last executing test programs: 4.114415148s ago: executing program 3 (id=2604): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) r0 = socket$kcm(0x10, 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001900)="2e00000011008188040900000000000000a1810031000000000f000000028002002d1f00000000000000e2000000", 0x2e}], 0x1}, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, 0x0, &(0x7f0000001700)=""/47}, 0x20) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="240000001a00010029bd7000fbdbdf250a008000000400001200000008000100e0000001"], 0x24}, 0x1, 0x0, 0x0, 0x24000050}, 0x20000050) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x50) syz_read_part_table(0x60d, &(0x7f0000002200)="$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") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2101000}, 0xc, &(0x7f00000001c0)={&(0x7f0000002840)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c010000180a010800000000000000000000000a0900020073797a32000000000c0003800800024000001800a000038008000140000000002c00038014000100766c616e3100000000000000000000001400010070696d3672656730000000000000000068000380140001006772657461703000000000000000000014000100697036677265746170300000000000001400010076657468315f746f5f7465616d0000001400010070696d7265673100000000000000000014000100626f6e645f736c6176655f000140000000002c000380140001006e723000000000000000000000000000140001006970365f7674693000000000000000000800014000000000080001400000000008000240000000070c00054000000000000000010c00054000000000000000050800074000000001cc020000020a030600000000000000000b000001f30006004e095fc25d338fd70a6a661648f8392d5eb5287b9462f0d8af5883229cf20898f337f3e1949576535c6a8b6ab25748b4c312f87a833591471b38a84d67b8432c030d2c959742be8bb50f786178ce585195024bee965ff4bf81709253dc3895ddff340a351939a65ecb8e41e246ca366c4417293a9993b3e9e963abdb0d3ec9f5ffac3a322a486559284561d50e70c2b3b4d0a2783882ec8642d213e07d22f729b8784ce8e2135b71304d0c0c758db940a5be775d92fbbf7d496c60f1358bc92f418cf9d031ce58a59bc5876a15846c3007aee3584486c73d2f10669fc896bc4ad65c61198673c5410f3f0c5bbd8e7a00d30006008f8f08f03d6124403bfc623334e607c54a658da2b2d8ebca41a8fab53eb2041006995093418b1aa4c7997bb77895d37ad85a617b129132c54c00a63a74e4040650c32d5450a74e2587beaedd63d2aa847fe7685be893e41b162fc969bdcf156a5050517168802b00dbbe905bf7949de51e2c9f60d36df886569918bf679a29cbadd83c37bc74b37f4cc587a32d3c9c10a5bf697e7f70239906f44771febf6e0846c27e00f870f1c5da6c40191f02318fe4c9ca1273578e7fc601cca0516b26bd4895ae43fce61ffbd2a9de15a41d19e98b2ad3b553000c000440000000000000000308000240000000010c00044000000000000000040800024000000001b40006009f9d7259073228a5c912fb1d96079d71e5a105844c70e8badd13698da5c9b18ed0f256d3b6f798de9d448e8d6c6cb4ebca85c8a59801883014bd3adcbf69eababa865c286132d0ac889c6373b013afa5f857366b42d5d95431c2fc9b46a834c3c446a7dfd9bcb4b170321c02a0b9d1cc33c810ead82f39fa75f15f229d3aedb410b83ed2af42af2a41ec711673571643b6fca7d552cdb9e77754c6922fb8617167170fef5855a9d8e74926f152cbc87d0c0004400000000000000005080002400000000748000000060a01020000000000000000010000060900010073657a300000000008000b40000000010900020073797a300000000008000940000000010c00064000000000000000058c010000020a01040000000000000000020000010c000440000000000000000489000600cba9dd7eeb7b5a8db9e3cb356e37da07a06a621bc2a684c80423177183b098a2fcc443543abf9c1ecfe7fa4e6e27ab9b56fcc1bbc5f58a92a785143199b67683e030f50a791b584fce98b5930ba4fa70478bf82281982cce6e9b19ff7e40ac3dc267e4c0966eb7d86666aec44d855d72f332908cce6aee6ea90817bc4302b3f6fe2e8a873c00000013000600617beb2e1d6a33e4dd6ca0ccb5a443000800024000000003c2000600f23b3e7f7b7dadd47f90ae8692df3051ae4e6aefc6c17e74c3d62f65f71361b17c3d84afd00d36945631a4a559380d76ee8db41c574223549814bf7b74a26ab4c5a9969d577d7047f5310ce41a13a7ba86cabe3bddd02256564817991f65954ba5d66a0cb930e2585d715df4197f6e4c1732c78ba1ba5f18decf374bbd3b95acb6390461b43adbc5216b40cfb42b819138411fae508cb74c5d489e1ef3cedd4503ef4ce4e1d5fee4fde8cf21e5a8c8dfd72fb075b3dd08f45530a16bc58800002c0000000b0a050000000000000000000100000208000a4000000003080005400000002a080007400000003ca8000000050a010100000000000000000500000a08000540fffffffe5c00048014000300776732000000000000000000000000000800024044c3a54a14000300626f6e645f736c6176655f30000000000800014000000001080001400000000308000240196b05460800014000000003080002402f130ab027c71016184e5f08000b400000000208000b40000000011f000c00ae56b7284f85ec5dacdc0c56794e2b536b5727006fd3a49eb9e23d00140000001100010000000000000000000a00000a"], 0x6d8}, 0x1, 0x0, 0x0, 0x20000001}, 0x40010) openat(0xffffffffffffff9c, 0x0, 0x105042, 0x1db) bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x24}}, 0x4100) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x2, 0x0, 0x7ffc0005}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) socket$inet6_tcp(0xa, 0x1, 0x0) gettid() timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0x1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0xffff0000, 0x80000001, 0xffffffff, 0x1, 0xffffffff}, 0x0, 0x4, 0x4, 0x9, 0x80000001, 0x8, 0x4, 0xfc, 0x0, 0x0, {0x0, 0x0, 0x5, 0x6739, 0x3}}}}]}, 0x78}}, 0x0) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f00000004c0)='|', 0x1}], 0x1, 0x4100000000000000) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) syz_usb_connect(0x0, 0x364, &(0x7f0000000d80)=ANY=[@ANYBLOB="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"], &(0x7f00000004c0)={0xa, &(0x7f0000000180)={0xa, 0x6, 0x250, 0x3, 0x4, 0x7, 0x20, 0xf9}, 0x5, &(0x7f0000000200)={0x5, 0xf, 0x5}, 0x4, [{0x47, &(0x7f0000000240)=@string={0x47, 0x3, "83d463be1ade1d5cbeb737a5e94ddee5e1df2e13129cd353cbd714641ee4d27fd5a675f80834171e67fb4ef9fbd7edcc8d15123d8091dfda95bfb77682b5b8db3e73e77dbe"}}, {0x3c, &(0x7f0000001100)=ANY=[@ANYBLOB="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"]}, {0x4, &(0x7f0000000340)=@lang_id={0x4, 0x3, 0x40c}}, {0x72, &(0x7f0000000380)=ANY=[@ANYBLOB="7203d9199dda54c2a94c65ded420c1b30d9fa1f91a18445573174de57c79e29d60783a816a4a218b15667d8aa07a190d8891b698f021ffca6b89a6c221d484713a1a27cea36fce3b46b32cd1d92dbe7e89dd57505e0f6729d4c6fde22366fa311d0f973ba3a178cdcc3713e4268bef156cd7"]}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f00000005c0)='./file1\x00', 0x1018ed8, &(0x7f0000000180), 0x1, 0x644, &(0x7f00000006c0)="$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") perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 2.204273142s ago: executing program 0 (id=2628): r0 = syz_open_procfs(0x0, &(0x7f0000000240)='smaps\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x339) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f00000005c0)={0x0, 0x0, {}, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f00000009c0)={r4, 0x0, 0x1}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) shutdown(r2, 0x1) io_uring_register$IORING_UNREGISTER_RING_FDS(r0, 0x15, &(0x7f0000000580)=[{0x4, 0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/143, 0x8f}, {&(0x7f00000000c0)=""/52, 0x34}, {&(0x7f00000002c0)=""/229, 0xe5}, {&(0x7f00000003c0)=""/65, 0x41}], &(0x7f0000000200)=[0xffffffffffff26c5]}, {0x1, 0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000440)=""/135, 0x87}], &(0x7f0000000540)=[0x4, 0x340, 0x6f6, 0x5, 0x4, 0xb10, 0x5, 0x7]}], 0x2) close_range(r0, 0xffffffffffffffff, 0x0) 2.043216515s ago: executing program 0 (id=2629): r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x1ff, 0x2) r1 = dup(r0) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000440)={0x80, 0x6, 0xf00, 0x1, 0x0, 0x5, 0x0}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0000000206030000000000008000000000000005000100070000000900020073797a30000000001400078008001240000000000500150004000000050005000000000005000400000000000d000300686173683a6d61"], 0x5c}}, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x4004743d, 0x110e22fff6) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0xd, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b70800000000001e23acb9ff00000000b708000000008b9e36274e99525f000000000007010000f8ff3ee5bfa400000000000007040000f0ffffffffb000000800000018c8e30a6700000000", @ANYRES32=r5, @ANYRES64=r5], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x7, 0x10, &(0x7f00000004c0)=ANY=[@ANYRESDEC=r7, @ANYRES64=0x0, @ANYRES16=r0, @ANYRESDEC, @ANYRESOCT, @ANYRES8=r6, @ANYRES32], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x37, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r8}, 0x10) write$cgroup_type(r4, &(0x7f0000000280), 0xfffffeed) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x4, &(0x7f0000000300)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001380)={0xffffffffffffffff, &(0x7f00000004c0)}, 0x20) 1.955579642s ago: executing program 0 (id=2630): prctl$PR_SCHED_CORE(0x3e, 0x2, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYRESOCT, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x28, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x11, &(0x7f0000000540)=@raw=[@cb_func={0x18, 0x2, 0x4, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x80000000}], &(0x7f0000000200)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000001bc0)=""/4096, 0x41000, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x6, 0xf, 0x5ef}, 0x10, 0x0, 0x0, 0x7, 0x0, &(0x7f0000000680)=[{0x3, 0x4, 0xf, 0x3}, {0x1, 0x1, 0xe, 0x7}, {0x2, 0x5, 0x2, 0x8}, {0x5, 0x2, 0xd, 0xb}, {0x4, 0x2, 0xc}, {0x0, 0x4, 0xa, 0x2}, {0x4, 0x3, 0x6, 0x1}], 0x10, 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000380)='svc_wake_up\x00', r0, 0x0, 0x2}, 0x58) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x181000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x21c91c, &(0x7f0000000900)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x800000}}, {@noblock_validity}, {@mblk_io_submit}, {@jqfmt_vfsold}, {@nodelalloc}, {@nomblk_io_submit}, {@usrjquota}, {@minixdf}, {@resgid, 0x32}]}, 0x1e, 0x4ea, &(0x7f00000009c0)="$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") r1 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB="d9"], 0x1, 0x550, &(0x7f0000000800)="$eJzs3VFv01YbwPHHpX3bN2ho2iaEqhYOZZOKVDIngaII7cJzTtIDiR3ZDmqvUEVTVJEyRDdp7c3EDduk7UNwuw8x7Quh3U2762Q7gZS2cUebpur+vwjOiX18zmPH8iM3sS0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEAst2LbBUvqxmstq8O5lcBvDJjf6+/mnmLAuCJW/E+mpuRKOunKZ+9mX47/m5OZ9N2MTMXFlOxcvPzxvU/Hx3rLDwjoVGxt7zxd7XTaL0YdyIjUtGdC3zScmlYm9FX5/yKyVA1V1dR1uBJGuqHcQDuRH6h596YqlMslpfMrfsurVZy67k28e6to24vqfr6pnSD0vS/v50N3ydTrxqslbeLZcZu78Y74wEQq0k5DqfWNTruUFWTcqHCURsWsRkW7WCwUisXC4p3ynbu2Pf5ugjWe7qr2XrJvkdHvtBitkzx8A8cy1s3/UhcjnrRkWdSBL1cqEogvjUPmd/Xy/xeTg8ftz/+9LH/l3expSfL/1fTd1cPy/yGxnN5rS7ZlR57KqnSkI215MfKITvdVEy2eGAnFFyMNcZIpqjtFSVkWZVFseSRLUpVQlFTFSF20hLIioUSikz3KlUC0OBKJL4EomRdXboqSguxOlqUkSrTkZUV8aYknNamIk/SyLhvJdi8NiPFto8JRGhUHNBqQ/7sTbPI/Mpz4MRz4ULu9/A8AAAAAAM4tK/nre3z+PyGzIhOWVE1d26MOCwAAAAAAnKDkm/+ZuJiIa7Nicf4PAAAAAMB5YyXX2FkikpNraa13JRR/BAAAAAAA4JxIvv+/Ghe5uHZNLM7/AQAAAAA4b3467B77fyRTLUvC5qT1+58SBBPWy+by59amE89wNi+ky114v8eoOm1d6naSFIvj3XeunrG6d798exPMN91iPete/9YJBCC/yPW0zfW1tFzrzUlHyVVNXeddv36vII5zaSzSy9F3zza+l2T1f/YalyxZ3+i084+/6awlsbyMe3m52b2B4r77KA6I5VuZTdvMHrzGE8mFGN1xc+m4dv/6j6WLj/2LMV/JXNpmLpeWub3rPxWPWcjf663He2ufRjEpIsda81dyI21zY/5GWhwQRTF/2GfQ3RbF/u3/QdviCFGUsqIoZUVx8asBUXDfTQCjs56Rhaz9if8DjrWnk91fyXzaZn46eRrL+PQBR3Q764huHzOv/7bvGUgH59hCMu6v8bg/yEanXUjGfR0v8PrQccN60ZKp53/t7m4+l8tb2zu3NjZXn7SftJ8Vi6VF+7Zt3ynKxPrGeNuOi07bHhApAOC/K/sZO5ktrNsZZ9WfvP1JQV4ei/y9u7smC8nVBskvDg7sNdf3M4SFjLPWXN8TXhYyzupyfQ96OXrb0il8EgAAnJ65jDx8lPy/kHHevTeXDz477s/lAABgOHTwxspFP1pBYJqPCuVywYmWtAp894EKTKWmlfEiHbhLjlfTqhn4ke/69bjy0FR0qMJWs+kHkar6gWr6oVlOnvyuuo9+D3XD8SLjhs26dkKtXN+LHDdSFRO6qtn6um7CJR0kC4dN7ZqqcZ3I+J4K/Vbg6rxSodZ9DU1Fe5GpmrjqqWZgGk6woh769VZDq4oO3cA0Iz/tsDeW8ap+0Ei6zY96YwMAcEZsbe88Xe102i+GWBn1OgIAgL3I0gAAAAAAAAAAAAAAAAAAAAAAnH3Dvf5vd3K4VxYOqzJ5NsIYdWXsRDv83/EWn+rfbU99a1jDG9SSM/Jx761kHzs+GuJxCcDw/RMAAP//vAFN1g==") r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000240)={0x8, 0x100001d, 0x4003, 0x83ffffc, 0xb, "69b7841b47f3ce7a26149600"}) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000100)=0x10000) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000003000), r5) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000003040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r5, &(0x7f0000003140)={0x0, 0x60, &(0x7f0000003100)={&(0x7f00000001c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="01002bbd7000fbdbdf25020000000a000900aaaaaaaaaa44000008000300", @ANYRES32=r7, @ANYBLOB='\b\x00\v'], 0x30}, 0x1, 0x0, 0x0, 0x20000050}, 0x20040084) syz_mount_image$msdos(&(0x7f0000000f40), &(0x7f0000000f00)='.\x00', 0x1aca421, &(0x7f00000008c0)=ANY=[], 0xb, 0x0, &(0x7f0000000000)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 1.842716391s ago: executing program 1 (id=2632): syz_open_dev$usbfs(0x0, 0x76, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b70800", @ANYRES32, @ANYBLOB], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x18) syz_io_uring_setup(0x16d2, 0x0, &(0x7f0000000200), &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) mq_getsetattr(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r3}, 0x10) r4 = mq_open(&(0x7f0000000a00)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xd3\xa7\xd8J\xfd\x94#KT\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\x88N\xb8\xde\xeb)\xcd\xc56m\n\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88|0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc\x02\xea\x91\xe8\xd8\x01YZy\xe6!\x89\x9c\xd1\xa6\x167\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1[\x84\x10aF\x9b\xda\xeb\xc4*\x02q\xb2\x92\x00\x8cv\xac AN\xb9\xaa\x81W\x97Te\x81\x98L\xfe\x97+u\xd3^\xb1\xf0\xe0\x1f\xbd\a\xbb\xe5\x18\x9ds\x12ha\x00\xeb\x84\x99\xc6\x0f\xf1\xd5LD\xa87\xa0DQ\x8a2\x16!8,\xbc%$\xf1\xf2\xd6\x9cy\xecK\xda\xc5\xdc\xfa\xdd\xf6\b\xc6\xb4\x14\x16\x9c\x7f\x92\x85\xb0\xa2%:\xf0\xf4\x150\x0f\xb4\xa6d\xb4\xe4L\x19W\xd5\x90\xf7l\x1b\xfe\xde\vh\x97=m\x82.\xac\vh\xfe\x84Q}\x838/\x83\xebP\xbe\xd6+:\xceE\\\x95\xd4\xac\x92\x87\xd7\x98\x97\xe3\xec\xad\xd5\xac\x80C\x84R\x88r^g\xbaQ(\x9a>\xe2\xba\xa8=\x17\f04\x8f\x1f\xf2\x88*@v\xe7\xd1\xee\xb3\xc2\x8dT\xda\x81g\xd9\x1a:hzW6s)x\x06\xae\x11\xf2\x1e\xcd\v\xe5L\x19\x96s\xbc\x9e\xf4\x10$\r\xa4\xd8\xa2\xa2\xfcM\xc5R3~$\xc0\xa5n\x9a W\xb1e\xcc<$\xf5#G\xce\xaf\x88U\xfa\x80\xf24\xf6\xb5\xef\xe2z\xcf\x9eN\x92\xac\x81{\xe6\xbd\xd7\x16\xe6F\xe2\x9e\x91%\x94\v\xb9\xdc\xd6\x87\x8f\xcd\xc1\xb05\x81\x81\xf8\xe9X\xe8Kt9@\xf4\xe1\xa6=\xc9\xe1:p4\nP[f\x1d\xfd\xfa\x839\x8d\x0e\xd1\xf9\xa0\xd2^E\xe5\xedo.\xaa\xf2\xb4\xcdn\x14\f\xcd\x83_yk\xda\xc5\x89\xf0Z\xea\x1d\xbd\xc00\v\xa3\xb3\xbe\xe6\x8b\x18/\xa8\xaaY\xf2\x89\x0f\x9enOOr\x00\xb2\x01\x1f:Z\xb8\xee;\xe3;\x8aPV\xce\xee\xf8[\x16\n\xe6:z\xb8\x1dvk\a{\xc1\x14\xd9+\xdb\t\x11\x90y\xe8\\\xe6\xfc\xca\xb4\xcbC\xd6\xd0\xbeC\xce\xc0L\xdb\xcd\xb3\x907c\xb4\xa6\xce\xdb[\xce\x122N\xa3\xc7Q<\x1a\xa5\xb3)\xc5\x98\x84\x8a\x82\x19\xb0\t\xac\x10\\\x8c\xbe\xcb\raIYe[\xa8\xc4\xac\x0e\xbb\x0f\b^\xdag\xe2\xa9\"\xf5h\'\xcf\xd9\x1b\xef\xe3\xe7y\x82\x1e\xca\x7f\x02 \xcf\x9e\xe0\xd9TM\xb9\n\xa9\xad3\x91\xa5\xe6!\xcd\xa2\xa4\x14\x12\xf9\xbf\xa8b\xcec:\xd7\'\f\f\x957\xc9}\r\xa6\xaa\x0f\xca\x96\xeb\x00\x00\x00\x00\x00', 0x42, 0x1f0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) mq_unlink(&(0x7f0000000000)='eth0\x00') close(r4) 1.801616394s ago: executing program 0 (id=2633): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f00000003c0)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000340)='kmem_cache_free\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) close(0xffffffffffffffff) r1 = socket$inet6(0xa, 0x2, 0x3a) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x800) ioctl$SG_GET_VERSION_NUM(r3, 0x2284, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r2}, 0x18) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000380)=[{0x1, 0x1, 0x7, 0x7}]}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x2, 0x0, 0x7fff0000}]}) shmat(0x0, &(0x7f0000ff2000/0xb000)=nil, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x18) ftruncate(0xffffffffffffffff, 0x2007ffc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r5 = socket$inet6(0xa, 0x3, 0x8000000003c) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r6}, 0x10) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendmsg(r5, &(0x7f00000000c0)={0x0, 0x953a, &(0x7f0000000100)=[{&(0x7f0000000000)="2b10", 0xffbd}], 0x1, 0x0, 0x0, 0x2c}, 0x4) r7 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r7, 0x114, 0x6, &(0x7f0000000140), 0x4) sendmmsg$inet6(r1, &(0x7f0000000340)=[{{&(0x7f0000000380)={0xa, 0x0, 0x0, @mcast2={0xff, 0x5, '\x00', 0x0}}, 0x1c, &(0x7f0000000000)=[{&(0x7f0000000100)="a0002883781ecc0e", 0x4008}], 0x6}}], 0x1, 0x0) 1.792167955s ago: executing program 1 (id=2634): socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x100b28, 0x6, 0x0, 0x7, 0x8, 0x20005, 0x80, 0x0, 0x0, 0x0, 0x20000009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_route(0x10, 0x3, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x200000000000011, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) close(r2) r3 = socket(0x28, 0x5, 0x0) r4 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r4, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) listen(r4, 0x4) connect$vsock_stream(r3, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r5}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) recvmsg$kcm(r3, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x2001) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=@newtfilter={0x24, 0x11, 0x1, 0x691522ec, 0x0, {0x0, 0x0, 0x74, r1, {0x10, 0xf}, {}, {0x5}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r7, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.659984616s ago: executing program 0 (id=2635): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) (async) write$binfmt_script(r0, &(0x7f0000000680)={'#! ', './file0'}, 0xb) (async) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000080)}, 0x400, 0x0, 0x0, 0x0, 0x0, 0x1fffffff, 0x0, 0x0, 0x40, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'tunl0\x00', &(0x7f0000000100)={'erspan0\x00', 0x0, 0x80, 0x700, 0xc8b, 0x7f, {{0x18, 0x4, 0x2, 0x0, 0x60, 0x66, 0x0, 0x0, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, {[@lsrr={0x83, 0xb, 0xc8, [@broadcast, @loopback]}, @timestamp_prespec={0x44, 0x1c, 0xb4, 0x3, 0xa, [{@loopback, 0x1}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x400}, {@empty, 0x1}]}, @lsrr={0x83, 0x23, 0x55, [@dev={0xac, 0x14, 0x14, 0x3c}, @remote, @dev={0xac, 0x14, 0x14, 0x39}, @rand_addr=0x64010101, @rand_addr=0x64010102, @remote, @private=0xa010101, @rand_addr=0x64010102]}]}}}}}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=@ipv6_deladdrlabel={0x1c, 0x49, 0x0, 0x70bd26, 0x25dfdbfe, {0xa, 0x0, 0x1f, 0x0, r1, 0x4}}, 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x4000) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) 1.618674329s ago: executing program 0 (id=2636): sendmsg$inet(0xffffffffffffffff, 0x0, 0x4008000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000002840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000001000/0x4000)=nil) brk(0x400000001000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xb, 0x31, 0xffffffffffffffff, 0xa2b5c000) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0xfe, "0062ba7d82000000160000000000f738096304"}) r3 = syz_open_pts(r0, 0x80) r4 = dup3(r3, r0, 0x80000) read$watch_queue(r4, &(0x7f0000001d40)=""/4095, 0xfff) r5 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) close(r5) fcntl$setstatus(r5, 0x4, 0x2c00) r6 = gettid() fcntl$setown(r5, 0x8, r6) ioctl$TIOCSLCKTRMIOS(r4, 0x5457, &(0x7f0000000040)) 1.563950733s ago: executing program 1 (id=2637): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x22, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sys_enter\x00', r2}, 0x10) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x81) r4 = socket$caif_stream(0x25, 0x1, 0x1) close(0x3) r5 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r5, &(0x7f0000007fc0), 0x800001d, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) cachestat(r1, &(0x7f0000000040)={0x100000000, 0x9}, &(0x7f00000000c0), 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000640), r6) sendmsg$IEEE802154_LLSEC_DEL_KEY(r6, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="30e87fd79916c966a0100200000000000001", @ANYRES16=r7, @ANYBLOB], 0x30}, 0x1, 0x0, 0x0, 0x4008000}, 0x48004) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xb, &(0x7f0000000940)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2d00000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x26, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000300)='kmem_cache_free\x00', r8}, 0x18) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x7c}, 0x1, 0x0, 0x0, 0x5}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) fsopen(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f00000001c0), 0x1, 0x553, &(0x7f0000001080)="$eJzs3d9rW1UcAPDvTdv91nUwhopIYQ9O5tK19ccEH+aj6HCg7zO0d2U0WUaTjrUO3B7ciy8yBBEH4ru++zj8B/wrBjoYMoo++BK56U2XrUmbddnSmc8Hbjkn9ybnfnPv9/TcnBsSwNCayP4UIl6OiG+SiIMRkeTrRiNfObG23er9q7PZkkSj8elfSXO7rN56rdbz9ueVlyLit68ijhc2tltbXlkolcvpYl6frFcuTdaWV05cqJTm0/n04vTMzKm3Z6bfe/edvsX6xtl/vv/k9oenvj66+t0vdw/dTOJ0HMjXtcfxBK61VyZiIn9PxuL0IxtO9aGxnSQZ9A6wLSN5no9F1gccjJE864H/vy8jogEMqUT+w5BqjQNa1/Z9ug5+btz7YO0CaGP8o2ufjcSe5rXRvtXkoSuj7Hp3vA/tZ238+uetm9kS/fscAmBL165HxMnR0Y39X5L3f9t3sodtHm1D/wfPzu1s/PNmp/FPYX38Ex3GP/s75O52bJ3/hbt9aKarbPz3fsfx7/qk1fhIXnuhOeYbS85fKKdZ3/ZiRByLsd1ZfbP5nFOrdxrd1rWP/7Ila781Fsz34+7o7oefM1eql54k5nb3rke80nH8m6wf/6TD8c/ej7M9tnEkvfVat3Vbx/90NX6KeL3j8X8wo5VsPj852TwfJltnxUZ/3zjye7f2Bx1/dvz3bR7/eNI+X1t7/DZ+3PNv2m3dQ/FH7+f/ruSzZnlX/tiVUr2+OBWxK/l44+PTD57bqre2z+I/dnTz/q/T+b83Ij7vMf4bh39+taf4B3T85x7r+D9+4c5HX/zQrf3e+r+3mqVj+SO99H+97uCTvHcAAAAAAACw0xQi4kAkheJ6uVAoFtfu7zgc+wrlaq1+/Hx16eJcNL8rOx5jhdZM98G2+yGm8vthW/XpR+ozEXEoIr4d2dusF2er5blBBw8AAAAAAAAAAAAAAAAAAAA7xP4u3//P/DEy6L0Dnjo/+Q3Da8v878cvPQE7kv//MLzkPwwv+Q/DS/7D8JL/MLzkPwwv+Q/DS/4DAAAAAAAAAAAAAAAAAAAAAAAAAABAX509cyZbGqv3r85m9bnLy0sL1csn5tLaQrGyNFucrS5eKs5Xq/PltDhbrWz1euVq9dLUdCxdmayntfpkbXnlXKW6dLF+7kKlNJ+eS8eeSVQAAAAAAAAAAAAAAAAAAADwfKktryyUyuV0UUFhW4XRnbEbCn0uDLpnAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAH/gsAAP//6AY3sQ==") bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r9 