last executing test programs: 3.099939149s ago: executing program 3 (id=1682): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=@newtaction={0xf8, 0x30, 0xffff, 0xfffffffe, 0x0, {}, [{0xe4, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c, 0x1, {0x2, 0x5, 0x0, 0x3, 0x1000, {0x0, 0x2, 0x0, 0x0, 0x5}, {0x2, 0x0, 0xff, 0x0, 0x2}, 0x0, 0x300}}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0xfffffff7}}]}, {0x4}, {0xc}, {0xc}}}, @m_bpf={0x2c, 0x3, 0x0, 0x0, {{0x8}, {0x4}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc}}}]}]}, 0xf8}}, 0x0) 3.04786046s ago: executing program 3 (id=1685): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000001000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, 0x0, 0x0) sendmmsg$inet(r1, 0x0, 0x0, 0x40480dc) recvmsg$can_j1939(r1, 0x0, 0x8100) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) r2 = socket(0x23, 0x80805, 0x0) listen(r2, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/pm_wakeup_irq', 0x0, 0xb) r4 = syz_open_dev$loop(&(0x7f0000000440), 0x81, 0x0) ioctl$LOOP_CONFIGURE(r4, 0x4c0a, &(0x7f0000001600)={r3, 0x800, {0x2a00, 0x80010000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x20, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4b4e00d9683dda1af1ea09de2b7fb0a0100000000000000020300", "2809e8dbe108598927875397bab22d0000b420a9c81f40f05f819e01177d3d458dac00000000000000000000003b00000000000000000200", "90be8b1c5512406c7f00", [0x4, 0x40000000000000]}}) 3.04734956s ago: executing program 3 (id=1686): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b705"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x48) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r2 = dup(r1) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffff"], 0x7c8) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec8500000075000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x4000002, 0x50032, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ec0)={&(0x7f0000000bc0)='kfree\x00', r7, 0x0, 0xfffffffffffffff4}, 0x18) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) creat(&(0x7f00000003c0)='./file0\x00', 0x36) 3.03799472s ago: executing program 3 (id=1687): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0x10}, 0x18) socket$key(0xf, 0x3, 0x2) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3801000010000100feffffff00010000fe8000000000000000000000000000bbfc010000000000000000000000000001000107144e230005000000003a000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff020000000000000000000000000001000004d46c0000007f000001000000000000000000000000000000000000000092010000000000000600000000000000ffff0000000000001c250800000000000200000000000000f8ffffffffffffff0000000000000000ffffffffffffffff00000000000000001f000000000000e6fdffffffffffffff02000000fcffffff070000002abd7000043500000a0001002000000000000000480003006465666c617465"], 0x138}, 0x1, 0x0, 0x0, 0x8801}, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) socket(0x2, 0x80805, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a0ef010095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f00000000c0)=0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r6) sendmsg$NFC_CMD_DEV_UP(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x1c, r7, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40089}, 0x8004) write$nci(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="414601", @ANYRES32=r5], 0x4) sendmsg$nl_xfrm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3801000018"], 0x138}, 0x1, 0x0, 0x0, 0x8801}, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000680), 0x1, 0x0) 2.947278792s ago: executing program 3 (id=1689): socket$kcm(0xa, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x7000000) 2.633902338s ago: executing program 3 (id=1698): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r4 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000740)={'syztnl1\x00', 0x0, 0x29, 0xfd, 0x3, 0x2, 0x5c, @local, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x40, 0x4, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000001c0)={'syztnl2\x00', 0x0}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r5 = syz_io_uring_setup(0x49f, &(0x7f0000000400)={0x0, 0xe7a8, 0x3400, 0x7ffe, 0x40024e}, &(0x7f0000000340)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f0000000280)=@IORING_OP_MSG_RING={0x28, 0x44, 0x0, r5, 0x0, 0x0, 0x0, 0x2}) io_uring_enter(r5, 0x627, 0x4c1, 0x43, 0x0, 0x0) move_pages(0x0, 0x20000000000000fe, &(0x7f0000000080)=[&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a3200000000140000001100"], 0x7c}}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0xffffffff, 0xff}, 0x0, 0x0, 0x800000, 0x6, 0x2, 0xcb, 0xffff, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r9 = getpgrp(0xffffffffffffffff) kcmp(r9, 0x0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.102266628s ago: executing program 1 (id=1752): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000a00)={{0x14, 0x10, 0x1, 0x0, 0x6000, {0x5}}, [@NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}]}, @NFT_MSG_NEWSETELEM={0x4c, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x20, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xc, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6, 0x1, "d103"}]}]}, {0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2}]}]}]}], {0x14, 0x11, 0x1, 0xffffffff, 0x0, {0x1}}}, 0xb0}}, 0x40) 1.01573457s ago: executing program 1 (id=1754): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b705"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x48) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r2 = dup(r1) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe935"], 0x7c8) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec8500000075000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x4000002, 0x50032, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ec0)={&(0x7f0000000bc0)='kfree\x00', r7, 0x0, 0xfffffffffffffff4}, 0x18) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) creat(&(0x7f00000003c0)='./file0\x00', 0x36) 988.00916ms ago: executing program 1 (id=1757): ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000040)={0x8, 0x1, 0xfffffff7, 0x3, 0xd, "63b170fc8a1dce1ab396be2279493cc7dfde10"}) r0 = socket$inet6(0xa, 0x3, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000200100000102000028"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff5b, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000240)='kmem_cache_free\x00', r2}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r3 = inotify_init1(0x80000) r4 = inotify_add_watch(r3, &(0x7f0000000200)='.\x00', 0x10000a0) r5 = dup(r3) inotify_rm_watch(r5, r4) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x22001, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x6, 0x27, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfffffffa, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@jmp={0x5, 0x1, 0xa, 0x9, 0xa, 0x0, 0xd}, @map_val={0x18, 0xa, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @exit, @exit, @ldst={0x1, 0xf39c5b4d142f07d0, 0x6, 0x0, 0x8, 0x50}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffff9}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='syzkaller\x00', 0x6, 0xdc, &(0x7f00000003c0)=""/220, 0x40f00, 0x58, '\x00', r7, 0x25, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000540)={0x2, 0x8, 0x3, 0x1}, 0x10, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000580)=[{0x3, 0x5, 0xa, 0xa}, {0x5, 0x4, 0x3, 0x9}, {0x0, 0x2, 0x9, 0x6}, {0x0, 0x3, 0xb, 0x7}, {0x3, 0x2, 0xc, 0xa}, {0x1, 0x3, 0x4}]}, 0x94) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000980)={{{@in6=@initdev={0xfe, 0x88, '\x00', 0x40, 0x0}, @in6=@local, 0x4e22, 0x0, 0x0, 0xfff8, 0x2}, {0x0, 0x200000004, 0x40000000007, 0x20000a0da, 0x100000000, 0x4000000000004, 0x200000003, 0x9}, {0x5}, 0x1, 0x0, 0x1, 0x0, 0x6}, {{@in=@empty, 0x0, 0x6c}, 0xa, @in6=@remote, 0x3502, 0x1, 0x8, 0x0, 0x9076}}, 0xe8) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000100)=0xff, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x4}}}, 0x1c) 900.204592ms ago: executing program 0 (id=1760): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000240)='cachefiles_ondemand_cread\x00', r2, 0x0, 0x7}, 0x18) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) close(r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a7"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) syz_io_uring_setup(0x112, &(0x7f0000000340)={0x0, 0x11, 0x2, 0x4}, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', 0xffffffffffffffff, 0x0, 0x2ca}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x800, 0x5, 0x1, 0x1220, r0, 0x6, '\x00', 0x0, r1, 0x2, 0x5, 0x0, 0x2}, 0x50) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r6 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000280)={'syzkaller1\x00', @link_local}) write$tun(r5, &(0x7f0000000080)={@val={0x0, 0x88f7}, @void, @eth={@broadcast, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x4000, 0x0, 0x3, 0x2f, 0x0, @private=0x1fe1, @multicast1}, {0xb000, 0x6558, 0xc, 0x0, @gue={{0x1, 0x0, 0x1, 0x9, 0x0, @void}}}}}}}}, 0x32) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x94eb2000) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r8, 0x0, 0x5}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xa, 0x101, 0x7ffc, 0xcc}, 0x50) r9 = gettid() process_vm_writev(r9, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) 899.354772ms ago: executing program 1 (id=1761): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf, 0x1, 0xfa, 0x0, 0x0, 0x7, 0x20410, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa, 0x1, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x10000, 0x2, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x400000, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x0, &(0x7f0000000200), 0x1, 0x4bc, &(0x7f0000000a40)="$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") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x1a2) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000240), r0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000280)={'wg0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kfree\x00', r4}, 0x18) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000000)={0x500, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020200090f000000000000000000000005000600000000000a0000000000000000000000000000000000000000000000000000000000000002000100000004d20000020300000020050005002f8000000a00000000000000ff0100000000000000000000000000010000000000000000010018"], 0x78}}, 0x0) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x6c, r1, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r2}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}, @WGDEVICE_A_PRIVATE_KEY={0x24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000400)=ANY=[@ANYBLOB="1400000010000100f7000000000000000500000a44000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc08000340000000144c0000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a3100000000200003801c0000800c00018006000100d10300000c000440000000000000000114000000110001"], 0xb8}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) socket$nl_netfilter(0x10, 0x3, 0xc) r7 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0xa4c42, 0x108) fallocate(r0, 0x0, 0xbf5, 0x2000402) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000040)={0xc, r0, 0x0, 0x0, 0x0, 0xfffffffffe000001}) 412.614052ms ago: executing program 2 (id=1765): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000800)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='kfree\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="440000001000090600"/20, @ANYRES32=0x0, @ANYBLOB="adfda888000000001c00128009000100626f6e64000000000c000280050001000600000008000a"], 0x44}}, 0x0) 412.262652ms ago: executing program 4 (id=1766): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xf, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r1 = syz_io_uring_setup(0x2439, &(0x7f0000001480)={0x0, 0x1064, 0x1000, 0x7, 0x40224}, &(0x7f00000006c0)=0x0, &(0x7f00000000c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000340)=@IORING_OP_SENDMSG={0x9, 0x10, 0x0, r1, 0x0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000180)=[{0x0}, {0x0}], 0x2, 0x0, 0x530}, 0x0, 0x1000}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000480)='kfree\x00', r5, 0x0, 0x7}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0}, 0x28) r6 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) bind$can_raw(r6, &(0x7f00000005c0), 0x10) recvmmsg(r6, &(0x7f0000000b00)=[{{0x0, 0x0, 0x0}, 0x9a2b}, {{0x0, 0x0, &(0x7f00000009c0)=[{0x0}], 0x1}, 0x1}], 0x2, 0x600181a2, 0x0) setsockopt$CAN_RAW_RECV_OWN_MSGS(r6, 0x65, 0x4, &(0x7f0000000580)=0x1, 0x4) sendmsg$can_raw(r6, &(0x7f0000000240)={&(0x7f0000000540)={0x1d, r7}, 0x10, &(0x7f0000000480)={&(0x7f0000000140)=@can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "000000000000001e"}, 0x10}}, 0x4040) io_uring_enter(r1, 0x47f8, 0x1e43, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0xfffffffffffffffe}, 0x18) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x3, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000005000100070000000900020073797a31000000001400078005001500070000000800124000000000050005000200000005000400000000000d000300686173683a6e6574"], 0x5c}}, 0x0) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 411.755231ms ago: executing program 0 (id=1767): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000540), 0x1, 0x490, &(0x7f0000000e00)="$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") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="090000000500"/20, @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f00000001c0)={r2, &(0x7f0000000080), &(0x7f0000000180)=""/29}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000000c0)={0x0, 0x2904c, 0x0, 0x10003, '\x00', [{}, {0xffffffff, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x10000}]}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r6}, 0x10) r7 = socket(0x10, 0x2, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r8, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r8, &(0x7f0000000340)={0xa, 0x5, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0xfffffffe}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r8, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r8, 0x11a, 0x1, &(0x7f0000000080)=@gcm_128={{0x304}, "a6341a1a379332f5", "1fd33c81cf7995313c09de00fd6ded74", "62266bd8", "1e00040000000100"}, 0x28) write$binfmt_script(r8, &(0x7f0000000500)={'#! ', './file0'}, 0xb) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r8, 0x6, 0x23, &(0x7f0000000280)={&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd87}, &(0x7f0000000240)=0x40) writev(r8, &(0x7f0000000100)=[{&(0x7f0000000a40)="fb", 0x1}], 0x1) close_range(r7, r8, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x4, 0x0, 0x7ffc0005}]}) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000040), &(0x7f0000048000), 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r3, 0x3) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) syz_read_part_table(0x637, &(0x7f0000000000)="$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") writev(r0, &(0x7f0000000400)=[{&(0x7f0000001c00)="2e9b3d0007e03dd65193dfb6c575963f8864", 0x12}], 0x1) 411.426272ms ago: executing program 4 (id=1768): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b705"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x48) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r2 = dup(r1) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x4000002, 0x50032, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ec0)={&(0x7f0000000bc0)='kfree\x00', r7, 0x0, 0xfffffffffffffff4}, 0x18) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) creat(&(0x7f00000003c0)='./file0\x00', 0x36) 411.020422ms ago: executing program 1 (id=1769): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'team_slave_0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'ipvlan0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="400000001000030500000000fddbdf0000000000", @ANYRES32=0x0, @ANYBLOB="02880100373004002000128008000100687372001400028008000100", @ANYRES32=r1, @ANYBLOB="08000200", @ANYRES32=r3], 0x40}}, 0x4008054) 393.986682ms ago: executing program 2 (id=1770): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)={{0x14}, [@NFT_MSG_NEWRULE={0x40, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x14, 0x4, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @match={{0xa}, @void}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x68}}, 0x4048010) close(0x3) 377.109112ms ago: executing program 4 (id=1771): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) ioctl$F2FS_IOC_ABORT_ATOMIC_WRITE(r2, 0xf505, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="5800000002060102000034e40000000000000003050001000600000005000400000000000900020073797a3100000000050005000200000011000300686173683a69702c706f7274"], 0x58}, 0x1, 0x0, 0x0, 0xc5dff1b4c279acea}, 0x2) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="500000000906010200000000ffffeff9020000000900020073797a31000000000500010007000000280007800c00018008000140ffffffff0500070084000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x4000}, 0x80) quotactl_fd$Q_QUOTAON(r3, 0xffffffff80000202, 0x0, 0x0) 318.247983ms ago: executing program 2 (id=1772): ioperm(0x10, 0x1, 0x6) clock_getres(0x1, &(0x7f0000000000)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x141, 0x132) clock_gettime(0x0, &(0x7f0000001400)={0x0, 0x0}) recvmmsg$unix(r0, &(0x7f00000013c0)=[{{&(0x7f0000000080)=@abs, 0x6e, &(0x7f00000012c0)=[{&(0x7f0000000100)=""/196, 0xc4}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/186, 0xba}], 0x3, &(0x7f0000001300)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x90}}], 0x1, 0x0, &(0x7f0000001440)={r1, r2+60000000}) sched_rr_get_interval(r11, &(0x7f0000001480)) r12 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xc, 0x100010, r9, 0x10000000) syz_io_uring_submit(0x0, r12, &(0x7f0000001500)=@IORING_OP_EPOLL_CTL=@mod={0x1d, 0xe, 0x0, r4, &(0x7f00000014c0)={0x20000000}, r3, 0x3, 0x0, 0x1}) ioperm(0x7, 0x32, 0x1) ioperm(0x101, 0x800, 0x1) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000001540)={'nicvf0\x00', @broadcast}) write$cgroup_subtree(r3, &(0x7f0000001580)={[{0x2d, 'net'}]}, 0x5) ioperm(0xa77e, 0xb4c, 0x7b3) r13 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000015c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r14 = openat$cgroup_ro(r13, &(0x7f0000001600)='io.stat\x00', 0x0, 0x0) recvmmsg(r4, &(0x7f0000004f00)=[{{&(0x7f0000001640)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f0000004b00)=[{&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}, {&(0x7f00000036c0)=""/179, 0xb3}, {&(0x7f0000003780)=""/217, 0xd9}, {&(0x7f0000003880)=""/178, 0xb2}, {&(0x7f0000003940)=""/4096, 0x1000}, {&(0x7f0000004940)=""/178, 0xb2}, {&(0x7f0000004a00)=""/202, 0xca}], 0x8, &(0x7f0000004b80)=""/130, 0x82}}, {{&(0x7f0000004c40)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004cc0)=""/8, 0x8}, {&(0x7f0000004d00)=""/25, 0x19}, {&(0x7f0000004d40)=""/218, 0xda}], 0x3, &(0x7f0000004e80)=""/98, 0x62}, 0x6}], 0x2, 0x10000, &(0x7f0000004f80)={0x0, 0x3938700}) r15 = accept4$x25(r9, &(0x7f0000004fc0), &(0x7f0000005000)=0x12, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r15, 0x89e7, &(0x7f0000005040)={0x14}) socket$kcm(0x29, 0x5, 0x0) execve(&(0x7f0000005080)='./file0\x00', &(0x7f0000005340)={[&(0x7f00000050c0)='\xff)\x00', &(0x7f0000005100)='\xff\xff\xff\xff\xff\xff', &(0x7f0000005140)='/.