64+0xd2/0x200 [ 96.080214][ T5650] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 96.080243][ T5650] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 96.080275][ T5650] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 96.080312][ T5650] RIP: 0033:0x7f0d8401eec9 [ 96.080332][ T5650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 96.080350][ T5650] RSP: 002b:00007f0d82a7f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 96.080369][ T5650] RAX: ffffffffffffffda RBX: 00007f0d84275fa0 RCX: 00007f0d8401eec9 [ 96.080381][ T5650] RDX: 0400000000000235 RSI: 0000200000000000 RDI: 0000000000000003 [ 96.080395][ T5650] RBP: 00007f0d82a7f090 R08: 0000000000000000 R09: 0000000000000000 [ 96.080411][ T5650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 96.080473][ T5650] R13: 00007f0d84276038 R14: 00007f0d84275fa0 R15: 00007ffec413e208 [ 96.080490][ T5650] [ 96.403986][ T5654] __nla_validate_parse: 12 callbacks suppressed [ 96.404006][ T5654] netlink: 8 bytes leftover after parsing attributes in process `syz.3.827'. [ 96.581914][ T5660] FAULT_INJECTION: forcing a failure. [ 96.581914][ T5660] name failslab, interval 1, probability 0, space 0, times 0 [ 96.594700][ T5660] CPU: 0 UID: 0 PID: 5660 Comm: syz.4.828 Not tainted syzkaller #0 PREEMPT(voluntary) [ 96.594730][ T5660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 96.594811][ T5660] Call Trace: [ 96.594820][ T5660] [ 96.594830][ T5660] __dump_stack+0x1d/0x30 [ 96.594878][ T5660] dump_stack_lvl+0xe8/0x140 [ 96.594966][ T5660] dump_stack+0x15/0x1b [ 96.595008][ T5660] should_fail_ex+0x265/0x280 [ 96.595049][ T5660] should_failslab+0x8c/0xb0 [ 96.595135][ T5660] kmem_cache_alloc_noprof+0x50/0x480 [ 96.595194][ T5660] ? audit_log_start+0x342/0x720 [ 96.595275][ T5660] audit_log_start+0x342/0x720 [ 96.595313][ T5660] ? kstrtouint+0x76/0xc0 [ 96.595346][ T5660] audit_seccomp+0x48/0x100 [ 96.595458][ T5660] ? __seccomp_filter+0x82d/0x1250 [ 96.595490][ T5660] __seccomp_filter+0x83e/0x1250 [ 96.595525][ T5660] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 96.595561][ T5660] ? vfs_write+0x7e8/0x960 [ 96.595625][ T5660] __secure_computing+0x82/0x150 [ 96.595721][ T5660] syscall_trace_enter+0xcf/0x1e0 [ 96.595757][ T5660] do_syscall_64+0xac/0x200 [ 96.595783][ T5660] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 96.595819][ T5660] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 96.595892][ T5660] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 96.595916][ T5660] RIP: 0033:0x7f8a7932eec9 [ 96.595932][ T5660] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 96.595955][ T5660] RSP: 002b:00007f8a77d8f038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 96.595980][ T5660] RAX: ffffffffffffffda RBX: 00007f8a79585fa0 RCX: 00007f8a7932eec9 [ 96.596056][ T5660] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffffff [ 96.596068][ T5660] RBP: 00007f8a77d8f090 R08: 0000000000000000 R09: 0000000000000000 [ 96.596080][ T5660] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 96.596092][ T5660] R13: 00007f8a79586038 R14: 00007f8a79585fa0 R15: 00007ffd4530a228 [ 96.596122][ T5660] [ 97.047667][ T5672] netlink: 4 bytes leftover after parsing attributes in process `syz.1.835'. [ 97.182409][ T5672] sch_fq: defrate 4294967295 ignored. [ 97.205606][ T5672] netlink: 28 bytes leftover after parsing attributes in process `syz.1.835'. [ 97.214657][ T5672] netlink: 28 bytes leftover after parsing attributes in process `syz.1.835'. [ 97.996564][ T5696] netlink: 4 bytes leftover after parsing attributes in process `syz.0.840'. [ 98.005459][ T5696] netlink: 'syz.0.840': attribute type 15 has an invalid length. [ 98.013778][ T5696] netlink: 'syz.0.840': attribute type 18 has an invalid length. [ 98.062972][ T5696] vxlan0: entered promiscuous mode [ 98.120539][ T1827] netdevsim netdevsim0 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 98.131834][ T1827] netdevsim netdevsim0 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 98.191085][ T1827] netdevsim netdevsim0 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 98.214436][ T1827] netdevsim netdevsim0 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 98.327426][ T5710] FAULT_INJECTION: forcing a failure. [ 98.327426][ T5710] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 98.340879][ T5710] CPU: 1 UID: 0 PID: 5710 Comm: syz.3.846 Not tainted syzkaller #0 PREEMPT(voluntary) [ 98.341019][ T5710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 98.341036][ T5710] Call Trace: [ 98.341043][ T5710] [ 98.341052][ T5710] __dump_stack+0x1d/0x30 [ 98.341166][ T5710] dump_stack_lvl+0xe8/0x140 [ 98.341215][ T5710] dump_stack+0x15/0x1b [ 98.341251][ T5710] should_fail_ex+0x265/0x280 [ 98.341403][ T5710] should_fail+0xb/0x20 [ 98.341461][ T5710] should_fail_usercopy+0x1a/0x20 [ 98.341487][ T5710] _copy_from_user+0x1c/0xb0 [ 98.341521][ T5710] kstrtouint_from_user+0x69/0xf0 [ 98.341587][ T5710] ? 0xffffffff81000000 [ 98.341600][ T5710] ? selinux_file_permission+0x1e4/0x320 [ 98.341638][ T5710] proc_fail_nth_write+0x50/0x160 [ 98.341745][ T5710] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 98.341775][ T5710] vfs_write+0x269/0x960 [ 98.341802][ T5710] ? vfs_read+0x4e6/0x770 [ 98.341827][ T5710] ? __rcu_read_unlock+0x4f/0x70 [ 98.341896][ T5710] ? __fget_files+0x184/0x1c0 [ 98.341978][ T5710] ksys_write+0xda/0x1a0 [ 98.342009][ T5710] __x64_sys_write+0x40/0x50 [ 98.342110][ T5710] x64_sys_call+0x2802/0x3000 [ 98.342131][ T5710] do_syscall_64+0xd2/0x200 [ 98.342158][ T5710] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 98.342244][ T5710] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 98.342395][ T5710] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 98.342424][ T5710] RIP: 0033:0x7fa0a186d97f [ 98.342453][ T5710] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 98.342538][ T5710] RSP: 002b:00007fa0a02d7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 98.342560][ T5710] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa0a186d97f [ 98.342572][ T5710] RDX: 0000000000000001 RSI: 00007fa0a02d70a0 RDI: 0000000000000003 [ 98.342584][ T5710] RBP: 00007fa0a02d7090 R08: 0000000000000000 R09: 0000000000000000 [ 98.342596][ T5710] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 98.342682][ T5710] R13: 00007fa0a1ac6038 R14: 00007fa0a1ac5fa0 R15: 00007ffd70ef7da8 [ 98.342705][ T5710] [ 98.567709][ T5711] netlink: 28 bytes leftover after parsing attributes in process `syz.2.844'. [ 98.581177][ T29] kauditd_printk_skb: 10768 callbacks suppressed [ 98.581193][ T29] audit: type=1400 audit(1759580043.731:20467): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 98.630207][ T29] audit: type=1400 audit(1759580043.731:20468): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 98.651291][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 98.651808][ T29] audit: type=1400 audit(1759580043.731:20469): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 98.658118][ T3030] audit: audit_lost=1849 audit_rate_limit=0 audit_backlog_limit=64 [ 98.679275][ T29] audit: type=1400 audit(1759580043.731:20470): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 98.687357][ T3030] audit: backlog limit exceeded [ 98.713979][ T29] audit: type=1400 audit(1759580043.731:20471): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 98.736001][ T29] audit: type=1400 audit(1759580043.731:20472): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 