last executing test programs: 1m25.654438473s ago: executing program 4 (id=5): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0xf4}}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000002001000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x400}, 0x18) r2 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r4 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) write$tun(r3, &(0x7f00000003c0)={@val={0x0, 0x86dd}, @val={0x0, 0x4, 0x11, 0x4, 0x0, 0xa6b9}, @mpls={[], @ipv6=@gre_packet={0xe, 0x6, "ec00be", 0x44, 0x2f, 0xff, @local, @mcast2, {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x88be, 0x0, 0x3}, {0x0, 0x0, 0x1, 0x1}, {0x1, 0x0, 0x1}, {0xa888, 0x88be, 0x2, {{0x6, 0x1, 0x9, 0x2, 0x1, 0x0, 0x3, 0x4}, 0x1, {0x8100}}}, {0x8, 0x22eb, 0x20000, {{0x0, 0x2, 0xc, 0x0, 0x0, 0x2, 0x7, 0x2}, 0x2, {0x2, 0x4, 0x0, 0x5, 0x1, 0x1, 0x1}}}, {0x8, 0x6558, 0x2}}}}}}, 0x7a) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, @in6=@dev={0xfe, 0x80, '\x00', 0x30}, 0x0, 0x0, 0x0, 0x1, 0xa, 0x80}, {0x5, 0x9, 0x0, 0xffffffeffffffffa, 0x0, 0x200000000000}, {0xffffffffffffffff, 0x8, 0x6, 0x20000001}, 0x0, 0x0, 0x0, 0x1, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x26}, 0x0, 0x2b}, 0xa, @in=@broadcast, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x3c0}}, 0xe8) r6 = socket$key(0xf, 0x3, 0x2) r7 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000400), 0x440480) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r7, 0xc08c5332, &(0x7f0000000c00)={0x8001, 0x1719, 0x1, 'queue0\x00', 0x7}) r8 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file1\x00', 0x2000c16, &(0x7f0000000000)={[{@usrquota}, {@acl}]}, 0xff, 0x257, &(0x7f0000000500)="$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") fspick(r8, &(0x7f0000000140)='./file1/file3\x00', 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x48c, &(0x7f0000000380)={0x0, 'team0\x00'}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0) sendmsg$key(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000300)=ANY=[@ANYRES32=r3, @ANYRES32=r1, @ANYRES16=r8], 0x1028}}, 0x4c041) syz_usb_connect$rtl8150(0x1, 0x3f, &(0x7f0000000200)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xbda, 0x8150, 0x0, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d}}]}}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x6, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r11, @ANYBLOB="000000000000005c07d00c48e7abe3dfd5168da900b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095", @ANYRES8=r1], &(0x7f0000000180)='GPL\x00', 0x0, 0xffffffffffffff2d, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r11, &(0x7f0000000480), &(0x7f0000000340)=@udp6=r9}, 0x20) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r9, 0x65, 0x1, &(0x7f0000000480)=[{{0x4}, {0x1, 0x0, 0x1}}, {{0x1}, {0x1, 0x1, 0x0, 0x1}}], 0x10) 1m23.597702142s ago: executing program 4 (id=24): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket(0x2, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x4018, 0x4) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendmmsg$inet(r1, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000440)="07db2716b09b314030d976dc3808284ff464832583f72bf3bea7408f", 0x1c}], 0x1}}], 0x1, 0x8c4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYRESOCT=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x18) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0000000206030000000000008000000000000005000100070000000900020073797a30000000001400078008001240000000000500150004000000050005000000000005000400000000000d000300686173683a6d6163"], 0x5c}}, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000740)=ANY=[@ANYBLOB="44000000090605000000000000000000010000050900020073797a30000006000500010007000000080009400000000114000880100007800a001100"], 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x44000) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000100000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r5}, 0x18) r6 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$selinux_access(r6, &(0x7f0000000040)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a6c645f736f5f7420704a122f7362696e2f6468636c69656e742030"], 0x41) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB="28000000030605000000000000000000000000000500010007"], 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x20000010) 1m23.547849303s ago: executing program 4 (id=25): r0 = socket$kcm(0x10, 0x400000002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="040300000900000000000000000000008500000023000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="1c0000005e0007"], 0xfe33) syz_clone(0x100000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000001ac0), 0xffffffffffffffff) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x18, 0xc, &(0x7f0000001240)=ANY=[@ANYRESDEC, @ANYBLOB="0191337127b4c5f4984608bf545ca8ee1e3fac84f930629eaaa69e311899061078129b23d790b8c586fbd910b9cd7ebfca9c8ac539000065629ae118d5369ebc181c62c855b9f04969b89b55cb79736e6c00a12198175dd74ee213a80b4a22bd3b477d778f414cfb87eccc62cb668cc973a7a886693ea06a82a13cfafcf63669ff4b4958d45ac02aed23c42febbc9280faf365dc6b4f4bd2ddcceffd06ca37653f", @ANYRESDEC=r3, @ANYRESOCT=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000001080)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) write$selinux_load(0xffffffffffffffff, 0x0, 0x2000) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x182, 0x0) ioctl$TIOCGPTPEER(r9, 0x5441, 0x3) r10 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r10, &(0x7f0000001f40)={0x0, 0x0, &(0x7f0000001f00)={&(0x7f0000000500)=ANY=[@ANYBLOB="a942c3911e7c0fb3fe4903d2ded53c000000", @ANYRES16=r1, @ANYBLOB="010026bd7000fcdbdf251c0000000e0001006e657464657673696d0000000f0002006e657464657673696d30000003000b00ff000000"], 0x3c}, 0x1, 0x0, 0x0, 0x40801}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r11}, 0x10) r12 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r13 = ioctl$LOOP_CTL_GET_FREE(r12, 0x4c82) ioctl$LOOP_CTL_REMOVE(r12, 0x4c81, r13) 1m23.479427715s ago: executing program 4 (id=26): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="01000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f00000001c0)={[{@grpquota}, {@inode_readahead_blks}, {@minixdf}]}, 0x1, 0x4ff, &(0x7f0000000ac0)="$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") open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x111) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x1c0000000, 0x8005, 0x0, 0x0, 0x15, 0x0, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c6780820d1cbf7966d61fdcf335263bd9bffbcc2542ded71038259ca171ce1a311ef54ec32d71e14ef3dc177e9b48b00", "f28359738e229a4c66810000000000d300e6d602000000000000000000000001", [0x200]}) r5 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', &(0x7f0000000080)={0x0, 0x0, 0x14}, 0x18) getdents64(r5, 0x0, 0x0) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) getpriority(0x1, r6) openat(0xffffffffffffff9c, 0x0, 0x0, 0x42) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, &(0x7f00000037c0)='posixacl\x00', 0x0, 0x0) creat(0x0, 0x0) mount(0x0, &(0x7f0000000240)='./cgroup\x00', &(0x7f0000000500)='autofs\x00', 0x0, &(0x7f0000000280)='gid=0,no9\xe1\x12 \x91\xfdP\x83\x0e\xb9G!8\xb0\x89\x99\x81\x02\x85\x1cE\b\x9f\x0f8-\xf6\xa4 \x99\x8d\x1d\x8a\xc7\xc5\x96\xe8Ee\xd5\xac\x18(\x9d\tIr\xdd\\\x95\x9eu}\x06ib\x88\x8c\x9d\xde\xeaT0;\xb4\x1f\x8cm\x15y\xb4[Gc\xaf\xee#\xcf>Qk\xcf\xfc\x12bY\xfc&\x93\xe0\xcc#\x93w\x84@/VV\xbc\x0eL\xeb~1\x832\xa7\xf7l\x1b\xffh\x96O\x84h\x1b\'\x15\xae\xc8\xfbrK1\x1b\x82\\kU{!\x8fe\xbd\xfa\xf3\xac\xdc\x9a7\xbb\xdf\xdf\n\xc4U\xfa\x15\x03e\xe2[\xa6\xd3\xce%\b#s\x05\x00\x00\xc0\x03\x84\x0e\xc3\x0e\xce\x1e\xe4\xc8\xd4s\xd8\xe4W\x8a\x18j\xc4S\xbf\xc9\xcc1\x87\xa0\f\x91/\x8b\a\xdd\x1bj\xff\xae\xfcJM\x9b\xc3\xe6q\xc1T\x19\xa9,\xef\x8ax\xbb\x18\xe7\x99\xff\x10\x15S\x19\'?\xfbt/\x86\xc6\xd3\xb2c\xc4*\x06\x05NT\xaa_\x97\xda8\xc8\xd0\x8d\x87Yk\xa1\x83\x9f\x86.[\x83\xdf&\x13\xcc\xb9\x01`D7R\xb7o\xa1\x1e\xffD#\t\x18i\xed\xa4<\x9c\x02\x00\x82\xbd\x93\x9e+\x03\xc6w?