\x00', &(0x7f0000005180)='io.stat\x00', &(0x7f00000051c0)='\x00', &(0x7f0000005200)='+)\xb3\']]--%\x00', &(0x7f0000005240)='net', &(0x7f0000005280)='./cgroup.net/syz0\x00', &(0x7f00000052c0)='*\x00', &(0x7f0000005300)='\xff\xff\xff\xff\xff\xff']}, &(0x7f0000005400)={[&(0x7f00000053c0)='nicvf0\x00']}) ioctl$VFAT_IOCTL_READDIR_BOTH(r4, 0x82307201, &(0x7f0000005440)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) getsockname$netlink(r10, &(0x7f0000005680), &(0x7f00000056c0)=0xc) r16 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000005740)=@generic={&(0x7f0000005700)='./file0\x00', 0x0, 0x10}, 0x18) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000005780)={0x0, @loopback, @private}, &(0x7f00000057c0)=0xc) bpf$MAP_CREATE(0x0, &(0x7f0000005800)=@bloom_filter={0x1e, 0x6d, 0x7, 0x717, 0x2000, r16, 0x1000, '\x00', r17, r4, 0x2, 0x1, 0x3, 0xc}, 0x50) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000005880)={{0x1, 0x1, 0x18, r14}, './file0\x00'}) socket(0x27, 0x2, 0xffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005c40)={0x18, 0x31, &(0x7f00000058c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0xc}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@map_idx={0x18, 0xb, 0x5, 0x0, 0x2}, @tail_call={{0x18, 0x2, 0x1, 0x0, r4}}, @printk={@lli}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x7}, @map_fd={0x18, 0x6, 0x1, 0x0, r7}, @func, @call={0x85, 0x0, 0x0, 0x84}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000005a80)='GPL\x00', 0x8, 0x9f, &(0x7f0000005ac0)=""/159, 0x41000, 0x2, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000005b80)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000005bc0)={0x0, 0xe, 0x0, 0x3}, 0x10, 0x0, 0x0, 0x2, 0x0, &(0x7f0000005c00)=[{0x1, 0x3, 0xe}, {0x1, 0x2, 0x5, 0x6}], 0x10, 0xa}, 0x94) fstat(r16, &(0x7f0000005d00)) bind$inet(r8, &(0x7f0000005d80)={0x2, 0x4e21, @broadcast}, 0x10) 317.884904ms ago: executing program 4 (id=1773): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000000c0)='kmem_cache_free\x00', r1, 0x0, 0x100000000}, 0x18) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/wakeup_count', 0xa00, 0xb) r3 = syz_open_dev$loop(&(0x7f0000000440), 0x81, 0x2a82) ioctl$LOOP_CONFIGURE(r3, 0x4c0a, &(0x7f0000000140)={r2, 0x800, {0x2a00, 0x80010000, 0x0, 0x5, 0x0, 0x0, 0x200000, 0x20, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4b4e00d9683dda1af1ea09de2b7fb0a0100000000000000000300", "280991800000598927875397bab22d0000b420a9c81f40f05f819e01177d3d458dac00000000000000000000003b00000000000000000200", "90be8b1c5512406c7f000000155cc30cf11d0bc000", [0x4, 0x7]}}) 317.209683ms ago: executing program 4 (id=1774): syz_clone(0x40800045, 0x0, 0x0, 0x0, 0x0, 0x0) 314.666853ms ago: executing program 2 (id=1775): syz_clone(0x40800045, 0x0, 0x0, 0x0, 0x0, 0x0) 191.859816ms ago: executing program 0 (id=1776): bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) socket(0x2b, 0x80801, 0x1) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) 191.639076ms ago: executing program 0 (id=1777): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0xffbfff}, 0x10) write(r0, &(0x7f0000000000)="240000001a005f0214f9f407000904001f00000000000002000000000800040001000000", 0x24) 137.769947ms ago: executing program 0 (id=1778): syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000080)='./file1\x00', 0x1808004, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYRES64], 0x4, 0x7cc, &(0x7f0000002200)="$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") openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000780)=[{0x200000000006, 0xf, 0x6, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000040000000800"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0xfc07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x30046, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x31, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) get_robust_list(0x0, &(0x7f0000000540)=0x0, &(0x7f0000000840)) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000500)="a4", 0x34000, 0x2000c851, &(0x7f0000000140)={0xa, 0x4e23, 0x2000000, @loopback, 0xffffffff}, 0x1c) 107.586347ms ago: executing program 1 (id=1779): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000f"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), r3) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000001900)={'wg2\x00', 0x0}) r6 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0x5]}, 0x8) name_to_handle_at(r6, &(0x7f0000004740)='\x00', 0x0, 0x0, 0x1200) sendmsg$WG_CMD_SET_DEVICE(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000840)=ANY=[@ANYBLOB="e0100000", @ANYRES16=r4, @ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="240003"], 0x10e0}}, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000380)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xee, &(0x7f00000004c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x79, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000000c0)={{r9, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)='%-5lx \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r10}, 0x4) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x18, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000b7080000000000007b8af8ff00000000b7080000540000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r9, @ANYBLOB="000000fcffffffffffffff0008000000850a0000304551c75b613c5f9ad5e6f2"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r11, 0x0, 0x10, 0x10, &(0x7f00000002c0)="0000ffffffffa000", &(0x7f0000000300)=""/8, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x1c, 0x10, &(0x7f0000001940)=ANY=[@ANYBLOB="1800000007000000000000000080000018110000e226a8af1e647e00003d1ef1e3e2c84e8e5a2bb711419adc171f13c1a5f1f059b01954a0950e044e536c04223f447d9f01daa2c4b74cf5d6406a382ff5aecb", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008520000004000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x12000, 0x28, &(0x7f0000000040)=""/40, 0x40e00, 0x46, '\x00', r5, @fallback=0x11, r7, 0x8, &(0x7f0000000300)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xc, 0x6, 0x7}, 0x10, r8, 0xffffffffffffffff, 0x0, &(0x7f0000000700)=[r0, r1, r1, 0x1, r1, r1, r1, r0, r0], 0x0, 0x10, 0xffffff00}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r12}, 0x10) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000000), 0x1, 0x512, &(0x7f0000000380)="$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") r14 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x82482, 0x0) write$binfmt_aout(r14, &(0x7f0000000000)=ANY=[], 0xff2e) ioctl$TCSETS(r14, 0x5402, &(0x7f0000000080)={0xa04c, 0x35e8b531, 0x1, 0x9, 0x13, "53af0f0b4ecf6c29bf81c173f4a8f5f73eb62f"}) write$binfmt_script(r13, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r13, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 63.156218ms ago: executing program 0 (id=1780): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xf, 0x1, 0xfa, 0x0, 0x0, 0x7, 0x20410, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa, 0x1, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x10000, 0x2, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x400000, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x0, &(0x7f0000000200), 0x1, 0x4bc, &(0x7f0000000a40)="$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") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x1a2) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000240), r0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000280)={'wg0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kfree\x00', r4}, 0x18) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000000)={0x500, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="020200090f000000000000000000000005000600000000000a0000000000000000000000000000000000000000000000000000000000000002000100000004d20000020300000020050005002f8000000a00000000000000ff0100000000000000000000000000010000000000000000010018"], 0x78}}, 0x0) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x6c, r1, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r2}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}, @WGDEVICE_A_PRIVATE_KEY={0x24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000400)=ANY=[@ANYBLOB="1400000010000100f7000000000000000500000a44000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc08000340000000144c0000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a3100000000200003801c0000800c00018006000100d10300000c000440000000000000000114000000110001"], 0xb8}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) socket$nl_netfilter(0x10, 0x3, 0xc) r7 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0xa4c42, 0x108) fallocate(r0, 0x0, 0xbf5, 0x2000402) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000040)={0xc, r0, 0x0, 0x0, 0x0, 0xfffffffffe000001}) 60.830998ms ago: executing program 4 (id=1781): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x18, 0x5, &(0x7f0000000580)=ANY=[@ANYBLOB="1801000000000066000000004b64ffec850000006d000000c5000000050000009551c3ca9fb2fae2c94a9f03aaac7a4a7c62b5819ba17aa9ae3e94b84956"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x8002, 0x0) ioctl$TCSETSW2(r0, 0x5453, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) readv(r1, &(0x7f00000008c0)=[{&(0x7f00000002c0)=""/156, 0x9c}], 0x1) 33.245299ms ago: executing program 2 (id=1782): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b705"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x48) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r2 = dup(r1) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x4000002, 0x50032, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ec0)={&(0x7f0000000bc0)='kfree\x00', r7, 0x0, 0xfffffffffffffff4}, 0x18) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) creat(&(0x7f00000003c0)='./file0\x00', 0x36) 0s ago: executing program 2 (id=1783): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xe7fd}, 0x100002, 0x3, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000002c0)='kfree\x00', r3, 0x0, 0x2}, 0x18) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002080)=@newtaction={0xe6c, 0x30, 0x25, 0x0, 0x0, {}, [{0xe58, 0x1, [@m_pedit={0xe54, 0x1, 0x0, 0x0, {{0xa}, {0xe28, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x4}, @TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{0x0, 0x0, 0x0, 0x0, 0x100}, 0x2}, [{}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x81}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x3000000}, {0x0, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x7}, {0x0, 0x5, 0x0, 0xfffffffd}, {}, {0x0, 0x2}, {}, {0x6}, {}, {0xfffffffc}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x1}, {0x7}, {}, {}, {0x0, 0x0, 0x80000001}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {}, {}, {0xbe44, 0x0, 0x0, 0x657}, {0x0, 0x800000}, {0x0, 0x0, 0x0, 0x0, 0xb4d0}, {0x2a49}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, {0x0, 0x0, 0xffffffff}, {0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {}, {}, {}, {0x0, 0x0, 0x4000000}, {}, {}, {}, {0x0, 0x0, 0x0, 0x2, 0xfffffffd}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0xffffffff}, {0x0, 0x0, 0x100}, {}, {}, {}, {0x0, 0x0, 0xfffffffe}, {}, {}, {}, {0x0, 0x0, 0x1}, {}, {0xfffffffd}, {}, {}, {}, {0x8}, {}, {}, {0x0, 0x0, 0x5}, {0x0, 0x2}, {0x400, 0x0, 0x1}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x200000}, {}, {}, {0x0, 0x0, 0x0, 0x10}, {}, {0x0, 0x1000}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {0x0, 0x0, 0x2, 0x0, 0x16e}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x2, 0x100000}, {0x0, 0x5}], [{0x2}, {0x3}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x2}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x5}, {}, {0x0, 0x1}, {0x0, 0x1}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x5}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe6c}}, 0x0) kernel console output (not intermixed with test programs): 2] EXT4-fs (loop3): Free/Dirty block details [ 40.495184][ T3942] EXT4-fs (loop3): free_blocks=2415919104 [ 40.500933][ T3942] EXT4-fs (loop3): dirty_blocks=944 [ 40.506121][ T3942] EXT4-fs (loop3): Block reservation details [ 40.512128][ T3942] EXT4-fs (loop3): i_reserved_data_blocks=59 [ 40.527475][ T3948] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 40.559579][ T3942] syz.3.117 (3942) used greatest stack depth: 10120 bytes left [ 40.567605][ T3304] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.578929][ T41] EXT4-fs (loop3): Delayed block allocation failed for inode 18 at logical offset 24 with max blocks 2 with error 28 [ 40.596334][ T3948] loop4: detected capacity change from 0 to 2048 [ 40.630115][ T3948] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 40.657659][ T3948] netlink: 'syz.4.125': attribute type 10 has an invalid length. [ 40.669366][ T3948] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 40.769268][ T3948] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 40.809014][ T3966] loop0: detected capacity change from 0 to 128 [ 40.814188][ T3948] syz.4.125 (3948) used greatest stack depth: 9968 bytes left [ 40.839272][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.897795][ T3968] FAULT_INJECTION: forcing a failure. [ 40.897795][ T3968] name failslab, interval 1, probability 0, space 0, times 1 [ 40.910439][ T3968] CPU: 0 UID: 0 PID: 3968 Comm: syz.0.129 Not tainted syzkaller #0 PREEMPT(voluntary) [ 40.910467][ T3968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 40.910484][ T3968] Call Trace: [ 40.910491][ T3968] [ 40.910499][ T3968] __dump_stack+0x1d/0x30 [ 40.910529][ T3968] dump_stack_lvl+0xe8/0x140 [ 40.910549][ T3968] dump_stack+0x15/0x1b [ 40.910573][ T3968] should_fail_ex+0x265/0x280 [ 40.910598][ T3968] should_failslab+0x8c/0xb0 [ 40.910621][ T3968] __kmalloc_noprof+0xa5/0x3e0 [ 40.910715][ T3968] ? copy_splice_read+0xc2/0x660 [ 40.910736][ T3968] copy_splice_read+0xc2/0x660 [ 40.910761][ T3968] ? __pfx_filemap_splice_read+0x10/0x10 [ 40.910782][ T3968] splice_direct_to_actor+0x290/0x680 [ 40.910804][ T3968] ? __pfx_direct_splice_actor+0x10/0x10 [ 40.910862][ T3968] do_splice_direct+0xda/0x150 [ 40.910878][ T3968] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 40.910951][ T3968] do_sendfile+0x380/0x650 [ 40.910977][ T3968] __x64_sys_sendfile64+0x105/0x150 [ 40.911000][ T3968] x64_sys_call+0x2bb0/0x2ff0 [ 40.911021][ T3968] do_syscall_64+0xd2/0x200 [ 40.911138][ T3968] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 40.911163][ T3968] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 40.911266][ T3968] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 40.911287][ T3968] RIP: 0033:0x7f4c8bbdeba9 [ 40.911303][ T3968] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.911375][ T3968] RSP: 002b:00007f4c8a626038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 40.911392][ T3968] RAX: ffffffffffffffda RBX: 00007f4c8be26090 RCX: 00007f4c8bbdeba9 [ 40.911426][ T3968] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000006 [ 40.911439][ T3968] RBP: 00007f4c8a626090 R08: 0000000000000000 R09: 0000000000000000 [ 40.911488][ T3968] R10: 0000000800000009 R11: 0000000000000246 R12: 0000000000000001 [ 40.911566][ T3968] R13: 00007f4c8be26128 R14: 00007f4c8be26090 R15: 00007fffd6956f48 [ 40.911583][ T3968] [ 41.262713][ T3988] loop3: detected capacity change from 0 to 512 [ 41.278646][ T3982] loop0: detected capacity change from 0 to 1024 [ 41.311077][ T3982] EXT4-fs: Ignoring removed bh option [ 41.316515][ T3982] EXT4-fs: inline encryption not supported [ 41.323851][ T3993] loop4: detected capacity change from 0 to 128 [ 41.334032][ T3988] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.363625][ T3982] EXT4-fs (loop0): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 41.382976][ T3988] ext4 filesystem being mounted at /16/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 41.402037][ T3930] syz.1.122 (3930) used greatest stack depth: 7304 bytes left [ 41.415537][ T3982] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=c84ce018, mo2=0000] [ 41.434822][ T3982] EXT4-fs error (device loop0): ext4_map_blocks:778: inode #3: block 2: comm syz.0.132: lblock 2 mapped to illegal pblock 2 (length 1) [ 41.475013][ T4000] kernel profiling enabled (shift: 17) [ 41.499913][ T4000] netdevsim netdevsim4: loading /lib/firmware/. failed with error -22 [ 41.508186][ T4000] netdevsim netdevsim4: Direct firmware load for . failed with error -22 [ 41.512597][ T3982] EXT4-fs error (device loop0): ext4_map_blocks:778: inode #3: block 48: comm syz.0.132: lblock 0 mapped to illegal pblock 48 (length 1) [ 41.531265][ T3982] EXT4-fs error (device loop0): ext4_acquire_dquot:6937: comm syz.0.132: Failed to acquire dquot type 0 [ 41.542852][ T3982] EXT4-fs error (device loop0) in ext4_reserve_inode_write:6334: Corrupt filesystem [ 41.552367][ T3982] EXT4-fs error (device