98.757405][ T29] audit: type=1400 audit(1759580043.731:20473): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 98.942285][ T5728] netlink: 4 bytes leftover after parsing attributes in process `syz.0.852'. [ 98.954773][ T5732] netlink: 4 bytes leftover after parsing attributes in process `syz.1.853'. [ 98.983983][ T5732] sch_fq: defrate 4294967295 ignored. [ 99.075337][ T5735] binfmt_misc: register: failed to install interpreter file ./file0 [ 99.454724][ T5760] FAULT_INJECTION: forcing a failure. [ 99.454724][ T5760] name failslab, interval 1, probability 0, space 0, times 0 [ 99.467596][ T5760] CPU: 0 UID: 0 PID: 5760 Comm: syz.1.863 Not tainted syzkaller #0 PREEMPT(voluntary) [ 99.467630][ T5760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 99.467677][ T5760] Call Trace: [ 99.467685][ T5760] [ 99.467695][ T5760] __dump_stack+0x1d/0x30 [ 99.467765][ T5760] dump_stack_lvl+0xe8/0x140 [ 99.467799][ T5760] dump_stack+0x15/0x1b [ 99.467832][ T5760] should_fail_ex+0x265/0x280 [ 99.467888][ T5760] should_failslab+0x8c/0xb0 [ 99.467922][ T5760] __kmalloc_noprof+0xa5/0x570 [ 99.467964][ T5760] ? ip_options_get+0x52/0x350 [ 99.468032][ T5760] ip_options_get+0x52/0x350 [ 99.468056][ T5760] do_ip_setsockopt+0x19d4/0x2240 [ 99.468095][ T5760] ip_setsockopt+0x58/0x110 [ 99.468141][ T5760] ipv6_setsockopt+0xfb/0x130 [ 99.468169][ T5760] tcp_setsockopt+0x98/0xb0 [ 99.468208][ T5760] sock_common_setsockopt+0x69/0x80 [ 99.468279][ T5760] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 99.468311][ T5760] __sys_setsockopt+0x184/0x200 [ 99.468350][ T5760] __x64_sys_setsockopt+0x64/0x80 [ 99.468388][ T5760] x64_sys_call+0x20ec/0x3000 [ 99.468409][ T5760] do_syscall_64+0xd2/0x200 [ 99.468439][ T5760] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 99.468516][ T5760] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 99.468543][ T5760] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 99.468569][ T5760] RIP: 0033:0x7fb1b58feec9 [ 99.468588][ T5760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 99.468610][ T5760] RSP: 002b:00007fb1b4367038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 99.468681][ T5760] RAX: ffffffffffffffda RBX: 00007fb1b5b55fa0 RCX: 00007fb1b58feec9 [ 99.468698][ T5760] RDX: 0000000000000004 RSI: 0004000000000000 RDI: 0000000000000004 [ 99.468715][ T5760] RBP: 00007fb1b4367090 R08: 0000000000000000 R09: 0000000000000000 [ 99.468727][ T5760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 99.468739][ T5760] R13: 00007fb1b5b56038 R14: 00007fb1b5b55fa0 R15: 00007ffc8b69db28 [ 99.468756][ T5760] [ 99.744933][ T5763] netlink: 12 bytes leftover after parsing attributes in process `syz.2.864'. [ 99.758468][ T5763] netlink: 4 bytes leftover after parsing attributes in process `syz.2.864'. [ 99.771837][ T5763] sch_fq: defrate 4294967295 ignored. [ 99.787204][ T5769] FAULT_INJECTION: forcing a failure. [ 99.787204][ T5769] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 99.800483][ T5769] CPU: 0 UID: 0 PID: 5769 Comm: syz.1.867 Not tainted syzkaller #0 PREEMPT(voluntary) [ 99.800515][ T5769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 99.800531][ T5769] Call Trace: [ 99.800540][ T5769] [ 99.800550][ T5769] __dump_stack+0x1d/0x30 [ 99.800593][ T5769] dump_stack_lvl+0xe8/0x140 [ 99.800671][ T5769] dump_stack+0x15/0x1b [ 99.800702][ T5769] should_fail_ex+0x265/0x280 [ 99.800743][ T5769] should_fail+0xb/0x20 [ 99.800786][ T5769] should_fail_usercopy+0x1a/0x20 [ 99.800827][ T5769] _copy_to_user+0x20/0xa0 [ 99.800861][ T5769] simple_read_from_buffer+0xb5/0x130 [ 99.800893][ T5769] proc_fail_nth_read+0x10e/0x150 [ 99.801003][ T5769] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 99.801087][ T5769] vfs_read+0x1a8/0x770 [ 99.801114][ T5769] ? __rcu_read_unlock+0x4f/0x70 [ 99.801144][ T5769] ? __fget_files+0x184/0x1c0 [ 99.801198][ T5769] ksys_read+0xda/0x1a0 [ 99.801228][ T5769] __x64_sys_read+0x40/0x50 [ 99.801359][ T5769] x64_sys_call+0x27c0/0x3000 [ 99.801383][ T5769] do_syscall_64+0xd2/0x200 [ 99.801416][ T5769] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 99.801471][ T5769] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 99.801503][ T5769] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 99.801532][ T5769] RIP: 0033:0x7fb1b58fd8dc [ 99.801552][ T5769] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 99.801572][ T5769] RSP: 002b:00007fb1b4367030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 99.801672][ T5769] RAX: ffffffffffffffda RBX: 00007fb1b5b55fa0 RCX: 00007fb1b58fd8dc [ 99.801691][ T5769] RDX: 000000000000000f RSI: 00007fb1b43670a0 RDI: 0000000000000004 [ 99.801708][ T5769] RBP: 00007fb1b4367090 R08: 0000000000000000 R09: 0000000000000000 [ 99.801725][ T5769] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 99.801741][ T5769] R13: 00007fb1b5b56038 R14: 00007fb1b5b55fa0 R15: 00007ffc8b69db28 [ 99.801810][ T5769] [ 100.005676][ T5771] netlink: 'syz.3.868': attribute type 2 has an invalid length. [ 100.022420][ T5773] netdevsim netdevsim4: Direct firmware load for ./file0/file1 failed with error -2 [ 100.148536][ T5789] sch_fq: defrate 4294967295 ignored. [ 100.252523][ T5800] FAULT_INJECTION: forcing a failure. [ 100.252523][ T5800] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 100.265932][ T5800] CPU: 1 UID: 0 PID: 5800 Comm: syz.3.879 Not tainted syzkaller #0 PREEMPT(voluntary) [ 100.265967][ T5800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 100.265984][ T5800] Call Trace: [ 100.265993][ T5800] [ 100.266004][ T5800] __dump_stack+0x1d/0x30 [ 100.266069][ T5800] dump_stack_lvl+0xe8/0x140 [ 100.266110][ T5800] dump_stack+0x15/0x1b [ 100.266161][ T5800] should_fail_ex+0x265/0x280 [ 100.266254][ T5800] should_fail+0xb/0x20 [ 100.266286][ T5800] should_fail_usercopy+0x1a/0x20 [ 100.266360][ T5800] _copy_from_user+0x1c/0xb0 [ 100.266393][ T5800] ___sys_sendmsg+0xc1/0x1d0 [ 100.266485][ T5800] __x64_sys_sendmsg+0xd4/0x160 [ 100.266513][ T5800] x64_sys_call+0x191e/0x3000 [ 100.266540][ T5800] do_syscall_64+0xd2/0x200 [ 100.266575][ T5800] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 100.266671][ T5800] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 100.266696][ T5800] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 100.266724][ T5800] RIP: 0033:0x7fa0a186eec9 [ 100.266745][ T5800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 100.266768][ T5800] RSP: 002b:00007fa0a02d7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 100.266838][ T5800] RAX: ffffffffffffffda RBX: 00007fa0a1ac5fa0 RCX: 00007fa0a186eec9 [ 100.266855][ T5800] RDX: 0000000004000c00 RSI: 0000200000000180 RDI: 0000000000000003 [ 100.266872][ T5800] RBP: 00007fa0a02d7090 R08: 0000000000000000 R09: 0000000000000000 [ 100.266936][ T5800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.266950][ T5800] R13: 00007fa0a1ac6038 R14: 00007fa0a1ac5fa0 R15: 00007ffd70ef7da8 [ 100.266967][ T5800] [ 100.268114][ T5797] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 100.300459][ T5802] sch_fq: defrate 4294967295 ignored. [ 100.574735][ T5814] sch_fq: defrate 4294967295 ignored. [ 101.194996][ T5846] sch_fq: defrate 4294967295 ignored. [ 101.951773][ T5861] __nla_validate_parse: 17 callbacks suppressed [ 101.951788][ T5861] netlink: 4 bytes leftover after parsing attributes in process `syz.4.901'. [ 102.104875][ T5861] sch_fq: defrate 4294967295 