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r9}, 0x4) r10 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r10, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={0x0}, 0x18) 1.332897272s ago: executing program 4 (id=2638): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r4, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)=@newlink={0x50, 0x10, 0x437, 0x70bd29, 0x25dfdbfc, {0x0, 0x0, 0x0, r5, 0x40c89}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @gretap={{0xb}, {0x20, 0x2, 0x0, 0x1, [@IFLA_GRE_TOS={0x5, 0x9, 0x4}, @IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x1}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_ENCAP_DPORT={0x6, 0x11, 0x4e22}]}}}]}, 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmmsg$inet(r3, &(0x7f00000017c0)=[{{&(0x7f0000000040)={0x2, 0x4e1c, @loopback}, 0x10, 0x0, 0x0, &(0x7f00000004c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @empty, @rand_addr=0x3}}}], 0x20}}], 0x1, 0x4040880) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @rt={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_RT_DREG={0x8, 0x1, 0x1, 0x0, 0xe}, @NFTA_RT_KEY={0x8, 0x2, 0x1, 0x0, 0x24}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x78}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socket$key(0xf, 0x3, 0x2) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2, &(0x7f0000000180)={[{@usrjquota}, {@abort}, {@nombcache}, {@noload}, {@jqfmt_vfsv0}, {@max_batch_time={'max_batch_time', 0x3d, 0x1}}, {@oldalloc}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x2000000}}, {@bsdgroups}, {@bh}]}, 0xfa, 0x477, &(0x7f0000001380)="$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") creat(&(0x7f0000000e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x81) symlink(&(0x7f0000000c00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000e80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r6 = creat(&(0x7f0000000d80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) sendmsg$BATADV_CMD_SET_MESH(r6, &(0x7f000000ae00)={&(0x7f0000009a80)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f000000adc0)={&(0x7f000000ad40)={0x54, 0x0, 0x4, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xfffffd7e}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xdc}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xfffffff7}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x2}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x91d20}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x6}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x44890}, 0x20024001) rename(&(0x7f0000001080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000001900)='./file0\x00') r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x4, 0x28}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f000000ae40)=ANY=[@ANYBLOB="1800000000000000000000008000000018120000", @ANYRES32=r7, @ANYBLOB="00000000000000008eccb7030000180000001b00000495000000000009c237b503901410046512143684848b558b836d94f7f70010000000000000a46da45616f2b99c4a132139f960b1ad3257620318d4541fe9acf1240c55"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41002, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) memfd_create(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x18) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000e00000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x31) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000140)='fib_table_lookup\x00', r9, 0x0, 0x417}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000080)='kfree\x00', r11}, 0x18) 1.147795707s ago: executing program 2 (id=2641): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffd40}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kmem_cache_free\x00', r1, 0x0, 0xd22}, 0x17) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c0000002000010000000000000000000a101400000000060000000014000200fc020000000000000000000000000001080017004e234e24140001002001"], 0x4c}}, 0x40000) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000002c0)=@newlink={0x5c, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x3c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @private2}]}}}]}, 0x5c}}, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) bind$unix(r4, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) listen(r4, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) connect$unix(r5, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) r6 = socket$unix(0x1, 0x1, 0x0) close(r5) connect$unix(r6, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) listen(r4, 0x1) sendmsg$TCPDIAG_GETSOCK(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000000000)={0x4c, 0x14, 0x101, 0x70bda4, 0x25dfdbfd, {0x1, 0x1f, 0x88, 0x10, {0x4e24, 0x4e22, [0x3, 0xffffffff, 0xf, 0xc3], [0x6, 0x0, 0x5, 0x7], 0x0, [0x1, 0x7fffffff]}, 0x2, 0xc7}}, 0x4c}, 0x1, 0x0, 0x0, 0x40480cc}, 0x40000) syz_clone3(&(0x7f0000000900)={0x4184100, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0x0], 0x1}, 0x58) 1.084262502s ago: executing program 3 (id=2642): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000040)={0x0, 0x6, 0x7ffffffefffffffd, 0x8}) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0x4}, 0x18) unlinkat(0xffffffffffffffff, 0x0, 0x200) r2 = socket$nl_route(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000280), &(0x7f0000000380), 0x2, 0x3) r3 = socket$netlink(0x10, 0x3, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x4c00}, 0x0) sendmsg$inet(r2, &(0x7f0000000b00)={&(0x7f0000000800)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000980)=[{&(0x7f0000000840)="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", 0xfe}, {&(0x7f0000000a00)="0a7df62f05bd3f72d6b6cb0d378306faa30b147ce72c3ab584153b6553c15edfa4a90ee0edee18586db14ed918993cc19a217c41be21309683e4650643e9502299b6243a8f135f01177bf16ffc74e6dde92f376cd05b74765870ce445ed67082ca8a02c2fd8e25c5f487335469b217d79ef9d021c74c12e4555473612702c49d7fec0922390416d2e7e78ee5b0f565dca4cfd50bf77017c8e05437fd6aca4fbc57e0e0690869143f0fd7f402e49b0930c50c38c0dcb23547d97aae55a557486acbe18f01ef0d10fd3bb68b175e7a447065e7a7", 0xd3}, {&(0x7f0000000c00)="b7f3981e02dab81d60442351eecde3a186e8080911af25eea2c403631a302faa0474f4bd2666e0ea7b877c32116955860c37aa2d400a2a6a83abcab19c092320e5b295be4b6172235626e8430250bded82a17ac788e63c895f207ac50afa6ac5dd167ca569c19601cd539496dce289d2c629b090b3833d45b2da9106880690367b156d191f3739fb8f358d534a7e5c0449797cf279b712ddc10244013c5d0c118e424c9f1d703e35e2ce039c1cd9aa49d8df936a7074e5027988e86cfaf601045df3799faf762a0df1a78dcf455dfd6ae09c1baccc904e3f6ad4fc38a0ea1a7544b43665642bb90de0dd67", 0xeb}, {&(0x7f0000000940)="13a49b7718446b4abd9bdd98bcf84ea103b21312cf008bca3a7641b1e4d799b2b8a20a23e11745ce97ff5b6a358d38ac", 0x30}], 0x4}, 0x20000800) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'syz_tun\x00', 0x0}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) sendto$inet(r5, 0x0, 0x0, 0x20000800, &(0x7f0000000040)={0x2, 0x3, @remote}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @random="5a01f3c2f136", @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @random="43b1849c32a1", @remote, @local, @remote}}}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x1, 0x2000000, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff3}}}, 0x24}}, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x0, 0x18}, 0xc) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x2}, 0x50) r8 = syz_io_uring_complete(0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0xc, &(0x7f0000000b40)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="1711cea3d64ae354dbf85a650000000000b70800000000e7057b8af8ff00000000bfa200000000000600000000000000ffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)={0x1b, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x50) r11 = memfd_secret(0x80000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000600), &(0x7f0000000640)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x3, 0x11, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_fd={0x18, 0x5, 0x1, 0x0, r6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @jmp={0x5, 0x0, 0x2, 0x3, 0x5, 0xfffffffffffffffe, 0xfffffffffffffff8}, @call={0x85, 0x0, 0x0, 0x58}, @exit, @call={0x85, 0x0, 0x0, 0x74}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x1}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0x7, 0xd3, &(0x7f0000000480)=""/211, 0x41000, 0x3, '\x00', 0x0, @sched_cls, r1, 0x8, &(0x7f0000000140)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0xd, 0x6, 0x1}, 0x10, 0x0, r0, 0x1, &(0x7f00000006c0)=[r7, r8, r9, r10, r11, r12, 0x1], &(0x7f0000000700)=[{0x3, 0x1, 0xb, 0x5}], 0x10, 0x3}, 0x94) 1.032931446s ago: executing program 1 (id=2643): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x161042, 0x0) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), r1) sendmsg$DEVLINK_CMD_RATE_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000da02df25250000000e0001006e657464657673696d0000000f0002006e657464657673696d300000"], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000140)) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f00000000c0)={0x1, &(0x7f0000000300)=[{0x50, 0xff, 0x0, 0x6}]}) write$ppp(r0, &(0x7f0000000200)="4176adc3a0", 0x5) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) ioprio_set$pid(0x2, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000bc0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf#2\x99\x1e\xa1`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\f<\x8f\xc1\x99\x89r\xe1?\xbdu\x98\xc3\xf8\xd2Q#\xc6g\xa0\x85\xd6G\x85\x11X\x8d,\x02\xd45\xb8\xca\x97\x9d\xcb\x1e\x80\xd6\xd5>N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec\x8aog\x87BR\x9d\xad\xd4FcB\xda\x95\xc3\xdd\x9d\x8f\x1a\xce\x18\x80\"j\xe1\xba\x1e\x97uX\xccv\xd6\vcz\x92A^\xbc\xceF\xf7\xe5:\xaf\xc5~\xbcJ e\r\x88c\x9d\xb92\xb6i4zq\xb3c\x0f\xb2t\x93\xf2E6b\xfa\xcdJ5\xe3W]`4\xd8D\x05\v\xfc)\xca\xedQ\xd0]Ot\'\xc2tDF\xf9\xa7\xb5(\x83\xa5\x0f\x1d\x1d\x06Dg\x13>\x19\xe85#\aaT\x89=\x104\xd5\x85Q\x96\x91\xea\x172P\xb3:\xadZ\xbc\xbe\x00\xf0\x14\x96\xd9M\xd7\x88QZs\xb2\xe1+$jfQodH\x05/y`~Mx\x02\x00(v\xe6`\x026\xfcgC\xb5\xf0\x13.zb\xc5bj+@\x00\x00\x00\x00\x00\x00\x00.\xd4`=z\xd1n\x8d\x8f\xa5hS\x8e[\xb3\xa3\x87\xb9\xe2_Z\x11\xef\xc2]V\xf3\x03\x94\xb9\xe1\xa68\x8d\\\xe5\xef\xacpM\xf0\xa6\x04\x10\xb7\xc0t\x83\\\xf7\x12k\x9f\x10\xd5Z\x19\xc1\xc1\x80\\o\x97\xce=U\xdd\xaa\x1b\x05\x14\x13\xa6\xbd#\xde\x04\xe6$\xec$3\xf6\x97\xc6\xeaSL\xb7A72M\x88k@\xe5\xa3\n&\x1e\xc84\xa9\xe2\xccM\x906\x95xQ-2p\xd62\'\xec\x0f\x13;I\x95fE_\r\xe7\t!A\x05\xe4\x8f\x9e0\xf8/T\x18\xf7\xa1\x9f\xde1\xd5\x80<\xf5\b\xa9\xec\x85\xaeW\xb3\xd8#)bn \xfb\xf2\x88\xfaR\xff\xdd\x80\x96_\xec5\xf0\x1c\a\x8a\x80\x00@=\r8u+%f:\x1e\x82\xfap\xf6\x89\xea\xba\xe3\xbbM%F\xdb\\\xd1eJJ*\xc67\xca\x03\xa3\xf7(\xbb\xecN\xd4\xe7\xf2:u\x8a\b\xd5\v\xca\xfd\\\xd6\xe3\x05\xb3\x03\xd5\xe0\xd2\xf2{\'\x8b\xdf\xa1\xbe}\xb2\xe4y\xbb\xe6\x1f\x10c\xf5WQ\x82\x04\x01C\x83,\x90\x1a\xfa\x8e\x17\x89\xe2\xedX\x8d\rmq\t\xb5$\xb4\x9b\x92z\xd6/-\x13,\xb5%\x8eM/\x04\xa7\x7f\x1b\x85\xf1\xa4X\x17\xbb\x1cR14\xfb!\b\x10\xe8\xb2\xd41gK\xe4\xea\xe39d\bL\xe5\x1b\xbd[\x9bWD:\r&\xe9\vn^\xcc\x86\xe3\xce1>3{\xaa{\xbd0P\x9f\xa68\xf5\x82\xb8\x9aD\x9c{\xe6\xf8\xcbD\xb5aJ\xb0\x92\x89\xbc\x80\x1ch\x89\xe7\xdd]q,\xec\xc4\xa5\x93\xe5,\x0e,>/\xaf|\xf0\x01V\x7f\xc9?\xba\x16\xe4$+}5dy\xb1\xef\xf1m\xa5\x94d9\xaf\xcfq\x8b=\x026\xef\r\x91\x18\xc5\xb6\xb9fM\x8ayZ\xbcd\xa5\x8a\x88\x98\xc3\xfc`\xa6\xba\x1f\x17\v$\x88g\xb4\xad\b\xc1\xddW\xa6\xc1\xb7\xb0\xa3\x84Q\x13GoU\xe2\xb7\x03\x9c\xd5\x0f\xa8\x0ef\"\x15\x82\xe7\xbd\xf8\xca\x10f\xfe6h\xe9\xc3\xc2\xa0O:\xac~\x1a\xf7\xbeF\xbe\xe5\xf0\x81\xd6&\xc0\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xd3\xa7\xd8J\xfd\x94#KT\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\x88N\xb8\xde\xeb)\xcd\xc56m\n\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88|0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc\x02\xea\x91\xe8\xd8\x01YZy\xe6!\x89\x9c\xd1\xa6\x167\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1[\x84\x10aF\x9b\xda\xeb\xc4*\x02q\xb2\x92\x00\x8cv\xac AN\xb9\xaa\x81W\x97Te\x81\x98L\xfe\x97+u\xd3^\xb1\xf0\xe0\x1f\xbd\a\xbb\xe5\x18\x9ds\x12ha\x00\xeb\x84\x99\xc6\x0f\xf1\xd5LD\xa87\xa0DQ\x8a2\x16!8,\xbc%$\xf1\xf2\xd6\x9cy\xecK\xda\xc5\xdc\xfa\xdd\xf6\b\xc6\xb4\x14\x16\x9c\x7f\x92\x85\xb0\xa2%:\xf0\xf4\x150\x0f\xb4\xa6d\xb4\xe4L\x19W\xd5\x90\xf7l\x1b\xfe\xde\vh\x97=m\x82.\xac\vh\xfe\x84Q}\x838/\x83\xebP\xbe\xd6+:\xceE\\\x95\xd4\xac\x92\x87\xd7\x98\x97\xe3\xec\xad\xd5\xac\x80C\x84R\x88r^g\xbaQ(\x9a>\xe2\xba\xa8=\x17\f04\x8f\x1f\xf2\x88*@v\xe7\xd1\xee\xb3\xc2\x8dT\xda\x81g\xd9\x1a:hzW6s)x\x06\xae\x11\xf2\x1e\xcd\v\xe5L\x19\x96s\xbc\x9e\xf4\x10$\r\xa4\xd8\xa2\xa2\xfcM\xc5R3~$\xc0\xa5n\x9a W\xb1e\xcc<$\xf5#G\xce\xaf\x88U\xfa\x80\xf24\xf6\xb5\xef\xe2z\xcf\x9eN\x92\xac\x81{\xe6\xbd\xd7\x16\xe6F\xe2\x9e\x91%\x94\v\xb9\xdc\xd6\x87\x8f\xcd\xc1\xb05\x81\x81\xf8\xe9X\xe8Kt9@\xf4\xe1\xa6=\xc9\xe1:p4\nP[f\x1d\xfd\xfa\x839\x8d\x0e\xd1\xf9\xa0\xd2^E\xe5\xedo.\xaa\xf2\xb4\xcdn\x14\f\xcd\x83_yk\xda\xc5\x89\xf0Z\xea\x1d\xbd\xc00\v\xa3\xb3\xbe\xe6\x8b\x18/\xa8\xaaY\xf2\x89\x0f\x9enOOr\x00\xb2\x01\x1f:Z\xb8\xee;\xe3;\x8aPV\xce\xee\xf8[\x16\n\xe6:z\xb8\x1dvk\a{\xc1\x14\xd9+\xdb\t\x11\x90y\xe8\\\xe6\xfc\xca\xb4\xcbC\xd6\xd0\xbeC\xce\xc0L\xdb\xcd\xb3\x907c\xb4\xa6\xce\xdb[\xce\x122N\xa3\xc7Q<\x1a\xa5\xb3)\xc5\x98\x84\x8a\x82\x19\xb0\t\xac\x10\\\x8c\xbe\xcb\raIYe[\xa8\xc4\xac\x0e\xbb\x0f\b^\xdag\xe2\xa9\"\xf5h\'\xcf\xd9\x1b\xef\xe3\xe7y\x82\x1e\xca\x7f\x02 \xcf\x9e\xe0\xd9TM\xb9\n\xa9\xad3\x91\xa5\xe6!\xcd\xa2\xa4\x14\x12\xf9\xbf\xa8b\xcec:\xd7\'\f\f\x957\xc9}\r\xa6\xaa\x0f\xca\x96\xeb\x00\x00\x00\x00\x00', 0x42, 0x1f0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) mq_unlink(&(0x7f0000000000)='eth0\x00') close(r4) 943.282314ms ago: executing program 1 (id=2645): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f00000006c0)={0x0, 0x0, 0xac1d}) fcntl$lock(r1, 0x25, &(0x7f00000000c0)) ioctl$HIDIOCGSTRING(r1, 0x81044804, &(0x7f0000000100)={0x12, "053121d1f49a0bfcbc1fa7eae607037530e7"}) pipe(&(0x7f0000000500)) ptrace(0x10, r0) socket$nl_netfilter(0x10, 0x3, 0xc) modify_ldt$write(0x1, &(0x7f0000000040)={0x806, 0x100000}, 0x10) syz_clone(0x26801000, 0x0, 0x0, 0x0, 0x0, 0x0) 927.219415ms ago: executing program 2 (id=2646): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000004000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0xa802, 0x0) close(r3) socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@gettclass={0x24, 0x2a, 0x129, 0x0, 0xfffffffd, {0x0, 0x0, 0x0, r5, {0x1, 0xd}, {}, {0x8, 0xfff1}}}, 0x24}}, 0x40004) (fail_nth: 5) recvmmsg(r6, &(0x7f0000001480)=[{{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000040)=""/55, 0x37}, {&(0x7f0000000540)=""/189, 0xbd}, {&(0x7f0000001ac0)=""/4096, 0x1000}, {0x0}], 0x4, 0x0, 0x0, 0xe58}, 0x5d}], 0x1, 0x10022, 0x0) 922.216585ms ago: executing program 4 (id=2647): getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@empty, @empty, 0x0}, &(0x7f0000000040)=0xc) r1 = socket$packet(0x11, 0x2, 0x300) connect$packet(r1, &(0x7f0000000080)={0x11, 0x17, r0, 0x1, 0xc}, 0x14) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x12, 0xffffffffffffffff, 0x0) r3 = syz_io_uring_setup(0x2353, &(0x7f00000000c0)={0x0, 0x7148, 0x200, 0x0, 0x1bb}, &(0x7f0000000140), &(0x7f0000000180)=0x0) syz_io_uring_submit(r2, r4, &(0x7f00000001c0)=@IORING_OP_SPLICE={0x1e, 0x3, 0x0, @fd_index=0x1, 0xdb, {0x0, r1}, 0x6, 0xd, 0x1, {0x0, 0x0, r1}}) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x104, &(0x7f0000000200)=0x10000, 0x0, 0x4) socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000280)={'vlan0\x00', 0x1}) fcntl$addseals(r3, 0x409, 0xd) setsockopt$inet6_tcp_int(r5, 0x6, 0x12, &(0x7f00000002c0)=0x7fff, 0x4) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000001300)=@get={0x1, &(0x7f0000000300)=""/4096, 0x8}) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x40010, r5, 0x0) r7 = accept4$tipc(r5, &(0x7f0000001340)=@id, &(0x7f0000001380)=0x10, 0x80000) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, r4, &(0x7f00000013c0)=@IORING_OP_FSYNC={0x3, 0x10, 0x0, @fd=r7, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r8}}) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$nl802154(&(0x7f0000001440), 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001480)={0x0, 0x0}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r9, &(0x7f0000001580)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x804011}, 0xc, &(0x7f0000001540)={&(0x7f0000001500)={0x24, r10, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@NL802154_ATTR_PID={0x8, 0x1c, r11}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r5}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x4804) r12 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000015c0), 0xca000, 0x0) setsockopt$inet_opts(r12, 0x0, 0x4, &(0x7f0000001600)="3bbe334e10ff6c5dac25fad992dd6956fc2874ede71265c860dfc8e16febc308b945e991ee5754a2218d4cf57ffafca710cfba7df8d4f247e77d0dcd3d30cdc47e32abcd1aa53ab77bd68857435b32623baa8b13db98c78bb4558d4f6587179e8dcbc10843793f6c", 0x68) fsconfig$FSCONFIG_SET_FD(r12, 0x5, &(0x7f0000001680)='nl802154\x00', 0x0, r1) connect$inet(r5, &(0x7f00000016c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r13 = memfd_secret(0x0) mkdirat(r13, &(0x7f0000001700)='./file0\x00', 0x1) prctl$PR_SET_NAME(0xf, &(0x7f0000001740)='nl802154\x00') syz_io_uring_setup(0x7462, &(0x7f0000001780)={0x0, 0xfebb, 0x200, 0x1, 0x1b1}, &(0x7f0000001800), &(0x7f0000001840)) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r13, 0x5000943f, &(0x7f0000001980)={{}, 0x0, 0x4, @unused=[0x8, 0x10000, 0x1, 0x8], @subvolid=0x1}) 874.242489ms ago: executing program 1 (id=2648): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000008385000000710000"], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r0, 0x0, 0x100000000}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f00000006c0)={0x4, 0x0, 0x0, 0x0, 0x104, 0x3}) r2 = memfd_create(&(0x7f0000000140)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xcda\x9bX\x0e\xa1\xcf\x1a\x98S7\xc9\x00'/47, 0x2) fallocate(r2, 0x0, 0x0, 0x509a) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000040)={0x5, 0x2, 0xf, 0xfe74, 0x8, "2c277bd72c6157ca4381fbdd4a7c9d6a6f0da7", 0xffffffff, 0x91}) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000380)='host1x_channel_submit_complete\x00', 0xffffffffffffffff, 0x0, 0x9}, 0x18) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = socket$key(0xf, 0x3, 0x2) close(r6) getpeername$l2tp(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @empty}, &(0x7f00000003c0)=0x10) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) r7 = syz_clone(0x80200, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r7, &(0x7f0000001c80)=[{&(0x7f0000001bc0)=""/156, 0x9c}], 0x1, &(0x7f0000001d80)=[{&(0x7f0000001cc0)=""/116, 0x20001c34}], 0x1, 0x0) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000100)=ANY=[@ANYBLOB="e4050000160001000000000000000000e0000001000000000006000000000000fe88000000000000000000000000000100000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x5e4}}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYRESHEX=r5, @ANYRESHEX=r2, @ANYRESHEX=r3, @ANYRES8=r4, @ANYRES32, @ANYRES16=r6], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) time(0x0) r9 = semget$private(0x0, 0x4000000009, 0x0) semop(r9, &(0x7f0000000140)=[{0x0, 0xffff}], 0x1) semtimedop(r9, &(0x7f0000000000), 0x0, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtaction={0x18, 0x30, 0xffffffffffffffff, 0x70bd2b, 0xfffffffd, {}, [{0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 799.748435ms ago: executing program 4 (id=2649): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="180000000d14000328bd700004000000080001cad9528600"], 0x18}, 0x1, 0x0, 0x0, 0x10}, 0x0) fchdir(r0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) r3 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r3, &(0x7f0000000080)={0x1d, r2, 0x0, {0x0, 0x0, 0x4}}, 0x18) sendmsg$can_j1939(r3, &(0x7f00000001c0)={&(0x7f0000000040), 0x18, &(0x7f0000000180)={&(0x7f00000000c0)="92", 0x1a000}}, 0xee) sendmsg$can_j1939(r3, &(0x7f0000000a80)={&(0x7f0000000000)={0x1d, r2, 0x2, {0x0, 0xff, 0x2}, 0xff}, 0x18, &(0x7f0000000280)={0x0}}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'syztnl0\x00', &(0x7f0000000200)={'syztnl0\x00', 0x0, 0x4, 0x7, 0x7, 0x0, 0x41, @private2={0xfc, 0x2, '\x00', 0x1}, @private0, 0x7800, 0x700, 0xfffffffe, 0x7ff}}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = socket(0x400000000010, 0x3, 0x0) r8 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r7, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xfffffffd, {0x0, 0x0, 0x0, r9, {0x0, 0x1}, {0xffff, 0xffff}, {0xffe0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newtfilter={0x34, 0x2c, 0xf3f, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r9, {0xb, 0xfff3}, {}, {0x7, 0x300}}, [@filter_kind_options=@f_basic={{0xa}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x20041090}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000400)=0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000440)={'ip6gre0\x00', 0x0, 0x2f, 0x0, 0x0, 0xfffff001, 0x21, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast1, 0x700, 0x40, 0x5, 0x6}}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000540)={'batadv_slave_1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000005c0)={'batadv0\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0}, &(0x7f0000000640)=0x14) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000700)={'gre0\x00', &(0x7f0000000680)={'syztnl2\x00', 0x0, 0x1, 0x7, 0x0, 0xa3bf, {{0xa, 0x4, 0x1, 0x39, 0x28, 0x67, 0x0, 0x6, 0x4, 0x0, @multicast1, @empty, {[@end, @timestamp={0x44, 0x10, 0xb4, 0x0, 0x6, [0x7, 0x3, 0x3]}]}}}}}) r17 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r17, 0x8933, &(0x7f0000000340)={'hsr0\x00', 0x0}) sendmsg$nl_route_sched(r17, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x1, 0x2000000, 0x0, {0x0, 0x0, 0x0, r18, {}, {}, {0xfff3}}}, 