loop0): ext4_evict_inode:254: inode #11: comm syz.0.132: mark_inode_dirty error [ 41.567454][ T3982] EXT4-fs warning (device loop0): ext4_evict_inode:257: couldn't mark inode dirty (err -117) [ 41.579135][ T3982] EXT4-fs (loop0): 1 orphan inode deleted [ 41.586116][ T3982] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.598779][ T51] EXT4-fs error (device loop0): ext4_map_blocks:778: inode #3: block 1: comm kworker/u8:3: lblock 1 mapped to illegal pblock 1 (length 1) [ 41.625659][ T51] EXT4-fs error (device loop0): ext4_release_dquot:6973: comm kworker/u8:3: Failed to release dquot type 0 [ 41.636701][ T4004] loop4: detected capacity change from 0 to 1024 [ 41.654194][ T4004] EXT4-fs: Ignoring removed bh option [ 41.660652][ T3982] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.661269][ T3307] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.679751][ T3982] EXT4-fs error (device loop0): __ext4_get_inode_loc:4861: comm syz.0.132: Invalid inode table block 1 in block_group 0 [ 41.708433][ T3982] EXT4-fs error (device loop0) in ext4_reserve_inode_write:6334: Corrupt filesystem [ 41.730516][ T4009] mmap: syz.1.135 (4009) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 41.737562][ T3982] EXT4-fs error (device loop0): ext4_quota_off:7221: inode #3: comm syz.0.132: mark_inode_dirty error [ 41.755916][ T4014] __nla_validate_parse: 8 callbacks suppressed [ 41.755927][ T4014] netlink: 4 bytes leftover after parsing attributes in process `syz.2.139'. [ 41.772206][ T4004] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 41.816736][ T4014] loop2: detected capacity change from 0 to 2364 [ 41.827357][ T4014] iso9660: Unknown parameter 'nocompress>uid' [ 41.857569][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.948588][ T4023] FAULT_INJECTION: forcing a failure. [ 41.948588][ T4023] name failslab, interval 1, probability 0, space 0, times 0 [ 41.961269][ T4023] CPU: 0 UID: 0 PID: 4023 Comm: syz.3.143 Not tainted syzkaller #0 PREEMPT(voluntary) [ 41.961336][ T4023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 41.961349][ T4023] Call Trace: [ 41.961356][ T4023] [ 41.961364][ T4023] __dump_stack+0x1d/0x30 [ 41.961386][ T4023] dump_stack_lvl+0xe8/0x140 [ 41.961413][ T4023] dump_stack+0x15/0x1b [ 41.961444][ T4023] should_fail_ex+0x265/0x280 [ 41.961468][ T4023] ? alloc_netdev_mqs+0x80c/0xa30 [ 41.961494][ T4023] should_failslab+0x8c/0xb0 [ 41.961540][ T4023] __kmalloc_cache_noprof+0x4c/0x320 [ 41.961571][ T4023] alloc_netdev_mqs+0x80c/0xa30 [ 41.961671][ T4023] tun_set_iff+0x42c/0x890 [ 41.961724][ T4023] __tun_chr_ioctl+0x5f0/0x14c0 [ 41.961744][ T4023] ? __pfx_tun_chr_ioctl+0x10/0x10 [ 41.961762][ T4023] tun_chr_ioctl+0x27/0x40 [ 41.961777][ T4023] __se_sys_ioctl+0xce/0x140 [ 41.961795][ T4023] __x64_sys_ioctl+0x43/0x50 [ 41.961818][ T4023] x64_sys_call+0x1816/0x2ff0 [ 41.961836][ T4023] do_syscall_64+0xd2/0x200 [ 41.961925][ T4023] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 41.961950][ T4023] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 41.961987][ T4023] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 41.962005][ T4023] RIP: 0033:0x7f889181eba9 [ 41.962083][ T4023] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 41.962100][ T4023] RSP: 002b:00007f8890287038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 41.962119][ T4023] RAX: ffffffffffffffda RBX: 00007f8891a65fa0 RCX: 00007f889181eba9 [ 41.962132][ T4023] RDX: 0000200000000100 RSI: 00000000400454ca RDI: 0000000000000004 [ 41.962150][ T4023] RBP: 00007f8890287090 R08: 0000000000000000 R09: 0000000000000000 [ 41.962162][ T4023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 41.962174][ T4023] R13: 00007f8891a66038 R14: 00007f8891a65fa0 R15: 00007ffd83b2e5b8 [ 41.962192][ T4023] [ 41.968809][ T36] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 42.168995][ T36] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz1] on syz0 [ 42.529448][ T4037] loop4: detected capacity change from 0 to 1024 [ 43.081959][ T4037] EXT4-fs: Ignoring removed orlov option [ 43.093670][ T4045] loop2: detected capacity change from 0 to 512 [ 43.101990][ T4045] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 43.138546][ T4037] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 43.154192][ T4045] EXT4-fs (loop2): 1 truncate cleaned up [ 43.177786][ T4045] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 43.232133][ T3304] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.518810][ T4068] loop2: detected capacity change from 0 to 1024 [ 43.568998][ T4070] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 43.587720][ T4068] EXT4-fs (loop2): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 43.618438][ T4070] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 43.661235][ T4068] EXT4-fs warning (device loop2): ext4_enable_quotas:7172: Failed to enable quota tracking (type=0, err=-117, ino=3). Please run e2fsck to fix. [ 43.681912][ T3303] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.713162][ T4068] EXT4-fs (loop2): mount failed [ 43.745983][ T36] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 43.851847][ T36] hid-generic 0000:0000:0000.0007: hidraw0: HID v0.00 Device [syz1] on syz0 [ 43.875068][ T4079] loop1: detected capacity change from 0 to 512 [ 43.912231][ T4080] fido_id[4080]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 44.083549][ T4079] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 44.142063][ T4096] netlink: 8 bytes leftover after parsing attributes in process `gtp'. [ 44.173755][ T4079] ext4 filesystem being mounted at /30/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 44.398194][ T4096] loop2: detected capacity change from 0 to 8192 [ 44.496918][ T3309] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.581375][ T4106] netlink: 8 bytes leftover after parsing attributes in process `syz.3.164'. [ 44.638624][ T4110] netlink: 68 bytes leftover after parsing attributes in process `syz.1.163'. [ 44.804682][ T4119] netlink: 8 bytes leftover after parsing attributes in process `syz.4.166'. [ 44.911966][ T3397] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 45.026736][ T29] kauditd_printk_skb: 127 callbacks suppressed [ 45.026748][ T29] audit: type=1326 audit(1758131131.777:782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4117 comm="syz.4.166" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2dc55ceba9 code=0x7ffc0000 [ 45.085154][ T29] audit: type=1326 audit(1758131131.807:783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4117 comm="syz.4.166" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2dc55ceba9 code=0x7ffc0000 [ 45.118040][ T3397] hid-generic 0000:0000:0000.0008: hidraw0: HID v0.00 Device [syz1] on syz0 [ 45.658043][ T4125] fido_id[4125]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 45.883504][ T4143] netlink: 64 bytes leftover after parsing attributes in process `syz.4.174'. [ 45.917250][ T29] audit: type=1400 audit(1758131132.658:784): avc: denied { validate_trans } for pid=4133 comm="syz.4.174" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 46.372195][ T4148] sch_tbf: peakrate 7 is lower than or equals to rate 19 ! [ 46.406953][ T4150] 9pnet: p9_errstr2errno: server reported unknown error [ 46.442369][ T29] audit: type=1326 audit(1758131133.188:785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4153 comm="syz.1.180" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f657edfeba9 code=0x7ffc0000 [ 46.473714][ T4154] loop1: detected capacity change from 0 to 128 [ 46.482823][ T4154] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 46.499443][ T29] audit: type=1326 audit(1758131133.218:786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4153 comm="syz.1.180" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f657edfeba9 code=0x7ffc0000 [ 46.522779][ T29] audit: type=1326 audit(1758131133.218:787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4153 comm="syz.1.180" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f657edfeba9 code=0x7ffc0000 [ 46.546015][ T29] audit: type=1326 audit(1758131133.218:788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4153 comm="syz.1.180" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f657edfeba9 code=0x7ffc0000 [ 46.569322][ T29] audit: type=1326 audit(1758131133.218:789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4153 comm="syz.1.180" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f657edfeba9 code=0x7ffc0000 [ 46.592597][ T29] audit: type=1326 audit(1758131133.218:790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4153 comm="syz.1.180" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f657edfeba9 code=0x7ffc0000 [ 46.615847][ T29] audit: type=1326 audit(1758131133.218:791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4153 comm="syz.1.180" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f657edfeba9 code=0x7ffc0000 [ 46.715808][ T4154] ext4 filesystem being mounted at /37/mnt supports timestamps until 2038-01-19 (0x7fffffff) [ 46.757167][ T4160] FAULT_INJECTION: forcing a failure. [ 46.757167][ T4160] name failslab, interval 1, probability 0, space 0, times 0 [ 46.769865][ T4160] CPU: 1 UID: 0 PID: 4160 Comm: syz.0.181 Not tainted syzkaller #0 PREEMPT(voluntary) [ 46.769968][ T4160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 46.769977][ T4160] Call Trace: [ 46.770046][ T4160] [ 46.770054][ T4160] __dump_stack+0x1d/0x30 [ 46.770075][ T4160] dump_stack_lvl+0xe8/0x140 [ 46.770095][ T4160] dump_stack+0x15/0x1b [ 46.770122][ T4160] should_fail_ex+0x265/0x280 [ 46.770221][ T4160] ? ip_set_create+0x1ec/0x960 [ 46.770241][ T4160] should_failslab+0x8c/0xb0 [ 46.770261][ T4160] __kmalloc_cache_noprof+0x4c/0x320 [ 46.770292][ T4160] ip_set_create+0x1ec/0x960 [ 46.770333][ T4160] ? __nla_parse+0x40/0x60 [ 46.770414][ T4160] nfnetlink_rcv_msg+0x4c6/0x590 [ 46.770451][ T4160] netlink_rcv_skb+0x120/0x220 [ 46.770475][ T4160] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 46.770551][ T4160] nfnetlink_rcv+0x16b/0x1690 [ 46.770572][ T4160] ? nlmon_xmit+0x4f/0x60 [ 46.770597][ T4160] ? consume_skb+0x49/0x150 [ 46.770620][ T4160] ? nlmon_xmit+0x4f/0x60 [ 46.770677][ T4160] ? dev_hard_start_xmit+0x3b0/0x3e0 [ 46.770700][ T4160] ? __dev_queue_xmit+0x1200/0x2000 [ 46.770723][ T4160] ? __dev_queue_xmit+0x182/0x2000 [ 46.770744][ T4160] ? ref_tracker_free+0x37d/0x3e0 [ 46.770835][ T4160] ? __netlink_deliver_tap+0x4dc/0x500 [ 46.770921][ T4160] netlink_unicast+0x5c0/0x690 [ 46.770941][ T4160] netlink_sendmsg+0x58b/0x6b0 [ 46.770993][ T4160] ? __pfx_netlink_sendmsg+0x10/0x10 [ 46.771019][ T4160] __sock_sendmsg+0x142/0x180 [ 46.771131][ T4160] ____sys_sendmsg+0x31e/0x4e0 [ 46.771159][ T4160] ___sys_sendmsg+0x17b/0x1d0 [ 46.771189][ T4160] __x64_sys_sendmsg+0xd4/0x160 [ 46.771242][ T4160] x64_sys_call+0x191e/0x2ff0 [ 46.771263][ T4160] do_syscall_64+0xd2/0x200 [ 46.771332][ T4160] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 46.771356][ T4160] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 46.771384][ T4160] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 46.771406][ T4160] RIP: 0033:0x7f4c8bbdeba9 [ 46.771425][ T4160] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 46.771439][ T4160] RSP: 002b:00007f4c8a647038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 46.771458][ T4160] RAX: ffffffffffffffda RBX: 00007f4c8be25fa0 RCX: 00007f4c8bbdeba9 [ 46.771468][ T4160] RDX: 0000000000000000 RSI: 0000200000000440 RDI: 0000000000000004 [ 46.771480][ T4160] RBP: 00007f4c8a647090 R08: 0000000000000000 R09: 0000000000000000 [ 46.771522][ T4160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 46.771532][ T4160] R13: 00007f4c8be26038 R14: 00007f4c8be25fa0 R15: 00007fffd6956f48 [ 46.771550][ T4160] [ 47.096390][ T4162] loop4: detected capacity change from 0 to 512 [ 47.160675][ T4173] lo speed is unknown, defaulting to 1000 [ 47.165757][ T4162] EXT4-fs (loop4): too many log groups per flexible block group [ 47.166799][ T4173] lo speed is unknown, defaulting to 1000 [ 47.174121][ T4162] EXT4-fs (loop4): failed to initialize mballoc (-12) [ 47.175856][ T4162] EXT4-fs (loop4): mount failed [ 47.180576][ T4173] lo speed is unknown, defaulting to 1000 [ 47.197516][ T4173] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 47.206655][ T4173] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 47.221562][ T4173] lo speed is unknown, defaulting to 1000 [ 47.227748][ T4173] lo speed is unknown, defaulting to 1000 [ 47.228448][ T4173] lo speed is unknown, defaulting to 1000 [ 47.228804][ T4173] lo speed is unknown, defaulting to 1000 [ 47.229248][ T4173] lo speed is unknown, defaulting to 1000 [ 47.354878][ T4179] netlink: 4 bytes leftover after parsing attributes in process `syz.3.187'. [ 47.485919][ T3309] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 47.522642][ T4186] bridge0: port 3(batadv1) entered blocking state [ 47.522709][ T4186] bridge0: port 3(batadv1) entered disabled state [ 47.522862][ T4186] batadv1: entered allmulticast mode [ 47.523599][ T4186] batadv1: entered promiscuous mode [ 47.627089][ T4191] loop3: detected capacity change from 0 to 512 [ 47.662812][ T4196] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 47.671052][ T4196] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 47.753197][ T4216] netlink: 16 bytes leftover after parsing attributes in process `syz.3.200'. [ 47.762245][ T4216] netlink: 16 bytes leftover after parsing attributes in process `syz.3.200'. [ 47.771157][ T4216] netlink: 16 bytes leftover after parsing attributes in process `syz.3.200'. [ 47.837312][ T4218] tipc: Enabling of bearer rejected, failed to enable media [ 47.854741][ T4216] netlink: 8 bytes leftover after parsing attributes in process `syz.3.200'. [ 47.894232][ T4226] netlink: 56 bytes leftover after parsing attributes in process `syz.4.203'. [ 48.024219][ T1927] batman_adv: batadv1: No IGMP Querier present - multicast optimizations disabled [ 48.033459][ T1927] batman_adv: batadv1: No MLD Querier present - multicast optimizations disabled [ 48.099664][ T4235] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 48.128487][ T4233] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 48.136704][ T4233] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 48.182543][ T4238] netlink: 14 bytes leftover after parsing attributes in process `syz.2.206'. [ 48.261180][ T4238] hsr_slave_0: left promiscuous mode [ 48.320159][ T4242] syz.3.209 uses obsolete (PF_INET,SOCK_PACKET) [ 48.333009][ T4238] hsr_slave_1: left promiscuous mode [ 48.653790][ T4257] program syz.3.213 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 48.673713][ T4255] FAULT_INJECTION: forcing a failure. [ 48.673713][ T4255] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 48.686861][ T4255] CPU: 1 UID: 0 PID: 4255 Comm: syz.1.212 Not tainted syzkaller #0 PREEMPT(voluntary) [ 48.686888][ T4255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 48.686901][ T4255] Call Trace: [ 48.686907][ T4255] [ 48.686964][ T4255] __dump_stack+0x1d/0x30 [ 48.687051][ T4255] dump_stack_lvl+0xe8/0x140 [ 48.687070][ T4255] dump_stack+0x15/0x1b [ 48.687088][ T4255] should_fail_ex+0x265/0x280 [ 48.687110][ T4255] should_fail+0xb/0x20 [ 48.687205][ T4255] should_fail_usercopy+0x1a/0x20 [ 48.687227][ T4255] _copy_from_user+0x1c/0xb0 [ 48.687255][ T4255] snd_seq_event_dup+0x306/0x460 [ 48.687283][ T4255] snd_seq_client_enqueue_event+0x1dc/0x2a0 [ 48.687338][ T4255] snd_seq_write+0x41a/0x530 [ 48.687370][ T4255] ? __pfx_snd_seq_write+0x10/0x10 [ 48.687471][ T4255] vfs_write+0x269/0x960 [ 48.687490][ T4255] ? __rcu_read_unlock+0x4f/0x70 [ 48.687509][ T4255] ? __fget_files+0x184/0x1c0 [ 48.687536][ T4255] ksys_write+0xda/0x1a0 [ 48.687632][ T4255] __x64_sys_write+0x40/0x50 [ 48.687655][ T4255] x64_sys_call+0x27fe/0x2ff0 [ 48.687676][ T4255] do_syscall_64+0xd2/0x200 [ 48.687701][ T4255] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 48.687779][ T4255] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 48.687803][ T4255] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 48.687824][ T4255] RIP: 0033:0x7f657edfeba9 [ 48.687840][ T4255] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 48.687857][ T4255] RSP: 002b:00007f657d867038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 48.687925][ T4255] RAX: ffffffffffffffda RBX: 00007f657f045fa0 RCX: 00007f657edfeba9 [ 48.687937][ T4255] RDX: 000000000000ffc8 RSI: 0000200000000000 RDI: 0000000000000009 [ 48.687950][ T4255] RBP: 00007f657d867090 R08: 0000000000000000 R09: 0000000000000000 [ 48.687963][ T4255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 48.687980][ T4255] R13: 00007f657f046038 R14: 00007f657f045fa0 R15: 00007ffe7555f318 [ 48.688017][ T4255] [ 48.900428][ T4257] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 48.909517][ T4257] netlink: 12 bytes leftover after parsing attributes in process `syz.3.213'. [ 49.000069][ T4264] loop1: detected capacity change from 0 to 512 [ 49.113200][ T4264] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 49.148915][ T4264] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 49.211801][ T4229] FAULT_INJECTION: forcing a failure. [ 49.211801][ T4229] name failslab, interval 1, probability 0, space 0, times 0 [ 49.224475][ T4229] CPU: 1 UID: 0 PID: 4229 Comm: syz.4.205 Not tainted syzkaller #0 PREEMPT(voluntary) [ 49.224564][ T4229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 49.224576][ T4229] Call Trace: [ 49.224582][ T4229] [ 49.224588][ T4229] __dump_stack+0x1d/0x30 [ 49.224670][ T4229] dump_stack_lvl+0xe8/0x140 [ 49.224690][ T4229] dump_stack+0x15/0x1b [ 49.224707][ T4229] should_fail_ex+0x265/0x280 [ 49.224790][ T4229] should_failslab+0x8c/0xb0 [ 49.224815][ T4229] __kvmalloc_node_noprof+0x123/0x4e0 [ 49.224864][ T4229] ? newary+0xe8/0x620 [ 49.224883][ T4229] ? __seccomp_filter+0x69d/0x10d0 [ 49.224906][ T4229] newary+0xe8/0x620 [ 49.224928][ T4229] ? __cond_resched+0x4e/0x90 [ 49.225012][ T4229] ipcget+0x33a/0x4f0 [ 49.225044][ T4229] __x64_sys_semget+0xfb/0x130 [ 49.225106][ T4229] x64_sys_call+0x6bf/0x2ff0 [ 49.225128][ T4229] do_syscall_64+0xd2/0x200 [ 49.225159][ T4229] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 