ignored. [ 102.551933][ T5880] netlink: 'syz.3.908': attribute type 5 has an invalid length. [ 103.071859][ T5895] FAULT_INJECTION: forcing a failure. [ 103.071859][ T5895] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 103.085244][ T5895] CPU: 0 UID: 0 PID: 5895 Comm: syz.0.912 Not tainted syzkaller #0 PREEMPT(voluntary) [ 103.085297][ T5895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 103.085312][ T5895] Call Trace: [ 103.085321][ T5895] [ 103.085331][ T5895] __dump_stack+0x1d/0x30 [ 103.085372][ T5895] dump_stack_lvl+0xe8/0x140 [ 103.085451][ T5895] dump_stack+0x15/0x1b [ 103.085485][ T5895] should_fail_ex+0x265/0x280 [ 103.085562][ T5895] should_fail+0xb/0x20 [ 103.085671][ T5895] should_fail_usercopy+0x1a/0x20 [ 103.085699][ T5895] _copy_from_user+0x1c/0xb0 [ 103.085733][ T5895] ___sys_sendmsg+0xc1/0x1d0 [ 103.085773][ T5895] __sys_sendmmsg+0x178/0x300 [ 103.085877][ T5895] __x64_sys_sendmmsg+0x57/0x70 [ 103.085921][ T5895] x64_sys_call+0x1c4a/0x3000 [ 103.085950][ T5895] do_syscall_64+0xd2/0x200 [ 103.085986][ T5895] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 103.086096][ T5895] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 103.086139][ T5895] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 103.086223][ T5895] RIP: 0033:0x7f0d8401eec9 [ 103.086239][ T5895] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 103.086263][ T5895] RSP: 002b:00007f0d82a7f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 103.086288][ T5895] RAX: ffffffffffffffda RBX: 00007f0d84275fa0 RCX: 00007f0d8401eec9 [ 103.086306][ T5895] RDX: 04000000000001f2 RSI: 0000200000000000 RDI: 0000000000000003 [ 103.086322][ T5895] RBP: 00007f0d82a7f090 R08: 0000000000000000 R09: 0000000000000000 [ 103.086339][ T5895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 103.086383][ T5895] R13: 00007f0d84276038 R14: 00007f0d84275fa0 R15: 00007ffec413e208 [ 103.086402][ T5895] [ 103.373579][ T5900] netlink: 12 bytes leftover after parsing attributes in process `syz.2.916'. [ 103.407384][ T5900] netlink: 4 bytes leftover after parsing attributes in process `syz.2.916'. [ 103.417033][ T5900] sch_fq: defrate 4294967295 ignored. [ 103.423041][ T5900] netlink: 28 bytes leftover after parsing attributes in process `syz.2.916'. [ 103.433212][ T5900] netlink: 28 bytes leftover after parsing attributes in process `syz.2.916'. [ 103.593736][ T29] kauditd_printk_skb: 33633 callbacks suppressed [ 103.593756][ T29] audit: type=1400 audit(1759580048.741:30155): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 103.594652][ T5904] dummy0: entered promiscuous mode [ 103.600380][ T29] audit: type=1400 audit(1759580048.741:30156): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 103.643524][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 103.648724][ T29] audit: type=1400 audit(1759580048.741:30157): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 103.655056][ T3030] audit: audit_lost=9834 audit_rate_limit=0 audit_backlog_limit=64 [ 103.676554][ T29] audit: type=1400 audit(1759580048.741:30158): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 103.684341][ T3030] audit: backlog limit exceeded [ 103.738231][ T3303] audit: audit_backlog=65 > audit_backlog_limit=64 [ 103.742170][ T5912] audit: audit_backlog=65 > audit_backlog_limit=64 [ 103.744928][ T3303] audit: audit_lost=9835 audit_rate_limit=0 audit_backlog_limit=64 [ 103.886984][ T5904] macsec1: entered promiscuous mode [ 103.938754][ T5904] dummy0: left promiscuous mode [ 104.255409][ T5926] sch_fq: defrate 4294967295 ignored. [ 104.397774][ T5931] netlink: 4 bytes leftover after parsing attributes in process `syz.3.926'. [ 104.504710][ T5936] FAULT_INJECTION: forcing a failure. [ 104.504710][ T5936] name failslab, interval 1, probability 0, space 0, times 0 [ 104.517771][ T5936] CPU: 1 UID: 0 PID: 5936 Comm: syz.0.928 Not tainted syzkaller #0 PREEMPT(voluntary) [ 104.517875][ T5936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 104.517891][ T5936] Call Trace: [ 104.517900][ T5936] [ 104.517971][ T5936] __dump_stack+0x1d/0x30 [ 104.518017][ T5936] dump_stack_lvl+0xe8/0x140 [ 104.518061][ T5936] dump_stack+0x15/0x1b [ 104.518100][ T5936] should_fail_ex+0x265/0x280 [ 104.518180][ T5936] should_failslab+0x8c/0xb0 [ 104.518215][ T5936] kmem_cache_alloc_noprof+0x50/0x480 [ 104.518258][ T5936] ? alloc_empty_file+0x76/0x200 [ 104.518378][ T5936] ? mntput+0x4b/0x80 [ 104.518412][ T5936] alloc_empty_file+0x76/0x200 [ 104.518518][ T5936] path_openat+0x68/0x2170 [ 104.518539][ T5936] ? __rcu_read_unlock+0x4f/0x70 [ 104.518573][ T5936] ? avc_has_extended_perms+0x73d/0x940 [ 104.518616][ T5936] do_filp_open+0x109/0x230 [ 104.518704][ T5936] do_sys_openat2+0xa6/0x110 [ 104.518802][ T5936] __x64_sys_openat+0xf2/0x120 [ 104.518822][ T5936] x64_sys_call+0x2eab/0x3000 [ 104.518844][ T5936] do_syscall_64+0xd2/0x200 [ 104.518919][ T5936] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 104.518950][ T5936] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 104.518975][ T5936] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 104.519002][ T5936] RIP: 0033:0x7f0d8401d710 [ 104.519025][ T5936] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 104.519092][ T5936] RSP: 002b:00007f0d82a5df00 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 104.519112][ T5936] RAX: ffffffffffffffda RBX: 0000000000141601 RCX: 00007f0d8401d710 [ 104.519125][ T5936] RDX: 0000000000141601 RSI: 00007f0d82a5dfa0 RDI: 00000000ffffff9c [ 104.519138][ T5936] RBP: 00007f0d82a5dfa0 R08: 0000000000000000 R09: 00007f0d82a5dd17 [ 104.519151][ T5936] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 104.519163][ T5936] R13: 00007f0d84276128 R14: 00007f0d84276090 R15: 00007ffec413e208 [ 104.519182][ T5936] [ 104.813656][ T5929] netlink: 12 bytes leftover after parsing attributes in process `syz.3.926'. [ 104.824798][ T5932] sch_fq: defrate 4294967295 ignored. [ 104.906084][ T5951] sch_fq: defrate 4294967295 ignored. [ 105.022770][ T5962] netlink: 8 bytes leftover after parsing attributes in process `syz.1.939'. [ 105.042100][ T5963] netlink: 8 bytes leftover after parsing attributes in process `syz.0.940'. [ 105.111080][ T5967] netlink: 12 bytes leftover after parsing attributes in process `syz.1.944'. [ 105.122505][ T5967] sch_fq: defrate 4294967295 ignored. [ 105.254433][ T5984] FAULT_INJECTION: forcing a failure. [ 105.254433][ T5984] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 105.267739][ T5984] CPU: 1 UID: 0 PID: 5984 Comm: syz.0.949 Not tainted syzkaller #0 PREEMPT(voluntary) [ 105.267771][ T5984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 105.267784][ T5984] Call Trace: [ 105.267790][ T5984] [ 105.267824][ T5984] __dump_stack+0x1d/0x30 [ 105.267879][ T5984] dump_stack_lvl+0xe8/0x140 [ 105.267927][ T5984] dump_stack+0x15/0x1b [ 105.268037][ T5984] should_fail_ex+0x265/0x280 [ 105.268071][ T5984] should_fail+0xb/0x20 [ 105.268104][ T5984] should_fail_usercopy+0x1a/0x20 [ 105.268177][ T5984] _copy_to_user+0x20/0xa0 [ 105.268202][ T5984] simple_read_from_buffer+0xb5/0x130 [ 105.268225][ T5984] proc_fail_nth_read+0x10e/0x150 [ 105.268265][ T5984] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 105.268304][ T5984] vfs_read+0x1a8/0x770 [ 105.268332][ T5984] ? vt_ioctl+0xe91/0x1880 [ 105.268408][ T5984] ? __rcu_read_unlock+0x4f/0x70 [ 105.268439][ T5984] ? __fget_files+0x184/0x1c0 [ 105.268471][ T5984] ksys_read+0xda/0x1a0 [ 105.268496][ T5984] __x64_sys_read+0x40/0x50 [ 105.268526][ T5984] x64_sys_call+0x27c0/0x3000 [ 105.268567][ T5984] do_syscall_64+0xd2/0x200 [ 105.268628][ T5984] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 105.268654][ T5984] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 105.268678][ T5984] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 105.268699][ T5984] RIP: 0033:0x7f0d8401d8dc [ 105.268718][ T5984] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 105.268772][ T5984] RSP: 002b:00007f0d82a7f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 105.268792][ T5984] RAX: ffffffffffffffda RBX: 00007f0d84275fa0 RCX: 00007f0d8401d8dc [ 105.268805][ T5984] RDX: 000000000000000f RSI: 00007f0d82a7f0a0 RDI: 0000000000000004 [ 105.268816][ T5984] RBP: 00007f0d82a7f090 R08: 0000000000000000 R09: 0000000000000000 [ 105.268828][ T5984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 105.268931][ T5984] R13: 00007f0d84276038 R14: 00007f0d84275fa0 R15: 00007ffec413e208 [ 105.268954][ T5984] [ 105.754930][ T6004] FAULT_INJECTION: forcing a failure. [ 105.754930][ T6004] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 105.768124][ T6004] CPU: 1 UID: 0 PID: 6004 Comm: syz.2.953 Not tainted syzkaller #0 PREEMPT(voluntary) [ 105.768159][ T6004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 105.768180][ T6004] Call Trace: [ 105.768187][ T6004] [ 105.768196][ T6004] __dump_stack+0x1d/0x30 [ 105.768347][ T6004] dump_stack_lvl+0xe8/0x140 [ 105.768427][ T6004] dump_stack+0x15/0x1b [ 105.768468][ T6004] should_fail_ex+0x265/0x280 [ 105.768589][ T6004] should_fail+0xb/0x20 [ 105.768655][ T6004] should_fail_usercopy+0x1a/0x20 [ 105.768685][ T6004] _copy_to_user+0x20/0xa0 [ 105.768718][ T6004] simple_read_from_buffer+0xb5/0x130 [ 105.768804][ T6004] proc_fail_nth_read+0x10e/0x150 [ 105.768842][ T6004] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 105.768971][ T6004] vfs_read+0x1a8/0x770 [ 105.768997][ T6004] ? __rcu_read_unlock+0x4f/0x70 [ 105.769029][ T6004] ? __fget_files+0x184/0x1c0 [ 105.769065][ T6004] ksys_read+0xda/0x1a0 [ 105.769094][ T6004] __x64_sys_read+0x40/0x50 [ 105.769239][ T6004] x64_sys_call+0x27c0/0x3000 [ 105.769267][ T6004] do_syscall_64+0xd2/0x200 [ 105.769298][ T6004] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 105.769323][ T6004] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 105.769355][ T6004] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 105.769383][ T6004] RIP: 0033:0x7effc74cd8dc [ 105.769402][ T6004] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 105.769426][ T6004] RSP: 002b:00007effc5f37030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 105.769451][ T6004] RAX: ffffffffffffffda RBX: 00007effc7725fa0 RCX: 00007effc74cd8dc [ 105.769477][ T6004] RDX: 000000000000000f RSI: 00007effc5f370a0 RDI: 0000000000000005 [ 105.769489][ T6004] RBP: 00007effc5f37090 R08: 0000000000000000 R09: 0000000000000000 [ 105.769500][ T6004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 105.769513][ T6004] R13: 00007effc7726038 R14: 00007effc7725fa0 R15: 00007ffcfef7d388 [ 105.769534][ T6004] [ 106.027427][ T6009] sch_fq: defrate 4294967295 ignored. [ 106.097417][ T6013] veth5: entered allmulticast mode [ 106.637129][ T6034] FAULT_INJECTION: forcing a failure. [ 106.637129][ T6034] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 106.650341][ T6034] CPU: 0 UID: 0 PID: 6034 Comm: syz.4.971 Not tainted syzkaller #0 PREEMPT(voluntary) [ 106.650368][ T6034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 106.650381][ T6034] Call Trace: [ 106.650442][ T6034] [ 106.650454][ T6034] __dump_stack+0x1d/0x30 [ 106.650492][ T6034] dump_stack_lvl+0xe8/0x140 [ 106.650630][ T6034] dump_stack+0x15/0x1b [ 106.650669][ T6034] should_fail_ex+0x265/0x280 [ 106.650715][ T6034] should_fail+0xb/0x20 [ 106.650757][ T6034] should_fail_usercopy+0x1a/0x20 [ 106.650809][ T6034] _copy_from_user+0x1c/0xb0 [ 106.650840][ T6034] kstrtouint_from_user+0x69/0xf0 [ 106.650859][ T6034] ? 0xffffffff81000000 [ 106.650872][ T6034] ? selinux_file_permission+0x1e4/0x320 [ 106.650988][ T6034] proc_fail_nth_write+0x50/0x160 [ 106.651027][ T6034] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 106.651066][ T6034] vfs_write+0x269/0x960 [ 106.651146][ T6034] ? vfs_read+0x4e6/0x770 [ 106.651173][ T6034] ? __rcu_read_unlock+0x4f/0x70 [ 106.651203][ T6034] ? __fget_files+0x184/0x1c0 [ 106.651236][ T6034] ksys_write+0xda/0x1a0 [ 106.651300][ T6034] __x64_sys_write+0x40/0x50 [ 106.651333][ T6034] x64_sys_call+0x2802/0x3000 [ 106.651421][ T6034] do_syscall_64+0xd2/0x200 [ 106.651456][ T6034] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 106.651490][ T6034] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 106.651527][ T6034] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 106.651553][ T6034] RIP: 0033:0x7f8a7932d97f [ 106.651569][ T6034] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 106.651587][ T6034] RSP: 002b:00007f8a77d8f030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 106.651621][ T6034] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8a7932d97f [ 106.651638][ T6034] RDX: 0000000000000001 RSI: 00007f8a77d8f0a0 RDI: 0000000000000004 [ 106.651655][ T6034] RBP: 00007f8a77d8f090 R08: 0000000000000000 R09: 0000000000000000 [ 106.651669][ T6034] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 106.651681][ T6034] R13: 00007f8a79586038 R14: 00007f8a79585fa0 R15: 00007ffd4530a228 [ 106.651699][ T6034] [ 106.976726][ T6039] sch_fq: defrate 4294967295 ignored. [ 106.986831][ T6042] __nla_validate_parse: 5 callbacks suppressed [ 106.986847][ T6042] netlink: 12 bytes leftover after parsing attributes in process `syz.3.975'. [ 107.008301][ T6042] netlink: 4 bytes leftover after parsing attributes in process `syz.3.975'. [ 107.037273][ T6042] sch_fq: defrate 4294967295 ignored. [ 107.070331][ T6050] netlink: 12 bytes leftover after parsing attributes in process `syz.3.978'. [ 107.129637][ T6056] netlink: 4 bytes leftover after parsing attributes in process `syz.3.978'. [ 107.144172][ T6046] FAULT_INJECTION: forcing a failure. [ 107.144172][ T6046] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 107.151966][ T6050] sch_fq: defrate 4294967295 ignored. [ 107.157371][ T6046] CPU: 0 UID: 0 PID: 6046 Comm: syz.4.977 Not tainted syzkaller #0 PREEMPT(voluntary) [ 107.157410][ T6046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 107.157428][ T6046] Call Trace: [ 107.157437][ T6046] [ 107.157467][ T6046] __dump_stack+0x1d/0x30 [ 107.157519][ T6046] dump_stack_lvl+0xe8/0x140 [ 107.157572][ T6046] dump_stack+0x15/0x1b [ 107.157616][ T6046] should_fail_ex+0x265/0x280 [ 107.157742][ T6046] should_fail+0xb/0x20 [ 107.157817][ T6046] should_fail_usercopy+0x1a/0x20 [ 107.157847][ T6046] strncpy_from_user+0x25/0x230 [ 107.157887][ T6046] ? kmem_cache_alloc_noprof+0x242/0x480 [ 107.157964][ T6046] ? getname_flags+0x80/0x3b0 [ 107.158005][ T6046] getname_flags+0xae/0x3b0 [ 107.158046][ T6046] __x64_sys_link+0x33/0x70 [ 107.158093][ T6046] x64_sys_call+0x12a7/0x3000 [ 107.158122][ T6046] do_syscall_64+0xd2/0x200 [ 107.158158][ T6046] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 107.158195][ T6046] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 107.158232][ T6046] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 107.158264][ T6046] RIP: 0033:0x7f8a7932eec9 [ 107.158284][ T6046] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 107.158309][ T6046] RSP: 002b:00007f8a77d8f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000056 [ 107.158334][ T6046] RAX: ffffffffffffffda RBX: 00007f8a79585fa0 RCX: 00007f8a7932eec9 [ 107.158352][ T6046] RDX: 0000000000000000 RSI: 0000200000000300 RDI: 0000200000000200 [ 107.158442][ T6046] RBP: 00007f8a77d8f090 R08: 0000000000000000 R09: 0000000000000000 [ 107.158459][ T6046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 107.158492][ T6046] R13: 00007f8a79586038 R14: 00007f8a79585fa0 R15: 00007ffd4530a228 [ 107.158515][ T6046] [ 107.357334][ T6058] netlink: 16 bytes leftover after parsing attributes in process `syz.1.980'. [ 107.366472][ T6058] netlink: 12 bytes leftover after parsing attributes in process `syz.1.980'. [ 107.380751][ T6058] sch_fq: defrate 4294967295 ignored. [ 107.386853][ T6058] netlink: 28 bytes leftover after parsing attributes in process `syz.1.980'. [ 107.395904][ T6058] netlink: 28 bytes leftover after parsing attributes in process `syz.1.980'. [ 107.407110][ T6050] netlink: 28 bytes leftover after parsing attributes in process `syz.3.978'. [ 107.416269][ T6050] netlink: 28 bytes leftover after parsing attributes in process `syz.3.978'. [ 107.451085][ T6060] sch_fq: defrate 4294967295 ignored. [ 107.648083][ T6071] ip6gre1: entered allmulticast mode [ 108.601170][ T29] kauditd_printk_skb: 17314 callbacks suppressed [ 108.601188][ T29] audit: type=1400 audit(1759580053.741:40664): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 108.645246][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 108.647693][ T29] audit: type=1400 audit(1759580053.751:40665): avc: denied { prog_load } for pid=6133 comm="syz.4.1013" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 108.652054][ T3030] audit: audit_lost=12106 audit_rate_limit=0 audit_backlog_limit=64 [ 108.652072][ T3030] audit: backlog limit exceeded [ 108.684312][ T29] audit: type=1400 audit(1759580053.751:40666): avc: denied { create } for pid=6133 comm="syz.4.1013" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 108.704426][ T29] audit: type=1400 audit(1759580053.751:40667): avc: denied { create } for pid=6133 comm="syz.4.1013" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 108.724403][ T29] audit: type=1400 audit(1759580053.751:40668): avc: denied { create } for pid=6133 comm="syz.4.1013" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=0 [ 108.744608][ T29] audit: type=1400 audit(1759580053.751:40669): avc: denied { create } for pid=6133 comm="syz.4.1013" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 108.764641][ T29] audit: type=1400 audit(1759580053.751:40670): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 108.979117][ T6147] netem: change failed [ 109.155926][ T6150] macsec1: entered promiscuous mode [ 109.177171][ T6150] dummy0: entered promiscuous mode [ 109.213902][ T6150] dummy0: left promiscuous mode [ 109.297061][ T6159] fq_change: 4 callbacks suppressed [ 109.297079][ T6159] sch_fq: defrate 4294967295 ignored. [ 109.330194][ T6166] sch_fq: defrate 4294967295 ignored. [ 109.473304][ T6177] sch_fq: defrate 4294967295 ignored. [ 109.542879][ T6180] FAULT_INJECTION: forcing a failure. [ 109.542879][ T6180] name failslab, interval 1, probability 0, space 0, times 0 [ 109.555656][ T6180] CPU: 1 UID: 0 PID: 6180 Comm: syz.1.1031 Not tainted syzkaller #0 PREEMPT(voluntary) [ 109.555690][ T6180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 109.555706][ T6180] Call Trace: [ 109.555715][ T6180] [ 109.555725][ T6180] __dump_stack+0x1d/0x30 [ 109.555762][ T6180] dump_stack_lvl+0xe8/0x140 [ 109.555803][ T6180] dump_stack+0x15/0x1b [ 109.555857][ T6180] should_fail_ex+0x265/0x280 [ 109.555902][ T6180] should_failslab+0x8c/0xb0 [ 109.555994][ T6180] kmem_cache_alloc_noprof+0x50/0x480 [ 109.556027][ T6180] ? audit_log_start+0x342/0x720 [ 109.556061][ T6180] audit_log_start+0x342/0x720 [ 109.556173][ T6180] ? kstrtouint+0x76/0xc0 [ 109.556217][ T6180] audit_seccomp+0x48/0x100 [ 109.556253][ T6180] ? __seccomp_filter+0x82d/0x1250 [ 109.556310][ T6180] __seccomp_filter+0x83e/0x1250 [ 109.556379][ T6180] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 109.556412][ T6180] ? vfs_write+0x7e8/0x960 [ 109.556495][ T6180] ? __rcu_read_unlock+0x4f/0x70 [ 109.556525][ T6180] ? __fget_files+0x184/0x1c0 [ 109.556553][ T6180] __secure_computing+0x82/0x150 [ 109.556641][ T6180] syscall_trace_enter+0xcf/0x1e0 [ 109.556676][ T6180] do_syscall_64+0xac/0x200 [ 109.556703][ T6180] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 109.556737][ T6180] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 109.556806][ T6180] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 109.556828][ T6180] RIP: 0033:0x7fb1b58feec9 [ 109.556843][ T6180] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 109.556860][ T6180] RSP: 002b:00007fb1b4367038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 109.556879][ T6180] RAX: ffffffffffffffda RBX: 00007fb1b5b55fa0 RCX: 00007fb1b58feec9 [ 109.556968][ T6180] RDX: 0000000000000000 RSI: 0000200000000040 RDI: ffffffffffffffff [ 109.556985][ T6180] RBP: 00007fb1b4367090 R08: 0000000000000000 R09: 0000000000000000 [ 109.557002][ T6180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 109.557018][ T6180] R13: 00007fb1b5b56038 R14: 00007fb1b5b55fa0 R15: 00007ffc8b69db28 [ 109.557041][ T6180] [ 109.649345][ T6189] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 109.791135][ T6189] block device autoloading is deprecated and will be removed. [ 109.897972][ T6192] sch_fq: defrate 4294967295 ignored. [ 109.907705][ T6196] sch_fq: defrate 4294967295 ignored. [ 110.013895][ T6204] sch_fq: defrate 4294967295 ignored. [ 110.101337][ T6211] dummy0: entered promiscuous mode [ 110.106578][ T6211] macsec1: entered promiscuous mode [ 110.119316][ T6211] dummy0: left promiscuous mode [ 110.155803][ T6213] sch_fq: defrate 4294967295 ignored. [ 110.256755][ T6221] FAULT_INJECTION: forcing a failure. [ 110.256755][ T6221] name failslab, interval 1, probability 0, space 0, times 0 [ 110.269574][ T6221] CPU: 0 UID: 0 PID: 6221 Comm: syz.3.1049 Not tainted syzkaller #0 PREEMPT(voluntary) [ 110.269606][ T6221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 110.269635][ T6221] Call Trace: [ 110.269642][ T6221] [ 110.269650][ T6221] __dump_stack+0x1d/0x30 [ 110.269703][ T6221] dump_stack_lvl+0xe8/0x140 [ 110.269750][ T6221] dump_stack+0x15/0x1b [ 110.269832][ T6221] should_fail_ex+0x265/0x280 [ 110.269877][ T6221] should_failslab+0x8c/0xb0 [ 110.269916][ T6221] kmem_cache_alloc_noprof+0x50/0x480 [ 110.269959][ T6221] ? getname_flags+0x80/0x3b0 [ 110.269999][ T6221] getname_flags+0x80/0x3b0 [ 110.270035][ T6221] do_sys_openat2+0x60/0x110 [ 110.270072][ T6221] __x64_sys_openat+0xf2/0x120 [ 110.270120][ T6221] x64_sys_call+0x2eab/0x3000 [ 110.270144][ T6221] do_syscall_64+0xd2/0x200 [ 110.270170][ T6221] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 110.270272][ T6221] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 110.270318][ T6221] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 110.270345][ T6221] RIP: 0033:0x7fa0a186eec9 [ 110.270360][ T6221] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 110.270434][ T6221] RSP: 002b:00007fa0a02d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 110.270539][ T6221] RAX: ffffffffffffffda RBX: 