\x83\x05\x0e\xf3TB]\xc0V\x1b\xf3\xfe\xe1s1r\xcb\xbc9\x19#3k\xd4#r\x9e=C\xd6k\xf89S\xb3\xf4\x84\xd8)\x17L\xeb\xf4\xf3iW\xe6\x9b\x8a\x13\x01\x0ej\x88N\xb5\xf7e;\xdd\xe1\xfc\x9c\x8a\xae>=n\xb3\x12\x7f\x94\x19~\x93\x92xK\x9b\x9e\xa6\x9e\x16v\"e\xe80\xa3%oS\xb4\xad\xb1\xb6\xe0\xef\x1fy\xf2\x1aN\xd7\xee\\*6\xa6\x8e\x84 \xc5\xc0\xd4/\x0eVg\xc1\xd9\xcb\xdc\xc7p)1\x00u\xa5\x8c\n\x91l\xef\x17\xfc\xc2\xef\xb9\x03\b*\x1c\xc6\xe8\x9a\xe0o\xba\x1d {%\x904\xa2\x8f\xed\xca%Z\x1a#\xddA7\x1b\xdf\xd5]\xc6\x0f\x9a\xf5)g\x8c\x98\x9e\xe6\x9b\xbd\x96\xc3\xb6}3\x98r\\.o\xe0\xee\x1d\x80\x0f\x8c\xa0%>]\x9a{=\xdd\x80\x13.\x96\xf9]u\x96P\xdb+A\xaa\xce\x9dP\xde\v\x16\x1d\x05\xbe\xd3\x8c\x99\xb2\x1b\xccX\xfdy\x05\xb0Q]bB') pivot_root(&(0x7f0000000240)='./file1\x00', &(0x7f0000002080)='./bus\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x4}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x3}, @ptr={0x0, 0x0, 0x0, 0x2, 0x4}, @volatile={0x0, 0x0, 0x0, 0x9, 0x3}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x52}, 0x28) socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x100b28, 0x1, 0x0, 0x1, 0xa, 0x21005, 0x9, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB], &(0x7f0000000c00)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r7, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socket$pppl2tp(0x18, 0x1, 0x1) 1m23.283023809s ago: executing program 4 (id=28): socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) set_mempolicy(0x4005, &(0x7f0000000040)=0x10000000005, 0x4) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', 0xffffffffffffffff, 0x0, 0xfffffffff7ffffe9}, 0x18) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r1, 0x0, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_usb_connect$uac1(0x0, 0x71, &(0x7f0000000240)=ANY=[], 0x0) mlock2(&(0x7f00008af000/0x4000)=nil, 0x4000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='mm_page_alloc_extfrag\x00', r3, 0x0, 0x4000}, 0x18) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x6, 0x0, 0x8100, 0x0, {0xc3}, {}, {0xe, 0xd}}, [@TCA_RATE={0x6}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x11, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) r6 = socket(0x1e, 0x4, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r7}, 0x10) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r8, &(0x7f0000000000)={0xa, 0x1fff, 0x0, @mcast2, 0x5}, 0x1c) write(r8, &(0x7f0000000080)="84650000cd", 0x5) setsockopt$TIPC_DEST_DROPPABLE(r6, 0x10f, 0x81, &(0x7f0000000480), 0x4) sendmsg$tipc(r6, &(0x7f0000000200)={&(0x7f00000003c0)=@nameseq={0x1e, 0x1, 0x2, {0x1, 0x1, 0x4}}, 0x10, 0x0}, 0x4000001) 1m22.961938285s ago: executing program 4 (id=35): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d0000008500000050"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000580)='kfree\x00', r0}, 0x18) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x1, 0x5a) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000240)={0x0, 0x1000, 0xa, [0x10, 0x5, 0x7, 0x3, 0x401, 0xa065, 0x1, 0x6, 0xfff, 0x400]}, &(0x7f0000000280)=0x1c) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x100000011, @multicast2, 0x0, 0x0, 'dh\x00', 0x2d, 0x400eeb4, 0x13}, 0x2c) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={r2, 0xa}, &(0x7f0000000300)=0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x9, 0x2, 0x4, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r4}, &(0x7f0000000840), &(0x7f0000000880), 0x1000000}, 0x20) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001b40)={&(0x7f0000000d40)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="a1ab2abd7000000000003200000008001701"], 0x24}, 0x1, 0x0, 0x0, 0x4050}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc0}, 0x94) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)={0x2c, 0x0, 0x10ada85e65c25359, 0xfffffffc, 0x25dfdbfd, {{0x6b}, {@val={0x8}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5, 0x9, 0x9}]}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8441}, 0x4000000) r5 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_FLUSH(r5, 0x0, 0xd4, &(0x7f0000000040)=0x8, 0x4) 1m22.961598335s ago: executing program 32 (id=35): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d0000008500000050"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000580)='kfree\x00', r0}, 0x18) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x1, 0x5a) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000240)={0x0, 0x1000, 0xa, [0x10, 0x5, 0x7, 0x3, 0x401, 0xa065, 0x1, 0x6, 0xfff, 0x400]}, &(0x7f0000000280)=0x1c) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x100000011, @multicast2, 0x0, 0x0, 'dh\x00', 0x2d, 0x400eeb4, 0x13}, 0x2c) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={r2, 0xa}, &(0x7f0000000300)=0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x9, 0x2, 0x4, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r4}, &(0x7f0000000840), &(0x7f0000000880), 0x1000000}, 0x20) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001b40)={&(0x7f0000000d40)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="a1ab2abd7000000000003200000008001701"], 0x24}, 0x1, 0x0, 0x0, 0x4050}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc0}, 0x94) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)={0x2c, 0x0, 0x10ada85e65c25359, 0xfffffffc, 0x25dfdbfd, {{0x6b}, {@val={0x8}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5, 0x9, 0x9}]}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8441}, 0x4000000) r5 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_FLUSH(r5, 0x0, 0xd4, &(0x7f0000000040)=0x8, 0x4) 1.630848109s ago: executing program 3 (id=1955): sched_setscheduler(0x0, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) connect$unix(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r0}, &(0x7f0000001c00), &(0x7f0000001c40)=r1}, 0x20) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000000c0)='sys_enter\x00', r2}, 0x18) rt_sigprocmask(0x2, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) r3 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x2, 0x0, 0x0, 0x4, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={0x0}, 0x18) r4 = syz_pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x2, 0x0, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0x8) setsockopt$RXRPC_SECURITY_KEYRING(r5, 0x110, 0x2, &(0x7f00000003c0)='\x00', 0x1) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0xd, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000540)='inet_sock_set_state\x00', r6}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x20, &(0x7f0000000000)={&(0x7f00000002c0)=""/173, 0xad, 0x0, &(0x7f0000000580)=""/4096, 0x1000}}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000001c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='inet_sock_set_state\x00', r8, 0x0, 0x7ff}, 0x18) socket$inet6_tcp(0xa, 0x1, 0x0) 1.03965953s ago: executing program 5 (id=1972): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYRES16=0x0], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000003c0)={'wg2\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000030000000100000008000100", @ANYRES32=r3, @ANYBLOB="4c00088048000080200004000a004e2100000000000000000000000000000000000000010000000024000100975c9d81c983c8209ee781254b899f8ed925ae9f0923c23c62f53c57cdbf691c"], 0x68}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1b, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a0ef010095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x1, 0x0, 0x7ffc0005}]}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x200000) syz_emit_ethernet(0x6a, &(0x7f0000000140)=ANY=[@ANYRES32=r0], 0x0) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000003c0)='./control\x00', 0x10444, &(0x7f0000000600)={[{@nogrpid}, {@jqfmt_vfsv1}, {@nobarrier}, {@debug}, {@data_err_abort}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xcc8}}, {@nogrpid}], [{@fsmagic={'fsmagic', 0x3d, 0x6}}, {@fowner_gt}]}, 0x0, 0x451, &(0x7f00000018c0)="$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") r4 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) close(r4) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r5, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x7, &(0x7f0000002400)=0x0) io_submit(r6, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x2002000000, 0x4, 0x0, 0x1, 0x0, r5, &(0x7f0000000040)="0200ffff0000", 0x6, 0x0, 0x0, 0x2}]) r7 = inotify_init1(0x800) fcntl$setstatus(r4, 0x4, 0x2c00) r8 = gettid() fcntl$setown(r4, 0x8, r8) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000000040)={[0xffffffffffff7ff8]}, 0x0, 0x0, 0x8) inotify_add_watch(r7, &(0x7f0000000180)='./control\x00', 