49.225183][ T4229] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 49.225208][ T4229] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 49.225305][ T4229] RIP: 0033:0x7f2dc55ceba9 [ 49.225319][ T4229] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 49.225336][ T4229] RSP: 002b:00007f2dc402f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000040 [ 49.225357][ T4229] RAX: ffffffffffffffda RBX: 00007f2dc5815fa0 RCX: 00007f2dc55ceba9 [ 49.225371][ T4229] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000 [ 49.225395][ T4229] RBP: 00007f2dc402f090 R08: 0000000000000000 R09: 0000000000000000 [ 49.225405][ T4229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 49.225415][ T4229] R13: 00007f2dc5816038 R14: 00007f2dc5815fa0 R15: 00007ffdec75f858 [ 49.225445][ T4229] [ 49.559450][ T4286] lo speed is unknown, defaulting to 1000 [ 50.018973][ T4326] ip6gre1: entered promiscuous mode [ 50.048003][ T29] kauditd_printk_skb: 405 callbacks suppressed [ 50.048018][ T29] audit: type=1400 audit(1758131136.790:1197): avc: denied { read write } for pid=4321 comm="syz.3.237" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 50.266364][ T29] audit: type=1400 audit(1758131136.790:1198): avc: denied { create } for pid=4321 comm="syz.3.237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 50.285876][ T29] audit: type=1400 audit(1758131136.790:1199): avc: denied { prog_load } for pid=4321 comm="syz.3.237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 50.304892][ T29] audit: type=1400 audit(1758131136.790:1200): avc: denied { create } for pid=4321 comm="syz.3.237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 50.324337][ T29] audit: type=1400 audit(1758131136.790:1201): avc: denied { prog_load } for pid=4321 comm="syz.3.237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 50.343267][ T29] audit: type=1326 audit(1758131136.790:1202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4321 comm="syz.3.237" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f889181eba9 code=0x7ffc0000 [ 50.366616][ T29] audit: type=1326 audit(1758131136.790:1203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4321 comm="syz.3.237" exe="/root/syz-executor" sig=0 arch=c000003e syscall=252 compat=0 ip=0x7f889181eba9 code=0x7ffc0000 [ 50.390007][ T29] audit: type=1326 audit(1758131136.790:1204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4321 comm="syz.3.237" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f889181eba9 code=0x7ffc0000 [ 50.413299][ T29] audit: type=1326 audit(1758131136.790:1205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4321 comm="syz.3.237" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f889181eba9 code=0x7ffc0000 [ 50.436645][ T29] audit: type=1326 audit(1758131136.840:1206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4323 comm="syz.4.238" exe="/root/syz-executor" sig=0 arch=c000003e syscall=231 compat=0 ip=0x7f2dc55ceba9 code=0x7ffc0000 [ 50.482317][ T4334] netlink: 4 bytes leftover after parsing attributes in process `syz.3.241'. [ 50.553920][ T4338] netlink: 'syz.3.244': attribute type 10 has an invalid length. [ 50.565884][ T4338] team0: Device hsr_slave_0 failed to register rx_handler [ 51.558466][ T4389] lo speed is unknown, defaulting to 1000 [ 52.196141][ T4462] netlink: 12 bytes leftover after parsing attributes in process `syz.1.293'. [ 52.546573][ T4474] __nla_validate_parse: 1 callbacks suppressed [ 52.546589][ T4474] netlink: 8 bytes leftover after parsing attributes in process `syz.4.299'. [ 52.561545][ T4474] netlink: 12 bytes leftover after parsing attributes in process `syz.4.299'. [ 52.585907][ T4474] bond2: entered promiscuous mode [ 52.590959][ T4474] bond2: entered allmulticast mode [ 52.599560][ T4474] 8021q: adding VLAN 0 to HW filter on device bond2 [ 52.778824][ T4502] netlink: 14 bytes leftover after parsing attributes in process `syz.2.308'. [ 52.931277][ T4506] Falling back ldisc for ttyS3. [ 53.401026][ T4531] wireguard0: entered promiscuous mode [ 53.406585][ T4531] wireguard0: entered allmulticast mode [ 53.651551][ T4547] netlink: 8 bytes leftover after parsing attributes in process `syz.4.328'. [ 53.701623][ T4547] netlink: 8 bytes leftover after parsing attributes in process `syz.4.328'. [ 53.757170][ T4551] bond1: entered promiscuous mode [ 53.762280][ T4551] bond1: entered allmulticast mode [ 53.771032][ T4551] 8021q: adding VLAN 0 to HW filter on device bond1 [ 53.820059][ T4551] bond1 (unregistering): Released all slaves [ 53.842253][ T4547] netlink: 8 bytes leftover after parsing attributes in process `syz.4.328'. [ 53.861000][ T4547] netlink: 8 bytes leftover after parsing attributes in process `syz.4.328'. [ 54.176908][ T4598] netlink: 8 bytes leftover after parsing attributes in process `syz.0.348'. [ 54.189300][ T4598] netlink: 4 bytes leftover after parsing attributes in process `syz.0.348'. [ 54.405362][ T4616] bridge_slave_0: left allmulticast mode [ 54.411068][ T4616] bridge_slave_0: left promiscuous mode [ 54.416824][ T4616] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.564910][ T4616] bridge_slave_1: left allmulticast mode [ 54.570643][ T4616] bridge_slave_1: left promiscuous mode [ 54.576351][ T4616] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.707419][ T4616] bond0: (slave bond_slave_0): Releasing backup interface [ 54.742957][ T4616] bond0: (slave bond_slave_1): Releasing backup interface [ 54.763950][ T4616] team0: Port device team_slave_0 removed [ 54.773592][ T4616] team0: Port device team_slave_1 removed [ 54.784173][ T4616] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 54.791731][ T4616] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 55.050146][ T29] kauditd_printk_skb: 11364 callbacks suppressed [ 55.050162][ T29] audit: type=1400 audit(1758131141.792:11683): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 55.098068][ T29] audit: type=1400 audit(1758131141.802:11684): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 55.119333][ T29] audit: type=1400 audit(1758131141.802:11685): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 55.140498][ T29] audit: type=1400 audit(1758131141.802:11686): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 55.161685][ T29] audit: type=1400 audit(1758131141.802:11687): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 55.182896][ T29] audit: type=1400 audit(1758131141.802:11688): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 55.204078][ T29] audit: type=1400 audit(1758131141.802:11689): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 55.225332][ T29] audit: type=1400 audit(1758131141.802:11690): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 55.246508][ T29] audit: type=1400 audit(1758131141.802:11691): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 55.252074][ T3033] audit: audit_backlog=65 > audit_backlog_limit=64 [ 55.297416][ T4661] netlink: 12 bytes leftover after parsing attributes in process `syz.4.375'. [ 55.353270][ T4661] 8021q: adding VLAN 0 to HW filter on device bond3 [ 55.500086][ T4673] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4673 comm=syz.1.380 [ 55.700007][ T4685] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(4) [ 55.706614][ T4685] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 55.714214][ T4685] vhci_hcd vhci_hcd.0: Device attached [ 55.795423][ T4686] vhci_hcd: connection closed [ 55.795612][ T4041] vhci_hcd: stop threads [ 55.804707][ T4041] vhci_hcd: release socket [ 55.809102][ T4041] vhci_hcd: disconnect device [ 55.855727][ T4696] lo speed is unknown, defaulting to 1000 [ 56.946632][ T4747] IPv6: Can't replace route, no match found [ 57.404796][ T4762] netlink: 'syz.1.416': attribute type 3 has an invalid length. [ 57.475145][ T4764] netdevsim netdevsim4: loading /lib/firmware/. failed with error -22 [ 57.483426][ T4764] netdevsim netdevsim4: Direct firmware load for . failed with error -22 [ 57.992506][ T4800] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 58.000799][ T4800] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 58.190551][ T4819] netlink: 'syz.2.437': attribute type 13 has an invalid length. [ 58.198323][ T4819] __nla_validate_parse: 2 callbacks suppressed [ 58.198336][ T4819] netlink: 4 bytes leftover after parsing attributes in process `syz.2.437'. [ 58.248786][ T12] netdevsim netdevsim2 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 58.258019][ T4819] netlink: 'syz.2.437': attribute type 13 has an invalid length. [ 58.265856][ T4819] netlink: 4 bytes leftover after parsing attributes in process `syz.2.437'. [ 58.275576][ T12] netdevsim netdevsim2 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 58.285832][ T12] netdevsim netdevsim2 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 58.294794][ T12] netdevsim netdevsim2 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 58.401071][ T4832] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 58.409299][ T4832] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 58.654058][ T4849] netlink: 96 bytes leftover after parsing attributes in process `syz.2.452'. [ 58.740607][ T4849] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4849 comm=syz.2.452 [ 58.895326][ T4860] netlink: 'syz.2.455': attribute type 10 has an invalid length. [ 58.903213][ T4860] netlink: 'syz.2.455': attribute type 10 has an invalid length. [ 58.969233][ T4863] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 [ 58.977429][ T4863] netdevsim netdevsim2: Direct firmware load for . failed with error -22 [ 59.237559][ T4883] netlink: 'syz.4.465': attribute type 1 has an invalid length. [ 59.250535][ T4883] 8021q: adding VLAN 0 to HW filter on device bond4 [ 59.307600][ T4892] netlink: 'syz.3.467': attribute type 1 has an invalid length. [ 59.382400][ T4905] FAULT_INJECTION: forcing a failure. [ 59.382400][ T4905] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 59.395619][ T4905] CPU: 0 UID: 0 PID: 4905 Comm: syz.4.471 Not tainted syzkaller #0 PREEMPT(voluntary) [ 59.395646][ T4905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 59.395658][ T4905] Call Trace: [ 59.395664][ T4905] [ 59.395670][ T4905] __dump_stack+0x1d/0x30 [ 59.395761][ T4905] dump_stack_lvl+0xe8/0x140 [ 59.395777][ T4905] dump_stack+0x15/0x1b [ 59.395790][ T4905] should_fail_ex+0x265/0x280 [ 59.395881][ T4905] should_fail+0xb/0x20 [ 59.395898][ T4905] should_fail_usercopy+0x1a/0x20 [ 59.395919][ T4905] _copy_from_user+0x1c/0xb0 [ 59.395951][ T4905] kstrtouint_from_user+0x69/0xf0 [ 59.395978][ T4905] ? 0xffffffff81000000 [ 59.395991][ T4905] ? selinux_file_permission+0x1e4/0x320 [ 59.396047][ T4905] proc_fail_nth_write+0x50/0x160 [ 59.396075][ T4905] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 59.396192][ T4905] vfs_write+0x269/0x960 [ 59.396240][ T4905] ? vfs_read+0x4e6/0x770 [ 59.396258][ T4905] ? __rcu_read_unlock+0x4f/0x70 [ 59.396276][ T4905] ? __fget_files+0x184/0x1c0 [ 59.396294][ T4905] ? __sys_bind+0xc3/0x2a0 [ 59.396312][ T4905] ksys_write+0xda/0x1a0 [ 59.396391][ T4905] __x64_sys_write+0x40/0x50 [ 59.396413][ T4905] x64_sys_call+0x27fe/0x2ff0 [ 59.396474][ T4905] do_syscall_64+0xd2/0x200 [ 59.396499][ T4905] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 59.396539][ T4905] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 59.396562][ T4905] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 59.396580][ T4905] RIP: 0033:0x7f2dc55cd65f [ 59.396594][ T4905] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 59.396611][ T4905] RSP: 002b:00007f2dc402f030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 59.396694][ T4905] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2dc55cd65f [ 59.396751][ T4905] RDX: 0000000000000001 RSI: 00007f2dc402f0a0 RDI: 0000000000000003 [ 59.396762][ T4905] RBP: 00007f2dc402f090 R08: 0000000000000000 R09: 0000000000000000 [ 59.396774][ T4905] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 59.396787][ T4905] R13: 00007f2dc5816038 R14: 00007f2dc5815fa0 R15: 00007ffdec75f858 [ 59.396806][ T4905] [ 59.659057][ T4910] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 59.667266][ T4910] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 60.005877][ T4953] netlink: 'syz.1.494': attribute type 10 has an invalid length. [ 60.035789][ T4953] team0: Port device dummy0 added [ 60.112515][ T4953] sch_tbf: burst 32855 is lower than device lo mtu (65550) ! [ 60.163251][ T29] kauditd_printk_skb: 21031 callbacks suppressed [ 60.163267][ T29] audit: type=1400 audit(1758131402.781:29406): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 60.190836][ T29] audit: type=1400 audit(1758131402.781:29407): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 60.212003][ T29] audit: type=1400 audit(1758131402.781:29408): avc: denied { prog_load } for pid=4949 comm="syz.4.492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 60.231017][ T29] audit: type=1400 audit(1758131402.781:29409): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 60.252307][ T29] audit: type=1400 audit(1758131402.781:29410): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 60.273435][ T29] audit: type=1400 audit(1758131402.781:29411): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 60.294661][ T29] audit: type=1400 audit(1758131402.781:29412): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 60.315836][ T29] audit: type=1400 audit(1758131402.781:29413): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 60.337189][ T29] audit: type=1400 audit(1758131402.781:29414): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 60.358312][ T29] audit: type=1400 audit(1758131402.781:29415): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 60.360875][ T4960] FAULT_INJECTION: forcing a failure. [ 60.360875][ T4960] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 60.392481][ T4960] CPU: 0 UID: 0 PID: 4960 Comm: syz.3.495 Not tainted syzkaller #0 PREEMPT(voluntary) [ 60.392503][ T4960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 60.392528][ T4960] Call Trace: [ 60.392533][ T4960] [ 60.392541][ T4960] __dump_stack+0x1d/0x30 [ 60.392562][ T4960] dump_stack_lvl+0xe8/0x140 [ 60.392582][ T4960] dump_stack+0x15/0x1b [ 60.392597][ T4960] should_fail_ex+0x265/0x280 [ 60.392672][ T4960] should_fail+0xb/0x20 [ 60.392693][ T4960] should_fail_usercopy+0x1a/0x20 [ 60.392719][ T4960] copy_folio_from_iter_atomic+0x278/0x11b0 [ 60.392794][ T4960] ? shmem_write_begin+0xa8/0x190 [ 60.392812][ T4960] ? shmem_write_begin+0xe1/0x190 [ 60.392829][ T4960] generic_perform_write+0x2c2/0x490 [ 60.392851][ T4960] shmem_file_write_iter+0xc5/0xf0 [ 60.392873][ T4960] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 60.392938][ T4960] vfs_write+0x52a/0x960 [ 60.392960][ T4960] ksys_write+0xda/0x1a0 [ 60.393019][ T4960] __x64_sys_write+0x40/0x50 [ 60.393040][ T4960] x64_sys_call+0x27fe/0x2ff0 [ 60.393073][ T4960] do_syscall_64+0xd2/0x200 [ 60.393104][ T4960] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 60.393132][ T4960] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 60.393243][ T4960] RIP: 0033:0x7f889181d65f [ 60.393258][ T4960] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 60.393272][ T4960] RSP: 002b:00007f8890286df0 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 60.393288][ T4960] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007f889181d65f [ 60.393298][ T4960] RDX: 0000000000040000 RSI: 00007f8887e67000 RDI: 0000000000000004 [ 60.393357][ T4960] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000000004ec [ 60.393370][ T4960] R10: 00000000000007ce R11: 0000000000000293 R12: 0000000000000004 [ 60.393383][ T4960] R13: 00007f8890286ef0 R14: 00007f8890286eb0 R15: 00007f8887e67000 [ 60.393403][ T4960] [ 60.624601][ T4965] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4965 comm=syz.1.497 [ 60.644243][ T4965] netlink: 12 bytes leftover after parsing attributes in process `syz.1.497'. [ 60.661618][ T4969] netlink: 6 bytes leftover after parsing attributes in process `syz.4.500'. [ 60.670425][ T4969] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 60.708456][ T4966] netlink: 24 bytes leftover after parsing attributes in process `syz.2.498'. [ 60.736349][ T4974] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4974 comm=syz.2.502 [ 60.750640][ T4974] netlink: 12 bytes leftover after parsing attributes in process `syz.2.502'. [ 60.797939][ T4970] pim6reg1: entered promiscuous mode [ 60.935105][ T4995] netlink: 'syz.4.509': attribute type 3 has an invalid length. [ 60.944822][ T4990] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 [ 60.953064][ T4990] netdevsim netdevsim2: Direct firmware load for . failed with error -22 [ 60.996547][ T4992] lo speed is unknown, defaulting to 1000 [ 61.114536][ T5009] netlink: 6 bytes leftover after parsing attributes in process `syz.2.512'. [ 61.137156][ T5009] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 61.635198][ T5040] netlink: 'syz.0.525': attribute type 3 has an invalid length. [ 62.898126][ T5059] netlink: 8 bytes leftover after parsing attributes in process `syz.3.533'. [ 62.907091][ T5059] netlink: 'syz.3.533': attribute type 30 has an invalid length. [ 62.941380][ T5061] netlink: 4 bytes leftover after parsing attributes in process `syz.2.536'. [ 62.969896][ T4041] netdevsim netdevsim3 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 63.009976][ T4041] netdevsim netdevsim3 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 63.044699][ T4041] netdevsim netdevsim3 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 63.063448][ T4041] netdevsim netdevsim3 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 63.097432][ T5082] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=49940 sclass=netlink_tcpdiag_socket pid=5082 comm=syz.0.539 [ 63.152827][ T5090] wireguard0: entered promiscuous mode [ 63.158334][ T5090] wireguard0: entered allmulticast mode [ 64.020606][ T5122] __nla_validate_parse: 2 callbacks suppressed [ 64.020620][ T5122] netlink: 8 bytes leftover after parsing attributes in process `syz.2.560'. [ 64.036849][ T5120] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 64.045040][ T5120] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 