00007fa0a1ac5fa0 RCX: 00007fa0a186eec9 [ 110.270553][ T6221] RDX: 0000000000000002 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 110.270565][ T6221] RBP: 00007fa0a02d7090 R08: 0000000000000000 R09: 0000000000000000 [ 110.270580][ T6221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 110.270596][ T6221] R13: 00007fa0a1ac6038 R14: 00007fa0a1ac5fa0 R15: 00007ffd70ef7da8 [ 110.270619][ T6221] [ 110.597641][ T6227] sch_fq: defrate 4294967295 ignored. [ 110.643313][ T6232] macvlan1: entered promiscuous mode [ 110.670369][ T6234] FAULT_INJECTION: forcing a failure. [ 110.670369][ T6234] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 110.683577][ T6234] CPU: 0 UID: 0 PID: 6234 Comm: syz.0.1054 Not tainted syzkaller #0 PREEMPT(voluntary) [ 110.683609][ T6234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 110.683626][ T6234] Call Trace: [ 110.683634][ T6234] [ 110.683643][ T6234] __dump_stack+0x1d/0x30 [ 110.683768][ T6234] dump_stack_lvl+0xe8/0x140 [ 110.683866][ T6234] dump_stack+0x15/0x1b [ 110.683901][ T6234] should_fail_ex+0x265/0x280 [ 110.683935][ T6234] should_fail+0xb/0x20 [ 110.684008][ T6234] should_fail_usercopy+0x1a/0x20 [ 110.684055][ T6234] _copy_from_user+0x1c/0xb0 [ 110.684089][ T6234] vmemdup_user+0x5e/0xd0 [ 110.684116][ T6234] path_setxattrat+0x1b6/0x310 [ 110.684334][ T6234] __x64_sys_lsetxattr+0x71/0x90 [ 110.684372][ T6234] x64_sys_call+0x287b/0x3000 [ 110.684400][ T6234] do_syscall_64+0xd2/0x200 [ 110.684436][ T6234] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 110.684535][ T6234] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 110.684561][ T6234] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 110.684599][ T6234] RIP: 0033:0x7f0d8401eec9 [ 110.684619][ T6234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 110.684652][ T6234] RSP: 002b:00007f0d82a7f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 110.684678][ T6234] RAX: ffffffffffffffda RBX: 00007f0d84275fa0 RCX: 00007f0d8401eec9 [ 110.684695][ T6234] RDX: 0000200000000040 RSI: 0000200000000300 RDI: 0000200000000100 [ 110.684709][ T6234] RBP: 00007f0d82a7f090 R08: 0000000000000000 R09: 0000000000000000 [ 110.684721][ T6234] R10: 000000000000fe37 R11: 0000000000000246 R12: 0000000000000001 [ 110.684733][ T6234] R13: 00007f0d84276038 R14: 00007f0d84275fa0 R15: 00007ffec413e208 [ 110.684755][ T6234] [ 110.868558][ T6232] ipvlan0: entered promiscuous mode [ 111.007299][ T6232] ipvlan0: left promiscuous mode [ 111.022788][ T6232] macvlan1: left promiscuous mode [ 111.036987][ T6231] macvlan1: entered promiscuous mode [ 111.065155][ T6231] ipvlan0: entered promiscuous mode [ 111.085558][ T6231] ipvlan0: left promiscuous mode [ 111.102351][ T6231] macvlan1: left promiscuous mode [ 111.183855][ T6250] dummy0: entered promiscuous mode [ 111.189112][ T6250] macsec1: entered promiscuous mode [ 111.196737][ T6250] dummy0: left promiscuous mode [ 111.218062][ T6252] sch_fq: defrate 4294967295 ignored. [ 111.391158][ T6263] sch_fq: defrate 4294967295 ignored. [ 111.407703][ T6267] FAULT_INJECTION: forcing a failure. [ 111.407703][ T6267] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 111.421363][ T6267] CPU: 0 UID: 0 PID: 6267 Comm: syz.0.1066 Not tainted syzkaller #0 PREEMPT(voluntary) [ 111.421399][ T6267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 111.421416][ T6267] Call Trace: [ 111.421425][ T6267] [ 111.421441][ T6267] __dump_stack+0x1d/0x30 [ 111.421488][ T6267] dump_stack_lvl+0xe8/0x140 [ 111.421531][ T6267] dump_stack+0x15/0x1b [ 111.421646][ T6267] should_fail_ex+0x265/0x280 [ 111.421682][ T6267] should_fail+0xb/0x20 [ 111.421718][ T6267] should_fail_usercopy+0x1a/0x20 [ 111.421780][ T6267] _copy_from_user+0x1c/0xb0 [ 111.421813][ T6267] __sys_bpf+0x183/0x7c0 [ 111.421855][ T6267] __x64_sys_bpf+0x41/0x50 [ 111.421913][ T6267] x64_sys_call+0x2aee/0x3000 [ 111.421935][ T6267] do_syscall_64+0xd2/0x200 [ 111.422010][ T6267] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 111.422044][ T6267] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 111.422077][ T6267] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 111.422105][ T6267] RIP: 0033:0x7f0d8401eec9 [ 111.422125][ T6267] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 111.422153][ T6267] RSP: 002b:00007f0d82a7f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 111.422177][ T6267] RAX: ffffffffffffffda RBX: 00007f0d84275fa0 RCX: 00007f0d8401eec9 [ 111.422194][ T6267] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 111.422211][ T6267] RBP: 00007f0d82a7f090 R08: 0000000000000000 R09: 0000000000000000 [ 111.422227][ T6267] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 111.422242][ T6267] R13: 00007f0d84276038 R14: 00007f0d84275fa0 R15: 00007ffec413e208 [ 111.422260][ T6267] [ 111.532910][ T6268] netem: change failed [ 111.994110][ T6277] __nla_validate_parse: 54 callbacks suppressed [ 111.994131][ T6277] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1070'. [ 112.009559][ T6277] netlink: 52 bytes leftover after parsing attributes in process `syz.0.1070'. [ 112.018902][ T6277] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1070'. [ 112.252497][ T6290] FAULT_INJECTION: forcing a failure. [ 112.252497][ T6290] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 112.265957][ T6290] CPU: 0 UID: 0 PID: 6290 Comm: syz.4.1076 Not tainted syzkaller #0 PREEMPT(voluntary) [ 112.265992][ T6290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 112.266009][ T6290] Call Trace: [ 112.266018][ T6290] [ 112.266028][ T6290] __dump_stack+0x1d/0x30 [ 112.266131][ T6290] dump_stack_lvl+0xe8/0x140 [ 112.266176][ T6290] dump_stack+0x15/0x1b [ 112.266207][ T6290] should_fail_ex+0x265/0x280 [ 112.266271][ T6290] should_fail+0xb/0x20 [ 112.266306][ T6290] should_fail_usercopy+0x1a/0x20 [ 112.266327][ T6290] _copy_to_user+0x20/0xa0 [ 112.266416][ T6290] simple_read_from_buffer+0xb5/0x130 [ 112.266444][ T6290] proc_fail_nth_read+0x10e/0x150 [ 112.266474][ T6290] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 112.266548][ T6290] vfs_read+0x1a8/0x770 [ 112.266576][ T6290] ? __rcu_read_unlock+0x4f/0x70 [ 112.266608][ T6290] ? __fget_files+0x184/0x1c0 [ 112.266675][ T6290] ksys_read+0xda/0x1a0 [ 112.266699][ T6290] __x64_sys_read+0x40/0x50 [ 112.266727][ T6290] x64_sys_call+0x27c0/0x3000 [ 112.266796][ T6290] do_syscall_64+0xd2/0x200 [ 112.266832][ T6290] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 112.266867][ T6290] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 112.266897][ T6290] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 112.266987][ T6290] RIP: 0033:0x7f8a7932d8dc [ 112.267006][ T6290] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 112.267030][ T6290] RSP: 002b:00007f8a77d8f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 112.267056][ T6290] RAX: ffffffffffffffda RBX: 00007f8a79585fa0 RCX: 00007f8a7932d8dc [ 112.267083][ T6290] RDX: 000000000000000f RSI: 00007f8a77d8f0a0 RDI: 0000000000000005 [ 112.267144][ T6290] RBP: 00007f8a77d8f090 R08: 0000000000000000 R09: 0000000000000000 [ 112.267161][ T6290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 112.267178][ T6290] R13: 00007f8a79586038 R14: 00007f8a79585fa0 R15: 00007ffd4530a228 [ 112.267196][ T6290] [ 112.510002][ T6291] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1074'. [ 112.605128][ T6299] netlink: 148 bytes leftover after parsing attributes in process `syz.4.1078'. [ 112.633407][ T6295] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1078'. [ 113.224261][ T6310] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1081'. [ 113.463157][ T6320] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1085'. [ 113.467650][ T6322] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1084'. [ 113.472185][ T6320] netlink: 24 bytes leftover after parsing attributes in process `syz.1.1085'. [ 113.481693][ T6322] netem: change failed [ 113.611175][ T3030] audit_log_start: 15091 callbacks suppressed [ 113.611196][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 113.623864][ T3030] audit: audit_lost=14068 audit_rate_limit=0 audit_backlog_limit=64 [ 113.631991][ T3030] audit: backlog limit exceeded [ 113.714025][ T6325] FAULT_INJECTION: forcing a failure. [ 113.714025][ T6325] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 113.727373][ T6325] CPU: 1 UID: 0 PID: 6325 Comm: syz.0.1086 Not tainted syzkaller #0 PREEMPT(voluntary) [ 113.727458][ T6325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 113.727473][ T6325] Call Trace: [ 113.727481][ T6325] [ 113.727490][ T6325] __dump_stack+0x1d/0x30 [ 113.727597][ T6325] dump_stack_lvl+0xe8/0x140 [ 113.727653][ T6325] dump_stack+0x15/0x1b [ 113.727686][ T6325] should_fail_ex+0x265/0x280 [ 113.727726][ T6325] should_fail+0xb/0x20 [ 113.727770][ T6325] should_fail_usercopy+0x1a/0x20 [ 113.727824][ T6325] _copy_from_user+0x1c/0xb0 [ 113.727852][ T6325] vmemdup_user+0x5e/0xd0 [ 113.727878][ T6325] path_setxattrat+0x1b6/0x310 [ 113.727931][ T6325] __x64_sys_lsetxattr+0x71/0x90 [ 113.728037][ T6325] x64_sys_call+0x287b/0x3000 [ 113.728135][ T6325] do_syscall_64+0xd2/0x200 [ 113.728165][ T6325] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 113.728195][ T6325] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 113.728247][ T6325] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 113.728271][ T6325] RIP: 0033:0x7f0d8401eec9 [ 113.728289][ T6325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 113.728311][ T6325] RSP: 002b:00007f0d82a5e038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 113.728334][ T6325] RAX: ffffffffffffffda RBX: 00007f0d84276090 RCX: 00007f0d8401eec9 [ 113.728348][ T6325] RDX: 0000200000000040 RSI: 0000200000000300 RDI: 0000200000000100 [ 113.728416][ T6325] RBP: 00007f0d82a5e090 R08: 0000000000000000 R09: 0000000000000000 [ 113.728430][ T6325] R10: 000000000000fe37 R11: 0000000000000246 R12: 0000000000000001 [ 113.728444][ T6325] R13: 00007f0d84276128 R14: 00007f0d84276090 R15: 00007ffec413e208 [ 113.728463][ T6325] [ 113.728843][ T29] audit: type=1400 audit(1759580058.671:49881): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 113.763330][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 113.764650][ T29] audit: type=1400 audit(1759580058.671:49882): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 113.768801][ T3030] audit: audit_lost=14069 audit_rate_limit=0 audit_backlog_limit=64 [ 113.768822][ T3030] audit: backlog limit exceeded [ 113.773556][ T29] audit: type=1400 audit(1759580058.671:49883): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 113.822824][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 115.523652][ T6376] fq_change: 2 callbacks suppressed [ 115.523670][ T6376] sch_fq: defrate 4294967295 ignored. [ 116.197841][ T6400] sch_fq: defrate 4294967295 ignored. [ 116.625573][ T6412] FAULT_INJECTION: forcing a failure. [ 116.625573][ T6412] name failslab, interval 1, probability 0, space 0, times 0 [ 116.638419][ T6412] CPU: 1 UID: 0 PID: 6412 Comm: syz.0.1119 Not tainted syzkaller #0 PREEMPT(voluntary) [ 116.638485][ T6412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 116.638503][ T6412] Call Trace: [ 116.638512][ T6412] [ 116.638528][ T6412] __dump_stack+0x1d/0x30 [ 116.638640][ T6412] dump_stack_lvl+0xe8/0x140 [ 116.638686][ T6412] dump_stack+0x15/0x1b [ 116.638728][ T6412] should_fail_ex+0x265/0x280 [ 116.638775][ T6412] should_failslab+0x8c/0xb0 [ 116.638836][ T6412] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 116.638877][ T6412] ? sidtab_sid2str_get+0xa0/0x130 [ 116.638918][ T6412] kmemdup_noprof+0x2b/0x70 [ 116.638949][ T6412] sidtab_sid2str_get+0xa0/0x130 [ 116.639066][ T6412] security_sid_to_context_core+0x1eb/0x2e0 [ 116.639106][ T6412] security_sid_to_context+0x27/0x40 [ 116.639143][ T6412] selinux_lsm_getattr+0x1c3/0x230 [ 116.639230][ T6412] selinux_getprocattr+0x3f/0x80 [ 116.639256][ T6412] security_getprocattr+0x1a4/0x1d0 [ 116.639335][ T6412] proc_pid_attr_read+0x9c/0x1a0 [ 116.639374][ T6412] ? __pfx_proc_pid_attr_read+0x10/0x10 [ 116.639418][ T6412] vfs_readv+0x3fb/0x690 [ 116.639463][ T6412] __x64_sys_preadv+0xfd/0x1c0 [ 116.639544][ T6412] x64_sys_call+0x282e/0x3000 [ 116.639564][ T6412] do_syscall_64+0xd2/0x200 [ 116.639593][ T6412] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 116.639627][ T6412] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 116.639741][ T6412] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 116.639771][ T6412] RIP: 0033:0x7f0d8401eec9 [ 116.639788][ T6412] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 116.639806][ T6412] RSP: 002b:00007f0d82a7f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 116.639825][ T6412] RAX: ffffffffffffffda RBX: 00007f0d84275fa0 RCX: 00007f0d8401eec9 [ 116.639838][ T6412] RDX: 0000000000000001 RSI: 00002000000003c0 RDI: 0000000000000003 [ 116.639854][ T6412] RBP: 00007f0d82a7f090 R08: 0000000000000000 R09: 0000000000000000 [ 116.639885][ T6412] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 116.639908][ T6412] R13: 00007f0d84276038 R14: 00007f0d84275fa0 R15: 00007ffec413e208 [ 116.639932][ T6412] [ 117.000486][ T6425] sch_fq: defrate 4294967295 ignored. [ 117.456233][ T6435] __nla_validate_parse: 9 callbacks suppressed [ 117.456251][ T6435] netlink: 24 bytes leftover after parsing attributes in process `syz.3.1128'. [ 117.498507][ T6446] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1131'. [ 117.522606][ T6453] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1135'. [ 117.542089][ T6453] sch_fq: defrate 4294967295 ignored. [ 117.569793][ T6453] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1135'. [ 117.576347][ T6455] sch_fq: defrate 4294967295 ignored. [ 117.579029][ T6453] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1135'. [ 117.728126][ T6461] sch_fq: defrate 4294967295 ignored. [ 117.931182][ T6472] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1140'. [ 117.964225][ T6472] netem: change failed [ 118.273174][ T6486] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1147'. [ 118.427983][ T6492] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1147'. [ 118.437036][ T6492] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1147'. [ 118.486210][ T6486] sch_fq: defrate 4294967295 ignored. [ 118.626537][ T29] kauditd_printk_skb: 13476 callbacks suppressed [ 118.626555][ T29] audit: type=1400 audit(1759580063.771:61121): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.654324][ T29] audit: type=1400 audit(1759580063.771:61122): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.675853][ T29] audit: type=1400 audit(1759580063.771:61123): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.697233][ T29] audit: type=1400 audit(1759580063.771:61124): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.718616][ T29] audit: type=1400 