0x24}}, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000740)=0x0, &(0x7f0000000780)=0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000007c0)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000a00)={&(0x7f0000000800)=ANY=[@ANYBLOB="ec010000", @ANYRES16=0x0, @ANYBLOB="00032abd7000fddbdf25040000005000018008000100", @ANYRES32=0x0, @ANYBLOB="14000200677265300000000000000000000000000800030001000000080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="380001801400020076657468315f746f5f6873720000000008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="08000300010000003c00018008000100", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f7465616d00000008000100", @ANYRES32=r9, @ANYBLOB="1400020070696d726567300000000000000000f90b00018008000100", @ANYRES32=r19, @ANYBLOB="180001801400020076657468305f766c616e0000000000004800018008000100", @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="08000300010000001400020064756d6d79300000000000000000000008000100", @ANYRES32=r13, @ANYBLOB="08000100", @ANYRES32=r14, @ANYBLOB="480001801400020076657468305f6d61637674617000000008000100", @ANYRES32=r15, @ANYBLOB="080003000300000008000300060000000800030002000000080003000200000008000300000000000c00018008000100", @ANYRES32=r16, @ANYBLOB="5400018008000100", @ANYRES32=r18, @ANYBLOB="140002007465616d5f736c6176655f300000000008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=r19, @ANYBLOB="08000100", @ANYRES32=r20, @ANYBLOB="1400020070696d36726567300000000000000000"], 0x1ec}, 0x1, 0x0, 0x0, 0x80}, 0x0) 329.982203ms ago: executing program 2 (id=2650): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x8, &(0x7f0000000080)={[{@sb={'sb', 0x3d, 0x1}}, {@nodioread_nolock}]}, 0x4, 0x530, &(0x7f0000001e00)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file1\x00', 0x1c4) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000200100000102000028"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x6, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) rmdir(&(0x7f0000000a40)='./file0\x00') 311.067595ms ago: executing program 4 (id=2651): r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x1ff, 0x2) r1 = dup(r0) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000440)={0x80, 0x6, 0xf00, 0x1, 0x0, 0x5, 0x0}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0000000206030000000000008000000000000005000100070000000900020073797a30000000001400078008001240000000000500150004000000050005000000000005000400000000000d000300686173683a6d61"], 0x5c}}, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x110e22fff6) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x4004743d, 0x110e22fff6) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0xd, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b70800000000001e23acb9ff00000000b708000000008b9e36274e99525f000000000007010000f8ff3ee5bfa400000000000007040000f0ffffffffb000000800000018c8e30a6700000000", @ANYRES32=r5, @ANYRES64=r5], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x7, 0x10, &(0x7f00000004c0)=ANY=[@ANYRESDEC=r7, @ANYRES64=0x0, @ANYRES16=r0, @ANYRESDEC, @ANYRESOCT, @ANYRES8=r6, @ANYRES32], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x37, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r8}, 0x10) write$cgroup_type(r4, &(0x7f0000000280), 0xfffffeed) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x4, &(0x7f0000000300)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001380)={0xffffffffffffffff, &(0x7f00000004c0)}, 0x20) 220.050892ms ago: executing program 4 (id=2652): r0 = epoll_create1(0x0) r1 = socket$unix(0x1, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0x3000000c}) r2 = syz_io_uring_setup(0x9eb, &(0x7f0000000140)={0x0, 0xfad6}, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r2, 0xdb4, 0x0, 0x0, 0x0, 0x0) (fail_nth: 10) 214.923923ms ago: executing program 3 (id=2653): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70208000000b7030000000000002d000000000000000090e4961b7cdaef777b293b2bd5141d7cec1276cbf6320e049ebd0628909e67432ab7d55ede81ffd0b231f9bbc5167841ebb8600dcf7d27a4ed8f306118dc870b055da5d3861f5db60ab5fac1cf8931092f5d72d58c10060c601ddf43e1790e67657f9cea0b528ec57e7916bb64b2e3f9b8649d4dc7722e39aa7a70dad8189030576432618ff749423bd436634df69e6fbd8693"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x6b, 0x11, 0x20}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x5}, @exit={0x95, 0x0, 0x33}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb8000000}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) r1 = syz_io_uring_setup(0x499, &(0x7f0000000140)={0x0, 0xa064, 0x3180, 0x2, 0x25c}, &(0x7f0000000080)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f00000000c0)=0xffb, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_TIMEOUT={0xb, 0x11, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x1, 0x40, 0x1}) io_uring_enter(r1, 0x628, 0xc88d, 0x43, 0x0, 0x0) 201.613723ms ago: executing program 4 (id=2654): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000600)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207a2500000000002020a07b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4f, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x94) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x0, 0xee01}}, './file0\x00'}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r3 = openat$cgroup_ro(r1, &(0x7f00000003c0)='memory.swap.current\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x89b1, &(0x7f0000000900)={'bond0\x00', @random="0600002000"}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r3, 0x89f8, &(0x7f0000001040)={'ip_vti0\x00', &(0x7f0000000f80)={'syztnl0\x00', 0x0, 0x40, 0x10, 0x5, 0x1, {{0x24, 0x4, 0x3, 0x2e, 0x90, 0x67, 0x0, 0x3, 0x29, 0x0, @rand_addr=0x64010101, @multicast1, {[@noop, @noop, @timestamp_prespec={0x44, 0x4c, 0x2c, 0x3, 0x5, [{@remote}, {@loopback, 0xfffff82b}, {@dev={0xac, 0x14, 0x14, 0x31}, 0xffffb68a}, {@local, 0x5ff68d34}, {@broadcast, 0x10}, {@private=0xa010101, 0x2}, {@dev={0xac, 0x14, 0x14, 0x15}, 0x2}, {@local, 0x1}, {@local, 0x3}]}, @generic={0x44, 0x12, "7c31a89f2c06fd4eeb4d515df7f75e17"}, @timestamp_prespec={0x44, 0xc, 0xd, 0x3, 0x1, [{@multicast1, 0x3}]}, @end, @noop, @rr={0x7, 0xb, 0x48, [@broadcast, @multicast1]}]}}}}}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000f40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r5, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000400)='mm_migrate_pages\x00', r6, 0x0, 0x5}, 0x18) mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) pread64(r1, &(0x7f0000000440)=""/185, 0xb9, 0x9) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x11, &(0x7f0000000240)={[{@nombcache}, {@debug}, {@norecovery}, {@grpid}, {@nodelalloc}]}, 0x9, 0x61b, &(0x7f0000000800)="$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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r0}, 0x18) sendmsg$inet6(r1, &(0x7f0000000340)={&(0x7f0000000300)={0xa, 0x4e23, 0x5, @remote, 0x40}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000000500)="8d5329716d34ff0475f0b75a6747ce944f3b1fe194fb6be0db67aa9b94931c8560335ae9e7fda3723bb588f584899050ece5113ac0215d1853c0b8d5835a40a64bb53f88cebf06a7145095d76902cc1ad4d31aba977ee0237339", 0x5a}, {&(0x7f0000000680)="66aa13669a078644696052720e08f0540d92b4ad82e238a3530c588db287f70df3ce581f1ba767d291c2923b742d7cb59484a282063862232fd34d126e5d89881ad863d54ba8a5a2d3e6fdc9bbc1e07325799511a4dd6ecc360ddfa7bbedd9ed92c5e137b3e8fa0f21f71989d346352f3887f7b721642cd7888fda24f1d53f0b6c52718cd98efad2f2f81a3870c3c6ecd728835eb7f3268c53e11502114dc0036d01462ecaf2083fad83ba8ee509817f09943c5c6075b45c41a27d", 0xbb}, {&(0x7f0000000740)="5e3bf1ef0c8a4ad0a874721c3bd26cf8ea820af98be30d381d9e580af29c4ef5cdd23a8d0e772880eeb4c1a567a83fec48cc5a80cad7ffa2af4ed07707dfe37455914428fd854fe4270c7f9992f65ae0ebe3259cce0a7155d25eb87bf6acb39160a87157a25bc8888e8c4caecba96070be97a10e6c3973f0c0ce7b3733668d463eb8cc122e9328a1f567ac46e10e520bececd65900f26bcec45f14ee7a1b5465f1d3fed983209d581ddb337377fd1829fee373a66df2052e4e87a71cb4e9e2ecab68261f16b6f594fe58a08c04ac5a8ee3e25531ba7f65add10793586e51e5ce30a38a0493e9", 0xe6}, {&(0x7f0000000840)="336d66f1a560c1aac086e0f1421e4ab62abd836c8b3dd0b58f5aaca9641c150f1020e266d9b5abeede96bb73afbb0343154f518638756164fb3840033dbdbdaace939c5fb246e2452f65b10ebb7d0afeac69370e91fe28848d2db40e1d007010e44dd4ecf7963edc9c60d97839a4307923786075faa0f6747f00aafc01645b3cd0022bb6ac35a816e939c243876c0249b0ea65028b6236f319d7475a2178fcbf7fd4234c84fc65b04184e7e602aee339", 0xb0}, {&(0x7f0000000900)="b91b6e1ac75397eabf9afaf2132dbf6660892444b9ff66b2860503d5fb70e88c012a850f37f1b1cbc588996d00df4a395728175fa140ecc9a11cef57b82d2ced9f7209e417febbb90705280a50a4ee91212912c541551c201637c662dde7414c0ead933aae3d856718a52b1859d821d60d3fd17200ee165163cbc849ec989ffa0657aff5b75a3007474d3eb5d6360d6a89f6fc3b4e3c24bc9fbb30e44afdafa89e710006e5b231acdfd8ad864aac2f23c5f49a7fa88e216a116e93b4cc5187cb7341def579ce8b6c64c2094ca4eb3fb3", 0xd0}, {&(0x7f0000000a00)="8b787e788b8e093982f995daf4c804a1027b5077473a6b075ab70a55510d4178ab024d9aa21f59c4284a8ff6dc022ff951f6f469826c35e6d6f0b90ddac714fb5afeecef65f531f0cc51cba9b513141a84ec2b56080e4f8e9162481eb435619a43a7d8001e0439795a3c7c177ea0e46e56186e531b5dcabee4bf65740dfcf17df5d0ee57bbac73d4ed6a649269ad758e04993f2fa040b38fe43e105bb84926d7911d21e3f3591ed379a000f4d5c0f02b7dda260e2c08595fc7a18d25a4a660e593d70c8cea87acfa0fbc698e7bbb6fc42cded940b7a593cce018b764a14eff32aac76c9222effe2264b0072f9bae02c4500f02", 0xf3}, {&(0x7f0000000b00)="2d84a2c5ed33eda428edccd31089ff1b1fc54d62f43dc6eca7435886b1bf7cc84bc7e4508c313aa60ee6e732e1018502b8760607204264e20c6afc383002a8c020c9d40d9764e3d4996ed5ed56cee1bb106660f9681982d4680b70d9fe97eb67598c2c9c53f65f6248bc306e25ee9a907a51d7424cad204098988e5d7f205b407d3538d911a063039c4a1e979c553a1d0cadf85806352e286b0c454868d91656a665e71b29cbf2f2d1b9480300f2b6a643888b54269c5ce3ce360e83cfeda97bf38cd459eb394cfdd84fccbdc7f0", 0xce}], 0x7, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], 0x70}, 0x40) socket$inet(0x2, 0x2, 0x1) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00'}, 0x10) quotactl$Q_QUOTAOFF(0xffffffff80000302, &(0x7f0000000080)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) 119.97241ms ago: executing program 3 (id=2655): pipe2$9p(&(0x7f0000000000), 0x84000) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000040)={0x8, 0xff}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000180)={0x4, 0x80, 0x9, 0x6, 0x7, 0x6, 0x0, 0x6, 0xa08, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x20, 0xb, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x1, 0xb, 0x6, 0x8000000000000001, 0x10001, 0x9, 0x0, 0xffffff51, 0x0, 0x7}) 119.64301ms ago: executing program 3 (id=2656): syz_open_dev$usbfs(0x0, 0x76, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa10000", @ANYRES32, @ANYBLOB], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x18) syz_io_uring_setup(0x16d2, 0x0, &(0x7f0000000200), &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) mq_getsetattr(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r3}, 0x10) r4 = mq_open(&(0x7f0000000a00)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xd3\xa7\xd8J\xfd\x94#KT\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\x88N\xb8\xde\xeb)\xcd\xc56m\n\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88|0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc\x02\xea\x91\xe8\xd8\x01YZy\xe6!\x89\x9c\xd1\xa6\x167\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1[\x84\x10aF\x9b\xda\xeb\xc4*\x02q\xb2\x92\x00\x8cv\xac AN\xb9\xaa\x81W\x97Te\x81\x98L\xfe\x97+u\xd3^\xb1\xf0\xe0\x1f\xbd\a\xbb\xe5\x18\x9ds\x12ha\x00\xeb\x84\x99\xc6\x0f\xf1\xd5LD\xa87\xa0DQ\x8a2\x16!8,\xbc%$\xf1\xf2\xd6\x9cy\xecK\xda\xc5\xdc\xfa\xdd\xf6\b\xc6\xb4\x14\x16\x9c\x7f\x92\x85\xb0\xa2%:\xf0\xf4\x150\x0f\xb4\xa6d\xb4\xe4L\x19W\xd5\x90\xf7l\x1b\xfe\xde\vh\x97=m\x82.\xac\vh\xfe\x84Q}\x838/\x83\xebP\xbe\xd6+:\xceE\\\x95\xd4\xac\x92\x87\xd7\x98\x97\xe3\xec\xad\xd5\xac\x80C\x84R\x88r^g\xbaQ(\x9a>\xe2\xba\xa8=\x17\f04\x8f\x1f\xf2\x88*@v\xe7\xd1\xee\xb3\xc2\x8dT\xda\x81g\xd9\x1a:hzW6s)x\x06\xae\x11\xf2\x1e\xcd\v\xe5L\x19\x96s\xbc\x9e\xf4\x10$\r\xa4\xd8\xa2\xa2\xfcM\xc5R3~$\xc0\xa5n\x9a W\xb1e\xcc<$\xf5#G\xce\xaf\x88U\xfa\x80\xf24\xf6\xb5\xef\xe2z\xcf\x9eN\x92\xac\x81{\xe6\xbd\xd7\x16\xe6F\xe2\x9e\x91%\x94\v\xb9\xdc\xd6\x87\x8f\xcd\xc1\xb05\x81\x81\xf8\xe9X\xe8Kt9@\xf4\xe1\xa6=\xc9\xe1:p4\nP[f\x1d\xfd\xfa\x839\x8d\x0e\xd1\xf9\xa0\xd2^E\xe5\xedo.\xaa\xf2\xb4\xcdn\x14\f\xcd\x83_yk\xda\xc5\x89\xf0Z\xea\x1d\xbd\xc00\v\xa3\xb3\xbe\xe6\x8b\x18/\xa8\xaaY\xf2\x89\x0f\x9enOOr\x00\xb2\x01\x1f:Z\xb8\xee;\xe3;\x8aPV\xce\xee\xf8[\x16\n\xe6:z\xb8\x1dvk\a{\xc1\x14\xd9+\xdb\t\x11\x90y\xe8\\\xe6\xfc\xca\xb4\xcbC\xd6\xd0\xbeC\xce\xc0L\xdb\xcd\xb3\x907c\xb4\xa6\xce\xdb[\xce\x122N\xa3\xc7Q<\x1a\xa5\xb3)\xc5\x98\x84\x8a\x82\x19\xb0\t\xac\x10\\\x8c\xbe\xcb\raIYe[\xa8\xc4\xac\x0e\xbb\x0f\b^\xdag\xe2\xa9\"\xf5h\'\xcf\xd9\x1b\xef\xe3\xe7y\x82\x1e\xca\x7f\x02 \xcf\x9e\xe0\xd9TM\xb9\n\xa9\xad3\x91\xa5\xe6!\xcd\xa2\xa4\x14\x12\xf9\xbf\xa8b\xcec:\xd7\'\f\f\x957\xc9}\r\xa6\xaa\x0f\xca\x96\xeb\x00\x00\x00\x00\x00', 0x42, 0x1f0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r4, 0x0, 0x0, 0x0, 0x0) mq_unlink(&(0x7f0000000000)='eth0\x00') close(r4) 113.711711ms ago: executing program 2 (id=2657): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x6, 0x4, 0x8, 0xc}, 0x50) ioctl$USBDEVFS_FORBID_SUSPEND(0xffffffffffffffff, 0x5521) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000bf080000000000007b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x6, 0x4, 0x8, 0xc}, 0x50) (async) ioctl$USBDEVFS_FORBID_SUSPEND(0xffffffffffffffff, 0x5521) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000bf080000000000007b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) 50.323786ms ago: executing program 3 (id=2658): r0 = socket$netlink(0x10, 0x3, 0x10) r1 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000)=0x80, 0x4) r3 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000840)={0x58, r3, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [{{0x8, 0x1, r4}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffbfff9}}}]}}]}, 0x58}, 0x1, 0x1000000, 0x0, 0x24004000}, 0x24040840) (fail_nth: 7) 0s ago: executing program 2 (id=2659): r0 = epoll_create(0x3ff) r1 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0xa0000000}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=@delneigh={0x24, 0x1a, 0x401, 0x0, 0xfffffffc, {0x1c, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4}, [@NDA_DST_IPV4={0x8, 0x1, @rand_addr=0x640100fd}]}, 0x24}}, 0x20040800) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000280)={0x2000000}) kernel console output (not intermixed with test programs): et pid=7856 comm=syz.1.1699 [ 111.295975][ T7867] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 111.490369][ T7885] netlink: 'syz.3.1713': attribute type 10 has an invalid length. [ 112.048548][ T7896] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1717'. [ 112.085967][ T7899] netlink: 24 bytes leftover after parsing attributes in process `syz.3.1718'. [ 112.234105][ T7907] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 112.247794][ T7904] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=7904 comm=syz.3.1718 [ 112.397310][ T7915] netlink: 'syz.0.1724': attribute type 10 has an invalid length. [ 112.685899][ T29] kauditd_printk_skb: 14804 callbacks suppressed [ 112.685968][ T29] audit: type=1400 audit(1755825082.222:226805): avc: denied { map_create } for pid=7933 comm="syz.1.1731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 112.706544][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 112.711958][ T29] audit: type=1400 audit(1755825082.222:226806): avc: denied { prog_load } for pid=7933 comm="syz.1.1731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 112.718541][ T3030] audit: audit_lost=33895 audit_rate_limit=0 audit_backlog_limit=64 [ 112.742016][ T29] audit: type=1400 audit(1755825082.222:226807): avc: denied { create } for pid=7933 comm="syz.1.1731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 112.742042][ T29] audit: type=1400 audit(1755825082.222:226808): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 112.768575][ T7936] audit: audit_backlog=65 > audit_backlog_limit=64 [ 112.770287][ T3030] audit: backlog limit exceeded [ 112.791470][ T7936] audit: audit_lost=33896 audit_rate_limit=0 audit_backlog_limit=64 [ 112.791488][ T7936] audit: backlog limit exceeded [ 112.835771][ T7940] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 112.876435][ T7945] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 112.884189][ T7944] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1736'. [ 112.948460][ T7944] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=7944 comm=syz.0.1736 [ 112.982082][ T7951] netlink: 'syz.1.1737': attribute type 10 has an invalid length. [ 113.743928][ T7982] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 113.864189][ T7988] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1749'. [ 113.902627][ T7992] FAULT_INJECTION: forcing a failure. [ 113.902627][ T7992] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 113.914065][ T7994] netlink: 'syz.4.1752': attribute type 10 has an invalid length. [ 113.916096][ T7992] CPU: 1 UID: 0 PID: 7992 Comm: syz.3.1751 Not tainted syzkaller #0 PREEMPT(voluntary) [ 113.916172][ T7992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 113.916184][ T7992] Call Trace: [ 113.916191][ T7992] [ 113.916198][ T7992] __dump_stack+0x1d/0x30 [ 113.916219][ T7992] dump_stack_lvl+0xe8/0x140 [ 113.916237][ T7992] dump_stack+0x15/0x1b [ 113.916327][ T7992] should_fail_ex+0x265/0x280 [ 113.916347][ T7992] should_fail+0xb/0x20 [ 113.916364][ T7992] should_fail_usercopy+0x1a/0x20 [ 113.916386][ T7992] _copy_to_user+0x20/0xa0 [ 113.916427][ T7992] simple_read_from_buffer+0xb5/0x130 [ 113.916449][ T7992] proc_fail_nth_read+0x10e/0x150 [ 113.916474][ T7992] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 113.916562][ T7992] vfs_read+0x1a8/0x770 [ 113.916599][ T7992] ? __rcu_read_unlock+0x4f/0x70 [ 113.916620][ T7992] ? __fget_files+0x184/0x1c0 [ 113.916696][ T7992] ? finish_task_switch+0xad/0x2b0 [ 113.916770][ T7992] ksys_read+0xda/0x1a0 [ 113.916791][ T7992] __x64_sys_read+0x40/0x50 [ 113.916920][ T7992] x64_sys_call+0x27bc/0x2ff0 [ 113.916956][ T7992] do_syscall_64+0xd2/0x200 [ 113.916981][ T7992] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 113.917004][ T7992] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 113.917068][ T7992] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 113.917153][ T7992] RIP: 0033:0x7fa15010d5fc [ 113.917223][ T7992] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 113.917241][ T7992] RSP: 002b:00007fa14eb6f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 113.917304][ T7992] RAX: ffffffffffffffda RBX: 00007fa150335fa0 RCX: 00007fa15010d5fc [ 113.917317][ T7992] RDX: 000000000000000f RSI: 00007fa14eb6f0a0 RDI: 0000000000000003 [ 113.917329][ T7992] RBP: 00007fa14eb6f090 R08: 0000000000000000 R09: 0000000000000000 [ 113.917342][ T7992] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 113.917354][ T7992] R13: 00007fa150336038 R14: 00007fa150335fa0 R15: 00007fff04aa9288 [ 113.917372][ T7992] [ 114.175698][ T7995] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=7995 comm=syz.0.1749 [ 114.374281][ T8014] FAULT_INJECTION: forcing a failure. [ 114.374281][ T8014] name failslab, interval 1, probability 0, space 0, times 0 [ 114.387071][ T8014] CPU: 1 UID: 0 PID: 8014 Comm: syz.0.1758 Not tainted syzkaller #0 PREEMPT(voluntary) [ 114.387099][ T8014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 114.387110][ T8014] Call Trace: [ 114.387155][ T8014] [ 114.387162][ T8014] __dump_stack+0x1d/0x30 [ 114.387180][ T8014] dump_stack_lvl+0xe8/0x140 [ 114.387196][ T8014] dump_stack+0x15/0x1b [ 114.387213][ T8014] should_fail_ex+0x265/0x280 [ 114.387234][ T8014] should_failslab+0x8c/0xb0 [ 114.387317][ T8014] kmem_cache_alloc_noprof+0x50/0x310 [ 114.387338][ T8014] ? audit_log_start+0x365/0x6c0 [ 114.387362][ T8014] audit_log_start+0x365/0x6c0 [ 114.387391][ T8014] audit_seccomp+0x48/0x100 [ 114.387535][ T8014] ? __seccomp_filter+0x68c/0x10d0 [ 114.387554][ T8014] __seccomp_filter+0x69d/0x10d0 [ 114.387576][ T8014] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 114.387602][ T8014] ? __rcu_read_unlock+0x4f/0x70 [ 114.387623][ T8014] ? __fget_files+0x184/0x1c0 [ 114.387714][ T8014] __secure_computing+0x82/0x150 [ 114.387735][ T8014] syscall_trace_enter+0xcf/0x1e0 [ 114.387759][ T8014] do_syscall_64+0xac/0x200 [ 114.387809][ T8014] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 114.387839][ T8014] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 114.387859][ T8014] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 114.387878][ T8014] RIP: 0033:0x7ff79624d5fc [ 114.387957][ T8014] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 114.387971][ T8014] RSP: 002b:00007ff794cb7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 114.387988][ T8014] RAX: ffffffffffffffda RBX: 00007ff796475fa0 RCX: 00007ff79624d5fc [ 114.388002][ T8014] RDX: 000000000000000f RSI: 00007ff794cb70a0 RDI: 0000000000000003 [ 114.388014][ T8014] RBP: 00007ff794cb7090 R08: 0000000000000000 R09: 0000000000000000 [ 114.388026][ T8014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 114.388038][ T8014] R13: 00007ff796476038 R14: 00007ff796475fa0 R15: 00007ffde8901b68 [ 114.388063][ T8014] [ 114.389133][ T8015] C: renamed from team_slave_0 (while UP) [ 114.633685][ T8015] netlink: 136 bytes leftover after parsing attributes in process `syz.4.1759'. [ 114.647446][ T8022] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 114.665466][ T8019] netlink: 136 bytes leftover after parsing attributes in process `syz.4.1759'. [ 114.723304][ T8032] netlink: 'syz.4.1766': attribute type 10 has an invalid length. [ 114.951615][ T8042] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1769'. [ 115.161589][ T8042] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=8042 comm=syz.4.1769 [ 115.323139][ T8055] netlink: 36 bytes leftover after parsing attributes in process `syz.4.1774'. [ 115.401132][ T8062] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 115.438157][ T8065] FAULT_INJECTION: forcing a failure. [ 115.438157][ T8065] name failslab, interval 1, probability 0, space 0, times 0 [ 115.450999][ T8065] CPU: 1 UID: 0 PID: 8065 Comm: syz.1.1777 Not tainted syzkaller #0 PREEMPT(voluntary) [ 115.451031][ T8065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 115.451043][ T8065] Call Trace: [ 115.451113][ T8065] [ 115.451120][ T8065] __dump_stack+0x1d/0x30 [ 115.451138][ T8065] dump_stack_lvl+0xe8/0x140 [ 115.451155][ T8065] dump_stack+0x15/0x1b [ 115.451225][ T8065] should_fail_ex+0x265/0x280 [ 115.451258][ T8065] should_failslab+0x8c/0xb0 [ 115.451280][ T8065] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 115.451343][ T8065] ? sidtab_sid2str_get+0xa0/0x130 [ 115.451366][ T8065] kmemdup_noprof+0x2b/0x70 [ 115.451415][ T8065] sidtab_sid2str_get+0xa0/0x130 [ 115.451437][ T8065] security_sid_to_context_core+0x1eb/0x2e0 [ 115.451459][ T8065] security_sid_to_context+0x27/0x40 [ 115.451566][ T8065] selinux_lsmprop_to_secctx+0x67/0xf0 [ 115.451589][ T8065] security_lsmprop_to_secctx+0x43/0x80 [ 115.451614][ T8065] audit_log_task_context+0x77/0x190 [ 115.451643][ T8065] audit_log_task+0xf4/0x250 [ 115.451666][ T8065] audit_seccomp+0x61/0x100 [ 115.451695][ T8065] ? __seccomp_filter+0x68c/0x10d0 [ 115.451716][ T8065] __seccomp_filter+0x69d/0x10d0 [ 115.451737][ T8065] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 115.451760][ T8065] ? vfs_write+0x7e8/0x960 [ 115.451780][ T8065] ? __rcu_read_unlock+0x4f/0x70 [ 115.451861][ T8065] ? __fget_files+0x184/0x1c0 [ 115.451891][ T8065] __secure_computing+0x82/0x150 [ 115.451965][ T8065] syscall_trace_enter+0xcf/0x1e0 [ 115.451988][ T8065] do_syscall_64+0xac/0x200 [ 115.452012][ T8065] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 115.452034][ T8065] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 115.452134][ T8065] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.452154][ T8065] RIP: 0033:0x7f648187d5fc [ 115.452169][ T8065] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 115.452184][ T8065] RSP: 002b:00007f64802df030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 115.452273][ T8065] RAX: ffffffffffffffda RBX: 00007f6481aa5fa0 RCX: 00007f648187d5fc [ 115.452286][ T8065] RDX: 000000000000000f RSI: 00007f64802df0a0 RDI: 0000000000000003 [ 115.452298][ T8065] RBP: 00007f64802df090 R08: 0000000000000000 R09: 0000000000000000 [ 115.452309][ T8065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.452320][ T8065] R13: 00007f6481aa6038 R14: 00007f6481aa5fa0 R15: 00007fff45cd2e78 [ 115.452335][ T8065] [ 115.845201][ T8080] netlink: 'syz.2.1779': attribute type 10 has an invalid length. [ 115.933743][ T8084] netlink: 24 bytes leftover after parsing attributes in process `syz.2.1785'. [ 116.019343][ T8084] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=8084 comm=syz.2.1785 [ 116.357358][ T8104] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 116.479149][ T8106] bond1: entered promiscuous mode [ 116.484258][ T8106] bond1: entered allmulticast mode [ 116.520755][ T8106] 8021q: adding VLAN 0 to HW filter on device bond1 [ 116.599487][ T8106] bond1 (unregistering): Released all slaves [ 116.632209][ T8113] netlink: 'syz.0.1795': attribute type 10 has an invalid length. [ 116.651418][ T8115] netlink: 180 bytes leftover after parsing attributes in process `syz.4.1796'. [ 116.793482][ T8121] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=8121 comm=syz.4.1798 [ 116.859313][ T8129] bridge1: entered promiscuous mode [ 116.864745][ T8129] bridge1: entered allmulticast mode [ 116.896192][ T8132] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 117.008530][ T8144] netlink: 'syz.4.1809': attribute type 10 has an invalid length. [ 117.022177][ T8142] netlink: 'syz.0.1808': attribute type 29 has an invalid length. [ 117.128042][ T8149] FAULT_INJECTION: forcing a failure. [ 117.128042][ T8149] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 117.141283][ T8149] CPU: 1 UID: 0 PID: 8149 Comm: syz.0.1811 Not tainted syzkaller #0 PREEMPT(voluntary) [ 117.141379][ T8149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 117.141390][ T8149] Call Trace: [ 117.141397][ T8149] [ 117.141415][ T8149] __dump_stack+0x1d/0x30 [ 117.141436][ T8149] dump_stack_lvl+0xe8/0x140 [ 117.141455][ T8149] dump_stack+0x15/0x1b [ 117.141473][ T8149] should_fail_ex+0x265/0x280 [ 117.141510][ T8149] should_fail+0xb/0x20 [ 117.141536][ T8149] should_fail_usercopy+0x1a/0x20 [ 117.141554][ T8149] _copy_to_user+0x20/0xa0 [ 117.141585][ T8149] simple_read_from_buffer+0xb5/0x130 [ 117.141608][ T8149] proc_fail_nth_read+0x10e/0x150 [ 117.141634][ T8149] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 117.141717][ T8149] vfs_read+0x1a8/0x770 [ 117.141737][ T8149] ? __rcu_read_unlock+0x4f/0x70 [ 117.141754][ T8149] ? __fget_files+0x184/0x1c0 [ 117.141777][ T8149] ksys_read+0xda/0x1a0 [ 117.141795][ T8149] __x64_sys_read+0x40/0x50 [ 117.141812][ T8149] x64_sys_call+0x27bc/0x2ff0 [ 117.141830][ T8149] do_syscall_64+0xd2/0x200 [ 117.141855][ T8149] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 117.141913][ T8149] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 117.141937][ T8149] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 117.141955][ T8149] RIP: 0033:0x7ff79624d5fc [ 117.142052][ T8149] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 117.142102][ T8149] RSP: 002b:00007ff794cb7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 117.142179][ T8149] RAX: ffffffffffffffda RBX: 00007ff796475fa0 RCX: 00007ff79624d5fc [ 117.142191][ T8149] RDX: 000000000000000f RSI: 00007ff794cb70a0 RDI: 0000000000000003 [ 117.142250][ T8149] RBP: 00007ff794cb7090 R08: 0000000000000000 R09: 0000000000000000 [ 117.142262][ T8149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 117.142294][ T8149] R13: 00007ff796476038 R14: 00007ff796475fa0 R15: 00007ffde8901b68 [ 117.142308][ T8149] [ 117.396344][ T8153] netlink: 'syz.4.1814': attribute type 1 has an invalid length. [ 117.410939][ T8157] __nla_validate_parse: 4 callbacks suppressed [ 117.410953][ T8157] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1815'. [ 117.483136][ T8153] 8021q: adding VLAN 0 to HW filter on device bond1 [ 117.501688][ T8162] netlink: 'syz.2.1816': attribute type 21 has an invalid length. [ 117.504056][ T8153] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1814'. [ 117.555894][ T8160] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 117.582321][ T8163] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=8163 comm=syz.0.1815 [ 117.616691][ T8166] netlink: 'syz.2.1816': attribute type 21 has an invalid length. [ 117.624718][ T8166] netlink: 6 bytes leftover after parsing attributes in process `syz.2.1816'. [ 117.643420][ T8153] bond1: (slave veth15): Enslaving as an active interface with a down link [ 117.693381][ T8165] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 117.701465][ T29] kauditd_printk_skb: 21945 callbacks suppressed [ 117.701477][ T29] audit: type=1400 audit(1755825087.232:238914): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.775145][ T29] audit: type=1400 audit(1755825087.262:238915): avc: denied { prog_load } for pid=8171 comm="syz.0.1819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 117.794962][ T29] audit: type=1400 audit(1755825087.262:238916): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.817508][ T29] audit: type=1400 audit(1755825087.262:238917): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.839306][ T29] audit: type=1400 audit(1755825087.262:238918): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.860953][ T29] audit: type=1400 audit(1755825087.262:238919): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.882269][ T29] audit: type=1400 audit(1755825087.262:238920): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.903776][ T29] audit: type=1400 audit(1755825087.262:238921): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.925101][ T29] audit: type=1400 audit(1755825087.262:238922): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 117.927183][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 117.971230][ T8165] bond1: (slave batadv1): making interface the new active one [ 117.984850][ T8165] batadv1: entered promiscuous mode [ 117.990816][ T8165] bond1: (slave batadv1): Enslaving as an active interface with an up link [ 117.999793][ T8162] netlink: 156 bytes leftover after parsing attributes in process `syz.2.1816'. [ 118.247807][ T8203] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1829'. [ 118.463826][ T8203] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=8203 comm=syz.0.1829 [ 119.016181][ T8235] netlink: 20 bytes leftover after parsing attributes in process `syz.3.1840'. [ 119.118830][ T8240] FAULT_INJECTION: forcing a failure. [ 119.118830][ T8240] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 119.132026][ T8240] CPU: 1 UID: 0 PID: 8240 Comm: syz.3.1842 Not tainted syzkaller #0 PREEMPT(voluntary) [ 119.132053][ T8240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 119.132066][ T8240] Call Trace: [ 119.132072][ T8240] [ 119.132081][ T8240] __dump_stack+0x1d/0x30 [ 119.132109][ T8240] dump_stack_lvl+0xe8/0x140 [ 119.132125][ T8240] dump_stack+0x15/0x1b [ 119.132142][ T8240] should_fail_ex+0x265/0x280 [ 119.132163][ T8240] should_fail+0xb/0x20 [ 119.132181][ T8240] should_fail_usercopy+0x1a/0x20 [ 119.132203][ T8240] _copy_to_user+0x20/0xa0 [ 119.132243][ T8240] __se_sys_newuname+0x91/0x270 [ 119.132299][ T8240] ? __secure_computing+0x82/0x150 [ 119.132323][ T8240] __x64_sys_newuname+0x1f/0x30 [ 119.132346][ T8240] x64_sys_call+0x295e/0x2ff0 [ 119.132365][ T8240] do_syscall_64+0xd2/0x200 [ 119.132400][ T8240] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 119.132426][ T8240] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 119.132450][ T8240] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 119.132511][ T8240] RIP: 0033:0x7fa15010ebe9 [ 119.132526][ T8240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 119.132543][ T8240] RSP: 002b:00007fa14eb6f038 EFLAGS: 00000246 ORIG_RAX: 000000000000003f [ 119.132608][ T8240] RAX: ffffffffffffffda RBX: 00007fa150335fa0 RCX: 00007fa15010ebe9 [ 119.132622][ T8240] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 119.132702][ T8240] RBP: 00007fa14eb6f090 R08: 0000000000000000 R09: 0000000000000000 [ 119.132714][ T8240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 119.132726][ T8240] R13: 00007fa150336038 R14: 00007fa150335fa0 R15: 00007fff04aa9288 [ 119.132818][ T8240] [ 119.415992][ T8244] netlink: 24 bytes leftover after parsing attributes in process `syz.2.1844'. [ 119.573315][ T8252] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=8252 comm=syz.2.1844 [ 119.687325][ T8250] bond0: (slave batadv0): Releasing backup interface [ 119.707901][ T8250] batadv0: left promiscuous mode [ 119.735708][ T8250] bridge_slave_0: left allmulticast mode [ 119.741389][ T8250] bridge_slave_0: left promiscuous mode [ 119.747186][ T8250] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.926454][ T8250] bridge_slave_1: left allmulticast mode [ 119.932185][ T8250] bridge_slave_1: left promiscuous mode [ 119.937945][ T8250] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.964914][ T8250] bond0: (slave bond_slave_0): Releasing backup interface [ 119.977540][ T8250] bond_slave_0: left promiscuous mode [ 119.990337][ T8250] bond0: (slave bond_slave_1): Releasing backup interface [ 120.018809][ T8250] bond_slave_1: left promiscuous mode [ 120.041795][ T8250] team0: Port device team_slave_0 removed [ 120.060157][ T8250] team0: Port device team_slave_1 removed [ 120.090613][ T8250] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 120.098147][ T8250] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 120.132688][ T8250] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 120.140415][ T8250] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 120.197829][ T8250] bond1: (slave bridge1): Releasing active interface [ 120.220292][ T8250] team0: Port device bridge2 removed [ 120.236083][ T8250] batman_adv: batadv0: Removing interface: gretap1 [ 120.367712][ T8274] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 120.434249][ T8278] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 120.625717][ T8287] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1858'. [ 120.739632][ T8293] FAULT_INJECTION: forcing a failure. [ 120.739632][ T8293] name failslab, interval 1, probability 0, space 0, times 0 [ 120.752916][ T8293] CPU: 1 UID: 0 PID: 8293 Comm: syz.1.1864 Not tainted syzkaller #0 PREEMPT(voluntary) [ 120.752939][ T8293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 120.753013][ T8293] Call Trace: [ 120.753049][ T8293] [ 120.753056][ T8293] __dump_stack+0x1d/0x30 [ 120.753078][ T8293] dump_stack_lvl+0xe8/0x140 [ 120.753097][ T8293] dump_stack+0x15/0x1b [ 120.753114][ T8293] should_fail_ex+0x265/0x280 [ 120.753136][ T8293] should_failslab+0x8c/0xb0 [ 120.753167][ T8293] __kmalloc_noprof+0xa5/0x3e0 [ 120.753268][ T8293] ? security_prepare_creds+0x52/0x120 [ 120.753354][ T8293] security_prepare_creds+0x52/0x120 [ 120.753375][ T8293] prepare_creds+0x34a/0x4c0 [ 120.753397][ T8293] copy_creds+0x8f/0x3f0 [ 120.753421][ T8293] copy_process+0x658/0x2000 [ 120.753477][ T8293] ? kstrtouint+0x76/0xc0 [ 120.753529][ T8293] ? __rcu_read_unlock+0x4f/0x70 [ 120.753552][ T8293] kernel_clone+0x16c/0x5c0 [ 120.753578][ T8293] ? vfs_write+0x7e8/0x960 [ 120.753611][ T8293] __x64_sys_clone+0xe6/0x120 [ 120.753703][ T8293] x64_sys_call+0x119c/0x2ff0 [ 120.753721][ T8293] do_syscall_64+0xd2/0x200 [ 120.753769][ T8293] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 120.753816][ T8293] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 120.753840][ T8293] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 120.753862][ T8293] RIP: 0033:0x7f648187ebe9 [ 120.753878][ T8293] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 120.753918][ T8293] RSP: 002b:00007f64802defe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 120.753938][ T8293] RAX: ffffffffffffffda RBX: 00007f6481aa5fa0 RCX: 00007f648187ebe9 [ 120.753952][ T8293] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 120.754017][ T8293] RBP: 00007f64802df090 R08: 0000000000000000 R09: 0000000000000000 [ 120.754030][ T8293] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 120.754043][ T8293] R13: 00007f6481aa6038 R14: 00007f6481aa5fa0 R15: 00007fff45cd2e78 [ 120.754062][ T8293] [ 121.100389][ T8306] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 121.922741][ T8337] netlink: 'syz.0.1879': attribute type 10 has an invalid length. [ 122.048682][ T8343] FAULT_INJECTION: forcing a failure. [ 122.048682][ T8343] name failslab, interval 1, probability 0, space 0, times 0 [ 122.061553][ T8343] CPU: 1 UID: 0 PID: 8343 Comm: +}[@ Not tainted syzkaller #0 PREEMPT(voluntary) [ 122.061575][ T8343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 122.061590][ T8343] Call Trace: [ 122.061598][ T8343] [ 122.061608][ T8343] __dump_stack+0x1d/0x30 [ 122.061668][ T8343] dump_stack_lvl+0xe8/0x140 [ 122.061684][ T8343] dump_stack+0x15/0x1b [ 122.061698][ T8343] should_fail_ex+0x265/0x280 [ 122.061715][ T8343] should_failslab+0x8c/0xb0 [ 122.061777][ T8343] kmem_cache_alloc_node_noprof+0x57/0x320 [ 122.061803][ T8343] ? __alloc_skb+0x101/0x320 [ 122.061831][ T8343] __alloc_skb+0x101/0x320 [ 122.061890][ T8343] ? audit_log_start+0x365/0x6c0 [ 122.061914][ T8343] audit_log_start+0x380/0x6c0 [ 122.062005][ T8343] ? should_fail_ex+0xdb/0x280 [ 122.062031][ T8343] audit_seccomp+0x48/0x100 [ 122.062058][ T8343] ? __seccomp_filter+0x68c/0x10d0 [ 122.062076][ T8343] __seccomp_filter+0x69d/0x10d0 [ 122.062206][ T8343] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 122.062238][ T8343] ? vfs_read+0x4e6/0x770 [ 122.062258][ T8343] __secure_computing+0x82/0x150 [ 122.062275][ T8343] syscall_trace_enter+0xcf/0x1e0 [ 122.062299][ T8343] do_syscall_64+0xac/0x200 [ 122.062340][ T8343] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 122.062365][ T8343] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 122.062387][ T8343] RIP: 0033:0x7ff79624d69f [ 122.062400][ T8343] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 122.062418][ T8343] RSP: 002b:00007ff794cb7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 122.062507][ T8343] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff79624d69f [ 122.062572][ T8343] RDX: 0000000000000001 RSI: 00007ff794cb70a0 RDI: 0000000000000005 [ 122.062584][ T8343] RBP: 00007ff794cb7090 R08: 0000000000000000 R09: 0000000000000000 [ 122.062596][ T8343] R10: 0000000000000001 R11: 0000000000000293 R12: 0000000000000002 [ 122.062609][ T8343] R13: 00007ff796476038 R14: 00007ff796475fa0 R15: 00007ffde8901b68 [ 122.062626][ T8343] [ 122.280872][ T8347] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1883'. [ 122.338810][ T8335] FAULT_INJECTION: forcing a failure. [ 122.338810][ T8335] name failslab, interval 1, probability 0, space 0, times 0 [ 122.352293][ T8335] CPU: 0 UID: 0 PID: 8335 Comm: syz.4.1878 Not tainted syzkaller #0 PREEMPT(voluntary) [ 122.352317][ T8335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 122.352328][ T8335] Call Trace: [ 122.352334][ T8335] [ 122.352343][ T8335] __dump_stack+0x1d/0x30 [ 122.352363][ T8335] dump_stack_lvl+0xe8/0x140 [ 122.352458][ T8335] dump_stack+0x15/0x1b [ 122.352541][ T8335] should_fail_ex+0x265/0x280 [ 122.352561][ T8335] should_failslab+0x8c/0xb0 [ 122.352592][ T8335] kmem_cache_alloc_noprof+0x50/0x310 [ 122.352618][ T8335] ? security_file_alloc+0x32/0x100 [ 122.352678][ T8335] security_file_alloc+0x32/0x100 [ 122.352707][ T8335] init_file+0x5c/0x1d0 [ 122.352734][ T8335] alloc_empty_file+0x8b/0x200 [ 122.352760][ T8335] alloc_file_pseudo+0xc6/0x160 [ 122.352805][ T8335] hugetlb_file_setup+0x2a6/0x3d0 [ 122.352825][ T8335] ksys_mmap_pgoff+0x157/0x310 [ 122.352854][ T8335] x64_sys_call+0x14a3/0x2ff0 [ 122.352918][ T8335] do_syscall_64+0xd2/0x200 [ 122.352944][ T8335] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 122.352968][ T8335] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 122.353023][ T8335] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 122.353043][ T8335] RIP: 0033:0x7f5b2223ebe9 [ 122.353058][ T8335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 122.353101][ T8335] RSP: 002b:00007f5b20ca7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 122.353117][ T8335] RAX: ffffffffffffffda RBX: 00007f5b22465fa0 RCX: 00007f5b2223ebe9 [ 122.353129][ T8335] RDX: 000000000300000c RSI: 0000000000c00000 RDI: 0000200000400000 [ 122.353140][ T8335] RBP: 00007f5b20ca7090 R08: ffffffffffffffff R09: 0000000000000000 [ 122.353152][ T8335] R10: 0000000000050032 R11: 0000000000000246 R12: 0000000000000001 [ 122.353208][ T8335] R13: 00007f5b22466038 R14: 00007f5b22465fa0 R15: 00007ffd783ab428 [ 122.353225][ T8335] [ 122.706224][ T29] kauditd_printk_skb: 21502 callbacks suppressed [ 122.706239][ T29] audit: type=1400 audit(1755825092.232:252690): avc: denied { create } for pid=8384 comm="syz.2.1900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 [ 122.712275][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 122.712622][ T29] audit: type=1400 audit(1755825092.232:252689): avc: denied { create } for pid=8384 comm="syz.2.1900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 [ 122.732892][ T3030] audit: audit_lost=39757 audit_rate_limit=0 audit_backlog_limit=64 [ 122.739445][ T29] audit: type=1400 audit(1755825092.242:252691): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 122.759528][ T3030] audit: backlog limit exceeded [ 122.762034][ T8386] audit: audit_backlog=65 > audit_backlog_limit=64 [ 122.768318][ T29] audit: type=1400 audit(1755825092.242:252692): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 122.789270][ T8386] audit: audit_lost=39758 audit_rate_limit=0 audit_backlog_limit=64 [ 122.789289][ T8386] audit: backlog limit exceeded [ 122.862036][ T8393] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1902'. [ 122.917610][ T8393] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=8393 comm=syz.4.1902 [ 123.003920][ T8415] netlink: 20 bytes leftover after parsing attributes in process `syz.0.1910'. [ 123.004143][ T8414] FAULT_INJECTION: forcing a failure. [ 123.004143][ T8414] name failslab, interval 1, probability 0, space 0, times 0 [ 123.025875][ T8414] CPU: 1 UID: 0 PID: 8414 Comm: syz.2.1911 Not tainted syzkaller #0 PREEMPT(voluntary) [ 123.025903][ T8414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 123.025916][ T8414] Call Trace: [ 123.025958][ T8414] [ 123.025965][ T8414] __dump_stack+0x1d/0x30 [ 123.025984][ T8414] dump_stack_lvl+0xe8/0x140 [ 123.026003][ T8414] dump_stack+0x15/0x1b [ 123.026026][ T8414] should_fail_ex+0x265/0x280 [ 123.026046][ T8414] ? allocate_file_region_entries+0xd2/0x310 [ 123.026089][ T8414] should_failslab+0x8c/0xb0 [ 123.026110][ T8414] __kmalloc_cache_noprof+0x4c/0x320 [ 123.026134][ T8414] ? __pfx_workingset_update_node+0x10/0x10 [ 123.026157][ T8414] allocate_file_region_entries+0xd2/0x310 [ 123.026199][ T8414] region_chg+0x232/0x2d0 [ 123.026279][ T8414] alloc_hugetlb_folio+0x312/0x1070 [ 123.026313][ T8414] hugetlb_fault+0xd71/0x1b50 [ 123.026340][ T8414] handle_mm_fault+0x1861/0x2c20 [ 123.026392][ T8414] ? follow_huge_pmd+0x76/0x380 [ 123.026436][ T8414] ? try_grab_folio+0x75/0x170 [ 123.026453][ T8414] ? down_read+0x77/0xe0 [ 123.026476][ T8414] __get_user_pages+0x102e/0x1fa0 [ 123.026502][ T8414] __mm_populate+0x243/0x3a0 [ 123.026596][ T8414] vm_mmap_pgoff+0x232/0x2e0 [ 123.026622][ T8414] ksys_mmap_pgoff+0x2d0/0x310 [ 123.026689][ T8414] x64_sys_call+0x14a3/0x2ff0 [ 123.026710][ T8414] do_syscall_64+0xd2/0x200 [ 123.026735][ T8414] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 123.026777][ T8414] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 123.026800][ T8414] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 123.026819][ T8414] RIP: 0033:0x7fe1021febe9 [ 123.026834][ T8414] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 