64.130545][ T5129] lo speed is unknown, defaulting to 1000 [ 64.160663][ T5141] netlink: 16 bytes leftover after parsing attributes in process `syz.4.567'. [ 64.169607][ T5141] netlink: 4 bytes leftover after parsing attributes in process `syz.4.567'. [ 64.244029][ T5149] FAULT_INJECTION: forcing a failure. [ 64.244029][ T5149] name failslab, interval 1, probability 0, space 0, times 0 [ 64.256688][ T5149] CPU: 0 UID: 0 PID: 5149 Comm: syz.2.571 Not tainted syzkaller #0 PREEMPT(voluntary) [ 64.256710][ T5149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 64.256719][ T5149] Call Trace: [ 64.256724][ T5149] [ 64.256731][ T5149] __dump_stack+0x1d/0x30 [ 64.256752][ T5149] dump_stack_lvl+0xe8/0x140 [ 64.256812][ T5149] dump_stack+0x15/0x1b [ 64.256832][ T5149] should_fail_ex+0x265/0x280 [ 64.256923][ T5149] should_failslab+0x8c/0xb0 [ 64.256948][ T5149] kmem_cache_alloc_noprof+0x50/0x310 [ 64.256975][ T5149] ? security_file_alloc+0x32/0x100 [ 64.257019][ T5149] security_file_alloc+0x32/0x100 [ 64.257046][ T5149] init_file+0x5c/0x1d0 [ 64.257070][ T5149] alloc_empty_file+0x8b/0x200 [ 64.257103][ T5149] alloc_file_pseudo+0xc6/0x160 [ 64.257157][ T5149] __shmem_file_setup+0x1de/0x210 [ 64.257187][ T5149] shmem_file_setup+0x3b/0x50 [ 64.257204][ T5149] __se_sys_memfd_create+0x2c3/0x590 [ 64.257246][ T5149] __x64_sys_memfd_create+0x31/0x40 [ 64.257267][ T5149] x64_sys_call+0x2abe/0x2ff0 [ 64.257328][ T5149] do_syscall_64+0xd2/0x200 [ 64.257353][ T5149] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 64.257376][ T5149] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 64.257404][ T5149] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 64.257457][ T5149] RIP: 0033:0x7fa3eb56eba9 [ 64.257472][ T5149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 64.257494][ T5149] RSP: 002b:00007fa3e9fd6e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 64.257512][ T5149] RAX: ffffffffffffffda RBX: 00000000000004f3 RCX: 00007fa3eb56eba9 [ 64.257525][ T5149] RDX: 00007fa3e9fd6ef0 RSI: 0000000000000000 RDI: 00007fa3eb5f27e8 [ 64.257537][ T5149] RBP: 0000200000000740 R08: 00007fa3e9fd6bb7 R09: 00007fa3e9fd6e40 [ 64.257558][ T5149] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000080 [ 64.257568][ T5149] R13: 00007fa3e9fd6ef0 R14: 00007fa3e9fd6eb0 R15: 0000200000000380 [ 64.257582][ T5149] [ 64.550139][ T5165] netlink: 'syz.3.579': attribute type 3 has an invalid length. [ 64.563142][ T5166] netlink: 'syz.0.572': attribute type 4 has an invalid length. [ 64.655754][ T5176] FAULT_INJECTION: forcing a failure. [ 64.655754][ T5176] name failslab, interval 1, probability 0, space 0, times 0 [ 64.668452][ T5176] CPU: 1 UID: 0 PID: 5176 Comm: syz.0.583 Not tainted syzkaller #0 PREEMPT(voluntary) [ 64.668547][ T5176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 64.668558][ T5176] Call Trace: [ 64.668565][ T5176] [ 64.668572][ T5176] __dump_stack+0x1d/0x30 [ 64.668590][ T5176] dump_stack_lvl+0xe8/0x140 [ 64.668607][ T5176] dump_stack+0x15/0x1b [ 64.668621][ T5176] should_fail_ex+0x265/0x280 [ 64.668676][ T5176] should_failslab+0x8c/0xb0 [ 64.668716][ T5176] kmem_cache_alloc_noprof+0x50/0x310 [ 64.668743][ T5176] ? audit_log_start+0x365/0x6c0 [ 64.668815][ T5176] audit_log_start+0x365/0x6c0 [ 64.668846][ T5176] audit_seccomp+0x48/0x100 [ 64.668872][ T5176] ? __seccomp_filter+0x68c/0x10d0 [ 64.669040][ T5176] __seccomp_filter+0x69d/0x10d0 [ 64.669062][ T5176] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 64.669140][ T5176] ? vfs_write+0x7e8/0x960 [ 64.669161][ T5176] __secure_computing+0x82/0x150 [ 64.669182][ T5176] syscall_trace_enter+0xcf/0x1e0 [ 64.669275][ T5176] do_syscall_64+0xac/0x200 [ 64.669306][ T5176] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 64.669329][ T5176] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 64.669357][ T5176] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 64.669377][ T5176] RIP: 0033:0x7f4c8bbdeba9 [ 64.669393][ T5176] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 64.669410][ T5176] RSP: 002b:00007f4c8a647038 EFLAGS: 00000246 ORIG_RAX: 00000000000000cb [ 64.669509][ T5176] RAX: ffffffffffffffda RBX: 00007f4c8be25fa0 RCX: 00007f4c8bbdeba9 [ 64.669522][ T5176] RDX: 00002000000002c0 RSI: 0000000000000008 RDI: 0000000000000000 [ 64.669534][ T5176] RBP: 00007f4c8a647090 R08: 0000000000000000 R09: 0000000000000000 [ 64.669546][ T5176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 64.669558][ T5176] R13: 00007f4c8be26038 R14: 00007f4c8be25fa0 R15: 00007fffd6956f48 [ 64.669622][ T5176] [ 64.946939][ T5192] netlink: 4 bytes leftover after parsing attributes in process `syz.1.589'. [ 64.981521][ T5194] netlink: 4 bytes leftover after parsing attributes in process `syz.0.590'. [ 65.013545][ T5194] bridge_slave_1: left allmulticast mode [ 65.019238][ T5194] bridge_slave_1: left promiscuous mode [ 65.024894][ T5194] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.032852][ T5194] bridge_slave_0: left allmulticast mode [ 65.038689][ T5194] bridge_slave_0: left promiscuous mode [ 65.044540][ T5194] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.168468][ T29] kauditd_printk_skb: 33966 callbacks suppressed [ 65.168481][ T29] audit: type=1400 audit(1758131407.911:56537): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 65.216397][ T3033] audit: audit_backlog=65 > audit_backlog_limit=64 [ 65.222986][ T3033] audit: audit_lost=3685 audit_rate_limit=0 audit_backlog_limit=64 [ 65.230910][ T3033] audit: backlog limit exceeded [ 65.237044][ T29] audit: type=1400 audit(1758131407.961:56538): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 65.261413][ T29] audit: type=1400 audit(1758131407.961:56539): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 65.282623][ T29] audit: type=1400 audit(1758131407.961:56540): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 65.303767][ T29] audit: type=1400 audit(1758131407.961:56541): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 65.324970][ T29] audit: type=1400 audit(1758131407.961:56542): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 65.346178][ T29] audit: type=1400 audit(1758131407.961:56543): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 65.995625][ T5281] netlink: 8 bytes leftover after parsing attributes in process `gtp'. [ 66.058045][ T5281] lo speed is unknown, defaulting to 1000 [ 66.094233][ T5286] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 [ 66.102671][ T5286] netdevsim netdevsim2: Direct firmware load for . failed with error -22 [ 67.953614][ T5369] netlink: 'syz.4.665': attribute type 10 has an invalid length. [ 67.961395][ T5369] netlink: 40 bytes leftover after parsing attributes in process `syz.4.665'. [ 68.519717][ T5391] bridge0: entered allmulticast mode [ 68.662762][ T5391] lo speed is unknown, defaulting to 1000 [ 68.671486][ T5401] netlink: 'syz.4.677': attribute type 10 has an invalid length. [ 69.665813][ T5459] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 69.674063][ T5459] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 69.772171][ T5473] futex_wake_op: syz.2.705 tries to shift op by -1; fix this program [ 69.883172][ T5482] netlink: 'syz.3.709': attribute type 4 has an invalid length. [ 70.019417][ T5488] lo speed is unknown, defaulting to 1000 [ 70.060121][ T5492] netlink: 'syz.1.713': attribute type 10 has an invalid length. [ 70.067880][ T5492] netlink: 40 bytes leftover after parsing attributes in process `syz.1.713'. [ 70.117884][ T5492] dummy0: entered promiscuous mode [ 70.153153][ T5492] team0: Port device dummy0 removed [ 70.193948][ T5497] netlink: 8 bytes leftover after parsing attributes in process `syz.3.715'. [ 70.246557][ T29] kauditd_printk_skb: 33625 callbacks suppressed [ 70.246572][ T29] audit: type=1400 audit(70.235:77422): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 70.299044][ T3033] audit: audit_backlog=65 > audit_backlog_limit=64 [ 70.305588][ T3033] audit: audit_lost=7935 audit_rate_limit=0 audit_backlog_limit=64 [ 70.313611][ T3033] audit: backlog limit exceeded [ 70.318733][ T29] audit: type=1400 audit(70.265:77423): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 70.339270][ T29] audit: type=1400 audit(70.265:77424): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 70.359775][ T29] audit: type=1400 audit(70.265:77425): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 70.380284][ T29] audit: type=1400 audit(70.265:77426): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 70.400970][ T29] audit: type=1400 audit(70.265:77427): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 70.421900][ T29] audit: type=1400 audit(70.265:77428): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 70.547425][ T5504] futex_wake_op: syz.4.718 tries to shift op by -1; fix this program [ 70.665489][ T5506] FAULT_INJECTION: forcing a failure. [ 70.665489][ T5506] name failslab, interval 1, probability 0, space 0, times 0 [ 70.678217][ T5506] CPU: 0 UID: 0 PID: 5506 Comm: syz.4.719 Not tainted syzkaller #0 PREEMPT(voluntary) [ 70.678242][ T5506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 70.678287][ T5506] Call Trace: [ 70.678294][ T5506] [ 70.678305][ T5506] __dump_stack+0x1d/0x30 [ 70.678327][ T5506] dump_stack_lvl+0xe8/0x140 [ 70.678343][ T5506] dump_stack+0x15/0x1b [ 70.678360][ T5506] should_fail_ex+0x265/0x280 [ 70.678426][ T5506] should_failslab+0x8c/0xb0 [ 70.678452][ T5506] __kvmalloc_node_noprof+0x123/0x4e0 [ 70.678615][ T5506] ? alloc_netdev_mqs+0x86d/0xa30 [ 70.678661][ T5506] ? __kmalloc_cache_noprof+0x22e/0x320 [ 70.678757][ T5506] alloc_netdev_mqs+0x86d/0xa30 [ 70.678799][ T5506] tun_set_iff+0x42c/0x890 [ 70.678821][ T5506] __tun_chr_ioctl+0x5f0/0x14c0 [ 70.678842][ T5506] ? __pfx_tun_chr_ioctl+0x10/0x10 [ 70.678863][ T5506] tun_chr_ioctl+0x27/0x40 [ 70.678913][ T5506] __se_sys_ioctl+0xce/0x140 [ 70.678928][ T5506] __x64_sys_ioctl+0x43/0x50 [ 70.678945][ T5506] x64_sys_call+0x1816/0x2ff0 [ 70.678967][ T5506] do_syscall_64+0xd2/0x200 [ 70.679105][ T5506] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 70.679128][ T5506] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 70.679151][ T5506] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 70.679168][ T5506] RIP: 0033:0x7f2dc55ceba9 [ 70.679193][ T5506] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 70.679233][ T5506] RSP: 002b:00007f2dc402f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 70.679250][ T5506] RAX: ffffffffffffffda RBX: 00007f2dc5815fa0 RCX: 00007f2dc55ceba9 [ 70.679260][ T5506] RDX: 0000200000000100 RSI: 00000000400454ca RDI: 0000000000000004 [ 70.679270][ T5506] RBP: 00007f2dc402f090 R08: 0000000000000000 R09: 0000000000000000 [ 70.679282][ T5506] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 70.679295][ T5506] R13: 00007f2dc5816038 R14: 00007f2dc5815fa0 R15: 00007ffdec75f858 [ 70.679312][ T5506] [ 71.025868][ T5516] netlink: 48 bytes leftover after parsing attributes in process `syz.4.722'. [ 71.035095][ T5513] netlink: 48 bytes leftover after parsing attributes in process `syz.4.722'. [ 71.134653][ T5523] netlink: 4 bytes leftover after parsing attributes in process `syz.0.716'. [ 71.863609][ T5575] ÿÿÿÿÿÿ: renamed from vlan1 (while UP) [ 71.920325][ T5577] netdevsim netdevsim4: loading /lib/firmware/. failed with error -22 [ 71.928553][ T5577] netdevsim netdevsim4: Direct firmware load for . failed with error -22 [ 72.273717][ T5599] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5599 comm=syz.3.756 [ 72.454767][ T5608] netdevsim netdevsim3: loading /lib/firmware/. failed with error -22 [ 72.463135][ T5608] netdevsim netdevsim3: Direct firmware load for . failed with error -22 [ 73.110348][ T5667] netlink: 14 bytes leftover after parsing attributes in process `syz.0.784'. [ 73.231930][ T5675] FAULT_INJECTION: forcing a failure. [ 73.231930][ T5675] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 73.245115][ T5675] CPU: 0 UID: 0 PID: 5675 Comm: syz.0.787 Not tainted syzkaller #0 PREEMPT(voluntary) [ 73.245227][ T5675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 73.245237][ T5675] Call Trace: [ 73.245253][ T5675] [ 73.245261][ T5675] __dump_stack+0x1d/0x30 [ 73.245283][ T5675] dump_stack_lvl+0xe8/0x140 [ 73.245395][ T5675] dump_stack+0x15/0x1b [ 73.245409][ T5675] should_fail_ex+0x265/0x280 [ 73.245429][ T5675] should_fail+0xb/0x20 [ 73.245445][ T5675] should_fail_usercopy+0x1a/0x20 [ 73.245531][ T5675] _copy_from_user+0x1c/0xb0 [ 73.245560][ T5675] kstrtouint_from_user+0x69/0xf0 [ 73.245584][ T5675] ? 0xffffffff81000000 [ 73.245597][ T5675] ? selinux_file_permission+0x1e4/0x320 [ 73.245689][ T5675] proc_fail_nth_write+0x50/0x160 [ 73.245741][ T5675] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 73.245765][ T5675] vfs_write+0x269/0x960 [ 73.245835][ T5675] ? vfs_read+0x4e6/0x770 [ 73.245854][ T5675] ? __rcu_read_unlock+0x4f/0x70 [ 73.245875][ T5675] ? __fget_files+0x184/0x1c0 [ 73.245939][ T5675] ksys_write+0xda/0x1a0 [ 73.245961][ T5675] __x64_sys_write+0x40/0x50 [ 73.246044][ T5675] x64_sys_call+0x27fe/0x2ff0 [ 73.246065][ T5675] do_syscall_64+0xd2/0x200 [ 73.246145][ T5675] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 73.246168][ T5675] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 73.246195][ T5675] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 73.246216][ T5675] RIP: 0033:0x7f4c8bbdd65f [ 73.246256][ T5675] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 73.246272][ T5675] RSP: 002b:00007f4c8a647030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 73.246291][ T5675] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4c8bbdd65f [ 73.246367][ T5675] RDX: 0000000000000001 RSI: 00007f4c8a6470a0 RDI: 0000000000000005 [ 73.246379][ T5675] RBP: 00007f4c8a647090 R08: 0000000000000000 R09: 0000000000000000 [ 73.246391][ T5675] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 73.246403][ T5675] R13: 00007f4c8be26038 R14: 00007f4c8be25fa0 R15: 00007fffd6956f48 [ 73.246489][ T5675] [ 73.249570][ T5674] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 73.470293][ T5674] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 73.694909][ T5693] netlink: 16 bytes leftover after parsing attributes in process `syz.1.793'. [ 73.782962][ T5701] netlink: 48 bytes leftover after parsing attributes in process `syz.3.798'. [ 74.108590][ T5710] netdevsim netdevsim4: loading /lib/firmware/. failed with error -22 [ 74.116833][ T5710] netdevsim netdevsim4: Direct firmware load for . failed with error -22 [ 74.306574][ T5719] netlink: 4 bytes leftover after parsing attributes in process `syz.2.803'. [ 74.501794][ T5728] lo speed is unknown, defaulting to 1000 [ 74.554789][ T5732] sch_tbf: peakrate 7 is lower than or equals to rate 19 ! [ 74.707639][ T5741] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 74.715940][ T5741] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 74.847457][ T5761] bond0: (slave batadv0): Releasing backup interface [ 74.875779][ T5761] bridge_slave_0: left allmulticast mode [ 74.881543][ T5761] bridge_slave_0: left promiscuous mode [ 74.887267][ T5761] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.900569][ T5761] bridge_slave_1: left allmulticast mode [ 74.906254][ T5761] bridge_slave_1: left promiscuous mode [ 74.912122][ T5761] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.934254][ T5761] bond0: (slave bond_slave_0): Releasing backup interface [ 74.952406][ T5761] bond0: (slave bond_slave_1): Releasing backup interface [ 74.962292][ T5761] team0: Port device team_slave_0 removed [ 74.977669][ T5761] team0: Port device team_slave_1 removed [ 74.988779][ T5767] IPv6: Can't replace route, no match found [ 74.991988][ T5761] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 75.011901][ T5761] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 75.078121][ T5776] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(4) [ 75.084666][ T5776] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 75.092159][ T5776] vhci_hcd vhci_hcd.0: Device attached [ 75.162805][ T5777] vhci_hcd: connection closed [ 75.165562][ T5790] netlink: 16 bytes leftover after parsing attributes in process `syz.3.831'. [ 75.175466][ T5792] netlink: 'syz.4.832': attribute type 10 has an invalid length. [ 75.187074][ T5792] netlink: 40 bytes leftover after parsing attributes in process `syz.4.832'. [ 75.198703][ T12] vhci_hcd: stop threads [ 75.203089][ T12] vhci_hcd: release socket [ 75.207569][ T12] vhci_hcd: disconnect device [ 75.207650][ T5787] Falling back ldisc for ttyS3. [ 75.247915][ T5792] team0: Port device geneve1 added [ 75.251210][ T29] kauditd_printk_skb: 33059 callbacks suppressed [ 75.251223][ T29] audit: type=1400 audit(2653.244:97759): avc: denied { read write } for pid=3304 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 75.257135][ T12] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.264608][ T29] audit: type=1400 audit(2653.244:97760): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 75.312617][ T29] audit: type=1400 audit(2653.244:97761): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 75.330111][ T12] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.333627][ T29] audit: type=1400 audit(2653.244:97762): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 75.362944][ T29] audit: type=1400 audit(2653.244:97763): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 75.383744][ T29] audit: type=1400 audit(2653.244:97764): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 75.394239][ T3033] audit: audit_backlog=65 > audit_backlog_limit=64 [ 75.404389][ T29] audit: type=1400 audit(2653.244:97765): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 75.410853][ T3033] audit: audit_lost=12179 audit_rate_limit=0 audit_backlog_limit=64 [ 75.410865][ T3033] audit: backlog limit exceeded [ 75.431561][ T12] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.439578][ T3392] vhci_hcd: vhci_device speed not set [ 75.477172][ T12] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.585827][ T5819] netlink: 16 bytes leftover after parsing attributes in process `syz.4.844'. [ 76.113670][ T5863] netlink: 'syz.0.863': attribute type 10 has