0xa4000960) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200)=r4, 0x4) 754.323785ms ago: executing program 3 (id=1976): mknodat$null(0xffffffffffffff9c, 0x0, 0xb0a54e68b1cd2fdb, 0x103) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newtaction={0x44, 0x30, 0x1, 0x0, 0x0, {}, [{0x30, 0x1, [@m_ife={0x2c, 0x1, 0x0, 0x0, {{0x8}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x44}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) socket(0x2, 0x80805, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/icmp6\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010328bd7000fedbdf251c0000000c00018008000100", @ANYRES32=r5], 0x20}}, 0x10) 702.953386ms ago: executing program 3 (id=1980): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'macvlan1\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'ipvlan0\x00', 0x0}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="400000001000030500000000fddbdf0000000000", @ANYRES32=0x0, @ANYBLOB="02880100373004002000128008000100687372001400028008000100", @ANYRES32=r1, @ANYBLOB="08000200", @ANYRES32=r3], 0x40}}, 0x4008054) 658.010577ms ago: executing program 3 (id=1983): r0 = socket$igmp6(0xa, 0x3, 0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000380)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000000)={@remote, 0x5d, r2}) 617.653648ms ago: executing program 1 (id=1985): r0 = socket$igmp6(0xa, 0x3, 0x2) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000910095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r2, 0x2f, 0x0, @void}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000140)=r3, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000380)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000000)={@remote, 0x5d, r4}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/timers\x00', 0x0, 0x0) 615.553698ms ago: executing program 3 (id=1987): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x0}, 0x94) prctl$PR_SET_NAME(0xf, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000003b00)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x11, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000080)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000008000000180001801400020073797a5f74756e000000000000000000180002801400038010"], 0x44}, 0x1, 0x0, 0x0, 0x20004080}, 0x0) 569.915379ms ago: executing program 1 (id=1988): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000380)=[{0x200000000006, 0x1, 0x7, 0x7ffc1ffb}]}) getegid() ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000800)) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x57) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000200)="0000000000aa303e97380e90231bdbdaf6a4bd866226b7cdb7c26858c4e4fd703be2f51ed6ddc4a47116ec2db75c7042a22491af0ffea4174a9de3350c0a498396b28c7d", 0x44}, {&(0x7f0000000900)}, {&(0x7f00000003c0)="128b9306006d4810e5ac5040ad9201847839fc378469d5765b9cc241840896c1498194a7197b45d74a8532b82037b02c9e6045", 0x33}], 0x3}, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, 0x0, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[], 0x30}}, 0x40) recvmmsg(r0, &(0x7f00000040c0)=[{{0x0, 0x0, 0x0}, 0x6}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a80)=""/93, 0x5d}, 0x6}], 0x2, 0x100, 0x0) accept4$tipc(r0, 0x0, &(0x7f00000000c0), 0x800) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffe44) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x7, &(0x7f0000000180)=0x3, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x275a, 0x0) 562.023929ms ago: executing program 3 (id=1990): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000001c80), 0x1, 0x0) getsockname$packet(r0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xd, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000001b80)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback=0x36e084fcb6392193, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$packet(0x11, 0x3, 0x300) socket$l2tp6(0xa, 0x2, 0x73) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1, 0x0, 0x6}, 0x1c) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000000)={0x6, 0x0, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x1}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd4242"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r3, 0x5412, &(0x7f0000000640)=0x13) r4 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback}, 0x1c) syz_usb_disconnect(0xffffffffffffffff) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f00000000c0)='vegas\x00', 0x6) shutdown(r4, 0x2) 553.577329ms ago: executing program 1 (id=1992): r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0xa401) r1 = socket$packet(0x11, 0xa, 0x300) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000200)={0xa, 0x4e22, 0x7f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xfffffffe}, 0x1c) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000080)=0x9, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4627, 0xfdfffffd, @local, 0x2}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000000240), 0x0, 0x4001c00) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000002fc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@ipv4_newroute={0x34, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_SPORT={0x6, 0x1c, 0x4e23}, @RTA_OIF={0x8}, @RTA_IP_PROTO={0x5, 0x1b, 0x1}]}, 0x34}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095", @ANYRES16=r1], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000003180)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x7ff, 0xf84, 0x3}, 0x1c) close(r5) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000002c0)='./file0\x00', 0x2010008, &(0x7f00000001c0), 0xff, 0x53b, &(0x7f0000000b80)="$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") ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f00000006c0)={0x2, 0x13, 0x4, 0x1, 0x0, 0x5, 0x0}) 489.71927ms ago: executing program 1 (id=1995): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000001c80), 0x1, 0x0) getsockname$packet(r0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x2) 488.649221ms ago: executing program 1 (id=1996): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x3, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000000000a0000002950000000000e7ff009e"], 0x0}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8001c00180081064e81f782db44b9b545c7910006007c09e8fe55a10a0017", 0x1f}], 0x1}, 0x0) (async) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8001c00180081064e81f782db44b9b545c7910006007c09e8fe55a10a0017", 0x1f}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="d8000000210081044e81f7d28344b904020000", 0x2}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x0) (async) socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x33fe0) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x33fe0) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r2) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(0x0, 0x0) (async) mkdir(0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, 0x0, &(0x7f0000000140)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x62, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xb904}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800001b68d9e5cd3318a0830000000000000000000000000018110000d3fc4c55df7be2dd5259b7081454717d952ce29c4f0aa9c8656319040e3b1ef6ba8858f81b4b1905301a9f5af55a6264b6d11cbe3d0df50a6da0e8174fc7000b59adef86d6fd714caf93331159df4ab8f00672370d11d696760f3d0b6bc35715a0b5bb784292eef898ac23d2bedfc7899e37", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800001b68d9e5cd3318a0830000000000000000000000000018110000d3fc4c55df7be2dd5259b7081454717d952ce29c4f0aa9c8656319040e3b1ef6ba8858f81b4b1905301a9f5af55a6264b6d11cbe3d0df50a6da0e8174fc7000b59adef86d6fd714caf93331159df4ab8f00672370d11d696760f3d0b6bc35715a0b5bb784292eef898ac23d2bedfc7899e37", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4, 0x0, 0xfffffffffffffffe}, 0xfd63) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39c}, 0x0) kexec_load(0x3e00, 0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0xff600000, 0x1000000}], 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r1, 0x0, 0xfffffffffffffffe}, 0x18) pipe2(&(0x7f0000001cc0), 0x800) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) (async) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x11, 