123.026915][ T8414] RSP: 002b:00007fe100c5f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 123.026936][ T8414] RAX: ffffffffffffffda RBX: 00007fe102425fa0 RCX: 00007fe1021febe9 [ 123.026949][ T8414] RDX: 0000000000000002 RSI: 0000000000ff5000 RDI: 0000200000000000 [ 123.026992][ T8414] RBP: 00007fe100c5f090 R08: ffffffffffffffff R09: 0000000000000000 [ 123.027011][ T8414] R10: 000000000004c831 R11: 0000000000000246 R12: 0000000000000002 [ 123.027024][ T8414] R13: 00007fe102426038 R14: 00007fe102425fa0 R15: 00007ffedc7c2e88 [ 123.027040][ T8414] [ 123.288473][ T8419] netlink: 'syz.0.1913': attribute type 10 has an invalid length. [ 123.315495][ T8421] netlink: 'syz.4.1914': attribute type 10 has an invalid length. [ 123.358156][ T8429] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1918'. [ 123.448855][ T8431] futex_wake_op: syz.2.1919 tries to shift op by -1; fix this program [ 123.471362][ T8429] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=8429 comm=syz.0.1918 [ 123.489866][ T8431] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1919'. [ 123.539894][ T8443] FAULT_INJECTION: forcing a failure. [ 123.539894][ T8443] name failslab, interval 1, probability 0, space 0, times 0 [ 123.553279][ T8443] CPU: 0 UID: 0 PID: 8443 Comm: syz.2.1924 Not tainted syzkaller #0 PREEMPT(voluntary) [ 123.553306][ T8443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 123.553318][ T8443] Call Trace: [ 123.553324][ T8443] [ 123.553332][ T8443] __dump_stack+0x1d/0x30 [ 123.553371][ T8443] dump_stack_lvl+0xe8/0x140 [ 123.553391][ T8443] dump_stack+0x15/0x1b [ 123.553405][ T8443] should_fail_ex+0x265/0x280 [ 123.553423][ T8443] should_failslab+0x8c/0xb0 [ 123.553487][ T8443] __kmalloc_node_noprof+0xa9/0x410 [ 123.553513][ T8443] ? crypto_create_tfm_node+0x5c/0x250 [ 123.553563][ T8443] crypto_create_tfm_node+0x5c/0x250 [ 123.553587][ T8443] ? crypto_mod_get+0x5a/0x90 [ 123.553664][ T8443] crypto_spawn_tfm2+0x43/0x80 [ 123.553736][ T8443] ? __pfx_crypto_gcm_init_tfm+0x10/0x10 [ 123.553755][ T8443] crypto_gcm_init_tfm+0x32/0x120 [ 123.553771][ T8443] ? __pfx_crypto_gcm_init_tfm+0x10/0x10 [ 123.553826][ T8443] crypto_aead_init_tfm+0xa0/0xc0 [ 123.553883][ T8443] crypto_create_tfm_node+0x105/0x250 [ 123.553905][ T8443] crypto_alloc_tfm_node+0xdc/0x2b0 [ 123.553929][ T8443] crypto_alloc_aead+0x2d/0x40 [ 123.553957][ T8443] macsec_validate_attr+0x109/0x640 [ 123.554036][ T8443] rtnl_newlink+0x859/0x12d0 [ 123.554063][ T8443] ? xas_load+0x413/0x430 [ 123.554087][ T8443] ? __memcg_slab_free_hook+0x135/0x230 [ 123.554191][ T8443] ? __rcu_read_unlock+0x4f/0x70 [ 123.554209][ T8443] ? avc_has_perm_noaudit+0x1b1/0x200 [ 123.554255][ T8443] ? cred_has_capability+0x210/0x280 [ 123.554286][ T8443] ? selinux_capable+0x31/0x40 [ 123.554370][ T8443] ? security_capable+0x83/0x90 [ 123.554392][ T8443] ? ns_capable+0x7d/0xb0 [ 123.554412][ T8443] ? __pfx_rtnl_newlink+0x10/0x10 [ 123.554470][ T8443] rtnetlink_rcv_msg+0x5fe/0x6d0 [ 123.554494][ T8443] netlink_rcv_skb+0x123/0x220 [ 123.554512][ T8443] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 123.554536][ T8443] rtnetlink_rcv+0x1c/0x30 [ 123.554558][ T8443] netlink_unicast+0x5bd/0x690 [ 123.554661][ T8443] netlink_sendmsg+0x58b/0x6b0 [ 123.554683][ T8443] ? __pfx_netlink_sendmsg+0x10/0x10 [ 123.554705][ T8443] __sock_sendmsg+0x142/0x180 [ 123.554760][ T8443] ____sys_sendmsg+0x31e/0x4e0 [ 123.554820][ T8443] ___sys_sendmsg+0x17b/0x1d0 [ 123.554920][ T8443] __x64_sys_sendmsg+0xd4/0x160 [ 123.554975][ T8443] x64_sys_call+0x191e/0x2ff0 [ 123.555032][ T8443] do_syscall_64+0xd2/0x200 [ 123.555097][ T8443] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 123.555119][ T8443] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 123.555196][ T8443] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 123.555314][ T8443] RIP: 0033:0x7fe1021febe9 [ 123.555329][ T8443] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 123.555355][ T8443] RSP: 002b:00007fe100c5f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 123.555371][ T8443] RAX: ffffffffffffffda RBX: 00007fe102425fa0 RCX: 00007fe1021febe9 [ 123.555383][ T8443] RDX: 0000000000040000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 123.555441][ T8443] RBP: 00007fe100c5f090 R08: 0000000000000000 R09: 0000000000000000 [ 123.555452][ T8443] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 123.555462][ T8443] R13: 00007fe102426038 R14: 00007fe102425fa0 R15: 00007ffedc7c2e88 [ 123.555534][ T8443] [ 124.026498][ T8459] netlink: 'syz.2.1928': attribute type 10 has an invalid length. [ 124.118575][ T8472] bridge: RTM_NEWNEIGH with invalid ether address [ 124.198135][ T8477] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 124.264752][ T8489] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1941'. [ 124.293790][ T8491] netlink: 'syz.1.1942': attribute type 10 has an invalid length. [ 124.305058][ T8491] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 124.314091][ T8491] batadv0: entered promiscuous mode [ 124.320443][ T8491] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 124.383665][ T8498] netlink: 'syz.3.1944': attribute type 1 has an invalid length. [ 124.399520][ T8498] 8021q: adding VLAN 0 to HW filter on device bond1 [ 124.410174][ T8498] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1944'. [ 124.437522][ T8498] bond1: (slave veth17): Enslaving as an active interface with a down link [ 124.483598][ T8509] ipvlan0: entered promiscuous mode [ 124.495838][ T8509] bridge0: port 1(ipvlan0) entered blocking state [ 124.502335][ T8509] bridge0: port 1(ipvlan0) entered disabled state [ 124.509838][ T8509] ipvlan0: entered allmulticast mode [ 124.516591][ T8509] ipvlan0: left allmulticast mode [ 124.519587][ T8513] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48793 sclass=netlink_route_socket pid=8513 comm=syz.3.1949 [ 125.120311][ T8533] netlink: 'syz.2.1955': attribute type 10 has an invalid length. [ 125.437728][ T8546] FAULT_INJECTION: forcing a failure. [ 125.437728][ T8546] name failslab, interval 1, probability 0, space 0, times 0 [ 125.450449][ T8546] CPU: 1 UID: 0 PID: 8546 Comm: syz.2.1959 Not tainted syzkaller #0 PREEMPT(voluntary) [ 125.450519][ T8546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 125.450530][ T8546] Call Trace: [ 125.450537][ T8546] [ 125.450544][ T8546] __dump_stack+0x1d/0x30 [ 125.450620][ T8546] dump_stack_lvl+0xe8/0x140 [ 125.450636][ T8546] dump_stack+0x15/0x1b [ 125.450649][ T8546] should_fail_ex+0x265/0x280 [ 125.450676][ T8546] should_failslab+0x8c/0xb0 [ 125.450735][ T8546] kmem_cache_alloc_noprof+0x50/0x310 [ 125.450758][ T8546] ? audit_log_start+0x365/0x6c0 [ 125.450784][ T8546] audit_log_start+0x365/0x6c0 [ 125.450812][ T8546] audit_seccomp+0x48/0x100 [ 125.450871][ T8546] ? __seccomp_filter+0x68c/0x10d0 [ 125.450956][ T8546] __seccomp_filter+0x69d/0x10d0 [ 125.450974][ T8546] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 125.451078][ T8546] ? vfs_write+0x7e8/0x960 [ 125.451160][ T8546] ? __rcu_read_unlock+0x4f/0x70 [ 125.451263][ T8546] ? __fget_files+0x184/0x1c0 [ 125.451285][ T8546] __secure_computing+0x82/0x150 [ 125.451351][ T8546] syscall_trace_enter+0xcf/0x1e0 [ 125.451417][ T8546] do_syscall_64+0xac/0x200 [ 125.451516][ T8546] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 125.451540][ T8546] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 125.451561][ T8546] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 125.451589][ T8546] RIP: 0033:0x7fe1021febe9 [ 125.451606][ T8546] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 125.451624][ T8546] RSP: 002b:00007fe100c5f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000084 [ 125.451645][ T8546] RAX: ffffffffffffffda RBX: 00007fe102425fa0 RCX: 00007fe1021febe9 [ 125.451660][ T8546] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 125.451672][ T8546] RBP: 00007fe100c5f090 R08: 0000000000000000 R09: 0000000000000000 [ 125.451735][ T8546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 125.451746][ T8546] R13: 00007fe102426038 R14: 00007fe102425fa0 R15: 00007ffedc7c2e88 [ 125.451761][ T8546] [ 125.772715][ T8560] FAULT_INJECTION: forcing a failure. [ 125.772715][ T8560] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 125.786270][ T8560] CPU: 1 UID: 0 PID: 8560 Comm: syz.3.1966 Not tainted syzkaller #0 PREEMPT(voluntary) [ 125.786310][ T8560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 125.786322][ T8560] Call Trace: [ 125.786330][ T8560] [ 125.786338][ T8560] __dump_stack+0x1d/0x30 [ 125.786355][ T8560] dump_stack_lvl+0xe8/0x140 [ 125.786410][ T8560] dump_stack+0x15/0x1b [ 125.786449][ T8560] should_fail_ex+0x265/0x280 [ 125.786466][ T8560] should_fail+0xb/0x20 [ 125.786480][ T8560] should_fail_usercopy+0x1a/0x20 [ 125.786498][ T8560] _copy_to_user+0x20/0xa0 [ 125.786526][ T8560] simple_read_from_buffer+0xb5/0x130 [ 125.786568][ T8560] proc_fail_nth_read+0x10e/0x150 [ 125.786595][ T8560] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 125.786615][ T8560] vfs_read+0x1a8/0x770 [ 125.786647][ T8560] ? __rcu_read_unlock+0x4f/0x70 [ 125.786666][ T8560] ? __fget_files+0x184/0x1c0 [ 125.786701][ T8560] ksys_read+0xda/0x1a0 [ 125.786719][ T8560] __x64_sys_read+0x40/0x50 [ 125.786739][ T8560] x64_sys_call+0x27bc/0x2ff0 [ 125.786759][ T8560] do_syscall_64+0xd2/0x200 [ 125.786810][ T8560] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 125.786830][ T8560] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 125.786908][ T8560] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 125.786929][ T8560] RIP: 0033:0x7fa15010d5fc [ 125.786943][ T8560] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 125.786961][ T8560] RSP: 002b:00007fa14eb6f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 125.787026][ T8560] RAX: ffffffffffffffda RBX: 00007fa150335fa0 RCX: 00007fa15010d5fc [ 125.787106][ T8560] RDX: 000000000000000f RSI: 00007fa14eb6f0a0 RDI: 0000000000000005 [ 125.787118][ T8560] RBP: 00007fa14eb6f090 R08: 0000000000000000 R09: 0000000000000000 [ 125.787128][ T8560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 125.787138][ T8560] R13: 00007fa150336038 R14: 00007fa150335fa0 R15: 00007fff04aa9288 [ 125.787153][ T8560] [ 126.023756][ T8562] netlink: 'syz.1.1967': attribute type 10 has an invalid length. [ 126.380925][ T8603] netlink: 'syz.1.1982': attribute type 10 has an invalid length. [ 126.429517][ T8605] netlink: 'syz.4.1983': attribute type 1 has an invalid length. [ 126.444602][ T8605] 8021q: adding VLAN 0 to HW filter on device bond2 [ 126.453440][ T8605] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1983'. [ 126.472768][ T8605] bond2: (slave veth19): Enslaving as an active interface with a down link [ 126.482920][ T8605] FAULT_INJECTION: forcing a failure. [ 126.482920][ T8605] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 126.496084][ T8605] CPU: 0 UID: 0 PID: 8605 Comm: syz.4.1983 Not tainted syzkaller #0 PREEMPT(voluntary) [ 126.496111][ T8605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 126.496124][ T8605] Call Trace: [ 126.496131][ T8605] [ 126.496138][ T8605] __dump_stack+0x1d/0x30 [ 126.496160][ T8605] dump_stack_lvl+0xe8/0x140 [ 126.496186][ T8605] dump_stack+0x15/0x1b [ 126.496203][ T8605] should_fail_ex+0x265/0x280 [ 126.496300][ T8605] should_fail+0xb/0x20 [ 126.496317][ T8605] should_fail_usercopy+0x1a/0x20 [ 126.496339][ T8605] copy_folio_from_iter_atomic+0x278/0x1170 [ 126.496510][ T8605] ? shmem_write_begin+0xa8/0x190 [ 126.496526][ T8605] ? shmem_write_begin+0xe1/0x190 [ 126.496545][ T8605] generic_perform_write+0x2c2/0x490 [ 126.496603][ T8605] shmem_file_write_iter+0xc5/0xf0 [ 126.496683][ T8605] do_iter_readv_writev+0x499/0x540 [ 126.496725][ T8605] vfs_writev+0x2df/0x8b0 [ 126.496753][ T8605] __se_sys_pwritev2+0xfc/0x1c0 [ 126.496774][ T8605] __x64_sys_pwritev2+0x67/0x80 [ 126.496797][ T8605] x64_sys_call+0x2c55/0x2ff0 [ 126.496817][ T8605] do_syscall_64+0xd2/0x200 [ 126.496926][ T8605] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 126.496950][ T8605] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 126.496976][ T8605] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 126.496997][ T8605] RIP: 0033:0x7f5b2223ebe9 [ 126.497009][ T8605] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 126.497023][ T8605] RSP: 002b:00007f5b20ca7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000148 [ 126.497040][ T8605] RAX: ffffffffffffffda RBX: 00007f5b22465fa0 RCX: 00007f5b2223ebe9 [ 126.497052][ T8605] RDX: 0000000000000001 RSI: 0000200000000240 RDI: 0000000000000003 [ 126.497122][ T8605] RBP: 00007f5b20ca7090 R08: 0000000000000000 R09: 0000000000000003 [ 126.497134][ T8605] R10: 0000000000007000 R11: 0000000000000246 R12: 0000000000000001 [ 126.497147][ T8605] R13: 00007f5b22466038 R14: 00007f5b22465fa0 R15: 00007ffd783ab428 [ 126.497164][ T8605] [ 126.782888][ T8623] netlink: 140 bytes leftover after parsing attributes in process `syz.4.1991'. [ 127.104220][ T8640] futex_wake_op: syz.3.1999 tries to shift op by -1; fix this program [ 127.119061][ T8644] validate_nla: 2 callbacks suppressed [ 127.119077][ T8644] netlink: 'syz.0.2001': attribute type 10 has an invalid length. [ 127.169469][ T8648] FAULT_INJECTION: forcing a failure. [ 127.169469][ T8648] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 127.182772][ T8648] CPU: 0 UID: 0 PID: 8648 Comm: syz.0.2003 Not tainted syzkaller #0 PREEMPT(voluntary) [ 127.182797][ T8648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 127.182806][ T8648] Call Trace: [ 127.182812][ T8648] [ 127.182819][ T8648] __dump_stack+0x1d/0x30 [ 127.182840][ T8648] dump_stack_lvl+0xe8/0x140 [ 127.182856][ T8648] dump_stack+0x15/0x1b [ 127.183043][ T8648] should_fail_ex+0x265/0x280 [ 127.183097][ T8648] should_fail+0xb/0x20 [ 127.183113][ T8648] should_fail_usercopy+0x1a/0x20 [ 127.183133][ T8648] _copy_from_user+0x1c/0xb0 [ 127.183156][ T8648] ___sys_sendmsg+0xc1/0x1d0 [ 127.183186][ T8648] __x64_sys_sendmsg+0xd4/0x160 [ 127.183206][ T8648] x64_sys_call+0x191e/0x2ff0 [ 127.183228][ T8648] do_syscall_64+0xd2/0x200 [ 127.183255][ T8648] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 127.183321][ T8648] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 127.183342][ T8648] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 127.183443][ T8648] RIP: 0033:0x7ff79624ebe9 [ 127.183460][ T8648] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 127.183478][ T8648] RSP: 002b:00007ff794cb7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 127.183560][ T8648] RAX: ffffffffffffffda RBX: 00007ff796475fa0 RCX: 00007ff79624ebe9 [ 127.183574][ T8648] RDX: f691750d1066a2e8 RSI: 00002000000001c0 RDI: 0000000000000004 [ 127.183586][ T8648] RBP: 00007ff794cb7090 R08: 0000000000000000 R09: 0000000000000000 [ 127.183628][ T8648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 127.183641][ T8648] R13: 00007ff796476038 R14: 00007ff796475fa0 R15: 00007ffde8901b68 [ 127.183661][ T8648] [ 127.230426][ T8654] netlink: 'syz.3.2005': attribute type 10 has an invalid length. [ 127.371285][ T8656] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 127.409869][ T8659] netlink: 'syz.3.2007': attribute type 16 has an invalid length. [ 127.418013][ T8659] netlink: 'syz.3.2007': attribute type 17 has an invalid length. [ 127.425997][ T8659] netlink: 'syz.3.2007': attribute type 27 has an invalid length. [ 127.570030][ T8677] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=28766 sclass=netlink_route_socket pid=8677 comm=syz.2.2013 [ 127.717360][ T29] kauditd_printk_skb: 24154 callbacks suppressed [ 127.717376][ T29] audit: type=1400 audit(1755825097.252:274614): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 127.757531][ T29] audit: type=1400 audit(1755825097.252:274615): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 127.779714][ T29] audit: type=1400 audit(1755825097.252:274616): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 127.801429][ T29] audit: type=1400 audit(1755825097.252:274617): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 127.822940][ T29] audit: type=1400 audit(1755825097.252:274618): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 127.826800][ T8686] audit: audit_backlog=65 > audit_backlog_limit=64 [ 127.844919][ T29] audit: type=1400 audit(1755825097.252:274619): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 127.851529][ T8686] audit: audit_lost=40504 audit_rate_limit=0 audit_backlog_limit=64 [ 127.851549][ T8686] audit: backlog limit exceeded [ 127.873545][ T29] audit: type=1400 audit(1755825097.252:274620): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 127.922399][ T8686] netlink: 'syz.4.2017': attribute type 10 has an invalid length. [ 127.985562][ T8693] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 128.088941][ T8699] syzkaller0: entered promiscuous mode [ 128.094458][ T8699] syzkaller0: entered allmulticast mode [ 128.193269][ T8707] netlink: 24 bytes leftover after parsing attributes in process `syz.4.2026'. [ 128.241173][ T8707] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=8707 comm=syz.4.2026 [ 128.310412][ T8714] netlink: 'syz.0.2029': attribute type 10 has an invalid length. [ 128.407925][ T8725] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 128.484137][ T8737] netlink: 96 bytes leftover after parsing attributes in process `+}[@'. [ 128.542160][ T8745] netlink: 24 bytes leftover after parsing attributes in process `syz.0.2040'. [ 128.594934][ T8745] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=8745 comm=syz.0.2040 [ 128.633603][ T8748] netlink: 'syz.0.2041': attribute type 10 has an invalid length. [ 129.370458][ T8766] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 129.421922][ T8768] netlink: 24 bytes leftover after parsing attributes in process `syz.3.2048'. [ 129.573996][ T8771] netdevsim netdevsim4: Direct firmware load for ./file0 failed with error -2 [ 129.594995][ T8773] netlink: 24 bytes leftover after parsing attributes in process `syz.2.2051'. [ 129.612662][ T8775] netlink: 'syz.3.2052': attribute type 10 has an invalid length. [ 129.655964][ T8773] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=8773 comm=syz.2.2051 [ 130.535073][ T296] batadv1: left promiscuous mode [ 130.704813][ T8801] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 130.807035][ T8806] netlink: 'syz.3.2063': attribute type 5 has an invalid length. [ 131.759459][ T8830] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 132.054634][ T8841] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2078'. [ 132.063744][ T8841] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2078'. [ 132.732205][ T29] kauditd_printk_skb: 31546 callbacks suppressed [ 132.732218][ T29] audit: type=1400 audit(1755825102.252:297911): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 132.737568][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 132.739032][ T29] audit: type=1400 audit(1755825102.252:297912): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 132.760657][ T3030] audit: audit_lost=43257 audit_rate_limit=0 audit_backlog_limit=64 [ 132.767149][ T29] audit: type=1400 audit(1755825102.252:297913): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 132.767173][ T29] audit: type=1400 audit(1755825102.252:297914): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 132.788810][ T3030] audit: backlog limit exceeded [ 132.835357][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 132.840037][ T29] audit: type=1400 audit(1755825102.252:297915): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 132.844972][ T3030] audit: audit_lost=43258 audit_rate_limit=0 audit_backlog_limit=64 [ 133.035733][ T8855] FAULT_INJECTION: forcing a failure. [ 133.035733][ T8855] name failslab, interval 1, probability 0, space 0, times 0 [ 133.048391][ T8855] CPU: 0 UID: 0 PID: 8855 Comm: syz.3.2081 Not tainted syzkaller #0 PREEMPT(voluntary) [ 133.048418][ T8855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 133.048508][ T8855] Call Trace: [ 133.048516][ T8855] [ 133.048524][ T8855] __dump_stack+0x1d/0x30 [ 133.048543][ T8855] dump_stack_lvl+0xe8/0x140 [ 133.048627][ T8855] dump_stack+0x15/0x1b [ 133.048640][ T8855] should_fail_ex+0x265/0x280 [ 133.048732][ T8855] should_failslab+0x8c/0xb0 [ 133.048754][ T8855] kmem_cache_alloc_noprof+0x50/0x310 [ 133.048781][ T8855] ? getname_flags+0x80/0x3b0 [ 133.048876][ T8855] getname_flags+0x80/0x3b0 [ 133.048901][ T8855] do_sys_openat2+0x60/0x110 [ 133.048940][ T8855] __x64_sys_openat+0xf2/0x120 [ 133.048971][ T8855] x64_sys_call+0x2e9c/0x2ff0 [ 133.048989][ T8855] do_syscall_64+0xd2/0x200 [ 133.049053][ T8855] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 133.049090][ T8855] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 133.049114][ T8855] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 133.049136][ T8855] RIP: 0033:0x7fa15010ebe9 [ 133.049160][ T8855] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 133.049176][ T8855] RSP: 002b:00007fa14eb6f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 133.049246][ T8855] RAX: ffffffffffffffda RBX: 00007fa150335fa0 RCX: 00007fa15010ebe9 [ 133.049256][ T8855] RDX: 0000000000515a02 RSI: 00002000000000c0 RDI: ffffffffffffffff [ 133.049267][ T8855] RBP: 00007fa14eb6f090 R08: 0000000000000000 R09: 0000000000000000 [ 133.049278][ T8855] R10: 52abe154ad664f26 R11: 0000000000000246 R12: 0000000000000001 [ 133.049291][ T8855] R13: 00007fa150336038 R14: 00007fa150335fa0 R15: 00007fff04aa9288 [ 133.049309][ T8855] [ 133.469692][ T8862] bond0: (slave batadv0): Releasing backup interface [ 133.492174][ T8862] batadv0: left promiscuous mode [ 133.519750][ T8862] bridge_slave_0: left allmulticast mode [ 133.525846][ T8862] bridge_slave_0: left promiscuous mode [ 133.531696][ T8862] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.580088][ T8862] bridge_slave_1: left allmulticast mode [ 133.585992][ T8862] bridge_slave_1: left promiscuous mode [ 133.591806][ T8862] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.624958][ T8862] bond0: (slave bond_slave_0): Releasing backup interface [ 133.645990][ T8862] bond_slave_0: left promiscuous mode [ 133.654842][ T8862] bond0: (slave bond_slave_1): Releasing backup interface [ 133.665630][ T8862] bond_slave_1: left promiscuous mode [ 133.679847][ T8862] team0: Port device team_slave_0 removed [ 133.696040][ T8862] team0: Port device team_slave_1 removed [ 133.709639][ T8862] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 133.717182][ T8862] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 133.722351][ T8869] validate_nla: 2 callbacks suppressed [ 133.722365][ T8869] netlink: 'syz.1.2086': attribute type 10 has an invalid length. [ 133.739967][ T8862] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 133.747466][ T8862] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 133.788443][ T8862] bond1: (slave veth17): Releasing active interface [ 133.800700][ T8866] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 134.729093][ T8901] netlink: 'syz.1.2097': attribute type 10 has an invalid length. [ 134.803733][ T8903] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 134.921125][ T8917] netlink: 24 bytes leftover after parsing attributes in process `syz.3.2104'. [ 134.996371][ T8924] FAULT_INJECTION: forcing a failure. [ 134.996371][ T8924] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 135.009538][ T8924] CPU: 1 UID: 0 PID: 8924 Comm: syz.1.2106 Not tainted syzkaller #0 PREEMPT(voluntary) [ 135.009562][ T8924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 135.009628][ T8924] Call Trace: [ 135.009636][ T8924] [ 135.009643][ T8924] __dump_stack+0x1d/0x30 [ 135.009664][ T8924] dump_stack_lvl+0xe8/0x140 [ 135.009684][ T8924] dump_stack+0x15/0x1b [ 135.009701][ T8924] should_fail_ex+0x265/0x280 [ 135.009790][ T8924] should_fail+0xb/0x20 [ 135.009808][ T8924] should_fail_usercopy+0x1a/0x20 [ 135.009831][ T8924] _copy_from_user+0x1c/0xb0 [ 135.009973][ T8924] ip_options_get+0x11a/0x350 [ 135.009994][ T8924] do_ip_setsockopt+0x19d4/0x2240 [ 135.010020][ T8924] ip_setsockopt+0x58/0x110 [ 135.010184][ T8924] udp_setsockopt+0x99/0xb0 [ 135.010277][ T8924] sock_common_setsockopt+0x69/0x80 [ 135.010303][ T8924] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 135.010352][ T8924] __sys_setsockopt+0x181/0x200 [ 135.010374][ T8924] __x64_sys_setsockopt+0x64/0x80 [ 135.010395][ T8924] x64_sys_call+0x20ec/0x2ff0 [ 135.010486][ T8924] do_syscall_64+0xd2/0x200 [ 135.010512][ T8924] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 135.010552][ T8924] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 135.010574][ T8924] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 135.010596][ T8924] RIP: 0033:0x7f648187ebe9 [ 135.010612][ T8924] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 135.010663][ T8924] RSP: 002b:00007f64802df038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 135.010680][ T8924] RAX: ffffffffffffffda RBX: 00007f6481aa5fa0 RCX: 00007f648187ebe9 [ 135.010693][ T8924] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 [ 135.010706][ T8924] RBP: 00007f64802df090 R08: 0000000000000028 R09: 0000000000000000 [ 135.010719][ T8924] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 135.010730][ T8924] R13: 00007f6481aa6038 R14: 00007f6481aa5fa0 R15: 00007fff45cd2e78 [ 135.010745][ T8924] [ 135.053023][ T8922] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=8922 comm=syz.3.2104 [ 135.264644][ T8936] netlink: 'syz.4.2110': attribute type 10 has an invalid length. [ 135.298641][ T8938] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 135.729322][ T8962] netlink: 24 bytes leftover after parsing attributes in process `syz.4.2122'. [ 135.774929][ T8962] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=8962 comm=syz.4.2122 [ 135.823304][ T8965] netlink: 'syz.4.2123': attribute type 10 has an invalid length. [ 136.162911][ T8989] FAULT_INJECTION: forcing a failure. [ 136.162911][ T8989] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 136.176333][ T8989] CPU: 0 UID: 0 PID: 8989 Comm: syz.2.2133 Not tainted syzkaller #0 PREEMPT(voluntary) [ 136.176416][ T8989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 136.176429][ T8989] Call Trace: [ 136.176436][ T8989] [ 136.176444][ T8989] __dump_stack+0x1d/0x30 [ 136.176531][ T8989] dump_stack_lvl+0xe8/0x140 [ 136.176576][ T8989] dump_stack+0x15/0x1b [ 136.176593][ T8989] should_fail_ex+0x265/0x280 [ 136.176612][ T8989] should_fail+0xb/0x20 [ 136.176626][ T8989] should_fail_usercopy+0x1a/0x20 [ 136.176644][ T8989] _copy_to_user+0x20/0xa0 [ 136.176718][ T8989] simple_read_from_buffer+0xb5/0x130 [ 136.176739][ T8989] proc_fail_nth_read+0x10e/0x150 [ 136.176760][ T8989] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 136.176803][ T8989] vfs_read+0x1a8/0x770 [ 136.176824][ T8989] ? __rcu_read_unlock+0x4f/0x70 [ 136.176885][ T8989] ? __fget_files+0x184/0x1c0 [ 136.176906][ T8989] ksys_read+0xda/0x1a0 [ 136.176927][ T8989] __x64_sys_read+0x40/0x50 [ 136.176998][ T8989] x64_sys_call+0x27bc/0x2ff0 [ 136.177019][ T8989] do_syscall_64+0xd2/0x200 [ 136.177044][ T8989] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 136.177184][ T8989] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 136.177208][ T8989] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 136.177264][ T8989] RIP: 0033:0x7fe1021fd5fc [ 136.177279][ T8989] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 136.177297][ T8989] RSP: 002b:00007fe100c5f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 136.177316][ T8989] RAX: ffffffffffffffda RBX: 00007fe102425fa0 RCX: 00007fe1021fd5fc [ 136.177353][ T8989] RDX: 000000000000000f RSI: 00007fe100c5f0a0 RDI: 0000000000000004 [ 136.177364][ T8989] RBP: 00007fe100c5f090 R08: 0000000000000000 R09: 0000000000000000 [ 136.177375][ T8989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 136.177426][ T8989] R13: 00007fe102426038 R14: 00007fe102425fa0 R15: 00007ffedc7c2e88 [ 136.177444][ T8989] [ 136.420159][ T8994] netlink: 24 bytes leftover after parsing attributes in process `syz.2.2134'. [ 136.436928][ T8998] netlink: 'syz.1.2136': attribute type 10 has an invalid length. [ 136.484945][ T8994] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=8994 comm=syz.2.2134 [ 136.582526][ T9007] FAULT_INJECTION: forcing a failure. [ 136.582526][ T9007] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 136.595695][ T9007] CPU: 1 UID: 0 PID: 9007 Comm: syz.2.2140 Not tainted syzkaller #0 PREEMPT(voluntary) [ 136.595725][ T9007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 136.595737][ T9007] Call Trace: [ 136.595744][ T9007] [ 136.595752][ T9007] __dump_stack+0x1d/0x30 [ 136.595793][ T9007] dump_stack_lvl+0xe8/0x140 [ 136.595877][ T9007] dump_stack+0x15/0x1b [ 136.595893][ T9007] should_fail_ex+0x265/0x280 [ 136.595914][ T9007] should_fail+0xb/0x20 [ 136.595946][ T9007] should_fail_usercopy+0x1a/0x20 [ 136.595968][ T9007] _copy_to_user+0x20/0xa0 [ 136.595995][ T9007] simple_read_from_buffer+0xb5/0x130 [ 136.596017][ T9007] proc_fail_nth_read+0x10e/0x150 [ 136.596105][ T9007] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 136.596158][ T9007] vfs_read+0x1a8/0x770 [ 136.596178][ T9007] ? __rcu_read_unlock+0x4f/0x70 [ 136.596240][ T9007] ? __fget_files+0x184/0x1c0 [ 136.596264][ T9007] ksys_read+0xda/0x1a0 [ 136.596286][ T9007] __x64_sys_read+0x40/0x50 [ 136.596307][ T9007] x64_sys_call+0x27bc/0x2ff0 [ 136.596350][ T9007] do_syscall_64+0xd2/0x200 [ 136.596376][ T9007] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 136.596399][ T9007] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 136.596423][ T9007] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 136.596511][ T9007] RIP: 0033:0x7fe1021fd5fc [ 136.596601][ T9007] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 136.596618][ T9007] RSP: 002b:00007fe100c5f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 136.596639][ T9007] RAX: ffffffffffffffda RBX: 00007fe102425fa0 RCX: 00007fe1021fd5fc [ 136.596652][ T9007] RDX: 000000000000000f RSI: 00007fe100c5f0a0 RDI: 0000000000000003 [ 136.596698][ T9007] RBP: 00007fe100c5f090 R08: 0000000000000000 R09: 0000000000000000 [ 136.596710][ T9007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 136.596722][ T9007] R13: 00007fe102426038 R14: 00007fe102425fa0 R15: 00007ffedc7c2e88 [ 136.596785][ T9007] [ 137.401255][ T9019] FAULT_INJECTION: forcing a failure. [ 137.401255][ T9019] name failslab, interval 1, probability 0, space 0, times 0 [ 137.414031][ T9019] CPU: 1 UID: 0 PID: 9019 Comm: +}[@ Not tainted syzkaller #0 PREEMPT(voluntary) [ 137.414118][ T9019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 137.414130][ T9019] Call Trace: [ 137.414138][ T9019] [ 137.414147][ T9019] __dump_stack+0x1d/0x30 [ 137.414234][ T9019] dump_stack_lvl+0xe8/0x140 [ 137.414249][ T9019] dump_stack+0x15/0x1b [ 137.414267][ T9019] should_fail_ex+0x265/0x280 [ 137.414288][ T9019] should_failslab+0x8c/0xb0 [ 137.414386][ T9019] kmem_cache_alloc_noprof+0x50/0x310 [ 137.414412][ T9019] ? alloc_empty_file+0x76/0x200 [ 137.414441][ T9019] alloc_empty_file+0x76/0x200 [ 137.414569][ T9019] alloc_file_pseudo+0xc6/0x160 [ 137.414659][ T9019] __shmem_file_setup+0x1de/0x210 [ 137.414692][ T9019] shmem_file_setup+0x3b/0x50 [ 137.414721][ T9019] __se_sys_memfd_create+0x2c3/0x590 [ 137.414742][ T9019] __x64_sys_memfd_create+0x31/0x40 [ 137.414836][ T9019] x64_sys_call+0x2abe/0x2ff0 [ 137.414858][ T9019] do_syscall_64+0xd2/0x200 [ 137.414880][ T9019] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 137.414900][ T9019] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 137.414992][ T9019] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 137.415014][ T9019] RIP: 0033:0x7f648187ebe9 [ 137.415073][ T9019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.415089][ T9019] RSP: 002b:00007f64802dee18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 137.415108][ T9019] RAX: ffffffffffffffda RBX: 0000000000000519 RCX: 00007f648187ebe9 [ 137.415122][ T9019] RDX: 00007f64802deef0 RSI: 0000000000000000 RDI: 00007f64819027e8 [ 137.415135][ T9019] RBP: 00002000000009c0 R08: 00007f64802debb7 R09: 00007f64802dee40 [ 137.415147][ T9019] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000440 [ 137.415227][ T9019] R13: 00007f64802deef0 R14: 00007f64802deeb0 R15: 0000200000000100 [ 137.415245][ T9019] [ 137.431911][ T9023] FAULT_INJECTION: forcing a failure. [ 137.431911][ T9023] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 137.624130][ T9023] CPU: 0 UID: 0 PID: 9023 Comm: syz.3.2145 Not tainted syzkaller #0 PREEMPT(voluntary) [ 137.624220][ T9023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 137.624231][ T9023] Call Trace: [ 137.624239][ T9023] [ 137.624246][ T9023] __dump_stack+0x1d/0x30 [ 137.624268][ T9023] dump_stack_lvl+0xe8/0x140 [ 137.624287][ T9023] dump_stack+0x15/0x1b [ 137.624303][ T9023] should_fail_ex+0x265/0x280 [ 137.624347][ T9023] should_fail+0xb/0x20 [ 137.624365][ T9023] should_fail_usercopy+0x1a/0x20 [ 137.624523][ T9023] _copy_to_user+0x20/0xa0 [ 137.624550][ T9023] copy_siginfo_to_user+0x22/0xb0 [ 137.624572][ T9023] x64_setup_rt_frame+0x2b5/0x580 [ 137.624594][ T9023] arch_do_signal_or_restart+0x27c/0x480 [ 137.624644][ T9023] irqentry_exit_to_user_mode+0x5e/0xa0 [ 137.624666][ T9023] irqentry_exit+0x12/0x50 [ 137.624682][ T9023] asm_exc_page_fault+0x26/0x30 [ 137.624698][ T9023] RIP: 0033:0x7fa14ffcea0a [ 137.624711][ T9023] Code: 90 8b 45 04 ba 03 00 00 00 c1 e0 04 03 45 64 39 c6 48 0f 42 f0 45 31 c9 31 ff e8 11 02 14 00 8b 75 00 ba 03 00 00 00 45 89 e0 <49> 89 45 00 41 b9 00 00 00 10 b9 01 80 00 00 31 ff c1 e6 06 e8 ed [ 137.624727][ T9023] RSP: 002b:00007fa14eb6efd0 EFLAGS: 00010217 [ 137.624759][ T9023] RAX: ffffffffffffffff RBX: 00007fa150335fa0 RCX: 00007fa15010ec23 [ 137.624810][ T9023] RDX: 0000000000000003 RSI: 0000000000000000 RDI: 0000000000000000 [ 137.624822][ T9023] RBP: 0000200000000400 R08: 00000000ffffffff R09: 0000000000000000 [ 137.624835][ T9023] R10: 0000000000008001 R11: 0000000000000246 R12: ffffffffffffffff [ 137.624848][ T9023] R13: 0000000000000000 R14: 0000000000003c0c R15: 0000000000000000 [ 137.624866][ T9023] [ 137.768746][ T29] kauditd_printk_skb: 34466 callbacks suppressed [ 137.768760][ T29] audit: type=1400 audit(1755825107.302:319802): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 137.776375][ T9028] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 137.779667][ T29] audit: type=1400 audit(1755825107.302:319803): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 137.847640][ T29] audit: type=1400 audit(1755825107.302:319804): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 137.869908][ T29] audit: type=1400 audit(1755825107.302:319805): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 137.891348][ T29] audit: type=1400 audit(1755825107.302:319806): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 137.896264][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 137.912675][ T29] audit: type=1400 audit(1755825107.302:319807): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 137.919359][ T3030] audit: audit_lost=47452 audit_rate_limit=0 audit_backlog_limit=64 [ 137.919377][ T3030] audit: backlog limit exceeded [ 137.922266][ T9030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 138.374547][ T9052] netlink: 24 bytes leftover after parsing attributes in process `syz.0.2160'. [ 138.437877][ T9054] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 138.444516][ T9055] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=9055 comm=syz.0.2160 [ 138.964275][ T9082] FAULT_INJECTION: forcing a failure. [ 138.964275][ T9082] name failslab, interval 1, probability 0, space 0, times 0 [ 138.977551][ T9082] CPU: 0 UID: 0 PID: 9082 Comm: syz.1.2172 Not tainted syzkaller #0 PREEMPT(voluntary) [ 138.977614][ T9082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 138.977628][ T9082] Call Trace: [ 138.977634][ T9082] [ 138.977642][ T9082] __dump_stack+0x1d/0x30 [ 138.977664][ T9082] dump_stack_lvl+0xe8/0x140 [ 138.977753][ T9082] dump_stack+0x15/0x1b [ 138.977767][ T9082] should_fail_ex+0x265/0x280 [ 138.977784][ T9082] should_failslab+0x8c/0xb0 [ 138.977806][ T9082] __kvmalloc_node_noprof+0x123/0x4e0 [ 138.977835][ T9082] ? vmemdup_user+0x26/0xd0 [ 138.977962][ T9082] ? should_fail_usercopy+0x1a/0x20 [ 138.977986][ T9082] vmemdup_user+0x26/0xd0 [ 138.978075][ T9082] path_setxattrat+0x1b6/0x310 [ 138.978133][ T9082] __x64_sys_lsetxattr+0x71/0x90 [ 138.978157][ T9082] x64_sys_call+0x2877/0x2ff0 [ 138.978179][ T9082] do_syscall_64+0xd2/0x200 [ 138.978207][ T9082] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 138.978273][ T9082] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 138.978335][ T9082] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 138.978356][ T9082] RIP: 0033:0x7f648187ebe9 [ 138.978431][ T9082] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 138.978489][ T9082] RSP: 002b:00007f64802df038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 138.978509][ T9082] RAX: ffffffffffffffda RBX: 00007f6481aa5fa0 RCX: 00007f648187ebe9 [ 138.978522][ T9082] RDX: 0000000000000000 RSI: 0000200000000480 RDI: 0000200000000440 [ 138.978535][ T9082] RBP: 00007f64802df090 R08: 0000000000000002 R09: 0000000000000000 [ 138.978548][ T9082] R10: 00000000000000d7 R11: 0000000000000246 R12: 0000000000000001 [ 138.978560][ T9082] R13: 00007f6481aa6038 R14: 00007f6481aa5fa0 R15: 00007fff45cd2e78 [ 138.978585][ T9082] [ 139.195112][ T9086] netlink: 24 bytes leftover after parsing attributes in process `syz.4.2174'. [ 139.262013][ T9084] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 139.331933][ T9087] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=9087 comm=syz.4.2174 [ 139.387956][ T9095] FAULT_INJECTION: forcing a failure. [ 139.387956][ T9095] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 139.401079][ T9095] CPU: 1 UID: 0 PID: 9095 Comm: syz.0.2179 Not tainted syzkaller #0 PREEMPT(voluntary) [ 139.401108][ T9095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 139.401120][ T9095] Call Trace: [ 139.401127][ T9095] [ 139.401135][ T9095] __dump_stack+0x1d/0x30 [ 139.401158][ T9095] dump_stack_lvl+0xe8/0x140 [ 139.401173][ T9095] dump_stack+0x15/0x1b [ 139.401187][ T9095] should_fail_ex+0x265/0x280 [ 139.401207][ T9095] should_fail+0xb/0x20 [ 139.401274][ T9095] should_fail_usercopy+0x1a/0x20 [ 139.401292][ T9095] _copy_to_user+0x20/0xa0 [ 139.401314][ T9095] simple_read_from_buffer+0xb5/0x130 [ 139.401383][ T9095] proc_fail_nth_read+0x10e/0x150 [ 139.401410][ T9095] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 139.401482][ T9095] vfs_read+0x1a8/0x770 [ 139.401515][ T9095] ? __fget_files+0x184/0x1c0 [ 139.401537][ T9095] ? __rcu_read_unlock+0x4f/0x70 [ 139.401557][ T9095] ? __fget_files+0x184/0x1c0 [ 139.401577][ T9095] ksys_read+0xda/0x1a0 [ 139.401594][ T9095] __x64_sys_read+0x40/0x50 [ 139.401728][ T9095] x64_sys_call+0x27bc/0x2ff0 [ 139.401749][ T9095] do_syscall_64+0xd2/0x200 [ 139.401773][ T9095] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 139.401792][ T9095] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 139.401811][ T9095] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 139.401835][ T9095] RIP: 0033:0x7ff79624d5fc [ 139.401850][ T9095] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 139.401868][ T9095] RSP: 002b:00007ff794cb7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 139.401940][ T9095] RAX: ffffffffffffffda RBX: 00007ff796475fa0 RCX: 00007ff79624d5fc [ 139.401953][ T9095] RDX: 000000000000000f RSI: 00007ff794cb70a0 RDI: 0000000000000003 [ 139.401966][ T9095] RBP: 00007ff794cb7090 R08: 0000000000000000 R09: 0000000000000000 [ 139.401981][ T9095] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 139.401994][ T9095] R13: 00007ff796476038 R14: 00007ff796475fa0 R15: 00007ffde8901b68 [ 139.402009][ T9095] [ 139.928862][ T9119] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 140.200553][ T9128] netlink: 24 bytes leftover after parsing attributes in process `syz.1.2191'. [ 140.211770][ T9134] FAULT_INJECTION: forcing a failure. [ 140.211770][ T9134] name failslab, interval 1, probability 0, space 0, times 0 [ 140.224697][ T9134] CPU: 0 UID: 0 PID: 9134 Comm: syz.2.2194 Not tainted syzkaller #0 PREEMPT(voluntary) [ 140.224786][ T9134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 140.224794][ T9134] Call Trace: [ 140.224869][ T9134] [ 140.224875][ T9134] __dump_stack+0x1d/0x30 [ 140.224889][ T9134] dump_stack_lvl+0xe8/0x140 [ 140.224899][ T9134] dump_stack+0x15/0x1b [ 140.224908][ T9134] should_fail_ex+0x265/0x280 [ 140.224988][ T9134] should_failslab+0x8c/0xb0 [ 140.225002][ T9134] __kmalloc_noprof+0xa5/0x3e0 [ 140.225017][ T9134] ? sidtab_sid2str_put+0xe5/0x360 [ 140.225030][ T9134] sidtab_sid2str_put+0xe5/0x360 [ 140.225042][ T9134] security_sid_to_context_core+0x252/0x2e0 [ 140.225104][ T9134] security_sid_to_context+0x27/0x40 [ 140.225121][ T9134] selinux_inode_getsecurity+0x23e/0x2e0 [ 140.225133][ T9134] security_inode_getsecurity+0xcf/0xe0 [ 140.225167][ T9134] vfs_getxattr+0x140/0x250 [ 140.225227][ T9134] do_getxattr+0x124/0x2a0 [ 140.225294][ T9134] path_getxattrat+0x22c/0x2a0 [ 140.225314][ T9134] __x64_sys_fgetxattr+0x59/0x70 [ 140.225327][ T9134] x64_sys_call+0x1ab3/0x2ff0 [ 140.225340][ T9134] do_syscall_64+0xd2/0x200 [ 140.225427][ T9134] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 140.225440][ T9134] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 140.225453][ T9134] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 140.225503][ T9134] RIP: 0033:0x7fe1021febe9 [ 140.225513][ T9134] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 140.225591][ T9134] RSP: 002b:00007fe100c5f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c1 [ 140.225603][ T9134] RAX: ffffffffffffffda RBX: 00007fe102425fa0 RCX: 00007fe1021febe9 [ 140.225677][ T9134] RDX: 0000000000000000 RSI: 00002000000002c0 RDI: 0000000000000003 [ 140.225684][ T9134] RBP: 00007fe100c5f090 R08: 0000000000000000 R09: 0000000000000000 [ 140.225691][ T9134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 140.225698][ T9134] R13: 00007fe102426038 R14: 00007fe102425fa0 R15: 00007ffedc7c2e88 [ 140.225708][ T9134] [ 140.278393][ T9135] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=9135 comm=syz.1.2191 [ 140.651111][ T9158] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 140.704416][ T9165] netlink: 'syz.1.2197': attribute type 4 has an invalid length. [ 140.826580][ T9170] netlink: 36 bytes leftover after parsing attributes in process `syz.4.2201'. [ 141.312609][ T9174] Falling back ldisc for ptm0. [ 141.508624][ T9190] FAULT_INJECTION: forcing a failure. [ 141.508624][ T9190] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 141.521995][ T9190] CPU: 0 UID: 0 PID: 9190 Comm: syz.1.2211 Not tainted syzkaller #0 PREEMPT(voluntary) [ 141.522018][ T9190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 141.522028][ T9190] Call Trace: [ 141.522034][ T9190] [ 141.522041][ T9190] __dump_stack+0x1d/0x30 [ 141.522063][ T9190] dump_stack_lvl+0xe8/0x140 [ 141.522082][ T9190] dump_stack+0x15/0x1b [ 141.522146][ T9190] should_fail_ex+0x265/0x280 [ 141.522164][ T9190] should_fail+0xb/0x20 [ 141.522178][ T9190] should_fail_usercopy+0x1a/0x20 [ 141.522200][ T9190] _copy_from_user+0x1c/0xb0 [ 141.522302][ T9190] __se_sys_select+0x7a/0x210 [ 141.522322][ T9190] __x64_sys_select+0x67/0x80 [ 141.522340][ T9190] x64_sys_call+0x2a3a/0x2ff0 [ 141.522405][ T9190] do_syscall_64+0xd2/0x200 [ 141.522431][ T9190] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 141.522455][ T9190] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 141.522477][ T9190] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 141.522572][ T9190] RIP: 0033:0x7f648187ebe9 [ 141.522610][ T9190] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 141.522625][ T9190] RSP: 002b:00007f64802df038 EFLAGS: 00000246 ORIG_RAX: 0000000000000017 [ 141.522644][ T9190] RAX: ffffffffffffffda RBX: 00007f6481aa5fa0 RCX: 00007f648187ebe9 [ 141.522657][ T9190] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 141.522670][ T9190] RBP: 00007f64802df090 R08: 0000200000000100 R09: 0000000000000000 [ 141.522729][ T9190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 141.522742][ T9190] R13: 00007f6481aa6038 R14: 00007f6481aa5fa0 R15: 00007fff45cd2e78 [ 141.522760][ T9190] [ 141.781527][ T9200] netlink: 180 bytes leftover after parsing attributes in process `syz.0.2216'. [ 141.791932][ T9200] FAULT_INJECTION: forcing a failure. [ 141.791932][ T9200] name failslab, interval 1, probability 0, space 0, times 0 [ 141.798553][ T9198] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 141.805552][ T9200] CPU: 0 UID: 0 PID: 9200 Comm: syz.0.2216 Not tainted syzkaller #0 PREEMPT(voluntary) [ 141.805580][ T9200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 141.805590][ T9200] Call Trace: [ 141.805596][ T9200] [ 141.805604][ T9200] __dump_stack+0x1d/0x30 [ 141.805626][ T9200] dump_stack_lvl+0xe8/0x140 [ 141.805644][ T9200] dump_stack+0x15/0x1b [ 141.805661][ T9200] should_fail_ex+0x265/0x280 [ 141.805682][ T9200] should_failslab+0x8c/0xb0 [ 141.805706][ T9200] kmem_cache_alloc_node_noprof+0x57/0x320 [ 141.805756][ T9200] ? __alloc_skb+0x101/0x320 [ 141.805786][ T9200] __alloc_skb+0x101/0x320 [ 141.805813][ T9200] netlink_alloc_large_skb+0xba/0xf0 [ 141.805872][ T9200] netlink_sendmsg+0x3cf/0x6b0 [ 141.805894][ T9200] ? __pfx_netlink_sendmsg+0x10/0x10 [ 141.805966][ T9200] __sock_sendmsg+0x142/0x180 [ 141.805992][ T9200] __sys_sendto+0x268/0x330 [ 141.806027][ T9200] __x64_sys_sendto+0x76/0x90 [ 141.806129][ T9200] x64_sys_call+0x2d05/0x2ff0 [ 141.806150][ T9200] do_syscall_64+0xd2/0x200 [ 141.806237][ T9200] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 141.806329][ T9200] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 141.806352][ T9200] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 141.806373][ T9200] RIP: 0033:0x7ff796250a7c [ 141.806397][ T9200] Code: 2a 5f 02 00 44 8b 4c 24 2c 4c 8b 44 24 20 89 c5 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 <48> 3d 00 f0 ff ff 77 34 89 ef 48 89 44 24 08 e8 70 5f 02 00 48 8b [ 141.806414][ T9200] RSP: 002b:00007ff794cb5ec0 EFLAGS: 00000293 ORIG_RAX: 000000000000002c [ 141.806433][ T9200] RAX: ffffffffffffffda RBX: 00007ff794cb5fc0 RCX: 00007ff796250a7c [ 141.806520][ T9200] RDX: 0000000000000020 RSI: 00007ff794cb6010 RDI: 0000000000000003 [ 141.806532][ T9200] RBP: 0000000000000000 R08: 00007ff794cb5f14 R09: 000000000000000c [ 141.806544][ T9200] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 141.806590][ T9200] R13: 00007ff794cb5f68 R14: 00007ff794cb6010 R15: 0000000000000000 [ 141.806607][ T9200] [ 142.440320][ T9232] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 142.666710][ T9223] can0: slcan on ttyS3. [ 142.725442][ T9222] can0 (unregistered): slcan off ttyS3. [ 142.776652][ T29] kauditd_printk_skb: 21211 callbacks suppressed [ 142.776665][ T29] audit: type=1400 audit(1755825112.312:333794): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 142.804630][ T29] audit: type=1400 audit(1755825112.312:333795): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 142.826381][ T29] audit: type=1400 audit(1755825112.312:333796): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 142.845462][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 142.848044][ T29] audit: type=1400 audit(1755825112.312:333797): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 142.854517][ T3030] audit: audit_lost=49862 audit_rate_limit=0 audit_backlog_limit=64 [ 142.875846][ T29] audit: type=1400 audit(1755825112.312:333798): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 142.883842][ T3030] audit: backlog limit exceeded [ 142.910151][ T29] audit: type=1400 audit(1755825112.312:333799): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 142.931707][ T29] audit: type=1400 audit(1755825112.312:333800): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 143.449371][ T9304] FAULT_INJECTION: forcing a failure. [ 143.449371][ T9304] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 143.462681][ T9304] CPU: 1 UID: 0 PID: 9304 Comm: syz.3.2259 Not tainted syzkaller #0 PREEMPT(voluntary) [ 143.462705][ T9304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 143.462719][ T9304] Call Trace: [ 143.462725][ T9304] [ 143.462733][ T9304] __dump_stack+0x1d/0x30 [ 143.462809][ T9304] dump_stack_lvl+0xe8/0x140 [ 143.462825][ T9304] dump_stack+0x15/0x1b [ 143.462889][ T9304] should_fail_ex+0x265/0x280 [ 143.462976][ T9304] should_fail+0xb/0x20 [ 143.462990][ T9304] should_fail_usercopy+0x1a/0x20 [ 143.463008][ T9304] _copy_to_user+0x20/0xa0 [ 143.463035][ T9304] simple_read_from_buffer+0xb5/0x130 [ 143.463099][ T9304] proc_fail_nth_read+0x10e/0x150 [ 143.463126][ T9304] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 143.463151][ T9304] vfs_read+0x1a8/0x770 [ 143.463191][ T9304] ? __rcu_read_unlock+0x4f/0x70 [ 143.463290][ T9304] ? __fget_files+0x184/0x1c0 [ 143.463314][ T9304] ksys_read+0xda/0x1a0 [ 143.463332][ T9304] __x64_sys_read+0x40/0x50 [ 143.463416][ T9304] x64_sys_call+0x27bc/0x2ff0 [ 143.463433][ T9304] do_syscall_64+0xd2/0x200 [ 143.463454][ T9304] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 143.463531][ T9304] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 143.463630][ T9304] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 143.463647][ T9304] RIP: 0033:0x7fa15010d5fc [ 143.463660][ T9304] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 143.463675][ T9304] RSP: 002b:00007fa14eb6f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 143.463696][ T9304] RAX: ffffffffffffffda RBX: 00007fa150335fa0 RCX: 00007fa15010d5fc [ 143.463746][ T9304] RDX: 000000000000000f RSI: 00007fa14eb6f0a0 RDI: 0000000000000003 [ 143.463757][ T9304] RBP: 00007fa14eb6f090 R08: 0000000000000000 R09: 0000000000000000 [ 143.463768][ T9304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 143.463778][ T9304] R13: 00007fa150336038 R14: 00007fa150335fa0 R15: 00007fff04aa9288 [ 143.463793][ T9304] [ 145.070463][ T9407] FAULT_INJECTION: forcing a failure. [ 145.070463][ T9407] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 145.083747][ T9407] CPU: 1 UID: 0 PID: 9407 Comm: +}[@ Not tainted syzkaller #0 PREEMPT(voluntary) [ 145.083772][ T9407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 145.083799][ T9407] Call Trace: [ 145.083806][ T9407] [ 145.083814][ T9407] __dump_stack+0x1d/0x30 [ 145.083835][ T9407] dump_stack_lvl+0xe8/0x140 [ 145.083922][ T9407] dump_stack+0x15/0x1b [ 145.083936][ T9407] should_fail_ex+0x265/0x280 [ 145.083954][ T9407] should_fail_alloc_page+0xf2/0x100 [ 145.083979][ T9407] __alloc_frozen_pages_noprof+0xff/0x360 [ 145.084015][ T9407] alloc_pages_mpol+0xb3/0x250 [ 145.084074][ T9407] alloc_pages_noprof+0x90/0x130 [ 145.084141][ T9407] get_free_pages_noprof+0xc/0x40 [ 145.084171][ T9407] selinux_genfs_get_sid+0x33/0x180 [ 145.084193][ T9407] inode_doinit_with_dentry+0x5fe/0x7a0 [ 145.084298][ T9407] selinux_d_instantiate+0x27/0x40 [ 145.084320][ T9407] security_d_instantiate+0x7a/0xa0 [ 145.084480][ T9407] d_splice_alias_ops+0x53/0x280 [ 145.084510][ T9407] d_splice_alias+0x1f/0x30 [ 145.084591][ T9407] kernfs_iop_lookup+0x1a2/0x1c0 [ 145.084692][ T9407] __lookup_slow+0x193/0x250 [ 145.084721][ T9407] lookup_slow+0x3c/0x60 [ 145.084759][ T9407] walk_component+0x1ec/0x220 [ 145.084786][ T9407] path_lookupat+0xfe/0x2a0 [ 145.084875][ T9407] filename_lookup+0x147/0x340 [ 145.084906][ T9407] user_path_at+0x3e/0x130 [ 145.084936][ T9407] __se_sys_mount+0x25b/0x2e0 [ 145.085022][ T9407] ? fput+0x8f/0xc0 [ 145.085045][ T9407] __x64_sys_mount+0x67/0x80 [ 145.085066][ T9407] x64_sys_call+0x2b4d/0x2ff0 [ 145.085156][ T9407] do_syscall_64+0xd2/0x200 [ 145.085177][ T9407] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 145.085202][ T9407] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 145.085228][ T9407] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 145.085277][ T9407] RIP: 0033:0x7ff79624ebe9 [ 145.085290][ T9407] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 145.085304][ T9407] RSP: 002b:00007ff794cb7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 145.085321][ T9407] RAX: ffffffffffffffda RBX: 00007ff796475fa0 RCX: 00007ff79624ebe9 [ 145.085334][ T9407] RDX: 00002000000000c0 RSI: 0000200000000180 RDI: 0000000000000000 [ 145.085412][ T9407] RBP: 00007ff794cb7090 R08: 0000200000000380 R09: 0000000000000000 [ 145.085422][ T9407] R10: 0000000002000040 R11: 0000000000000246 R12: 0000000000000002 [ 145.085433][ T9407] R13: 00007ff796476038 R14: 00007ff796475fa0 R15: 00007ffde8901b68 [ 145.085450][ T9407] [ 145.576640][ T9437] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.2308'. [ 145.683208][ T9432] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.2308'. [ 145.732278][ T9446] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2314'. [ 146.015412][ T9472] FAULT_INJECTION: forcing a failure. [ 146.015412][ T9472] name failslab, interval 1, probability 0, space 0, times 0 [ 146.028382][ T9472] CPU: 1 UID: 0 PID: 9472 Comm: syz.1.2324 Not tainted syzkaller #0 PREEMPT(voluntary) [ 146.028407][ T9472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 146.028418][ T9472] Call Trace: [ 146.028425][ T9472] [ 146.028434][ T9472] __dump_stack+0x1d/0x30 [ 146.028456][ T9472] dump_stack_lvl+0xe8/0x140 [ 146.028512][ T9472] dump_stack+0x15/0x1b [ 146.028525][ T9472] should_fail_ex+0x265/0x280 [ 146.028546][ T9472] ? __se_sys_mount+0xef/0x2e0 [ 146.028600][ T9472] should_failslab+0x8c/0xb0 [ 146.028619][ T9472] __kmalloc_cache_noprof+0x4c/0x320 [ 146.028681][ T9472] ? memdup_user+0x99/0xd0 [ 146.028706][ T9472] __se_sys_mount+0xef/0x2e0 [ 146.028727][ T9472] ? fput+0x8f/0xc0 [ 146.028751][ T9472] ? ksys_write+0x192/0x1a0 [ 146.028837][ T9472] __x64_sys_mount+0x67/0x80 [ 146.028978][ T9472] x64_sys_call+0x2b4d/0x2ff0 [ 146.028998][ T9472] do_syscall_64+0xd2/0x200 [ 146.029038][ T9472] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 146.029062][ T9472] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 146.029086][ T9472] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 146.029104][ T9472] RIP: 0033:0x7f648187ebe9 [ 146.029117][ T9472] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 146.029134][ T9472] RSP: 002b:00007f64802df038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 146.029210][ T9472] RAX: ffffffffffffffda RBX: 00007f6481aa5fa0 RCX: 00007f648187ebe9 [ 146.029367][ T9472] RDX: 0000200000000080 RSI: 0000200000000000 RDI: 0000000000000000 [ 146.029378][ T9472] RBP: 00007f64802df090 R08: 00002000000001c0 R09: 0000000000000000 [ 146.029393][ T9472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 146.029403][ T9472] R13: 00007f6481aa6038 R14: 00007f6481aa5fa0 R15: 00007fff45cd2e78 [ 146.029421][ T9472] [ 146.114272][ T9475] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2325'. [ 146.242941][ T9475] netlink: 'syz.2.2325': attribute type 20 has an invalid length. [ 146.346658][ T9480] FAULT_INJECTION: forcing a failure. [ 146.346658][ T9480] name failslab, interval 1, probability 0, space 0, times 0 [ 146.359846][ T9480] CPU: 0 UID: 0 PID: 9480 Comm: syz.1.2327 Not tainted syzkaller #0 PREEMPT(voluntary) [ 146.359928][ T9480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 146.359939][ T9480] Call Trace: [ 146.359947][ T9480] [ 146.359955][ T9480] __dump_stack+0x1d/0x30 [ 146.360040][ T9480] dump_stack_lvl+0xe8/0x140 [ 146.360069][ T9480] dump_stack+0x15/0x1b [ 146.360083][ T9480] should_fail_ex+0x265/0x280 [ 146.360102][ T9480] should_failslab+0x8c/0xb0 [ 146.360126][ T9480] kmem_cache_alloc_node_noprof+0x57/0x320 [ 146.360267][ T9480] ? __alloc_skb+0x101/0x320 [ 146.360316][ T9480] __alloc_skb+0x101/0x320 [ 146.360343][ T9480] ? audit_log_start+0x365/0x6c0 [ 146.360367][ T9480] audit_log_start+0x380/0x6c0 [ 146.360450][ T9480] audit_seccomp+0x48/0x100 [ 146.360470][ T9480] ? __seccomp_filter+0x68c/0x10d0 [ 146.360488][ T9480] __seccomp_filter+0x69d/0x10d0 [ 146.360572][ T9480] ? __rcu_read_unlock+0x4f/0x70 [ 146.360593][ T9480] ? __fget_files+0x184/0x1c0 [ 146.360617][ T9480] __secure_computing+0x82/0x150 [ 146.360702][ T9480] syscall_trace_enter+0xcf/0x1e0 [ 146.360721][ T9480] do_syscall_64+0xac/0x200 [ 146.360748][ T9480] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 146.360771][ T9480] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 146.360819][ T9480] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 146.360840][ T9480] RIP: 0033:0x7f648187d5fc [ 146.360853][ T9480] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 146.360870][ T9480] RSP: 002b:00007f64802df030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 146.360951][ T9480] RAX: ffffffffffffffda RBX: 00007f6481aa5fa0 RCX: 00007f648187d5fc [ 146.360962][ T9480] RDX: 000000000000000f RSI: 00007f64802df0a0 RDI: 0000000000000004 [ 146.360972][ T9480] RBP: 00007f64802df090 R08: 0000000000000000 R09: 0000000000000000 [ 146.360985][ T9480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 146.360995][ T9480] R13: 00007f6481aa6038 R14: 00007f6481aa5fa0 R15: 00007fff45cd2e78 [ 146.361009][ T9480] [ 146.670144][ T12] netdevsim netdevsim2 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 146.691180][ T9487] FAULT_INJECTION: forcing a failure. [ 146.691180][ T9487] name failslab, interval 1, probability 0, space 0, times 0 [ 146.704042][ T9487] CPU: 0 UID: 0 PID: 9487 Comm: syz.3.2328 Not tainted syzkaller #0 PREEMPT(voluntary) [ 146.704116][ T9487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 146.704132][ T9487] Call Trace: [ 146.704139][ T9487] [ 146.704146][ T9487] __dump_stack+0x1d/0x30 [ 146.704208][ T9487] dump_stack_lvl+0xe8/0x140 [ 146.704225][ T9487] dump_stack+0x15/0x1b [ 146.704238][ T9487] should_fail_ex+0x265/0x280 [ 146.704259][ T9487] ? alloc_netdev_mqs+0x80c/0xa30 [ 146.704277][ T9487] should_failslab+0x8c/0xb0 [ 146.704364][ T9487] __kmalloc_cache_noprof+0x4c/0x320 [ 146.704394][ T9487] alloc_netdev_mqs+0x80c/0xa30 [ 146.704472][ T9487] slip_open+0x2d1/0x920 [ 146.704500][ T9487] ? vfree+0x295/0x3a0 [ 146.704527][ T9487] ? up_write+0x18/0x60 [ 146.704549][ T9487] tty_ldisc_open+0x5d/0xb0 [ 146.704650][ T9487] tty_set_ldisc+0x1db/0x380 [ 146.704672][ T9487] tiocsetd+0x51/0x60 [ 146.704694][ T9487] tty_ioctl+0xa7f/0xb80 [ 146.704787][ T9487] ? __pfx_tty_ioctl+0x10/0x10 [ 146.704885][ T9487] __se_sys_ioctl+0xce/0x140 [ 146.704917][ T9487] __x64_sys_ioctl+0x43/0x50 [ 146.705013][ T9487] x64_sys_call+0x1816/0x2ff0 [ 146.705043][ T9487] do_syscall_64+0xd2/0x200 [ 146.705069][ T9487] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 146.705092][ T9487] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 146.705157][ T9487] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 146.705176][ T9487] RIP: 0033:0x7fa15010ebe9 [ 146.705192][ T9487] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 146.705207][ T9487] RSP: 002b:00007fa14eb6f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 146.705227][ T9487] RAX: ffffffffffffffda RBX: 00007fa150335fa0 RCX: 00007fa15010ebe9 [ 146.705241][ T9487] RDX: 00002000000003c0 RSI: 0000000000005423 RDI: 0000000000000003 [ 146.705324][ T9487] RBP: 00007fa14eb6f090 R08: 0000000000000000 R09: 0000000000000000 [ 146.705336][ T9487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 146.705348][ T9487] R13: 00007fa150336038 R14: 00007fa150335fa0 R15: 00007fff04aa9288 [ 146.705366][ T9487] [ 146.975655][ T12] netdevsim netdevsim2 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 147.076204][ T12] netdevsim netdevsim2 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 147.111628][ T12] netdevsim netdevsim2 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 147.319785][ T9509] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2339'. [ 147.528729][ T9528] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2345'. [ 147.786344][ T29] kauditd_printk_skb: 16682 callbacks suppressed [ 147.786356][ T29] audit: type=1400 audit(1755825117.322:346066): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 147.801530][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 147.814751][ T29] audit: type=1400 audit(1755825117.322:346067): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 147.814796][ T29] audit: type=1400 audit(1755825117.322:346068): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 147.814815][ T29] audit: type=1400 audit(1755825117.322:346069): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 147.821616][ T3030] audit: audit_lost=51336 audit_rate_limit=0 audit_backlog_limit=64 [ 147.821635][ T3030] audit: backlog limit exceeded [ 147.842536][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 147.844771][ T29] audit: type=1400 audit(1755825117.322:346070): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 147.867725][ T3030] audit: audit_lost=51337 audit_rate_limit=0 audit_backlog_limit=64 [ 148.091440][ T9560] netlink: 'syz.2.2358': attribute type 9 has an invalid length. [ 148.150938][ T9562] netlink: 'syz.0.2355': attribute type 1 has an invalid length. [ 148.206714][ T9571] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2355'. [ 148.406682][ T9562] 8021q: adding VLAN 0 to HW filter on device bond3 [ 148.415766][ T9591] FAULT_INJECTION: forcing a failure. [ 148.415766][ T9591] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 148.428980][ T9591] CPU: 0 UID: 0 PID: 9591 Comm: syz.4.2368 Not tainted syzkaller #0 PREEMPT(voluntary) [ 148.429005][ T9591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 148.429053][ T9591] Call Trace: [ 148.429059][ T9591] [ 148.429066][ T9591] __dump_stack+0x1d/0x30 [ 148.429091][ T9591] dump_stack_lvl+0xe8/0x140 [ 148.429109][ T9591] dump_stack+0x15/0x1b [ 148.429170][ T9591] should_fail_ex+0x265/0x280 [ 148.429239][ T9591] should_fail+0xb/0x20 [ 148.429261][ T9591] should_fail_usercopy+0x1a/0x20 [ 148.429281][ T9591] strncpy_from_user+0x25/0x230 [ 148.429353][ T9591] ? kmem_cache_alloc_noprof+0x186/0x310 [ 148.429380][ T9591] ? getname_flags+0x80/0x3b0 [ 148.429402][ T9591] getname_flags+0xae/0x3b0 [ 148.429423][ T9591] __x64_sys_symlinkat+0x4d/0x70 [ 148.429447][ T9591] x64_sys_call+0x293d/0x2ff0 [ 148.429465][ T9591] do_syscall_64+0xd2/0x200 [ 148.429498][ T9591] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 148.429583][ T9591] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 148.429606][ T9591] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 148.429624][ T9591] RIP: 0033:0x7f5b2223ebe9 [ 148.429638][ T9591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 148.429655][ T9591] RSP: 002b:00007f5b20ca7038 EFLAGS: 00000246 ORIG_RAX: 000000000000010a [ 148.429671][ T9591] RAX: ffffffffffffffda RBX: 00007f5b22465fa0 RCX: 00007f5b2223ebe9 [ 148.429688][ T9591] RDX: 0000000000000000 RSI: ffffffffffffff9c RDI: 0000200000002040 [ 148.429700][ T9591] RBP: 00007f5b20ca7090 R08: 0000000000000000 R09: 0000000000000000 [ 148.429714][ T9591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 148.429727][ T9591] R13: 00007f5b22466038 R14: 00007f5b22465fa0 R15: 00007ffd783ab428 [ 148.429805][ T9591] [ 148.626722][ T9571] bond3 (unregistering): Released all slaves [ 148.639143][ T9600] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2370'. [ 148.998592][ T9619] FAULT_INJECTION: forcing a failure. [ 148.998592][ T9619] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 149.011788][ T9619] CPU: 0 UID: 0 PID: 9619 Comm: syz.3.2376 Not tainted syzkaller #0 PREEMPT(voluntary) [ 149.011881][ T9619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 149.011893][ T9619] Call Trace: [ 149.011898][ T9619] [ 149.011905][ T9619] __dump_stack+0x1d/0x30 [ 149.011923][ T9619] dump_stack_lvl+0xe8/0x140 [ 149.011940][ T9619] dump_stack+0x15/0x1b [ 149.011955][ T9619] should_fail_ex+0x265/0x280 [ 149.012039][ T9619] should_fail+0xb/0x20 [ 149.012084][ T9619] should_fail_usercopy+0x1a/0x20 [ 149.012102][ T9619] _copy_from_user+0x1c/0xb0 [ 149.012127][ T9619] tiocswinsz+0x44/0xe0 [ 149.012153][ T9619] tty_ioctl+0x1b1/0xb80 [ 149.012187][ T9619] ? __pfx_tty_ioctl+0x10/0x10 [ 149.012214][ T9619] __se_sys_ioctl+0xce/0x140 [ 149.012246][ T9619] __x64_sys_ioctl+0x43/0x50 [ 149.012331][ T9619] x64_sys_call+0x1816/0x2ff0 [ 149.012352][ T9619] do_syscall_64+0xd2/0x200 [ 149.012375][ T9619] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 149.012434][ T9619] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 149.012457][ T9619] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 149.012478][ T9619] RIP: 0033:0x7fa15010ebe9 [ 149.012491][ T9619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 149.012505][ T9619] RSP: 002b:00007fa14eb6f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 149.012562][ T9619] RAX: ffffffffffffffda RBX: 00007fa150335fa0 RCX: 00007fa15010ebe9 [ 149.012575][ T9619] RDX: 0000200000000000 RSI: 0000000000005414 RDI: 0000000000000003 [ 149.012624][ T9619] RBP: 00007fa14eb6f090 R08: 0000000000000000 R09: 0000000000000000 [ 149.012637][ T9619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 149.012648][ T9619] R13: 00007fa150336038 R14: 00007fa150335fa0 R15: 00007fff04aa9288 [ 149.012666][ T9619] [ 149.826611][ T9671] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9671 comm=syz.0.2390 [ 150.018852][ T9681] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2398'. [ 151.138351][ T9737] FAULT_INJECTION: forcing a failure. [ 151.138351][ T9737] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 151.151527][ T9737] CPU: 0 UID: 0 PID: 9737 Comm: syz.2.2419 Not tainted syzkaller #0 PREEMPT(voluntary) [ 151.151597][ T9737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 151.151607][ T9737] Call Trace: [ 151.151613][ T9737] [ 151.151619][ T9737] __dump_stack+0x1d/0x30 [ 151.151640][ T9737] dump_stack_lvl+0xe8/0x140 [ 151.151659][ T9737] dump_stack+0x15/0x1b [ 151.151676][ T9737] should_fail_ex+0x265/0x280 [ 151.151733][ T9737] should_fail+0xb/0x20 [ 151.151774][ T9737] should_fail_usercopy+0x1a/0x20 [ 151.151796][ T9737] _copy_from_user+0x1c/0xb0 [ 151.151832][ T9737] kstrtouint_from_user+0x69/0xf0 [ 151.151854][ T9737] ? 