audit(1759580063.771:61125): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.740280][ T29] audit: type=1400 audit(1759580063.771:61126): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.749773][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 118.761660][ T29] audit: type=1400 audit(1759580063.771:61127): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.768132][ T3030] audit: audit_lost=14817 audit_rate_limit=0 audit_backlog_limit=64 [ 118.789462][ T29] audit: type=1400 audit(1759580063.771:61128): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 119.242743][ T6507] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1151'. [ 119.261051][ T6507] netem: change failed [ 119.449748][ T6508] wireguard0: entered promiscuous mode [ 119.455353][ T6508] wireguard0: entered allmulticast mode [ 119.740948][ T6516] sch_fq: defrate 4294967295 ignored. [ 120.916101][ T6556] sch_fq: defrate 4294967295 ignored. [ 122.732270][ T6597] __nla_validate_parse: 10 callbacks suppressed [ 122.732290][ T6597] netlink: 148 bytes leftover after parsing attributes in process `syz.3.1185'. [ 122.807863][ T6601] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1184'. [ 122.816974][ T6601] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1184'. [ 122.863420][ T6601] sch_fq: defrate 4294967295 ignored. [ 122.872359][ T6601] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1184'. [ 122.881712][ T6601] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1184'. [ 123.079568][ T6612] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1190'. [ 123.119657][ T6612] sch_fq: defrate 4294967295 ignored. [ 123.125604][ T6612] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1190'. [ 123.134660][ T6612] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1190'. [ 123.145012][ T6614] sch_fq: defrate 4294967295 ignored. [ 123.523419][ T6630] netlink: 16 bytes leftover after parsing attributes in process `syz.3.1195'. [ 123.603801][ T6634] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1198'. [ 123.621876][ T6634] sch_fq: defrate 4294967295 ignored. [ 123.643017][ T29] kauditd_printk_skb: 18045 callbacks suppressed [ 123.643035][ T29] audit: type=1400 audit(1759580068.791:73584): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 123.670653][ T29] audit: type=1400 audit(1759580068.791:73585): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 123.691974][ T29] audit: type=1400 audit(1759580068.791:73586): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 123.713139][ T29] audit: type=1400 audit(1759580068.791:73587): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 123.734300][ T29] audit: type=1400 audit(1759580068.791:73588): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 123.755643][ T29] audit: type=1400 audit(1759580068.791:73589): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 123.777003][ T29] audit: type=1400 audit(1759580068.791:73590): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 123.798236][ T29] audit: type=1400 audit(1759580068.791:73591): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 123.809831][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 123.819534][ T29] audit: type=1400 audit(1759580068.791:73592): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 123.975292][ T6644] sch_fq: defrate 4294967295 ignored. [ 124.354774][ T6654] sch_fq: defrate 4294967295 ignored. [ 124.433742][ T6656] ================================================================== [ 124.441982][ T6656] BUG: KCSAN: data-race in __lru_add_drain_all / folios_put_refs [ 124.449869][ T6656] [ 124.452382][ T6656] write to 0xffff888237c25ee8 of 1 bytes by task 6639 on cpu 0: [ 124.460041][ T6656] folios_put_refs+0x285/0x2d0 [ 124.464866][ T6656] folio_batch_move_lru+0x24b/0x280 [ 124.470152][ T6656] folio_add_lru+0x14a/0x1f0 [ 124.474873][ T6656] shmem_get_folio_gfp+0x7ab/0xd60 [ 124.480045][ T6656] shmem_write_begin+0xa8/0x190 [ 124.484928][ T6656] generic_perform_write+0x184/0x490 [ 124.490258][ T6656] shmem_file_write_iter+0xc5/0xf0 [ 124.495441][ T6656] iter_file_splice_write+0x666/0xa60 [ 124.500853][ T6656] direct_splice_actor+0x153/0x2a0 [ 124.506005][ T6656] splice_direct_to_actor+0x30f/0x680 [ 124.511405][ T6656] do_splice_direct+0xda/0x150 [ 124.516186][ T6656] do_sendfile+0x380/0x650 [ 124.520662][ T6656] __x64_sys_sendfile64+0x105/0x150 [ 124.525941][ T6656] x64_sys_call+0x2bb4/0x3000 [ 124.530663][ T6656] do_syscall_64+0xd2/0x200 [ 124.535194][ T6656] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 124.541101][ T6656] [ 124.543445][ T6656] read to 0xffff888237c25ee8 of 1 bytes by task 6656 on cpu 1: [ 124.551001][ T6656] __lru_add_drain_all+0x17e/0x450 [ 124.556274][ T6656] lru_cache_disable+0x1f/0x30 [ 124.561064][ T6656] __se_sys_move_pages+0x2b2/0x1360 [ 124.566296][ T6656] __x64_sys_move_pages+0x78/0x90 [ 124.571458][ T6656] x64_sys_call+0x2f87/0x3000 [ 124.576150][ T6656] do_syscall_64+0xd2/0x200 [ 124.580759][ T6656] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 124.586773][ T6656] [ 124.589122][ T6656] value changed: 0x19 -> 0x00 [ 124.593838][ T6656] [ 124.596173][ T6656] Reported by Kernel Concurrency Sanitizer on: [ 124.602350][ T6656] CPU: 1 UID: 0 PID: 6656 Comm: syz.4.1205 Not tainted syzkaller #0 PREEMPT(voluntary) [ 124.612099][ T6656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 124.622171][ T6656] ================================================================== [ 128.651062][ T29] kauditd_printk_skb: 36356 callbacks suppressed [ 128.651086][ T29] audit: type=1400 audit(1759580073.791:107610): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 128.661238][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 128.679188][ T29] audit: type=1400 audit(1759580073.801:107611): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 128.685498][ T3030] audit: audit_lost=17461 audit_rate_limit=0 audit_backlog_limit=64 [ 128.706726][ T29] audit: type=1400 audit(1759580073.801:107612): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 128.714708][ T3030] audit: backlog limit exceeded [ 128.735912][ T29] audit: type=1400 audit(1759580073.801:107613): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 128.743314][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 128.762078][ T29] audit: type=1400 audit(1759580073.801:107614): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 128.768667][ T3030] audit: audit_lost=17462 audit_rate_limit=0 audit_backlog_limit=64 [ 133.661004][ T3030] audit_log_start: 47606 callbacks suppressed [ 133.661023][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 133.667540][ T29] audit: type=1400 audit(1759580078.801:154785): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 133.673927][ T3030] audit: audit_lost=17608 audit_rate_limit=0 audit_backlog_limit=64 [ 133.673943][ T3030] audit: backlog limit exceeded [ 133.674096][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 133.695407][ T29] audit: type=1400 audit(1759580078.801:154786): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 133.703562][ T3030] audit: audit_lost=17609 audit_rate_limit=0 audit_backlog_limit=64 [ 133.708503][ T29] audit: type=1400 audit(1759580078.801:154787): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 133.715217][ T3030] audit: backlog limit exceeded [ 133.736393][ T29] audit: type=1400 audit(1759580078.801:154788): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0