0x10, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r6, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) (async) socket$nl_netfilter(0x10, 0x3, 0xc) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 439.820462ms ago: executing program 1 (id=1998): r0 = socket$netlink(0x10, 0x3, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xa, 0x4, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x9, 0x61, 0x11, 0x4c}, [@call={0x85, 0x0, 0x0, 0x25}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000680)=@ipmr_delroute={0x1c, 0x19, 0x501, 0x70bd26, 0x25dfdbfe, {0x80, 0x20, 0x0, 0x40, 0xfe, 0x4, 0x74b16507cf167cca, 0xb, 0x800}}, 0x1c}, 0x1, 0x0, 0x0, 0x24040804}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000600)='./bus\x00', 0x1c14744, &(0x7f0000000040)={[{@jqfmt_vfsold}]}, 0x0, 0x4ac, &(0x7f0000000640)="$eJzs3MtvG8UfAPDvrp0+f78mlPJoqUSgICIeSZO20ANIgEDiABIIDuUYkrQqdRvUBIlWFU0RKkdUiTviiMRfwIkTAk5IXDjAHVWqoELq44LR2rupbWw3KUmc4M9HcjvjGe/s17PjnezYG0DfGs7+SSL+FxG/RMRgPdtcYbj+3/Wr56ZuXD03lUS1+ubvSa3etavnpoqqxeu255mRNCL9OMkbaTZ35uyJyUpl5nSeH5s/+d7Y3JmzTx0/OXls5tjMqYnDhw8eGH/m6YlDTa871C2YcueiLL5rez6c3bv7lbcvvTZ15NI733+V7W+alzfGsVKGs8D/qNa0lj260o312F/VW3EmtX642SZq1ptSPmwGauN/MEoNg2gwXv6opzsHrKrsM3tz5+KFKvAflkSv9wDojeJEn/39mz8G1mjqsS5ceaH+B1AW+/X8US8pL14bWM03ZDgijizc/Dx7RMN1iOr5+txsFZsGAPrUN9n858mm+V8+/0nj3oZ6O/K1oaGIuCsidkbE3RGxKyLuiajVvS8i7l9m+61LQ/9ch0kvR+ua1ArK5n/P5mtbzfO/YvYXQ6U89/9a/APJ0eOVmf35ezISA5uz/Hi7jRebeOmnTzu13zj/yx5Z+8VcMN/I5fLm5vinJ+cnV2pSeuVCxJ5yu/iTxZWArO3dEbFneZveUSSOP/7l3k6Vbh9/F13W+5aq+kXEY/X+X4iW+AtJ9/XJsS1Rmdk/Vj8qSm3a+OHHi693av9fxb8Csv7f1nz8t9QY/DNpXK+dW34bF3/9pOPaanmJx3+j7PjflLxVW9PdlD/3weT8/OnxiE3Jq7V80/MTt15b5Iv6Wfwj+9qP/535a7L4H4iIvRE/F8PuwbzvHoqIhyNiX5f4v3vxkXc7la2H/p9u+/m3ePwPNff/8hOlE99+3an91viTPH+rRtb/B2upkfyZ2udfbmuH7XbenS15jTs9mgEAAGDjSWvfjU/S0cV0mo6O1r/Dvyu2pZXZufknjs6+f2q6/h36oRhIi+ufgw3XQ8eThXyL9fxEfq24KD+QXzf+rLQ1SaIyMzo1W5nucezQ77Z3GP+Z39pdzI6I59Z0D4FVtQLraMAG1Tr+0x7tB7D2nP+hfxn/0L+Mf+hfxfh/o+G58y11OqwFABuc8z/0L+Mf+tfi+L/Q2/0A1p7zP/Sldj+SL+5x0FBU3Azgzm8CsIxEucuv99dporSW789SElmHrW4Tkd6uzvPR0zch8ptY9Lwv2h3hS+qdG9U7bKLcZXQvNbH2n0UAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACr4e8AAAD//3Hk5OQ=") r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000e00)=ANY=[@ANYBLOB="a4010000160001040000000000000000fc0100000000000000000000000000000000000000000000000000000000000000040fd1ffff0002020000000c000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1e0001000000000000000000000000ffffffff33000000fc0200000000000000000000000000010000000000000000e103000000000000000000000000000000000000000000000000000000000080ff0f000000000000010000000000000000000000000000000101000000000000ffffffffffffffff0000000000000000000800000000000010000000040000000300000000000000040000000a000003850000000000000000000000ad040000ac00070064010101000000000000000000000000ac14142e0000000000000000000000004e2100074e2301ff020020805e000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="050000000000000000000000000000000000000000000004030000000000000002000000000000000100000000000000cb03000000000000070000000000000005000000000000000800000000000000e70c00000000000006000000000000001fe00000b36b6e000e00020300000000c7b8f5286237218f1a3c20f4757bb388c72bad4fe8c28d5c54ff2864f1fdd5b68757f547e2144583f2df32f6c30005f93b7bc417edb4d00a4aaf1a84e56c2283889c4f8ed8d92ee8c1f4696812df2809ed326e026e7c"], 0x1a4}, 0x1, 0x0, 0x0, 0x48000}, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_hci(r3, 0x0, 0x2, 0x0, &(0x7f0000003600)) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019f000000000000000002000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x4005}, 0x0) sendmmsg(r4, &(0x7f0000000000), 0x4000000000001f2, 0x0) ioctl$PPPOEIOCDFWD(r4, 0xb101, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') syz_usb_connect(0x3, 0x31f, &(0x7f00000001c0)={{0x12, 0x1, 0x201, 0xcf, 0x43, 0x66, 0x8, 0x12d1, 0xe8ba, 0x404a, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x30d, 0x1, 0x0, 0xb8, 0xc0, 0x8, [{{0x9, 0x4, 0x9d, 0x4, 0x7, 0xff, 0x4, 0x3f, 0x9, [], [{{0x9, 0x5, 0x7, 0x0, 0x200, 0x0, 0xc6, 0x64}}, {{0x9, 0x5, 0x6, 0x1, 0x3ff, 0x8, 0x2, 0x6d, [@generic={0x91, 0x10, "aa93c825362ef22eed389c87914d74c9bd3981a51b4ea7618ed8b3cf2d26f0c1ac487776a58cb114e545cc3edf168599dae2210902c5ba51ae60120e58bad81a12f6f85bb83397bbef7e56fd552f44daca3b22cd68e16d90fa7977f3f8e1c7f74903f5878ec1d8ad40efc6de4e645a238c1828d2b631c0c8c6114c4517e556958b2f8c483326176e0ed6c5e094a716"}]}}, {{0x9, 0x5, 0xa, 0x8, 0x20, 0x6, 0x5, 0x2, [@uac_iso={0x7, 0x25, 0x1, 0x42, 0x6}, @generic={0xb3, 0x6, "95005d7ae6f442363a4c6adfbc931e4d3d83124b54b12f4fed5129b0d8e9f06d9a1872c83bd98aad86f52ac62882fac0fd5186154ded4f79af0818d948a07461c93e5294ca22cc5765507413f1df19bf081d53654fafba7fdf049013865a69cd0323f8a13e027863003f15be2c73e0e39aedc008c464db6c39a8f3bca0a4f7515ca204e40ab3fe381a339d70aed6539d2a8ee537c1601849e7d913025030b6d16c581bae6f24a58f789291a2bdf29ac02e"}]}}, {{0x9, 0x5, 0xddba9e3cc671a0ec, 0x0, 0x40, 0xff, 0x81, 0x1}}, {{0x9, 0x5, 0x1, 0x0, 0x440, 0xc, 0x81, 0x1, [@generic={0xc0, 0x24, "708040e7a38edf361e9c958ba1c9830ef11025cae671f5a65073d3778ec1da577342c53f97ccdf70fdb2a5de9718873e6bcf0d763ec2ac90a55f3080b9abf63942664af25fa9c3b63fec7991e0ea2533b55ee3c37ff2748335cd94342dbba560e2d0b2892d91f83261d3fbb68cb5c4b0a326248a26aec5b72a038608f7168593c6656dcbed8b54e34d97ad30e92c2a4821d60d3568a012f44b1fb9677c66f14968ebb61f5ddcc22d056325e6c931418c78d66efcd2b046c7d31fb4a241d0"}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0x61}]}}, {{0x9, 0x5, 0xa, 0x4, 0x3ff, 0x81, 0x3, 0x9}}, {{0x9, 0x5, 0x0, 0x4, 0x1d414640135c2e8b, 0xf1, 0x6, 0x40, [@generic={0xaa, 0xc, "96f1f24646217b4ba54bc035ee4a4c1a15e2496afdb2c5b481b9754569114372c896f892e7945441d107bc5bc6d1629f62930bac1cf8a7cae919f4252ca315a195b0d901941a9ef4aa213125e0bcc81a37901371f20210bd7686cf897ec3831a0ccf10bbbaa3f6c7a96afb9cad856312aaef76cba91f4b24ff4bcd77f1d582a61e9d6c0f06e12cb7c9a77718ba79874f7c9f5c12b527f570be66599bce73e75b6a825cee461fed61"}]}}]}}]}}]}}, &(0x7f0000000d00)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x201, 0x3, 0x1, 0x1, 0x10, 0x10}, 0x5, &(0x7f0000000500)={0x5, 0xf, 0x5}, 0x9, [{0x46, &(0x7f0000000b80)=ANY=[@ANYBLOB="46039f2e74ac72b59b3d96a3f043e6f290f0c37cb12ab253153b0001000000000000508ffe3c505d95fef1f23ffb2c2321c4317b4e583b5873cc9d2d2ebe637043b0024fad7f86d134f3edcb39"]}, {0x4, &(0x7f00000006c0)=@lang_id={0x4, 0x3, 0x40e}}, {0x102, &(0x7f0000001000)=ANY=[@ANYBLOB="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"]}, {0x7f, &(0x7f0000000700)=@string={0x7f, 0x3, "9dae0975986cdb69bfebc3afbd6ae7781d457abf0e8d7f4181b56abd57f5ea9c2b084f92c74dc770aa7fb173d861a9e254fe25406337cf1d0017de4d3b02a82ae895cca9befe2fae0814480971f109bee072a7831059a6fcd8a37c0d99ed940513db6fe0677aa9f6bbe476d7f06c06e777101d3b4e1bbbf40bfba0b425"}}, {0x4, &(0x7f0000000780)=@lang_id={0x4, 0x3, 0x83e}}, {0x9a, &(0x7f0000001080)=ANY=[]}, {0x4, &(0x7f00000007c0)=@lang_id={0x4, 0x3, 0x380a}}, {0x55, &(0x7f0000000c40)=@string={0x55, 0x3, "f9bb944647a12a064073eedb4206a970a3b2d38dcc041830a18ebc7328a4d24cd23b063baab02c30f7aff3a3b07dc49fc421eee0c27d522e268add2a75d3346ca7fd43c58dd991264e786726838266b280df57"}}, {0x4, &(0x7f0000000cc0)=@lang_id={0x4, 0x3, 0x81a}}]}) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000580)='/sys/power/image_size', 0x1a1081, 0x18) pwritev(r5, &(0x7f0000000000)=[{&(0x7f0000000040)="c650bfab6a3b", 0x6}], 0x1, 0x2000, 0xfffffff8) r6 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r6, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xa2f01, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r8 = socket$kcm(0x2, 0xa, 0x2) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000dc0)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x2400cc10}, 0x1) sendmsg$NFT_BATCH(r9, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000002100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000090a010400000000000000000a0000040900010073797a310000000008000540000000040900020073797a310000000008000a40fffffffc200011800e000100636f6e6e6c696d69740000000c00028008000140fffff27414000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r7, &(0x7f00000012c0)={@val={0x0, 0x890d}, @void, @eth={@multicast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @val={@val={0x88a8, 0x1, 0x0, 0x2}, {0x8100, 0x4, 0x0, 0x1}}, {@ipv6={0x86dd, @udp={0xd, 0x6, '\x00 \x00', 0x4b, 0x11, 0xff, @empty, @mcast2, {[], {0x4f19, 