0xffffffff81000000 [ 151.151868][ T9737] ? selinux_file_permission+0x1e4/0x320 [ 151.151937][ T9737] proc_fail_nth_write+0x50/0x160 [ 151.151996][ T9737] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 151.152017][ T9737] vfs_write+0x269/0x960 [ 151.152034][ T9737] ? vfs_read+0x4e6/0x770 [ 151.152061][ T9737] ? __rcu_read_unlock+0x4f/0x70 [ 151.152080][ T9737] ? __fget_files+0x184/0x1c0 [ 151.152106][ T9737] ksys_write+0xda/0x1a0 [ 151.152182][ T9737] __x64_sys_write+0x40/0x50 [ 151.152200][ T9737] x64_sys_call+0x27fe/0x2ff0 [ 151.152220][ T9737] do_syscall_64+0xd2/0x200 [ 151.152242][ T9737] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 151.152344][ T9737] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 151.152436][ T9737] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 151.152457][ T9737] RIP: 0033:0x7fe1021fd69f [ 151.152473][ T9737] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 151.152490][ T9737] RSP: 002b:00007fe100c5f030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 151.152534][ T9737] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe1021fd69f [ 151.152545][ T9737] RDX: 0000000000000001 RSI: 00007fe100c5f0a0 RDI: 0000000000000004 [ 151.152573][ T9737] RBP: 00007fe100c5f090 R08: 0000000000000000 R09: 0000000000000000 [ 151.152586][ T9737] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 151.152598][ T9737] R13: 00007fe102426038 R14: 00007fe102425fa0 R15: 00007ffedc7c2e88 [ 151.152616][ T9737] [ 152.152547][ T9775] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 152.159130][ T9775] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 152.166925][ T9775] vhci_hcd vhci_hcd.0: Device attached [ 152.353580][ T9783] vhci_hcd: connection closed [ 152.353892][ T51] vhci_hcd: stop threads [ 152.362894][ T51] vhci_hcd: release socket [ 152.367449][ T51] vhci_hcd: disconnect device [ 152.425125][ T10] vhci_hcd: vhci_device speed not set [ 152.645613][ T9790] wireguard0: entered promiscuous mode [ 152.651153][ T9790] wireguard0: entered allmulticast mode [ 152.795080][ T29] kauditd_printk_skb: 17601 callbacks suppressed [ 152.795092][ T29] audit: type=1400 audit(1755825122.322:358682): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 152.831191][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 152.837890][ T3030] audit: audit_lost=53001 audit_rate_limit=0 audit_backlog_limit=64 [ 152.846527][ T3030] audit: backlog limit exceeded [ 152.894961][ T29] audit: type=1400 audit(1755825122.352:358683): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 152.906404][ T9795] audit: audit_backlog=65 > audit_backlog_limit=64 [ 152.916504][ T29] audit: type=1400 audit(1755825122.352:358684): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 152.923020][ T9795] audit: audit_lost=53002 audit_rate_limit=0 audit_backlog_limit=64 [ 152.944438][ T29] audit: type=1400 audit(1755825122.352:358685): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 152.952279][ T9795] audit: backlog limit exceeded [ 153.347717][ T9830] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 153.354939][ T9830] IPv6: NLM_F_CREATE should be set when creating new route [ 153.362176][ T9830] IPv6: NLM_F_CREATE should be set when creating new route [ 153.436935][ T9850] bridge2: entered promiscuous mode [ 153.442163][ T9850] bridge2: entered allmulticast mode [ 153.488169][ T9850] team0: Port device bridge2 added [ 153.829211][ T9881] netlink: 'syz.2.2468': attribute type 1 has an invalid length. [ 153.858884][ T9881] 8021q: adding VLAN 0 to HW filter on device bond1 [ 153.960659][ T9887] 8021q: adding VLAN 0 to HW filter on device bond1 [ 153.969738][ T9887] bond1: (slave vxcan3): The slave device specified does not support setting the MAC address [ 153.981873][ T9887] bond1: (slave vxcan3): Error -95 calling set_mac_address [ 154.736755][ T9936] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(6) [ 154.738566][ T9947] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2492'. [ 154.743293][ T9936] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 154.743327][ T9936] vhci_hcd vhci_hcd.0: Device attached [ 154.820743][ T9936] vhci_hcd vhci_hcd.0: pdev(0) rhport(1) sockfd(8) [ 154.827372][ T9936] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 154.834976][ T9936] vhci_hcd vhci_hcd.0: Device attached [ 154.903205][ T9940] vhci_hcd vhci_hcd.0: pdev(0) rhport(2) sockfd(11) [ 154.909930][ T9940] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 154.917683][ T9940] vhci_hcd vhci_hcd.0: Device attached [ 154.961243][ T9936] vhci_hcd vhci_hcd.0: pdev(0) rhport(3) sockfd(10) [ 154.967977][ T9936] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 154.975631][ T9936] vhci_hcd vhci_hcd.0: Device attached [ 155.004694][ T36] usb 1-1: new low-speed USB device number 3 using vhci_hcd [ 155.021276][ T9940] vhci_hcd vhci_hcd.0: pdev(0) rhport(4) sockfd(15) [ 155.028350][ T9940] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 155.036573][ T9940] vhci_hcd vhci_hcd.0: Device attached [ 155.126654][ T9967] vhci_hcd: connection closed [ 155.126735][ T9950] vhci_hcd: connection closed [ 155.131637][ T9963] vhci_hcd: connection closed [ 155.136784][ T3442] vhci_hcd: stop threads [ 155.145840][ T3442] vhci_hcd: release socket [ 155.151221][ T3442] vhci_hcd: disconnect device [ 155.156173][ T9945] vhci_hcd: connection reset by peer [ 155.161790][ T9957] vhci_hcd: connection closed [ 155.186423][ T3442] vhci_hcd: stop threads [ 155.195549][ T3442] vhci_hcd: release socket [ 155.200143][ T3442] vhci_hcd: disconnect device [ 155.241378][ T3442] vhci_hcd: stop threads [ 155.245845][ T3442] vhci_hcd: release socket [ 155.250571][ T3442] vhci_hcd: disconnect device [ 155.285208][ T3442] vhci_hcd: stop threads [ 155.289555][ T3442] vhci_hcd: release socket [ 155.293969][ T3442] vhci_hcd: disconnect device [ 155.339281][ T3442] vhci_hcd: stop threads [ 155.343579][ T3442] vhci_hcd: release socket [ 155.348129][ T3442] vhci_hcd: disconnect device [ 156.109969][T10020] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2502'. [ 156.320509][ T9988] netlink: 24 bytes leftover after parsing attributes in process `syz.1.2502'. [ 156.609054][T10066] FAULT_INJECTION: forcing a failure. [ 156.609054][T10066] name failslab, interval 1, probability 0, space 0, times 0 [ 156.622521][T10066] CPU: 1 UID: 0 PID: 10066 Comm: syz.3.2530 Not tainted syzkaller #0 PREEMPT(voluntary) [ 156.622608][T10066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 156.622621][T10066] Call Trace: [ 156.622629][T10066] [ 156.622637][T10066] __dump_stack+0x1d/0x30 [ 156.622659][T10066] dump_stack_lvl+0xe8/0x140 [ 156.622677][T10066] dump_stack+0x15/0x1b [ 156.622723][T10066] should_fail_ex+0x265/0x280 [ 156.622743][T10066] should_failslab+0x8c/0xb0 [ 156.622767][T10066] kmem_cache_alloc_noprof+0x50/0x310 [ 156.622848][T10066] ? getname_flags+0x80/0x3b0 [ 156.622936][T10066] getname_flags+0x80/0x3b0 [ 156.622976][T10066] __se_sys_mq_unlink+0x6b/0x260 [ 156.622999][T10066] __x64_sys_mq_unlink+0x1f/0x30 [ 156.623019][T10066] x64_sys_call+0x28ae/0x2ff0 [ 156.623037][T10066] do_syscall_64+0xd2/0x200 [ 156.623118][T10066] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 156.623142][T10066] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 156.623166][T10066] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 156.623185][T10066] RIP: 0033:0x7fa15010ebe9 [ 156.623278][T10066] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 156.623313][T10066] RSP: 002b:00007fa14eb6f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f1 [ 156.623333][T10066] RAX: ffffffffffffffda RBX: 00007fa150335fa0 RCX: 00007fa15010ebe9 [ 156.623344][T10066] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 156.623362][T10066] RBP: 00007fa14eb6f090 R08: 0000000000000000 R09: 0000000000000000 [ 156.623373][T10066] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 156.623383][T10066] R13: 00007fa150336038 R14: 00007fa150335fa0 R15: 00007fff04aa9288 [ 156.623461][T10066] [ 156.860530][T10074] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2534'. [ 156.949504][T10080] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 157.217317][T10090] sch_fq: defrate 4294967295 ignored. [ 157.592480][T10125] netlink: 'syz.3.2552': attribute type 16 has an invalid length. [ 157.805394][ T29] kauditd_printk_skb: 14086 callbacks suppressed [ 157.805409][ T29] audit: type=1400 audit(1755825127.338:371461): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 157.812777][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 157.842383][ T3030] audit: audit_lost=53441 audit_rate_limit=0 audit_backlog_limit=64 [ 157.849335][T10131] audit: audit_backlog=65 > audit_backlog_limit=64 [ 157.851060][ T3030] audit: backlog limit exceeded [ 157.857712][T10131] audit: audit_lost=53442 audit_rate_limit=0 audit_backlog_limit=64 [ 157.871230][T10131] audit: backlog limit exceeded [ 157.957587][ T3309] audit: audit_backlog=65 > audit_backlog_limit=64 [ 157.964581][ T3309] audit: audit_lost=53443 audit_rate_limit=0 audit_backlog_limit=64 [ 157.972670][ T3309] audit: backlog limit exceeded [ 158.128491][T10139] netlink: 20 bytes leftover after parsing attributes in process `syz.3.2561'. [ 158.321366][T10154] netlink: 72 bytes leftover after parsing attributes in process `syz.2.2563'. [ 158.330508][T10154] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 158.616459][T10181] netlink: 96 bytes leftover after parsing attributes in process `syz.3.2576'. [ 159.509962][T10224] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2591'. [ 160.052699][T10255] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=27 sclass=netlink_route_socket pid=10255 comm=syz.3.2602 [ 160.095139][ T36] usb 1-1: enqueue for inactive port 0 [ 160.109466][ T36] usb 1-1: enqueue for inactive port 0 [ 160.195677][ T36] vhci_hcd: vhci_device speed not set [ 160.246617][T10261] netlink: 14 bytes leftover after parsing attributes in process `syz.3.2604'. [ 160.302875][T10261] hsr_slave_0: left promiscuous mode [ 160.361392][T10261] hsr_slave_1: left promiscuous mode [ 161.151417][T10306] FAULT_INJECTION: forcing a failure. [ 161.151417][T10306] name failslab, interval 1, probability 0, space 0, times 0 [ 161.164751][T10306] CPU: 1 UID: 0 PID: 10306 Comm: syz.2.2621 Not tainted syzkaller #0 PREEMPT(voluntary) [ 161.164784][T10306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 161.164794][T10306] Call Trace: [ 161.164801][T10306] [ 161.164809][T10306] __dump_stack+0x1d/0x30 [ 161.164831][T10306] dump_stack_lvl+0xe8/0x140 [ 161.164850][T10306] dump_stack+0x15/0x1b [ 161.164867][T10306] should_fail_ex+0x265/0x280 [ 161.164891][T10306] should_failslab+0x8c/0xb0 [ 161.164914][T10306] kmem_cache_alloc_node_noprof+0x57/0x320 [ 161.164937][T10306] ? __alloc_skb+0x101/0x320 [ 161.164962][T10306] __alloc_skb+0x101/0x320 [ 161.165044][T10306] ? audit_log_start+0x365/0x6c0 [ 161.165085][T10306] audit_log_start+0x380/0x6c0 [ 161.165112][T10306] audit_seccomp+0x48/0x100 [ 161.165175][T10306] ? __seccomp_filter+0x68c/0x10d0 [ 161.165196][T10306] __seccomp_filter+0x69d/0x10d0 [ 161.165218][T10306] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 161.165244][T10306] ? vfs_write+0x7e8/0x960 [ 161.165263][T10306] ? __rcu_read_unlock+0x4f/0x70 [ 161.165360][T10306] ? __fget_files+0x184/0x1c0 [ 161.165385][T10306] __secure_computing+0x82/0x150 [ 161.165456][T10306] syscall_trace_enter+0xcf/0x1e0 [ 161.165475][T10306] do_syscall_64+0xac/0x200 [ 161.165496][T10306] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 161.165518][T10306] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 161.165541][T10306] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 161.165583][T10306] RIP: 0033:0x7fe1021febe9 [ 161.165596][T10306] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 161.165640][T10306] RSP: 002b:00007fe100c5f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000136 [ 161.165660][T10306] RAX: ffffffffffffffda RBX: 00007fe102425fa0 RCX: 00007fe1021febe9 [ 161.165673][T10306] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 161.165720][T10306] RBP: 00007fe100c5f090 R08: 0000000000000000 R09: 0000000000000000 [ 161.165805][T10306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 161.165817][T10306] R13: 00007fe102426038 R14: 00007fe102425fa0 R15: 00007ffedc7c2e88 [ 161.165835][T10306] [ 161.507560][T10313] FAULT_INJECTION: forcing a failure. [ 161.507560][T10313] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 161.521034][T10313] CPU: 0 UID: 0 PID: 10313 Comm: syz.4.2623 Not tainted syzkaller #0 PREEMPT(voluntary) [ 161.521063][T10313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 161.521073][T10313] Call Trace: [ 161.521079][T10313] [ 161.521086][T10313] __dump_stack+0x1d/0x30 [ 161.521104][T10313] dump_stack_lvl+0xe8/0x140 [ 161.521124][T10313] dump_stack+0x15/0x1b [ 161.521208][T10313] should_fail_ex+0x265/0x280 [ 161.521226][T10313] should_fail+0xb/0x20 [ 161.521241][T10313] should_fail_usercopy+0x1a/0x20 [ 161.521261][T10313] strncpy_from_user+0x25/0x230 [ 161.521294][T10313] ? __kmalloc_cache_noprof+0x189/0x320 [ 161.521319][T10313] __se_sys_memfd_create+0x1ff/0x590 [ 161.521340][T10313] __x64_sys_memfd_create+0x31/0x40 [ 161.521362][T10313] x64_sys_call+0x2abe/0x2ff0 [ 161.521414][T10313] do_syscall_64+0xd2/0x200 [ 161.521434][T10313] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 161.521458][T10313] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 161.521490][T10313] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 161.521526][T10313] RIP: 0033:0x7f5b2223ebe9 [ 161.521542][T10313] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 161.521557][T10313] RSP: 002b:00007f5b20ca6e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 161.521573][T10313] RAX: ffffffffffffffda RBX: 00000000000005fc RCX: 00007f5b2223ebe9 [ 161.521584][T10313] RDX: 00007f5b20ca6ef0 RSI: 0000000000000000 RDI: 00007f5b222c27e8 [ 161.521594][T10313] RBP: 0000200000000600 R08: 00007f5b20ca6bb7 R09: 00007f5b20ca6e40 [ 161.521625][T10313] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000000 [ 161.521638][T10313] R13: 00007f5b20ca6ef0 R14: 00007f5b20ca6eb0 R15: 0000200000000c00 [ 161.521657][T10313] [ 162.131698][T10328] pim6reg1: entered promiscuous mode [ 162.137325][T10328] pim6reg1: entered allmulticast mode [ 162.626868][T10342] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2634'. [ 162.815171][ T29] kauditd_printk_skb: 15607 callbacks suppressed [ 162.815184][ T29] audit: type=1400 audit(1755825132.348:385756): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 162.832073][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 162.850365][ T3030] audit: audit_lost=53882 audit_rate_limit=0 audit_backlog_limit=64 [ 162.858474][ T3030] audit: backlog limit exceeded [ 162.897398][T10354] audit: audit_backlog=65 > audit_backlog_limit=64 [ 162.904483][T10354] audit: audit_lost=53883 audit_rate_limit=0 audit_backlog_limit=64 [ 162.912877][T10354] audit: backlog limit exceeded [ 162.918617][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 162.921365][ T29] audit: type=1400 audit(1755825132.348:385757): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 162.925604][ T3030] audit: audit_lost=53884 audit_rate_limit=0 audit_backlog_limit=64 [ 163.331012][T10368] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2642'. [ 163.531461][T10387] FAULT_INJECTION: forcing a failure. [ 163.531461][T10387] name failslab, interval 1, probability 0, space 0, times 0 [ 163.544896][T10387] CPU: 1 UID: 0 PID: 10387 Comm: syz.2.2646 Not tainted syzkaller #0 PREEMPT(voluntary) [ 163.544923][T10387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 163.544944][T10387] Call Trace: [ 163.544952][T10387] [ 163.544959][T10387] __dump_stack+0x1d/0x30 [ 163.544978][T10387] dump_stack_lvl+0xe8/0x140 [ 163.545081][T10387] dump_stack+0x15/0x1b [ 163.545098][T10387] should_fail_ex+0x265/0x280 [ 163.545116][T10387] should_failslab+0x8c/0xb0 [ 163.545138][T10387] kmem_cache_alloc_noprof+0x50/0x310 [ 163.545207][T10387] ? skb_clone+0x151/0x1f0 [ 163.545226][T10387] skb_clone+0x151/0x1f0 [ 163.545246][T10387] __netlink_deliver_tap+0x2c9/0x500 [ 163.545271][T10387] netlink_unicast+0x66b/0x690 [ 163.545320][T10387] netlink_sendmsg+0x58b/0x6b0 [ 163.545343][T10387] ? __pfx_netlink_sendmsg+0x10/0x10 [ 163.545434][T10387] __sock_sendmsg+0x142/0x180 [ 163.545535][T10387] ____sys_sendmsg+0x31e/0x4e0 [ 163.545557][T10387] ___sys_sendmsg+0x17b/0x1d0 [ 163.545588][T10387] __x64_sys_sendmsg+0xd4/0x160 [ 163.545676][T10387] x64_sys_call+0x191e/0x2ff0 [ 163.545694][T10387] do_syscall_64+0xd2/0x200 [ 163.545728][T10387] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 163.545755][T10387] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 163.545778][T10387] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 163.545831][T10387] RIP: 0033:0x7fe1021febe9 [ 163.545847][T10387] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 163.545917][T10387] RSP: 002b:00007fe100c3e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 163.545937][T10387] RAX: ffffffffffffffda RBX: 00007fe102426090 RCX: 00007fe1021febe9 [ 163.546030][T10387] RDX: 0000000000040004 RSI: 0000200000000280 RDI: 0000000000000006 [ 163.546042][T10387] RBP: 00007fe100c3e090 R08: 0000000000000000 R09: 0000000000000000 [ 163.546052][T10387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 163.546063][T10387] R13: 00007fe102426128 R14: 00007fe102426090 R15: 00007ffedc7c2e88 [ 163.546079][T10387] [ 163.777154][T10389] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2649'. [ 163.869154][T10379] syzkaller0: entered promiscuous mode [ 163.874722][T10379] syzkaller0: entered allmulticast mode [ 163.896770][T10389] hsr_slave_0: left promiscuous mode [ 163.903250][T10389] hsr_slave_1: left promiscuous mode [ 164.374567][ T3299] ================================================================== [ 164.382683][ T3299] BUG: KCSAN: data-race in generic_fillattr / inode_add_bytes [ 164.390162][ T3299] [ 164.392500][ T3299] read-write to 0xffff88811b1b6100 of 8 bytes by task 10384 on cpu 1: [ 164.400641][ T3299] inode_add_bytes+0x47/0xe0 [ 164.405242][ T3299] __dquot_alloc_space+0x180/0x8a0 [ 164.410368][ T3299] shmem_inode_acct_blocks+0x129/0x240 [ 164.415846][ T3299] shmem_get_folio_gfp+0x5a7/0xd60 [ 164.420954][ T3299] shmem_write_begin+0xa8/0x190 [ 164.425897][ T3299] generic_perform_write+0x184/0x490 [ 164.431342][ T3299] shmem_file_write_iter+0xc5/0xf0 [ 164.436460][ T3299] __kernel_write_iter+0x2d3/0x540 [ 164.441594][ T3299] dump_user_range+0x61e/0x8f0 [ 164.446364][ T3299] elf_core_dump+0x1e00/0x1f90 [ 164.451220][ T3299] coredump_write+0xb0d/0xe30 [ 164.455985][ T3299] vfs_coredump+0x142f/0x20c0 [ 164.460650][ T3299] get_signal+0xd85/0xf70 [ 164.464988][ T3299] arch_do_signal_or_restart+0x96/0x480 [ 164.470537][ T3299] irqentry_exit_to_user_mode+0x5e/0xa0 [ 164.476109][ T3299] irqentry_exit+0x12/0x50 [ 164.480531][ T3299] asm_exc_page_fault+0x26/0x30 [ 164.485368][ T3299] [ 164.487686][ T3299] read to 0xffff88811b1b6100 of 8 bytes by task 3299 on cpu 0: [ 164.495210][ T3299] generic_fillattr+0x27d/0x340 [ 164.500056][ T3299] shmem_getattr+0x181/0x200 [ 164.504719][ T3299] vfs_getattr_nosec+0x143/0x1e0 [ 164.509740][ T3299] vfs_statx+0x113/0x390 [ 164.514014][ T3299] vfs_fstatat+0x115/0x170 [ 164.518422][ T3299] __se_sys_newfstatat+0x55/0x260 [ 164.523453][ T3299] __x64_sys_newfstatat+0x55/0x70 [ 164.528483][ T3299] x64_sys_call+0x135a/0x2ff0 [ 164.533519][ T3299] do_syscall_64+0xd2/0x200 [ 164.538026][ T3299] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 164.543930][ T3299] [ 164.546342][ T3299] value changed: 0x0000000000015538 -> 0x0000000000015548 [ 164.553638][ T3299] [ 164.555976][ T3299] Reported by Kernel Concurrency Sanitizer on: [ 164.562109][ T3299] CPU: 0 UID: 0 PID: 3299 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(voluntary) [ 164.572127][ T3299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 164.582636][ T3299] ================================================================== [ 167.825978][ T29] kauditd_printk_skb: 30324 callbacks suppressed [ 167.825993][ T29] audit: type=1400 audit(1755825137.348:411794): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 167.837545][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 167.854704][ T29] audit: type=1400 audit(1755825137.358:411795): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 167.861318][ T3030] audit: audit_lost=55314 audit_rate_limit=0 audit_backlog_limit=64 [ 167.861336][ T3030] audit: backlog limit exceeded [ 167.863271][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 167.883260][ T29] audit: type=1400 audit(1755825137.358:411796): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 167.891474][ T3030] audit: audit_lost=55315 audit_rate_limit=0 audit_backlog_limit=64 [ 167.896351][ T29] audit: type=1400 audit(1755825137.358:411797): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 167.902833][ T3030] audit: backlog limit exceeded [ 172.836460][ T29] kauditd_printk_skb: 48546 callbacks suppressed [ 172.836517][ T29] audit: type=1400 audit(1755825142.358:459939): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 172.841618][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 172.843036][ T29] audit: type=1400 audit(1755825142.368:459940): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 172.864553][ T3030] audit: audit_lost=55451 audit_rate_limit=0 audit_backlog_limit=64 [ 172.871118][ T29] audit: type=1400 audit(1755825142.368:459941): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 172.892308][ T3030] audit: backlog limit exceeded [ 172.900382][ T29] audit: type=1400 audit(1755825142.368:459942): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 172.925221][ T3030] audit: audit_backlog=65 > audit_backlog_limit=64 [ 172.926633][ T29] audit: type=1400 audit(1755825142.368:459943): avc: denied { read } for pid=3030 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 172.947908][ T3030] audit: audit_lost=55452 audit_rate_limit=0 audit_backlog_limit=64