an invalid length. [ 76.143676][ T5863] team0: Port device syz_tun added [ 76.199305][ T5869] netlink: 'syz.0.866': attribute type 1 has an invalid length. [ 76.207153][ T5869] netlink: 'syz.0.866': attribute type 4 has an invalid length. [ 76.214852][ T5869] netlink: 9462 bytes leftover after parsing attributes in process `syz.0.866'. [ 76.249576][ T5870] netlink: 'syz.0.866': attribute type 1 has an invalid length. [ 76.257399][ T5870] netlink: 'syz.0.866': attribute type 4 has an invalid length. [ 76.265142][ T5870] netlink: 9462 bytes leftover after parsing attributes in process `syz.0.866'. [ 76.316700][ T5873] netlink: 'syz.0.866': attribute type 1 has an invalid length. [ 76.324465][ T5873] netlink: 'syz.0.866': attribute type 4 has an invalid length. [ 76.332229][ T5873] netlink: 9462 bytes leftover after parsing attributes in process `syz.0.866'. [ 76.516112][ T5882] FAULT_INJECTION: forcing a failure. [ 76.516112][ T5882] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 76.529270][ T5882] CPU: 1 UID: 0 PID: 5882 Comm: syz.2.871 Not tainted syzkaller #0 PREEMPT(voluntary) [ 76.529299][ T5882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 76.529311][ T5882] Call Trace: [ 76.529318][ T5882] [ 76.529326][ T5882] __dump_stack+0x1d/0x30 [ 76.529346][ T5882] dump_stack_lvl+0xe8/0x140 [ 76.529364][ T5882] dump_stack+0x15/0x1b [ 76.529380][ T5882] should_fail_ex+0x265/0x280 [ 76.529425][ T5882] should_fail+0xb/0x20 [ 76.529446][ T5882] should_fail_usercopy+0x1a/0x20 [ 76.529543][ T5882] _copy_from_user+0x1c/0xb0 [ 76.529620][ T5882] snd_seq_event_dup+0x306/0x460 [ 76.529653][ T5882] snd_seq_client_enqueue_event+0x1dc/0x2a0 [ 76.529682][ T5882] snd_seq_write+0x41a/0x530 [ 76.529711][ T5882] ? __pfx_snd_seq_write+0x10/0x10 [ 76.529745][ T5882] vfs_write+0x269/0x960 [ 76.529763][ T5882] ? __rcu_read_unlock+0x4f/0x70 [ 76.529782][ T5882] ? __fget_files+0x184/0x1c0 [ 76.529808][ T5882] ksys_write+0xda/0x1a0 [ 76.529842][ T5882] __x64_sys_write+0x40/0x50 [ 76.529913][ T5882] x64_sys_call+0x27fe/0x2ff0 [ 76.529934][ T5882] do_syscall_64+0xd2/0x200 [ 76.530023][ T5882] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 76.530051][ T5882] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 76.530073][ T5882] RIP: 0033:0x7fa3eb56eba9 [ 76.530088][ T5882] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 76.530184][ T5882] RSP: 002b:00007fa3e9fd7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 76.530204][ T5882] RAX: ffffffffffffffda RBX: 00007fa3eb7b5fa0 RCX: 00007fa3eb56eba9 [ 76.530217][ T5882] RDX: 000000000000ffc8 RSI: 0000200000000000 RDI: 0000000000000006 [ 76.530230][ T5882] RBP: 00007fa3e9fd7090 R08: 0000000000000000 R09: 0000000000000000 [ 76.530242][ T5882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 76.530307][ T5882] R13: 00007fa3eb7b6038 R14: 00007fa3eb7b5fa0 R15: 00007ffc8fbdb128 [ 76.530351][ T5882] [ 76.744654][ T5884] netlink: 4 bytes leftover after parsing attributes in process `syz.2.872'. [ 76.783469][ T5886] netlink: 60 bytes leftover after parsing attributes in process `syz.2.873'. [ 77.097821][ T5913] FAULT_INJECTION: forcing a failure. [ 77.097821][ T5913] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 77.111184][ T5913] CPU: 0 UID: 0 PID: 5913 Comm: syz.2.886 Not tainted syzkaller #0 PREEMPT(voluntary) [ 77.111206][ T5913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 77.111217][ T5913] Call Trace: [ 77.111224][ T5913] [ 77.111232][ T5913] __dump_stack+0x1d/0x30 [ 77.111254][ T5913] dump_stack_lvl+0xe8/0x140 [ 77.111271][ T5913] dump_stack+0x15/0x1b [ 77.111364][ T5913] should_fail_ex+0x265/0x280 [ 77.111385][ T5913] should_fail_alloc_page+0xf2/0x100 [ 77.111410][ T5913] __alloc_frozen_pages_noprof+0xff/0x360 [ 77.111504][ T5913] alloc_pages_mpol+0xb3/0x250 [ 77.111535][ T5913] vma_alloc_folio_noprof+0x1aa/0x300 [ 77.111594][ T5913] handle_mm_fault+0xec2/0x2c20 [ 77.111621][ T5913] do_user_addr_fault+0x636/0x1090 [ 77.111653][ T5913] ? fpregs_assert_state_consistent+0xb4/0xe0 [ 77.111728][ T5913] exc_page_fault+0x62/0xa0 [ 77.111755][ T5913] asm_exc_page_fault+0x26/0x30 [ 77.111844][ T5913] RIP: 0033:0x7fa3eb430ba3 [ 77.111858][ T5913] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 77.111924][ T5913] RSP: 002b:00007fa3e9fd64a0 EFLAGS: 00010206 [ 77.111938][ T5913] RAX: 000000000000c000 RBX: 00007fa3e9fd6540 RCX: 00007fa3e1bb7000 [ 77.111948][ T5913] RDX: 00007fa3e9fd66e0 RSI: 0000000000000000 RDI: 00007fa3e9fd65e0 [ 77.111959][ T5913] RBP: 00000000000000fa R08: 0000000000000007 R09: 000000000000003c [ 77.111972][ T5913] R10: 0000000000000050 R11: 00007fa3e9fd6540 R12: 0000000000000001 [ 77.111985][ T5913] R13: 00007fa3eb60da00 R14: 0000000000000005 R15: 00007fa3e9fd65e0 [ 77.112003][ T5913] [ 77.112023][ T5913] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 77.741612][ T5953] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5953 comm=syz.4.900 [ 77.793091][ T5953] netlink: 12 bytes leftover after parsing attributes in process `syz.4.900'. [ 77.839972][ T5958] netlink: 'syz.3.901': attribute type 10 has an invalid length. [ 77.871852][ T5958] team0: Port device dummy0 added [ 77.893274][ T5958] netlink: 'syz.3.901': attribute type 10 has an invalid length. [ 77.914059][ T5958] team0: Port device dummy0 removed [ 77.931237][ T5958] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 78.106645][ T5979] lo speed is unknown, defaulting to 1000 [ 78.538423][ T6033] FAULT_INJECTION: forcing a failure. [ 78.538423][ T6033] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 78.551718][ T6033] CPU: 0 UID: 0 PID: 6033 Comm: syz.0.932 Not tainted syzkaller #0 PREEMPT(voluntary) [ 78.551744][ T6033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 78.551755][ T6033] Call Trace: [ 78.551762][ T6033] [ 78.551806][ T6033] __dump_stack+0x1d/0x30 [ 78.551828][ T6033] dump_stack_lvl+0xe8/0x140 [ 78.551848][ T6033] dump_stack+0x15/0x1b [ 78.551864][ T6033] should_fail_ex+0x265/0x280 [ 78.551893][ T6033] should_fail+0xb/0x20 [ 78.551946][ T6033] should_fail_usercopy+0x1a/0x20 [ 78.551971][ T6033] copy_folio_from_iter_atomic+0x278/0x11b0 [ 78.552005][ T6033] ? shmem_write_begin+0xa8/0x190 [ 78.552025][ T6033] ? shmem_write_begin+0xe1/0x190 [ 78.552078][ T6033] generic_perform_write+0x2c2/0x490 [ 78.552101][ T6033] shmem_file_write_iter+0xc5/0xf0 [ 78.552188][ T6033] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 78.552208][ T6033] vfs_write+0x52a/0x960 [ 78.552229][ T6033] ksys_write+0xda/0x1a0 [ 78.552278][ T6033] __x64_sys_write+0x40/0x50 [ 78.552300][ T6033] x64_sys_call+0x27fe/0x2ff0 [ 78.552322][ T6033] do_syscall_64+0xd2/0x200 [ 78.552395][ T6033] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 78.552418][ T6033] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 78.552471][ T6033] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 78.552514][ T6033] RIP: 0033:0x7f4c8bbdd65f [ 78.552530][ T6033] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 78.552546][ T6033] RSP: 002b:00007f4c8a646df0 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 78.552616][ T6033] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007f4c8bbdd65f [ 78.552627][ T6033] RDX: 0000000000040000 RSI: 00007f4c82227000 RDI: 0000000000000004 [ 78.552637][ T6033] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000474 [ 78.552647][ T6033] R10: 00000000000003bc R11: 0000000000000293 R12: 0000000000000004 [ 78.552724][ T6033] R13: 00007f4c8a646ef0 R14: 00007f4c8a646eb0 R15: 00007f4c82227000 [ 78.552738][ T6033] [ 79.040914][ T6071] netlink: 16 bytes leftover after parsing attributes in process `syz.4.947'. [ 79.401351][ T6091] futex_wake_op: syz.1.957 tries to shift op by 144; fix this program [ 79.427684][ T6096] bond3: entered promiscuous mode [ 79.432837][ T6096] bond3: entered allmulticast mode [ 79.477443][ T6096] 8021q: adding VLAN 0 to HW filter on device bond3 [ 79.607732][ T3579] IPVS: starting estimator thread 0... [ 79.700489][ T6124] IPVS: using max 2160 ests per chain, 108000 per kthread [ 79.906865][ T6148] wireguard0: entered promiscuous mode [ 79.912387][ T6148] wireguard0: entered allmulticast mode [ 80.261239][ T29] kauditd_printk_skb: 37819 callbacks suppressed [ 80.261251][ T29] audit: type=1400 audit(2914.255:122925): avc: denied { read write } for pid=6170 comm="syz.4.989" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 80.267615][ T3033] audit: audit_backlog=65 > audit_backlog_limit=64 [ 80.267628][ T3033] audit: audit_lost=16400 audit_rate_limit=0 audit_backlog_limit=64 [ 80.291322][ T29] audit: type=1400 audit(2914.255:122926): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 80.291342][ T29] audit: type=1400 audit(2914.255:122927): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 80.297822][ T3033] audit: backlog limit exceeded [ 80.300694][ T3033] audit: audit_backlog=65 > audit_backlog_limit=64 [ 80.305872][ T29] audit: type=1400 audit(2914.255:122928): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 80.326556][ T3033] audit: audit_lost=16401 audit_rate_limit=0 audit_backlog_limit=64 [ 80.347203][ T29] audit: type=1400 audit(2914.255:122929): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 80.432675][ T6175] vlan2: entered allmulticast mode [ 80.438010][ T6175] bridge_slave_0: entered allmulticast mode [ 80.472701][ T6180] bond4: entered promiscuous mode [ 80.477935][ T6180] bond4: entered allmulticast mode [ 80.498905][ T6180] 8021q: adding VLAN 0 to HW filter on device bond4 [ 80.513702][ T6180] bond4 (unregistering): Released all slaves [ 80.526359][ T6185] team_slave_0: entered promiscuous mode [ 80.534175][ T6185] team_slave_0: left promiscuous mode [ 80.737002][ T6210] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 80.745342][ T6210] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 81.030879][ T6230] __nla_validate_parse: 5 callbacks suppressed [ 81.030893][ T6230] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1012'. [ 81.310137][ T6245] netdevsim netdevsim4: loading /lib/firmware/. failed with error -22 [ 81.318486][ T6245] netdevsim netdevsim4: Direct firmware load for . failed with error -22 [ 81.825806][ T6273] netdevsim netdevsim4: loading /lib/firmware/. failed with error -22 [ 81.834142][ T6273] netdevsim netdevsim4: Direct firmware load for . failed with error -22 [ 81.947113][ T6285] netlink: 'syz.2.1036': attribute type 1 has an invalid length. [ 81.981869][ T6285] 8021q: adding VLAN 0 to HW filter on device bond4 [ 82.205565][ T6301] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 [ 82.213872][ T6301] netdevsim netdevsim2: Direct firmware load for . failed with error -22 [ 82.262245][ T6306] netlink: 'syz.1.1035': attribute type 3 has an invalid length. [ 82.293676][ T6306] netlink: 'syz.1.1035': attribute type 3 has an invalid length. [ 82.314153][ T6305] netdevsim netdevsim2 netdevsim0: entered promiscuous mode [ 82.321518][ T6305] netdevsim netdevsim2 netdevsim0: entered allmulticast mode [ 82.359691][ T6305] A link change request failed with some changes committed already. Interface netdevsim0 may have been left with an inconsistent configuration, please check. [ 83.580081][ T6339] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1054'. [ 83.589303][ T6339] netlink: 196 bytes leftover after parsing attributes in process `syz.3.1054'. [ 83.600303][ T6339] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1054'. [ 83.609753][ T6339] netlink: 196 bytes leftover after parsing attributes in process `syz.3.1054'. [ 83.686786][ T6343] ipvlan2: entered promiscuous mode [ 83.700162][ T6343] bridge0: port 4(ipvlan2) entered blocking state [ 83.706686][ T6343] bridge0: port 4(ipvlan2) entered disabled state [ 83.717832][ T6343] ipvlan2: entered allmulticast mode [ 83.732233][ T6343] ipvlan2: left allmulticast mode [ 83.799897][ T6353] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1059'. [ 83.810657][ T6352] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 83.816696][ T6352] pim6reg0: linktype set to 805 [ 83.955859][ T6357] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 83.971639][ T3392] lo speed is unknown, defaulting to 1000 [ 83.977487][ T3392] syz2: Port: 1 Link ACTIVE [ 84.137056][ T6374] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1067'. [ 84.146051][ T6374] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1067'. [ 84.628494][ T6386] lo speed is unknown, defaulting to 1000 [ 85.068494][ T6405] netlink: 36 bytes leftover after parsing attributes in process `syz.3.1077'. [ 85.122418][ T6408] netlink: 'syz.2.1078': attribute type 3 has an invalid length. [ 85.271889][ T6422] IPVS: set_ctl: invalid protocol: 0 0.32.0.0:65535 [ 85.278887][ T29] kauditd_printk_skb: 31406 callbacks suppressed [ 85.278898][ T29] audit: type=1400 audit(2919.265:145050): avc: denied { prog_load } for pid=6413 comm="syz.2.1081" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 85.360359][ T29] audit: type=1400 audit(2919.295:145051): avc: denied { create } for pid=6413 comm="syz.2.1081" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 85.380722][ T29] audit: type=1400 audit(2919.305:145052): avc: denied { prog_load } for pid=6414 comm="syz.1.1082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 85.399706][ T29] audit: type=1400 audit(2919.305:145053): avc: denied { prog_load } for pid=6414 comm="syz.1.1082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 85.418425][ T29] audit: type=1400 audit(2919.305:145054): avc: denied { prog_load } for pid=6414 comm="syz.1.1082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 85.437450][ T29] audit: type=1400 audit(2919.305:145055): avc: denied { prog_load } for pid=6414 comm="syz.1.1082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 85.451996][ T3033] audit: audit_backlog=65 > audit_backlog_limit=64 [ 85.456194][ T29] audit: type=1400 audit(2919.305:145056): avc: denied { prog_load } for pid=6414 comm="syz.1.1082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 85.462666][ T3033] audit: audit_lost=19497 audit_rate_limit=0 audit_backlog_limit=64 [ 85.462679][ T3033] audit: backlog limit exceeded [ 85.511174][ T6430] lo speed is unknown, defaulting to 1000 [ 85.560165][ T6440] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 85.566694][ T6440] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 85.574384][ T6440] vhci_hcd vhci_hcd.0: Device attached [ 85.623899][ T6453] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35 sclass=netlink_route_socket pid=6453 comm=syz.1.1092 [ 85.645149][ T6453] serio: Serial port ptm3 [ 85.646538][ T6443] vhci_hcd: connection closed [ 85.649952][ T12] vhci_hcd: stop threads [ 85.658909][ T12] vhci_hcd: release socket [ 85.659149][ T6455] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1096'. [ 85.663437][ T12] vhci_hcd: disconnect device [ 86.217132][ T6484] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 86.225447][ T6484] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 86.285211][ T6489] __nla_validate_parse: 1 callbacks suppressed [ 86.285227][ T6489] netlink: 96 bytes leftover after parsing attributes in process `syz.0.1110'. [ 86.359928][ T6489] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6489 comm=syz.0.1110 [ 86.539471][ T6495] netlink: 40 bytes leftover after parsing attributes in process `syz.1.1112'. [ 87.220240][ T6548] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 87.228493][ T6548] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 87.247355][ T6543] wg2: entered promiscuous mode [ 87.252290][ T6543] wg2: entered allmulticast mode [ 87.368085][ T6566] 8021q: adding VLAN 0 to HW filter on device bond1 [ 87.381558][ T6566] team0: Port device bond1 added [ 87.541992][ T6588] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1148'. [ 87.573563][ T6588] (unnamed net_device) (uninitialized): option ad_actor_sys_prio: invalid value (0) [ 87.583058][ T6588] (unnamed net_device) (uninitialized): option ad_actor_sys_prio: allowed values 1 - 65535 [ 87.635216][ T6600] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1155'. [ 87.851555][ T6625] can0: slcan on ttyS3. [ 87.900589][ T6625] can0 (unregistered): slcan off ttyS3. [ 87.901474][ T6634] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6634 comm=syz.0.1169 [ 87.929824][ T6634] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1169'. [ 87.997199][ T6641] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6641 comm=syz.0.1172 [ 88.011456][ T6641] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1172'. [ 88.114272][ T6652] netlink: 'syz.4.1177': attribute type 3 has an invalid length. [ 88.168551][ T6659] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65528 sclass=netlink_route_socket pid=6659 comm=syz.4.1180 [ 88.464360][ T6693] lo speed is unknown, defaulting to 1000 [ 88.807215][ T6731] netlink: 'syz.0.1211': attribute type 3 has an invalid length. [ 89.374068][ T6776] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1227'. [ 89.383751][ T6776] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1227'. [ 89.407345][ T6776] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1227'. [ 89.475654][ T6788] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(4) [ 89.482536][ T6788] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 89.490345][ T6788] vhci_hcd vhci_hcd.0: Device attached [ 89.534789][ T6789] vhci_hcd: connection closed [ 89.535132][ T4041] vhci_hcd: stop threads [ 89.544409][ T4041] vhci_hcd: release socket [ 89.548846][ T4041] vhci_hcd: disconnect device [ 89.697720][ T6796] netlink: 32 bytes leftover after parsing attributes in process `syz.2.1234'. [ 90.060085][ T6809] macsec1: entered promiscuous mode [ 90.065349][ T6809] bridge0: entered promiscuous mode [ 90.279263][ T29] kauditd_printk_skb: 30772 callbacks suppressed [ 90.279275][ T29] audit: type=1400 audit(2924.276:174092): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.312347][ T3033] audit: audit_backlog=65 > audit_backlog_limit=64 [ 90.318297][ T6833] audit: audit_backlog=65 > audit_backlog_limit=64 [ 90.318886][ T3033] audit: audit_lost=20077 audit_rate_limit=0 audit_backlog_limit=64 [ 90.325420][ T6833] audit: audit_lost=20078 audit_rate_limit=0 audit_backlog_limit=64 [ 90.333405][ T3033] audit: backlog limit exceeded [ 90.333687][ T29] audit: type=1400 audit(2924.306:174093): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.341840][ T6833] audit: backlog limit exceeded [ 90.346593][ T29] audit: type=1400 audit(2924.306:174094): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.392824][ T29] audit: type=1400 audit(2924.306:174095): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 90.543064][ T6853] FAULT_INJECTION: forcing a failure. [ 90.543064][ T6853] name failslab, interval 1, probability 0, space 0, times 0 [ 90.555818][ T6853] CPU: 1 UID: 0 PID: 6853 Comm: syz.2.1257 Not tainted syzkaller #0 PREEMPT(voluntary) [ 90.555914][ T6853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 90.555927][ T6853] Call Trace: [ 90.555932][ T6853] [ 90.555938][ T6853] __dump_stack+0x1d/0x30 [ 90.555957][ T6853] dump_stack_lvl+0xe8/0x140 [ 90.555972][ T6853] dump_stack+0x15/0x1b [ 90.555986][ T6853] should_fail_ex+0x265/0x280 [ 90.556049][ T6853] ? __se_sys_memfd_create+0x1cc/0x590 [ 90.556123][ T6853] should_failslab+0x8c/0xb0 [ 90.556143][ T6853] __kmalloc_cache_noprof+0x4c/0x320 [ 90.556198][ T6853] ? fput+0x8f/0xc0 [ 90.556223][ T6853] __se_sys_memfd_create+0x1cc/0x590 [ 90.556241][ T6853] __x64_sys_memfd_create+0x31/0x40 [ 90.556292][ T6853] x64_sys_call+0x2abe/0x2ff0 [ 90.556316][ T6853] do_syscall_64+0xd2/0x200 [ 90.556341][ T6853] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 90.556362][ T6853] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 90.556408][ T6853] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 90.556551][ T6853] RIP: 0033:0x7fa3eb56eba9 [ 90.556564][ T6853] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 90.556578][ T6853] RSP: 002b:00007fa3e9fd6e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 90.556598][ T6853] RAX: ffffffffffffffda RBX: 00000000000004f2 RCX: 00007fa3eb56eba9 [ 90.556612][ T6853] RDX: 00007fa3e9fd6ef0 RSI: 0000000000000000 RDI: 00007fa3eb5f27e8 [ 90.556625][ T6853] RBP: 0000200000000600 R08: 00007fa3e9fd6bb7 R09: 00007fa3e9fd6e40 [ 90.556635][ T6853] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000000 [ 90.556684][ T6853] R13: 00007fa3e9fd6ef0 R14: 00007fa3e9fd6eb0 R15: 00002000000002c0 [ 90.556699][ T6853] [ 90.886997][ T6876] lo speed is unknown, defaulting to 1000 [ 91.391680][ T6901] netlink: 'syz.4.1275': attribute type 4 has an invalid length. [ 91.557488][ T6907] lo speed is unknown, defaulting to 1000 [ 91.750850][ T6921] FAULT_INJECTION: forcing a failure. [ 91.750850][ T6921] name failslab, interval 1, probability 0, space 0, times 0 [ 91.763693][ T6921] CPU: 1 UID: 0 PID: 6921 Comm: syz.2.1283 Not tainted syzkaller #0 PREEMPT(voluntary) [ 91.763718][ T6921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 91.763728][ T6921] Call Trace: [ 91.763735][ T6921] [ 91.763741][ T6921] __dump_stack+0x1d/0x30 [ 91.763763][ T6921] dump_stack_lvl+0xe8/0x140 [ 91.763861][ T6921] dump_stack+0x15/0x1b [ 91.763876][ T6921] should_fail_ex+0x265/0x280 [ 91.763900][ T6921] should_failslab+0x8c/0xb0 [ 91.763922][ T6921] kmem_cache_alloc_node_noprof+0x57/0x320 [ 91.764024][ T6921] ? __alloc_skb+0x101/0x320 [ 91.764110][ T6921] __alloc_skb+0x101/0x320 [ 91.764129][ T6921] ? audit_log_start+0x365/0x6c0 [ 91.764214][ T6921] audit_log_start+0x380/0x6c0 [ 91.764333][ T6921] audit_seccomp+0x48/0x100 [ 91.764359][ T6921] ? __seccomp_filter+0x68c/0x10d0 [ 91.764381][ T6921] __seccomp_filter+0x69d/0x10d0 [ 91.764476][ T6921] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 91.764569][ T6921] ? vfs_write+0x7e8/0x960 [ 91.764594][ T6921] __secure_computing+0x82/0x150 [ 91.764612][ T6921] syscall_trace_enter+0xcf/0x1e0 [ 91.764632][ T6921] do_syscall_64+0xac/0x200 [ 91.764685][ T6921] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 91.764739][ T6921] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 91.764766][ T6921] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 91.764840][ T6921] RIP: 0033:0x7fa3eb56eba9 [ 91.764855][ T6921] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.764995][ T6921] RSP: 002b:00007fa3e9fd7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000cb [ 91.765013][ T6921] RAX: ffffffffffffffda RBX: 00007fa3eb7b5fa0 RCX: 00007fa3eb56eba9 [ 91.765025][ T6921] RDX: 00002000000002c0 RSI: 0000000000000008 RDI: 0000000000000000 [ 91.765100][ T6921] RBP: 00007fa3e9fd7090 R08: 0000000000000000 R09: 0000000000000000 [ 91.765114][ T6921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 91.765130][ T6921] R13: 00007fa3eb7b6038 R14: 00007fa3eb7b5fa0 R15: 00007ffc8fbdb128 [ 91.765189][ T6921] [ 92.145435][ T6933] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 92.153793][ T6933] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 92.268361][ T6954] FAULT_INJECTION: forcing a failure. [ 92.268361][ T6954] name failslab, interval 1, probability 0, space 0, times 0 [ 92.281011][ T6954] CPU: 1 UID: 0 PID: 6954 Comm: syz.1.1296 Not tainted syzkaller #0 PREEMPT(voluntary) [ 92.281054][ T6954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 92.281066][ T6954] Call Trace: [ 92.281109][ T6954] [ 92.281115][ T6954] __dump_stack+0x1d/0x30 [ 92.281198][ T6954] dump_stack_lvl+0xe8/0x140 [ 92.281213][ T6954] dump_stack+0x15/0x1b [ 92.281227][ T6954] should_fail_ex+0x265/0x280 [ 92.281285][ T6954] ? __inet_diag_dump_start+0x53/0x790 [ 92.281312][ T6954] should_failslab+0x8c/0xb0 [ 92.281335][ T6954] __kmalloc_cache_noprof+0x4c/0x320 [ 92.281360][ T6954] __inet_diag_dump_start+0x53/0x790 [ 92.281484][ T6954] ? __netlink_lookup+0x266/0x2a0 [ 92.281514][ T6954] inet_diag_dump_start+0x1a/0x30 [ 92.281538][ T6954] __netlink_dump_start+0x331/0x520 [ 92.281564][ T6954] inet_diag_handler_cmd+0xf3/0x140 [ 92.281623][ T6954] ? __pfx_inet_diag_dump_start+0x10/0x10 [ 92.281653][ T6954] ? __pfx_inet_diag_dump+0x10/0x10 [ 92.281672][ T6954] ? __pfx_inet_diag_dump_done+0x10/0x10 [ 92.281693][ T6954] ? __pfx_inet_diag_handler_cmd+0x10/0x10 [ 92.281715][ T6954] sock_diag_rcv_msg+0x285/0x2c0 [ 92.281819][ T6954] netlink_rcv_skb+0x120/0x220 [ 92.281838][ T6954] ? __pfx_sock_diag_rcv_msg+0x10/0x10 [ 92.281873][ T6954] sock_diag_rcv+0x1c/0x30 [ 92.281896][ T6954] netlink_unicast+0x5c0/0x690 [ 92.281915][ T6954] netlink_sendmsg+0x58b/0x6b0 [ 92.282032][ T6954] ? __pfx_netlink_sendmsg+0x10/0x10 [ 92.282058][ T6954] __sock_sendmsg+0x142/0x180 [ 92.282125][ T6954] sock_write_iter+0x165/0x1b0 [ 92.282158][ T6954] do_iter_readv_writev+0x499/0x540 [ 92.282193][ T6954] vfs_writev+0x2df/0x8b0 [ 92.282289][ T6954] do_writev+0xe7/0x210 [ 92.282352][ T6954] __x64_sys_writev+0x45/0x50 [ 92.282378][ T6954] x64_sys_call+0x1e9a/0x2ff0 [ 92.282398][ T6954] do_syscall_64+0xd2/0x200 [ 92.282484][ T6954] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 92.282504][ T6954] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 92.282528][ T6954] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 92.282612][ T6954] RIP: 0033:0x7f657edfeba9 [ 92.282628][ T6954] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 92.282645][ T6954] RSP: 002b:00007f657d867038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 92.282702][ T6954] RAX: ffffffffffffffda RBX: 00007f657f045fa0 RCX: 00007f657edfeba9 [ 92.282715][ T6954] RDX: 0000000000000001 RSI: 0000200000000280 RDI: 0000000000000003 [ 92.282728][ T6954] RBP: 00007f657d867090 R08: 0000000000000000 R09: 0000000000000000 [ 92.282799][ T6954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.282809][ T6954] R13: 00007f657f046038 R14: 00007f657f045fa0 R15: 00007ffe7555f318 [ 92.282827][ T6954] [ 92.752166][ T6963] __nla_validate_parse: 5 callbacks suppressed [ 92.752207][ T6963] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1298'. [ 92.953497][ T6977] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1307'. [ 93.115705][ T6991] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 93.124010][ T6991] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 93.229497][ T7007] sch_tbf: peakrate 7 is lower than or equals to rate 19 ! [ 93.255780][ T7011] FAULT_INJECTION: forcing a failure. [ 93.255780][ T7011] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 93.269092][ T7011] CPU: 1 UID: 0 PID: 7011 Comm: syz.0.1321 Not tainted syzkaller #0 PREEMPT(voluntary) [ 93.269125][ T7011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 93.269176][ T7011] Call Trace: [ 93.269184][ T7011] [ 93.269192][ T7011] __dump_stack+0x1d/0x30 [ 93.269210][ T7011] dump_stack_lvl+0xe8/0x140 [ 93.269226][ T7011] dump_stack+0x15/0x1b [ 93.269270][ T7011] should_fail_ex+0x265/0x280 [ 93.269294][ T7011] should_fail_alloc_page+0xf2/0x100 [ 93.269321][ T7011] __alloc_frozen_pages_noprof+0xff/0x360 [ 93.269357][ T7011] alloc_pages_mpol+0xb3/0x250 [ 93.269408][ T7011] folio_alloc_mpol_noprof+0x39/0x80 [ 93.269439][ T7011] shmem_get_folio_gfp+0x3cf/0xd60 [ 93.269596][ T7011] shmem_write_begin+0xa8/0x190 [ 93.269638][ T7011] generic_perform_write+0x181/0x490 [ 93.269660][ T7011] shmem_file_write_iter+0xc5/0xf0 [ 93.269680][ T7011] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 93.269704][ T7011] vfs_write+0x52a/0x960 [ 93.269819][ T7011] ksys_write+0xda/0x1a0 [ 93.269837][ T7011] __x64_sys_write+0x40/0x50 [ 93.269858][ T7011] x64_sys_call+0x27fe/0x2ff0 [ 93.269880][ T7011] do_syscall_64+0xd2/0x200 [ 93.269965][ T7011] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 93.269985][ T7011] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 93.270054][ T7011] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 93.270071][ T7011] RIP: 0033:0x7f4c8bbdd65f [ 93.270085][ T7011] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 93.270111][ T7011] RSP: 002b:00007f4c8a646df0 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 93.270131][ T7011] RAX: ffffffffffffffda RBX: 0000000000014800 RCX: 00007f4c8bbdd65f [ 93.270144][ T7011] RDX: 0000000000014800 RSI: 00007f4c82227000 RDI: 0000000000000004 [ 93.270155][ T7011] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000702 [ 93.270165][ T7011] R10: 00000000000007d2 R11: 0000000000000293 R12: 0000000000000004 [ 93.270176][ T7011] R13: 00007f4c8a646ef0 R14: 00007f4c8a646eb0 R15: 00007f4c82227000 [ 93.270194][ T7011] [ 93.845549][ T7037] netdevsim netdevsim3 netdevsim0: entered allmulticast mode [ 93.925336][ T7047] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7047 comm=syz.1.1335 [ 93.955466][ T7051] netlink: 32 bytes leftover after parsing attributes in process `syz.0.1338'. [ 94.325482][ T7092] lo speed is unknown, defaulting to 1000 [ 94.485437][ T7105] netdevsim netdevsim3: loading /lib/firmware/. failed with error -22 [ 94.493835][ T7105] netdevsim netdevsim3: Direct firmware load for . failed with error -22 [ 94.912358][ T7140] lo speed is unknown, defaulting to 1000 [ 95.209922][ T7149] futex_wake_op: syz.4.1375 tries to shift op by -1; fix this program [ 95.288137][ T29] kauditd_printk_skb: 37621 callbacks suppressed [ 95.288149][ T29] audit: type=1400 audit(5507.283:195579): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.288246][ T29] audit: type=1400 audit(5507.283:195580): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.288389][ T29] audit: type=1400 audit(5507.283:195581): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.288521][ T29] audit: type=1400 audit(5507.283:195582): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.288656][ T29] audit: type=1400 audit(5507.283:195583): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.288733][ T29] audit: type=1400 audit(5507.283:195584): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.288825][ T29] audit: type=1400 audit(5507.283:195585): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.288965][ T29] audit: type=1400 audit(5507.283:195586): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.289037][ T29] audit: type=1400 audit(5507.283:195587): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.289148][ T29] audit: type=1400 audit(5507.283:195588): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 95.661690][ T7170] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1383'. [ 95.761458][ T7183] netlink: 'syz.2.1388': attribute type 21 has an invalid length. [ 99.386180][ T7227] lo speed is unknown, defaulting to 1000 [ 99.483609][ T7237] lo speed is unknown, defaulting to 1000 [ 99.733278][ T7262] netlink: 'syz.2.1418': attribute type 21 has an invalid length. [ 99.741288][ T7262] netlink: 128 bytes leftover after parsing attributes in process `syz.2.1418'. [ 99.831074][ T7262] netlink: 'syz.2.1418': attribute type 5 has an invalid length. [ 99.838910][ T7262] netlink: 'syz.2.1418': attribute type 6 has an invalid length. [ 99.846720][ T7262] netlink: 3 bytes leftover after parsing attributes in process `syz.2.1418'. [ 100.296507][ T29] kauditd_printk_skb: 43127 callbacks suppressed [ 100.296520][ T29] audit: type=1400 audit(5512.294:237216): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 100.355412][ T3033] audit: audit_backlog=65 > audit_backlog_limit=64 [ 100.362128][ T3033] audit: audit_lost=25959 audit_rate_limit=0 audit_backlog_limit=64 [ 100.370199][ T3033] audit: backlog limit exceeded [ 100.372882][ T7287] audit: audit_backlog=65 > audit_backlog_limit=64 [ 100.381579][ T7287] audit: audit_lost=25960 audit_rate_limit=0 audit_backlog_limit=64 [ 100.385442][ T3307] audit: audit_backlog=65 > audit_backlog_limit=64 [ 100.390090][ T7287] audit: backlog limit exceeded [ 100.391837][ T7285] audit: audit_backlog=65 > audit_backlog_limit=64 [ 100.396645][ T3307] audit: audit_lost=25961 audit_rate_limit=0 audit_backlog_limit=64 [ 100.549359][ T7315] erspan0: entered promiscuous mode [ 100.580513][ T7320] team0 (unregistering): Port device team_slave_1 removed [ 100.790288][ T7353] netdevsim netdevsim4 netdevsim0: entered allmulticast mode [ 100.855252][ T7353] lo speed is unknown, defaulting to 1000 [ 100.896403][ T7365] netlink: 'syz.3.1459': attribute type 10 has an invalid length. [ 100.924454][ T7365] ipvlan0: entered allmulticast mode [ 100.929811][ T7365] veth0_vlan: entered allmulticast mode [ 100.946992][ T7365] team0: Device ipvlan0 failed to register rx_handler [ 101.490629][ T7415] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1478'. [ 101.649954][ T7435] (unnamed net_device) (uninitialized): option tlb_dynamic_lb: invalid value (242) [ 101.714622][ T7453] SELinux: syz.0.1489 (7453) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 101.795612][ T7464] netlink: 24 bytes leftover after parsing attributes in process `syz.3.1497'. [ 101.829467][ T7464] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=7464 comm=syz.3.1497 [ 101.848107][ T7464] netlink: 'syz.3.1497': attribute type 1 has an invalid length. [ 102.050451][ T7479] netlink: 24 bytes leftover after parsing attributes in process `syz.3.1503'. [ 102.109116][ T7479] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=7479 comm=syz.3.1503 [ 102.139970][ T7479] netlink: 'syz.3.1503': attribute type 1 has an invalid length. [ 102.179609][ T7481] netdevsim netdevsim4: loading /lib/firmware/. failed with error -22 [ 102.187866][ T7481] netdevsim netdevsim4: Direct firmware load for . failed with error -22 [ 102.239590][ T7486] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1507'. [ 102.305358][ T7490] FAULT_INJECTION: forcing a failure. [ 102.305358][ T7490] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 102.318592][ T7490] CPU: 0 UID: 0 PID: 7490 Comm: syz.3.1510 Not tainted syzkaller #0 PREEMPT(voluntary) [ 102.318620][ T7490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 102.318631][ T7490] Call Trace: [ 102.318637][ T7490] [ 102.318643][ T7490] __dump_stack+0x1d/0x30 [ 102.318662][ T7490] dump_stack_lvl+0xe8/0x140 [ 102.318749][ T7490] dump_stack+0x15/0x1b [ 102.318766][ T7490] should_fail_ex+0x265/0x280 [ 102.318786][ T7490] should_fail+0xb/0x20 [ 102.318888][ T7490] should_fail_usercopy+0x1a/0x20 [ 102.318910][ T7490] _copy_from_iter+0xd2/0xe80 [ 102.318933][ T7490] ? kernel_fpu_begin_mask+0x211/0x290 [ 102.318987][ T7490] ? kernel_fpu_end+0x85/0xd0 [ 102.319015][ T7490] ? blake2s_update+0x134/0x160 [ 102.319046][ T7490] write_pool_user+0x7c/0x1e0 [ 102.319170][ T7490] ? import_ubuf+0xe8/0x120 [ 102.319231][ T7490] ? __pfx_random_ioctl+0x10/0x10 [ 102.319255][ T7490] random_ioctl+0x2cc/0x400 [ 102.319300][ T7490] __se_sys_ioctl+0xce/0x140 [ 102.319319][ T7490] __x64_sys_ioctl+0x43/0x50 [ 102.319335][ T7490] x64_sys_call+0x1816/0x2ff0 [ 102.319383][ T7490] do_syscall_64+0xd2/0x200 [ 102.319415][ T7490] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 102.319439][ T7490] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 102.319464][ T7490] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 102.319512][ T7490] RIP: 0033:0x7f889181eba9 [ 102.319603][ T7490] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 102.319621][ T7490] RSP: 002b:00007f8890287038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 102.319638][ T7490] RAX: ffffffffffffffda RBX: 00007f8891a65fa0 RCX: 00007f889181eba9 [ 102.319648][ T7490] RDX: 000020000000fec0 RSI: 0000000040085203 RDI: 0000000000000003 [ 102.319658][ T7490] RBP: 00007f8890287090 R08: 0000000000000000 R09: 0000000000000000 [ 102.319668][ T7490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 102.319737][ T7490] R13: 00007f8891a66038 R14: 00007f8891a65fa0 R15: 00007ffd83b2e5b8 [ 102.319754][ T7490] [ 102.575721][ T7498] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1509'. [ 102.629947][ T7506] netlink: 172 bytes leftover after parsing attributes in process `syz.1.1515'. [ 102.654512][ T7506] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1515'. [ 102.666460][ T7506] netlink: 172 bytes leftover after parsing attributes in process `syz.1.1515'. [ 102.732589][ T7516] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 [ 102.740833][ T7516] netdevsim netdevsim2: Direct firmware load for . failed with error -22 [ 102.817896][ T7535] FAULT_INJECTION: forcing a failure. [ 102.817896][ T7535] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 102.831145][ T7535] CPU: 0 UID: 0 PID: 7535 Comm: syz.2.1527 Not tainted syzkaller #0 PREEMPT(voluntary) [ 102.831171][ T7535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 102.831183][ T7535] Call Trace: [ 102.831190][ T7535] [ 102.831198][ T7535] __dump_stack+0x1d/0x30 [ 102.831220][ T7535] dump_stack_lvl+0xe8/0x140 [ 102.831245][ T7535] dump_stack+0x15/0x1b [ 102.831343][ T7535] should_fail_ex+0x265/0x280 [ 102.831366][ T7535] should_fail+0xb/0x20 [ 102.831462][ T7535] should_fail_usercopy+0x1a/0x20 [ 102.831562][ T7535] _copy_to_user+0x20/0xa0 [ 102.831592][ T7535] do_pipe2+0x89/0x130 [ 102.831616][ T7535] ? ksys_write+0x192/0x1a0 [ 102.831649][ T7535] __x64_sys_pipe2+0x30/0x40 [ 102.831669][ T7535] x64_sys_call+0x2624/0x2ff0 [ 102.831728][ T7535] do_syscall_64+0xd2/0x200 [ 102.831759][ T7535] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 102.831783][ T7535] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 102.831863][ T7535] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 102.831881][ T7535] RIP: 0033:0x7fa3eb56eba9 [ 102.831895][ T7535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 102.831912][ T7535] RSP: 002b:00007fa3e9fd7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000125 [ 102.831999][ T7535] RAX: ffffffffffffffda RBX: 00007fa3eb7b5fa0 RCX: 00007fa3eb56eba9 [ 102.832009][ T7535] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000001900 [ 102.832022][ T7535] RBP: 00007fa3e9fd7090 R08: 0000000000000000 R09: 0000000000000000 [ 102.832033][ T7535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 102.832045][ T7535] R13: 00007fa3eb7b6038 R14: 00007fa3eb7b5fa0 R15: 00007ffc8fbdb128 [ 102.832062][ T7535] [ 103.130645][ T7548] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 [ 103.138900][ T7548] netdevsim netdevsim2: Direct firmware load for . failed with error -22 [ 103.354683][ T7573] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 103.362922][ T7573] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 103.485930][ T7588] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 103.574733][ T7595] team0: Port device geneve1 removed [ 103.594027][ T70] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 103.673315][ T7607] netlink: 'syz.3.1561': attribute type 13 has an invalid length. [ 103.689065][ T70] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 103.705439][ T7609] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 103.713702][ T7609] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 103.841443][ T7607] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 103.864242][ T7607] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 103.948190][ T7628] netlink: 'syz.1.1570': attribute type 10 has an invalid length. [ 104.004251][ T7607] netlink: 'syz.3.1561': attribute type 13 has an invalid length. [ 104.005204][ T70] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 104.028942][ T7628] team0: Port device geneve1 added [ 104.041405][ T7607] netlink: 'syz.3.1561': attribute type 13 has an invalid length. [ 104.057384][ T7638] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 [ 104.061304][ T70] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 104.065731][ T7638] netdevsim netdevsim2: Direct firmware load for . failed with error -22 [ 104.087671][ T7607] netlink: 'syz.3.1561': attribute type 13 has an invalid length. [ 104.130231][ T7607] netlink: 'syz.3.1561': attribute type 13 has an invalid length. [ 104.140530][ T70] netdevsim netdevsim3 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 104.149558][ T70] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 104.164350][ T7607] netlink: 'syz.3.1561': attribute type 13 has an invalid length. [ 104.237342][ T70] netdevsim netdevsim3 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 104.246345][ T70] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 104.285789][ T70] netdevsim netdevsim3 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 104.294760][ T70] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 104.329701][ T70] netdevsim netdevsim3 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 104.338652][ T70] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 104.423233][ T7670] netdevsim netdevsim3: loading /lib/firmware/. failed with error -22 [ 104.431577][ T7670] netdevsim netdevsim3: Direct firmware load for . failed with error -22 [ 104.726357][ T7703] lo speed is unknown, defaulting to 1000 [ 104.726808][ T7702] tun0: tun_chr_ioctl cmd 1074812118 [ 104.765446][ T7707] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 [ 104.773768][ T7707] netdevsim netdevsim2: Direct firmware load for . failed with error -22 [ 105.157978][ T7720] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 105.187832][ T29] kauditd_printk_skb: 29508 callbacks suppressed [ 105.187844][ T29] audit: type=1400 audit(6544.304:259531): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 105.237712][ T3033] audit: audit_backlog=65 > audit_backlog_limit=64 [ 105.239523][ T7729] audit: audit_backlog=65 > audit_backlog_limit=64 [ 105.244294][ T3033] audit: audit_lost=28360 audit_rate_limit=0 audit_backlog_limit=64 [ 105.250857][ T7729] audit: audit_lost=28361 audit_rate_limit=0 audit_backlog_limit=64 [ 105.258896][ T3033] audit: backlog limit exceeded [ 105.266885][ T7729] audit: backlog limit exceeded [ 105.275427][ T29] audit: type=1400 audit(6544.335:259532): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 105.297669][ T29] audit: type=1400 audit(6544.335:259533): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 105.297690][ T29] audit: type=1400 audit(6544.335:259534): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 105.353578][ T7737] netdevsim netdevsim4: loading /lib/firmware/. failed with error -22 [ 105.353601][ T7737] netdevsim netdevsim4: Direct firmware load for . failed with error -22 [ 105.590699][ T7760] netdevsim netdevsim4: loading /lib/firmware/. failed with error -22 [ 105.599084][ T7760] netdevsim netdevsim4: Direct firmware load for . failed with error -22 [ 105.727680][ T7778] __nla_validate_parse: 9 callbacks suppressed [ 105.727694][ T7778] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1632'. [ 105.743642][ T7773] FAULT_INJECTION: forcing a failure. [ 105.743642][ T7773] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 105.756750][ T7773] CPU: 1 UID: 0 PID: 7773 Comm: syz.3.1630 Not tainted syzkaller #0 PREEMPT(voluntary) [ 105.756774][ T7773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 105.756832][ T7773] Call Trace: [ 105.756839][ T7773] [ 105.756847][ T7773] __dump_stack+0x1d/0x30 [ 105.756868][ T7773] dump_stack_lvl+0xe8/0x140 [ 105.756887][ T7773] dump_stack+0x15/0x1b [ 105.756901][ T7773] should_fail_ex+0x265/0x280 [ 105.756920][ T7773] should_fail+0xb/0x20 [ 105.756966][ T7773] should_fail_usercopy+0x1a/0x20 [ 105.756991][ T7773] _copy_from_user+0x1c/0xb0 [ 105.757030][ T7773] snd_seq_event_dup+0x306/0x460 [ 105.757094][ T7773] snd_seq_client_enqueue_event+0x1dc/0x2a0 [ 105.757129][ T7773] snd_seq_write+0x41a/0x530 [ 105.757161][ T7773] ? __pfx_snd_seq_write+0x10/0x10 [ 105.757190][ T7773] vfs_write+0x269/0x960 [ 105.757213][ T7773] ? __rcu_read_unlock+0x4f/0x70 [ 105.757255][ T7773] ? __fget_files+0x184/0x1c0 [ 105.757282][ T7773] ksys_write+0xda/0x1a0 [ 105.757305][ T7773] __x64_sys_write+0x40/0x50 [ 105.757435][ T7773] x64_sys_call+0x27fe/0x2ff0 [ 105.757502][ T7773] do_syscall_64+0xd2/0x200 [ 105.757528][ T7773] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 105.757548][ T7773] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 105.757597][ T7773] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 105.757618][ T7773] RIP: 0033:0x7f889181eba9 [ 105.757634][ T7773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 105.757648][ T7773] RSP: 002b:00007f8890287038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 105.757693][ T7773] RAX: ffffffffffffffda RBX: 00007f8891a65fa0 RCX: 00007f889181eba9 [ 105.757706][ T7773] RDX: 000000000000ffc8 RSI: 0000200000000000 RDI: 0000000000000006 [ 105.757718][ T7773] RBP: 00007f8890287090 R08: 0000000000000000 R09: 0000000000000000 [ 105.757731][ T7773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 105.757793][ T7773] R13: 00007f8891a66038 R14: 00007f8891a65fa0 R15: 00007ffd83b2e5b8 [ 105.757848][ T7773] [ 105.977228][ T7779] lo speed is unknown, defaulting to 1000 [ 106.508148][ T7800] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 106.516521][ T7800] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 106.572984][ T7811] lo speed is unknown, defaulting to 1000 [ 106.706729][ T7832] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7832 comm=syz.1.1652 [ 106.743430][ T7832] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1652'. [ 106.887025][ T7841] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 106.895297][ T7841] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 107.217451][ T7877] syzkaller0: entered promiscuous mode [ 107.223136][ T7877] syzkaller0: entered allmulticast mode [ 107.719167][ T7929] FAULT_INJECTION: forcing a failure. [ 107.719167][ T7929] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 107.732301][ T7929] CPU: 1 UID: 0 PID: 7929 Comm: syz.2.1690 Not tainted syzkaller #0 PREEMPT(voluntary) [ 107.732325][ T7929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 107.732336][ T7929] Call Trace: [ 107.732342][ T7929] [ 107.732400][ T7929] __dump_stack+0x1d/0x30 [ 107.732421][ T7929] dump_stack_lvl+0xe8/0x140 [ 107.732504][ T7929] dump_stack+0x15/0x1b [ 107.732585][ T7929] should_fail_ex+0x265/0x280 [ 107.732604][ T7929] should_fail+0xb/0x20 [ 107.732620][ T7929] should_fail_usercopy+0x1a/0x20 [ 107.732674][ T7929] copy_folio_from_iter_atomic+0x278/0x11b0 [ 107.732766][ T7929] ? shmem_write_begin+0xa8/0x190 [ 107.732786][ T7929] ? shmem_write_begin+0xe1/0x190 [ 107.732806][ T7929] generic_perform_write+0x2c2/0x490 [ 107.732834][ T7929] shmem_file_write_iter+0xc5/0xf0 [ 107.732917][ T7929] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 107.733004][ T7929] vfs_write+0x52a/0x960 [ 107.733031][ T7929] ksys_write+0xda/0x1a0 [ 107.733109][ T7929] __x64_sys_write+0x40/0x50 [ 107.733183][ T7929] x64_sys_call+0x27fe/0x2ff0 [ 107.733202][ T7929] do_syscall_64+0xd2/0x200 [ 107.733299][ T7929] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 107.733339][ T7929] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 107.733413][ T7929] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 107.733431][ T7929] RIP: 0033:0x7fa3eb56d65f [ 107.733443][ T7929] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 107.733457][ T7929] RSP: 002b:00007fa3e9fd6df0 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 107.733474][ T7929] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007fa3eb56d65f [ 107.733488][ T7929] RDX: 0000000000040000 RSI: 00007fa3e1bb7000 RDI: 0000000000000004 [ 107.733545][ T7929] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000474 [ 107.733556][ T7929] R10: 00000000000003bc R11: 0000000000000293 R12: 0000000000000004 [ 107.733568][ T7929] R13: 00007fa3e9fd6ef0 R14: 00007fa3e9fd6eb0 R15: 00007fa3e1bb7000 [ 107.733658][ T7929] [ 107.984346][ T7939] ALSA: seq fatal error: cannot create timer (-19) [ 108.057549][ T7949] netlink: 64 bytes leftover after parsing attributes in process `syz.4.1699'. [ 108.198489][ T7962] lo speed is unknown, defaulting to 1000 [ 108.275314][ T7968] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1705'. [ 108.295176][ T7970] validate_nla: 61 callbacks suppressed [ 108.295190][ T7970] netlink: 'syz.0.1706': attribute type 10 has an invalid length. [ 108.327773][ T7970] netlink: 'syz.0.1706': attribute type 10 has an invalid length. [ 108.432593][ T7987] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 108.672186][ T8009] netlink: 'syz.4.1720': attribute type 1 has an invalid length. [ 108.680167][ T8010] netlink: 'syz.4.1720': attribute type 1 has an invalid length. [ 108.702993][ T8009] 8021q: adding VLAN 0 to HW filter on device bond7 [ 109.001500][ T8040] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1732'. [ 109.010528][ T8040] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1732'. [ 109.032299][ T8040] bond8: entered promiscuous mode [ 109.037424][ T8040] bond8: entered allmulticast mode [ 109.049532][ T8040] 8021q: adding VLAN 0 to HW filter on device bond8 [ 109.391034][ T8077] wireguard0: entered promiscuous mode [ 109.396743][ T8077] wireguard0: entered allmulticast mode [ 109.758656][ T8110] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1759'. [ 109.958757][ T29] kauditd_printk_skb: 17806 callbacks suppressed [ 109.958771][ T29] audit: type=1400 audit(6549.301:276435): avc: denied { prog_load } for pid=8124 comm="syz.4.1764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 109.984178][ T29] audit: type=1400 audit(6549.312:276437): avc: denied { prog_load } for pid=8124 comm="syz.4.1764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 110.003249][ T29] audit: type=1400 audit(6549.301:276436): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 110.040241][ T8127] bond5: entered promiscuous mode [ 110.055112][ T3033] audit: audit_backlog=65 > audit_backlog_limit=64 [ 110.059861][ T29] audit: type=1400 audit(6549.312:276438): avc: denied { read write } for pid=8124 comm="syz.4.1764" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 110.061894][ T3033] audit: audit_lost=28664 audit_rate_limit=0 audit_backlog_limit=64 [ 110.061909][ T3033] audit: backlog limit exceeded [ 110.085957][ T29] audit: type=1400 audit(6549.364:276439): avc: denied { read write } for pid=3304 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 110.101950][ T8127] 8021q: adding VLAN 0 to HW filter on device bond5 [ 110.122913][ T29] audit: type=1400 audit(6549.385:276440): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 110.150256][ T29] audit: type=1400 audit(6549.385:276441): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 110.216956][ T8127] bond5 (unregistering): Released all slaves [ 110.413936][ T8146] lo speed is unknown, defaulting to 1000 [ 110.424120][ T8147] lo speed is unknown, defaulting to 1000 [ 110.474561][ T8149] team_slave_0: entered promiscuous mode [ 110.489454][ T8149] ipvlan0: entered promiscuous mode [ 110.499924][ T8149] ipvlan0: left promiscuous mode [ 110.505456][ T8149] team_slave_0: left promiscuous mode [ 110.656953][ T12] ================================================================== [ 110.665215][ T12] BUG: KCSAN: data-race in n_tty_receive_char_flow_ctrl / tty_set_termios [ 110.673736][ T12] [ 110.676095][ T12] write to 0xffff88812363e108 of 44 bytes by task 8164 on cpu 1: [ 110.683987][ T12] tty_set_termios+0xc0/0x8c0 [ 110.688766][ T12] set_termios+0x35b/0x4e0 [ 110.693276][ T12] tty_mode_ioctl+0x379/0x5c0 [ 110.697968][ T12] n_tty_ioctl_helper+0x91/0x210 [ 110.702922][ T12] n_tty_ioctl+0x101/0x200 [ 110.707342][ T12] tty_ioctl+0x845/0xb80 [ 110.711604][ T12] __se_sys_ioctl+0xce/0x140 [ 110.716303][ T12] __x64_sys_ioctl+0x43/0x50 [ 110.720922][ T12] x64_sys_call+0x1816/0x2ff0 [ 110.725617][ T12] do_syscall_64+0xd2/0x200 [ 110.730187][ T12] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 110.736172][ T12] [ 110.738507][ T12] read to 0xffff88812363e121 of 1 bytes by task 12 on cpu 0: [ 110.746043][ T12] n_tty_receive_char_flow_ctrl+0x23/0x1a0 [ 110.751863][ T12] n_tty_lookahead_flow_ctrl+0xed/0x130 [ 110.757435][ T12] tty_port_default_lookahead_buf+0x91/0xc0 [ 110.763403][ T12] flush_to_ldisc+0x285/0x340 [ 110.768211][ T12] process_scheduled_works+0x4cb/0x9d0 [ 110.773875][ T12] worker_thread+0x582/0x770 [ 110.778928][ T12] kthread+0x489/0x510 [ 110.783000][ T12] ret_from_fork+0x11f/0x1b0 [ 110.787682][ T12] ret_from_fork_asm+0x1a/0x30 [ 110.792540][ T12] [ 110.794960][ T12] value changed: 0x11 -> 0xbf [ 110.799826][ T12] [ 110.802265][ T12] Reported by Kernel Concurrency Sanitizer on: [ 110.808750][ T12] CPU: 0 UID: 0 PID: 12 Comm: kworker/u8:0 Not tainted syzkaller #0 PREEMPT(voluntary) [ 110.819420][ T12] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 110.830054][ T12] Workqueue: events_unbound flush_to_ldisc [ 110.836844][ T12] ================================================================== [ 114.731443][ T29] kauditd_printk_skb: 43706 callbacks suppressed [ 114.731457][ T29] audit: type=1400 audit(6554.319:319845): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 114.738002][ T3033] audit: audit_backlog=65 > audit_backlog_limit=64 [ 114.738040][ T29] audit: type=1400 audit(6554.319:319846): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 114.738060][ T29] audit: type=1400 audit(6554.319:319847): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 114.738078][ T29] audit: type=1400 audit(6554.319:319848): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 114.738116][ T29] audit: type=1400 audit(6554.319:319849): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 114.759647][ T3033] audit: audit_lost=28766 audit_rate_limit=0 audit_backlog_limit=64 [ 114.766188][ T29] audit: type=1400 audit(6554.319:319850): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 114.787274][ T3033] audit: backlog limit exceeded [ 114.790758][ T3033] audit: audit_backlog=65 > audit_backlog_limit=64 [ 119.503262][ T29] kauditd_printk_skb: 54407 callbacks suppressed [ 119.503277][ T29] audit: type=1400 audit(6559.327:373695): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 119.515393][ T3033] audit: audit_backlog=65 > audit_backlog_limit=64 [ 119.530594][ T29] audit: type=1400 audit(6559.327:373696): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 119.537149][ T3033] audit: audit_lost=28955 audit_rate_limit=0 audit_backlog_limit=64 [ 119.537164][ T3033] audit: backlog limit exceeded [ 119.537379][ T3033] audit: audit_backlog=65 > audit_backlog_limit=64 [ 119.560385][ T29] audit: type=1400 audit(6559.337:373697): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 119.565958][ T3033] audit: audit_lost=28956 audit_rate_limit=0 audit_backlog_limit=64 [ 119.570827][ T29] audit: type=1400 audit(6559.337:373698): avc: denied { read } for pid=3033 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 119.577275][ T3033] audit: backlog limit exceeded