0x4e20, 0x4b, 0x0, @gue={{0x2, 0x0, 0x3, 0x5, 0x100}, "1a9e2e7301a1db3486b6ae8596d41be6fdbdf1400ccfbfe472deb02a27acecf8369bca7eb0351a88b750170c9048717fd0796732318ff6e33f7d9d"}}}}}}}}, 0x8d) getdents(0xffffffffffffff9c, 0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a84476080ffe00600000200590000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x40b}], 0x1) 194.310286ms ago: executing program 2 (id=2006): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000001c80), 0x1, 0x0) shutdown(0xffffffffffffffff, 0x2) 194.117196ms ago: executing program 2 (id=2007): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="01000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r5}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x0) 171.667177ms ago: executing program 2 (id=2008): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x70, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x7}, @CTA_SEQ_ADJ_REPLY={0xc, 0xf, 0x0, 0x1, [@CTA_SEQADJ_CORRECTION_POS={0x8}]}]}, 0x70}}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000000000000000850000007b00"/32], 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r3}, 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000380)={'pim6reg1\x00', @broadcast}) 113.379328ms ago: executing program 0 (id=2009): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f0000000d80)=ANY=[@ANYBLOB="620ac4ff00000000711019000000000095"], &(0x7f0000000480)='GPL\x00'}, 0x90) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @initdev}, &(0x7f0000000080)=0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000540)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r3}, 0x10) pipe(&(0x7f0000005880)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1e, 0x0) r5 = open_tree(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x100) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x1, '\x00', r2, r5, 0x4, 0x2, 0x4}, 0x50) 113.058798ms ago: executing program 5 (id=2010): r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0xa401) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wg2\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00', 0x0}) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[@ANYBLOB="a8000000", @ANYRES16=r1, @ANYBLOB="000828bd7000fcdbdf251900000024000180080003000200000008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="2c0001801400020070696d72656731000000000000000000140002006261746164765f736c6176655f3000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="200001801400020070696d726567310000000000000000000800030002000000180001801400024ce7703667726574617030000000000000"], 0xa8}, 0x1, 0x0, 0x0, 0x800}, 0x8000) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) socketpair(0x6, 0x80000, 0x401, &(0x7f0000000400)={0xffffffffffffffff}) accept$packet(r6, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000020000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000080)='kmem_cache_free\x00', r7}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000000)) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f00000006c0)={0x2, 0xf, 0x4, 0x1, 0x0, 0x5, 0x0}) 92.659178ms ago: executing program 0 (id=2011): syz_init_net_socket$llc(0x1a, 0x2, 0x0) r0 = epoll_create1(0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/power/wakeup_count', 0x80800, 0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0xe000001a}) read$char_usb(r1, &(0x7f0000001980)=""/179, 0xb3) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)) 92.291838ms ago: executing program 5 (id=2012): mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x21) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) pselect6(0x40, &(0x7f0000000040)={0x7, 0x8b, 0x6, 0x7fff, 0x8, 0x200, 0x6, 0x2}, &(0x7f0000000080)={0x8000, 0x7ff, 0x2, 0x0, 0x7, 0xff, 0x8, 0x8}, &(0x7f00000002c0)={0x2, 0x412, 0x1, 0x7ff, 0x6, 0x0, 0x8000000000000001, 0x6}, &(0x7f0000000300)={0x77359400}, &(0x7f0000000540)={&(0x7f0000000500)={[0xffffffff]}, 0x8}) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000fd"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) fcntl$notify(r0, 0x402, 0x2f) r1 = open(&(0x7f0000000740)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xc8180, 0x68) preadv(r1, 0x0, 0x0, 0xd, 0x80007) 83.486878ms ago: executing program 0 (id=2013): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x0}, 0x94) prctl$PR_SET_NAME(0xf, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000003b00)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x11, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000080)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000008000000180001801400020073797a5f74756e000000000000000000180002801400038010"], 0x44}, 0x1, 0x0, 0x0, 0x20004080}, 0x0) 46.355759ms ago: executing program 0 (id=2014): sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000780)=@newtfilter={0x38, 0x2c, 0xd27, 0x70bd28, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0xfff1}, {}, {0x9, 0xffff}}, [@filter_kind_options=@f_basic={{0xa}, {0x8, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x14004880}, 0x2000d8d0) r0 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) setxattr$trusted_overlay_redirect(&(0x7f0000000980)='./file0\x00', &(0x7f0000000b00), &(0x7f0000000b40)='./file0\x00', 0x8, 0x0) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000b80)=ANY=[@ANYBLOB="db010bf900", @ANYRES16, @ANYBLOB="1000d2000000fbdbdf258900000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900d1dc00000a000000a4001d804400008005000800430000000400040005000b0001000000050008008600000005000600000000000c0002000400000000000000050009000100000005000600000000002000008005000800b800000005000800f00000000c00020006000000000000000c000080050008005d000000300000800500090001000000040004000500090000000000050006000100000005000c00000000000500060000000000"], 0xcc}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x64, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x2}, 0x18) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/fscreate\x00') writev(r3, &(0x7f00000000c0)=[{&(0x7f0000000040)="dc", 0x1}], 0x8) 46.160199ms ago: executing program 2 (id=2015): ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) kexec_load(0x0, 0x0, 0x0, 0x0) acct(0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000000540), 0x0) socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) sendto$inet(r2, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x0) recvfrom$inet(r2, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x720, 0x0, 0xfffffffffffffd25) socket(0x200000000000011, 0x2, 0x0) 43.826849ms ago: executing program 5 (id=2016): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20200006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fsopen(&(0x7f0000000400)='autofs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000240)=',-\x10*\x00', &(0x7f0000000380)='$\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000100)='\xadk=', &(0x7f0000001c80)='n', 0x1) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000040)='syzkaller\x00', &(0x7f0000001140)='\xf1\x95\xb3>-\x8c\xd4\r\x01\xfa\xe2{eED\x0e\xaaPV\x11\xff\xb6j\xd4~6\x82^\x9b b', 0x0) close(r0) 43.536179ms ago: executing program 0 (id=2017): syz_clone3(&(0x7f0000000a80)={0x280, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, &(0x7f0000000980)=[0x0], 0x1}, 0x58) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x18, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6}}, @ldst={0x3, 0x0, 0x1, 0xb, 0x5, 0x1, 0xfffffffffffffff0}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000000c0)='GPL\x00', 0xfffff87b, 0x0, 0x0, 0x3597959de170892c, 0x11, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0xb, 0x4, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0x1], 0x0, 0x10, 0x8000}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000280)={r0, 0x0, 0x25, 0x10, @void}, 0x10) bind$tipc(0xffffffffffffffff, &(0x7f00000002c0)=@name={0x1e, 0x2, 0x0, {{0x0, 0x2}}}, 0x10) 43.185339ms ago: executing program 2 (id=2018): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="01000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r5}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8014}, 0x0) 27.735479ms ago: executing program 5 (id=2019): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) shutdown(0xffffffffffffffff, 0x2) 732.32µs ago: executing program 0 (id=2020): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r0}, &(0x7f0000001c00), &(0x7f0000001c40)=r1}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r0}, &(0x7f0000001c00), &(0x7f0000001c40)=r1}, 0x20) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x10000}}, './file1\x00'}) socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) (async) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0100000000000000000017"], 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x4000004) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000800)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000500)={0x2c, r5, 0x10, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x4}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40080}, 0x4048820) (async) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000800)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000500)={0x2c, r5, 0x10, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x4}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40080}, 0x4048820) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffd2c) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r6}, 0x10) setpriority(0x1, 0x0, 0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000480), r7) sendmsg$NLBL_CIPSOV4_C_ADD(r7, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x54, r8, 0x207, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}]}, 0x54}}, 0x880) ptrace$setregset(0x4205, 0xffffffffffffffff, 0x2, &(0x7f00000001c0)={&(0x7f0000000600)="f47fed45a525d08c36ee05d774b4c7984efe12edd8d4c203b910474288955465be6a94b8710edfd9b0b6e52032cdcdb58ef3b3860c774b6ca44ebade1be35b026bd098f37b1301c3c88fdd947ac08c244de56a99b795e348b7d3c13802fa92a071638377953f7cfbeb1def6793c59e90501e3196671277d8098586d2dc392deb5d716311f46ecf1b91c3c5fa9fe00a543f77", 0x92}) r9 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) (async) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0xffffffffffffffff, r10) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) chown(&(0x7f0000000040)='./file1\x00', r11, r12) setresgid(0xffffffffffffffff, r10, r12) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 148.37µs ago: executing program 5 (id=2021): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYRES16=0x0], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r1) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000003c0)={'wg2\x00', 0x0}) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000030000000100000008000100", @ANYRES32=r3, @ANYBLOB="4c00088048000080200004000a004e2100000000000000000000000000000000000000010000000024000100975c9d81c983c8209ee781254b899f8ed925ae9f0923c23c62f53c57cdbf691c"], 0x68}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1b, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a0ef010095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x1, 0x0, 0x7ffc0005}]}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x200000) syz_emit_ethernet(0x6a, &(0x7f0000000140)=ANY=[@ANYRES32=r0], 0x0) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000003c0)='./control\x00', 0x10444, &(0x7f0000000600)={[{@nogrpid}, {@jqfmt_vfsv1}, {@nobarrier}, {@debug}, {@data_err_abort}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xcc8}}, {@nogrpid}], [{@fsmagic={'fsmagic', 0x3d, 0x6}}, {@fowner_gt}]}, 0x0, 0x451, &(0x7f00000018c0)="$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") r4 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) close(r4) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r5, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x7, &(0x7f0000002400)=0x0) io_submit(r6, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x2002000000, 0x4, 0x0, 0x1, 0x0, r5, &(0x7f0000000040)="0200ffff0000", 0x6, 0x0, 0x0, 0x2}]) r7 = inotify_init1(0x800) fcntl$setstatus(r4, 0x4, 0x2c00) r8 = gettid() fcntl$setown(r4, 0x8, r8) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000000040)={[0xffffffffffff7ff8]}, 0x0, 0x0, 0x8) inotify_add_watch(r7, &(0x7f0000000180)='./control\x00', 0xa4000960) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200)=r4, 0x4) 0s ago: executing program 2 (id=2022): clock_nanosleep(0x6ce0024abb6183bb, 0x0, 0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20200006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = fsopen(&(0x7f0000000400)='autofs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000240)=',-\x10*\x00', &(0x7f0000000380)='$\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000100)='\xadk=', &(0x7f0000001c80)='n', 0x1) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000040)='syzkaller\x00', &(0x7f0000001140)='\xf1\x95\xb3>-\x8c\xd4\r\x01\xfa\xe2{eED\x0e\xaaPV\x11\xff\xb6j\xd4~6\x82^\x9b b', 0x0) close(r0) kernel console output (not intermixed with test programs): entered allmulticast mode [ 89.338760][ T6568] 8021q: adding VLAN 0 to HW filter on device bond3 [ 89.351332][ T6568] bond3 (unregistering): Released all slaves [ 89.487375][ T6611] pim6reg1: entered promiscuous mode [ 89.492812][ T6611] pim6reg1: entered allmulticast mode [ 89.584216][ T6615] lo speed is unknown, defaulting to 1000 [ 89.628487][ T6615] lo speed is unknown, defaulting to 1000 [ 89.682866][ T6607] lo speed is unknown, defaulting to 1000 [ 89.750677][ T6607] lo speed is unknown, defaulting to 1000 [ 89.914821][ T6665] netlink: 'syz.1.1116': attribute type 13 has an invalid length. [ 89.935478][ T6667] FAULT_INJECTION: forcing a failure. [ 89.935478][ T6667] name failslab, interval 1, probability 0, space 0, times 0 [ 89.935501][ T6667] CPU: 1 UID: 0 PID: 6667 Comm: syz.0.1117 Not tainted syzkaller #0 PREEMPT(voluntary) [ 89.935522][ T6667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 89.935532][ T6667] Call Trace: [ 89.935537][ T6667] [ 89.935545][ T6667] __dump_stack+0x1d/0x30 [ 89.935644][ T6667] dump_stack_lvl+0xe8/0x140 [ 89.935664][ T6667] dump_stack+0x15/0x1b [ 89.935681][ T6667] should_fail_ex+0x265/0x280 [ 89.935706][ T6667] should_failslab+0x8c/0xb0 [ 89.935806][ T6667] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 89.935835][ T6667] ? __d_alloc+0x3d/0x340 [ 89.935870][ T6667] __d_alloc+0x3d/0x340 [ 89.935895][ T6667] ? selinux_file_open+0x2df/0x330 [ 89.935971][ T6667] d_alloc_parallel+0x53/0xc60 [ 89.936000][ T6667] ? selinux_inode_permission+0x62d/0x740 [ 89.936034][ T6667] ? make_vfsuid+0x49/0xa0 [ 89.936059][ T6667] ? lockref_get_not_dead+0x120/0x1c0 [ 89.936089][ T6667] ? __rcu_read_unlock+0x4f/0x70 [ 89.936111][ T6667] __lookup_slow+0x8c/0x250 [ 89.936143][ T6667] lookup_slow+0x3c/0x60 [ 89.936246][ T6667] walk_component+0x1ec/0x220 [ 89.936270][ T6667] path_lookupat+0xfe/0x2a0 [ 89.936323][ T6667] filename_lookup+0x147/0x340 [ 89.936394][ T6667] user_path_at+0x3e/0x130 [ 89.936479][ T6667] do_fchownat+0xb0/0x210 [ 89.936507][ T6667] __x64_sys_lchown+0x4a/0x60 [ 89.936536][ T6667] x64_sys_call+0x2861/0x2ff0 [ 89.936574][ T6667] do_syscall_64+0xd2/0x200 [ 89.936651][ T6667] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 89.936676][ T6667] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 89.936705][ T6667] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 89.936727][ T6667] RIP: 0033:0x7f88d85beba9 [ 89.936790][ T6667] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 89.936874][ T6667] RSP: 002b:00007f88d7027038 EFLAGS: 00000246 ORIG_RAX: 000000000000005e [ 89.936919][ T6667] RAX: ffffffffffffffda RBX: 00007f88d8805fa0 RCX: 00007f88d85beba9 [ 89.936929][ T6667] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000700 [ 89.936941][ T6667] RBP: 00007f88d7027090 R08: 0000000000000000 R09: 0000000000000000 [ 89.936954][ T6667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 89.936967][ T6667] R13: 00007f88d8806038 R14: 00007f88d8805fa0 R15: 00007ffc001e4508 [ 89.936987][ T6667] [ 90.047583][ T6665] bridge0: port 2(bridge_slave_1) entered disabled state [ 90.250563][ T6665] bridge0: port 1(bridge_slave_0) entered disabled state [ 90.383907][ T6665] bond0: left promiscuous mode [ 90.388721][ T6665] bond_slave_0: left promiscuous mode [ 90.394456][ T6665] bond_slave_1: left promiscuous mode [ 90.402457][ T3963] lo speed is unknown, defaulting to 1000 [ 90.402473][ T3963] syz2: Port: 1 Link DOWN [ 90.402506][ T3963] lo speed is unknown, defaulting to 1000 [ 90.413432][ T1039] syz1: Port: 1 Link DOWN [ 90.418696][ T12] netdevsim netdevsim1 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.439083][ T12] netdevsim netdevsim1 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.439160][ T12] netdevsim netdevsim1 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.439199][ T12] netdevsim netdevsim1 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.487302][ T6693] resource: Trying to free nonexistent resource <0x00000000000002e8-0x00000000000002ef> [ 90.632719][ T6709] __nla_validate_parse: 5 callbacks suppressed [ 90.632735][ T6709] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1133'. [ 90.633177][ T6709] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1133'. [ 90.704579][ T6717] FAULT_INJECTION: forcing a failure. [ 90.704579][ T6717] name failslab, interval 1, probability 0, space 0, times 0 [ 90.704604][ T6717] CPU: 0 UID: 0 PID: 6717 Comm: syz.2.1137 Not tainted syzkaller #0 PREEMPT(voluntary) [ 90.704630][ T6717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 90.704642][ T6717] Call Trace: [ 90.704649][ T6717] [ 90.704656][ T6717] __dump_stack+0x1d/0x30 [ 90.704680][ T6717] dump_stack_lvl+0xe8/0x140 [ 90.704699][ T6717] dump_stack+0x15/0x1b [ 90.704715][ T6717] should_fail_ex+0x265/0x280 [ 90.704739][ T6717] ? __pfx_inetaddr_event+0x10/0x10 [ 90.704761][ T6717] ? addr_event+0x9b/0x270 [ 90.704811][ T6717] should_failslab+0x8c/0xb0 [ 90.704955][ T6717] __kmalloc_cache_noprof+0x4c/0x320 [ 90.704978][ T6717] ? __pfx_inetaddr_event+0x10/0x10 [ 90.705037][ T6717] addr_event+0x9b/0x270 [ 90.705052][ T6717] ? __pfx_inetaddr_event+0x10/0x10 [ 90.705110][ T6717] inetaddr_event+0x71/0xa0 [ 90.705131][ T6717] blocking_notifier_call_chain+0x9b/0x1f0 [ 90.705150][ T6717] __inet_del_ifa+0x4e5/0x7f0 [ 90.705176][ T6717] ? netdev_name_node_lookup+0xa4/0xd0 [ 90.705198][ T6717] devinet_ioctl+0x7bd/0xe40 [ 90.705221][ T6717] inet_ioctl+0x2f8/0x3a0 [ 90.705246][ T6717] sock_do_ioctl+0x70/0x220 [ 90.705297][ T6717] sock_ioctl+0x41b/0x610 [ 90.705327][ T6717] ? __pfx_sock_ioctl+0x10/0x10 [ 90.705358][ T6717] __se_sys_ioctl+0xce/0x140 [ 90.705377][ T6717] __x64_sys_ioctl+0x43/0x50 [ 90.705394][ T6717] x64_sys_call+0x1816/0x2ff0 [ 90.705453][ T6717] do_syscall_64+0xd2/0x200 [ 90.705556][ T6717] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 90.705593][ T6717] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 90.705620][ T6717] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 90.705697][ T6717] RIP: 0033:0x7f5110cbeba9 [ 90.705713][ T6717] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 90.705731][ T6717] RSP: 002b:00007f510f727038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 90.705747][ T6717] RAX: ffffffffffffffda RBX: 00007f5110f05fa0 RCX: 00007f5110cbeba9 [ 90.705760][ T6717] RDX: 0000200000000000 RSI: 0000000000008916 RDI: 0000000000000003 [ 90.705773][ T6717] RBP: 00007f510f727090 R08: 0000000000000000 R09: 0000000000000000 [ 90.705786][ T6717] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 90.705822][ T6717] R13: 00007f5110f06038 R14: 00007f5110f05fa0 R15: 00007fff8f2f7308 [ 90.705838][ T6717] [ 90.726064][ T6696] lo speed is unknown, defaulting to 1000 [ 90.763206][ T6696] lo speed is unknown, defaulting to 1000 [ 90.990747][ T6726] FAULT_INJECTION: forcing a failure. [ 90.990747][ T6726] name failslab, interval 1, probability 0, space 0, times 0 [ 91.003389][ T6726] CPU: 1 UID: 0 PID: 6726 Comm: syz.0.1140 Not tainted syzkaller #0 PREEMPT(voluntary) [ 91.003414][ T6726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 91.003424][ T6726] Call Trace: [ 91.003443][ T6726] [ 91.003450][ T6726] __dump_stack+0x1d/0x30 [ 91.003469][ T6726] dump_stack_lvl+0xe8/0x140 [ 91.003488][ T6726] dump_stack+0x15/0x1b [ 91.003536][ T6726] should_fail_ex+0x265/0x280 [ 91.003564][ T6726] ? do_epoll_create+0x57/0x270 [ 91.003589][ T6726] should_failslab+0x8c/0xb0 [ 91.003609][ T6726] __kmalloc_cache_noprof+0x4c/0x320 [ 91.003634][ T6726] do_epoll_create+0x57/0x270 [ 91.003721][ T6726] __x64_sys_epoll_create+0x35/0x60 [ 91.003746][ T6726] x64_sys_call+0x2d89/0x2ff0 [ 91.003771][ T6726] do_syscall_64+0xd2/0x200 [ 91.003801][ T6726] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 91.003824][ T6726] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 91.003858][ T6726] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 91.003875][ T6726] RIP: 0033:0x7f88d85beba9 [ 91.003888][ T6726] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.003904][ T6726] RSP: 002b:00007f88d7027038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d5 [ 91.003922][ T6726] RAX: ffffffffffffffda RBX: 00007f88d8805fa0 RCX: 00007f88d85beba9 [ 91.003996][ T6726] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000000003ff [ 91.004008][ T6726] RBP: 00007f88d7027090 R08: 0000000000000000 R09: 0000000000000000 [ 91.004019][ T6726] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 91.004084][ T6726] R13: 00007f88d8806038 R14: 00007f88d8805fa0 R15: 00007ffc001e4508 [ 91.004102][ T6726] [ 91.204446][ T6733] FAULT_INJECTION: forcing a failure. [ 91.204446][ T6733] name failslab, interval 1, probability 0, space 0, times 0 [ 91.217121][ T6733] CPU: 0 UID: 0 PID: 6733 Comm: syz.0.1144 Not tainted syzkaller #0 PREEMPT(voluntary) [ 91.217171][ T6733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 91.217185][ T6733] Call Trace: [ 91.217191][ T6733] [ 91.217199][ T6733] __dump_stack+0x1d/0x30 [ 91.217221][ T6733] dump_stack_lvl+0xe8/0x140 [ 91.217241][ T6733] dump_stack+0x15/0x1b [ 91.217274][ T6733] should_fail_ex+0x265/0x280 [ 91.217378][ T6733] should_failslab+0x8c/0xb0 [ 91.217415][ T6733] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 91.217441][ T6733] ? sidtab_sid2str_get+0xa0/0x130 [ 91.217489][ T6733] kmemdup_noprof+0x2b/0x70 [ 91.217512][ T6733] sidtab_sid2str_get+0xa0/0x130 [ 91.217559][ T6733] security_sid_to_context_core+0x1eb/0x2e0 [ 91.217578][ T6733] security_sid_to_context+0x27/0x40 [ 91.217594][ T6733] selinux_lsmprop_to_secctx+0x67/0xf0 [ 91.217622][ T6733] security_lsmprop_to_secctx+0x43/0x80 [ 91.217649][ T6733] audit_log_task_context+0x77/0x190 [ 91.217686][ T6733] audit_log_task+0xf4/0x250 [ 91.217712][ T6733] audit_seccomp+0x61/0x100 [ 91.217803][ T6733] ? __seccomp_filter+0x68c/0x10d0 [ 91.217826][ T6733] __seccomp_filter+0x69d/0x10d0 [ 91.217845][ T6733] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 91.217868][ T6733] ? vfs_write+0x7e8/0x960 [ 91.217890][ T6733] __secure_computing+0x82/0x150 [ 91.218022][ T6733] syscall_trace_enter+0xcf/0x1e0 [ 91.218042][ T6733] do_syscall_64+0xac/0x200 [ 91.218067][ T6733] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 91.218149][ T6733] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 91.218172][ T6733] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 91.218189][ T6733] RIP: 0033:0x7f88d85beba9 [ 91.218214][ T6733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.218228][ T6733] RSP: 002b:00007f88d7027038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 91.218245][ T6733] RAX: ffffffffffffffda RBX: 00007f88d8805fa0 RCX: 00007f88d85beba9 [ 91.218255][ T6733] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000200000000080 [ 91.218292][ T6733] RBP: 00007f88d7027090 R08: 0000000000000000 R09: 0000000000000000 [ 91.218302][ T6733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 91.218312][ T6733] R13: 00007f88d8806038 R14: 00007f88d8805fa0 R15: 00007ffc001e4508 [ 91.218408][ T6733] [ 91.220104][ T6737] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1145'. [ 91.320073][ T6749] FAULT_INJECTION: forcing a failure. [ 91.320073][ T6749] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 91.337263][ T6737] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1145'. [ 91.337601][ T6749] CPU: 0 UID: 0 PID: 6749 Comm: syz.0.1151 Not tainted syzkaller #0 PREEMPT(voluntary) [ 91.337623][ T6749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 91.337644][ T6749] Call Trace: [ 91.337724][ T6749] [ 91.337731][ T6749] __dump_stack+0x1d/0x30 [ 91.337752][ T6749] dump_stack_lvl+0xe8/0x140 [ 91.337777][ T6749] dump_stack+0x15/0x1b [ 91.337793][ T6749] should_fail_ex+0x265/0x280 [ 91.337817][ T6749] should_fail+0xb/0x20 [ 91.337836][ T6749] should_fail_usercopy+0x1a/0x20 [ 91.337896][ T6749] _copy_to_iter+0x251/0xe70 [ 91.337924][ T6749] ? should_fail_ex+0xdb/0x280 [ 91.337950][ T6749] copy_page_to_iter+0x18f/0x2d0 [ 91.337978][ T6749] process_vm_rw+0x672/0x960 [ 91.338022][ T6749] __x64_sys_process_vm_readv+0x78/0x90 [ 91.338050][ T6749] x64_sys_call+0x1874/0x2ff0 [ 91.338102][ T6749] do_syscall_64+0xd2/0x200 [ 91.338132][ T6749] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 91.338155][ T6749] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 91.338228][ T6749] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 91.338248][ T6749] RIP: 0033:0x7f88d85beba9 [ 91.338263][ T6749] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.338292][ T6749] RSP: 002b:00007f88d7027038 EFLAGS: 00000246 ORIG_RAX: 0000000000000136 [ 91.338311][ T6749] RAX: ffffffffffffffda RBX: 00007f88d8805fa0 RCX: 00007f88d85beba9 [ 91.338323][ T6749] RDX: 0000000000000002 RSI: 0000200000008400 RDI: 00000000000002cd [ 91.338336][ T6749] RBP: 00007f88d7027090 R08: 0000000000000286 R09: 0000000000000000 [ 91.338347][ T6749] R10: 0000200000008640 R11: 0000000000000246 R12: 0000000000000001 [ 91.338359][ T6749] R13: 00007f88d8806038 R14: 00007f88d8805fa0 R15: 00007ffc001e4508 [ 91.338491][ T6749] [ 91.783264][ T6794] macvlan1: entered promiscuous mode [ 91.795077][ T6794] ipvlan0: entered promiscuous mode [ 91.801270][ T6798] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1171'. [ 91.801487][ T6794] ipvlan0: left promiscuous mode [ 91.826694][ T6794] macvlan1: left promiscuous mode [ 91.835557][ T6798] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1171'. [ 91.897068][ T6788] lo speed is unknown, defaulting to 1000 [ 91.947374][ T6788] lo speed is unknown, defaulting to 1000 [ 92.003207][ T6817] lo speed is unknown, defaulting to 1000 [ 92.017483][ T6823] ipvlan0: entered promiscuous mode [ 92.032283][ T6823] bridge0: port 3(ipvlan0) entered blocking state [ 92.038791][ T6823] bridge0: port 3(ipvlan0) entered disabled state [ 92.070564][ T6823] ipvlan0: entered allmulticast mode [ 92.075978][ T6823] bridge0: entered allmulticast mode [ 92.087787][ T6823] ipvlan0: left allmulticast mode [ 92.092940][ T6823] bridge0: left allmulticast mode [ 92.102920][ T6817] lo speed is unknown, defaulting to 1000 [ 92.162929][ T6832] FAULT_INJECTION: forcing a failure. [ 92.162929][ T6832] name failslab, interval 1, probability 0, space 0, times 0 [ 92.175603][ T6832] CPU: 0 UID: 0 PID: 6832 Comm: syz.2.1184 Not tainted syzkaller #0 PREEMPT(voluntary) [ 92.175651][ T6832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 92.175661][ T6832] Call Trace: [ 92.175668][ T6832] [ 92.175675][ T6832] __dump_stack+0x1d/0x30 [ 92.175694][ T6832] dump_stack_lvl+0xe8/0x140 [ 92.175710][ T6832] dump_stack+0x15/0x1b [ 92.175723][ T6832] should_fail_ex+0x265/0x280 [ 92.175749][ T6832] should_failslab+0x8c/0xb0 [ 92.175773][ T6832] __kvmalloc_node_noprof+0x123/0x4e0 [ 92.175801][ T6832] ? alloc_fdtable+0xbd/0x1d0 [ 92.175873][ T6832] ? __kmalloc_cache_noprof+0x22e/0x320 [ 92.175903][ T6832] alloc_fdtable+0xbd/0x1d0 [ 92.175924][ T6832] dup_fd+0x4c7/0x540 [ 92.176011][ T6832] copy_files+0x98/0xf0 [ 92.176036][ T6832] copy_process+0xc5b/0x2000 [ 92.176064][ T6832] kernel_clone+0x16c/0x5c0 [ 92.176085][ T6832] ? vfs_write+0x7e8/0x960 [ 92.176187][ T6832] __x64_sys_clone+0xe6/0x120 [ 92.176217][ T6832] x64_sys_call+0x119c/0x2ff0 [ 92.176234][ T6832] do_syscall_64+0xd2/0x200 [ 92.176260][ T6832] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 92.176295][ T6832] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 92.176321][ T6832] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 92.176385][ T6832] RIP: 0033:0x7f5110cbeba9 [ 92.176399][ T6832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 92.176413][ T6832] RSP: 002b:00007f510f705fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 92.176454][ T6832] RAX: ffffffffffffffda RBX: 00007f5110f06090 RCX: 00007f5110cbeba9 [ 92.176464][ T6832] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006a000000 [ 92.176531][ T6832] RBP: 00007f510f706090 R08: 0000000000000000 R09: 0000000000000000 [ 92.176542][ T6832] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 92.176552][ T6832] R13: 00007f5110f06128 R14: 00007f5110f06090 R15: 00007fff8f2f7308 [ 92.176576][ T6832] [ 92.594732][ T6855] macvlan1: entered promiscuous mode [ 92.600696][ T6855] ipvlan0: entered promiscuous mode [ 92.606538][ T6855] ipvlan0: left promiscuous mode [ 92.611849][ T6855] macvlan1: left promiscuous mode [ 92.622565][ T6858] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2049 sclass=netlink_route_socket pid=6858 comm=syz.3.1195 [ 92.627540][ T6860] ipvlan2: entered promiscuous mode [ 92.641106][ T6860] bridge0: port 3(ipvlan2) entered blocking state [ 92.647548][ T6860] bridge0: port 3(ipvlan2) entered disabled state [ 92.681969][ T6860] ipvlan2: entered allmulticast mode [ 92.687309][ T6860] bridge0: entered allmulticast mode [ 92.707455][ T6860] ipvlan2: left allmulticast mode [ 92.712552][ T6860] bridge0: left allmulticast mode [ 92.831141][ T6882] FAULT_INJECTION: forcing a failure. [ 92.831141][ T6882] name failslab, interval 1, probability 0, space 0, times 0 [ 92.843815][ T6882] CPU: 0 UID: 0 PID: 6882 Comm: syz.2.1205 Not tainted syzkaller #0 PREEMPT(voluntary) [ 92.843838][ T6882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 92.843848][ T6882] Call Trace: [ 92.843854][ T6882] [ 92.843860][ T6882] __dump_stack+0x1d/0x30 [ 92.843904][ T6882] dump_stack_lvl+0xe8/0x140 [ 92.843922][ T6882] dump_stack+0x15/0x1b [ 92.843938][ T6882] should_fail_ex+0x265/0x280 [ 92.843962][ T6882] should_failslab+0x8c/0xb0 [ 92.844083][ T6882] kmem_cache_alloc_noprof+0x50/0x310 [ 92.844108][ T6882] ? alloc_empty_file+0x76/0x200 [ 92.844151][ T6882] ? mntput+0x4b/0x80 [ 92.844253][ T6882] alloc_empty_file+0x76/0x200 [ 92.844282][ T6882] path_openat+0x68/0x2170 [ 92.844310][ T6882] ? _parse_integer_limit+0x170/0x190 [ 92.844349][ T6882] ? kstrtoull+0x111/0x140 [ 92.844367][ T6882] ? kstrtouint+0x76/0xc0 [ 92.844394][ T6882] do_filp_open+0x109/0x230 [ 92.844419][ T6882] do_sys_openat2+0xa6/0x110 [ 92.844446][ T6882] __x64_sys_openat+0xf2/0x120 [ 92.844475][ T6882] x64_sys_call+0x2e9c/0x2ff0 [ 92.844503][ T6882] do_syscall_64+0xd2/0x200 [ 92.844532][ T6882] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 92.844556][ T6882] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 92.844581][ T6882] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 92.844598][ T6882] RIP: 0033:0x7f5110cbeba9 [ 92.844611][ T6882] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 92.844684][ T6882] RSP: 002b:00007f510f727038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 92.844703][ T6882] RAX: ffffffffffffffda RBX: 00007f5110f05fa0 RCX: 00007f5110cbeba9 [ 92.844716][ T6882] RDX: 0000000000084d03 RSI: 0000200000000380 RDI: ffffffffffffff9c [ 92.844758][ T6882] RBP: 00007f510f727090 R08: 0000000000000000 R09: 0000000000000000 [ 92.844768][ T6882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.844778][ T6882] R13: 00007f5110f06038 R14: 00007f5110f05fa0 R15: 00007fff8f2f7308 [ 92.844793][ T6882] [ 92.908004][ T6876] FAULT_INJECTION: forcing a failure. [ 92.908004][ T6876] name failslab, interval 1, probability 0, space 0, times 0 [ 92.908029][ T6876] CPU: 0 UID: 0 PID: 6876 Comm: syz.1.1202 Not tainted syzkaller #0 PREEMPT(voluntary) [ 92.908050][ T6876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 92.908062][ T6876] Call Trace: [ 92.908068][ T6876] [ 92.908074][ T6876] __dump_stack+0x1d/0x30 [ 92.908094][ T6876] dump_stack_lvl+0xe8/0x140 [ 92.908112][ T6876] dump_stack+0x15/0x1b [ 92.908127][ T6876] should_fail_ex+0x265/0x280 [ 92.908149][ T6876] should_failslab+0x8c/0xb0 [ 92.908173][ T6876] kmem_cache_alloc_noprof+0x50/0x310 [ 92.908198][ T6876] ? vm_area_dup+0x33/0x2c0 [ 92.908224][ T6876] vm_area_dup+0x33/0x2c0 [ 92.908250][ T6876] __split_vma+0xe9/0x650 [ 92.908276][ T6876] ? mas_find+0x5d5/0x700 [ 92.908312][ T6876] vms_gather_munmap_vmas+0x2b2/0x7b0 [ 92.908338][ T6876] do_vmi_align_munmap+0x1a4/0x3d0 [ 92.908366][ T6876] do_vmi_munmap+0x1db/0x220 [ 92.908387][ T6876] move_vma+0x9d5/0xcf0 [ 92.908418][ T6876] mremap_to+0x3eb/0x440 [ 92.908441][ T6876] ? check_prep_vma+0x5d6/0x660 [ 92.908465][ T6876] __se_sys_mremap+0x650/0xb40 [ 92.908494][ T6876] ? fput+0x8f/0xc0 [ 92.908518][ T6876] ? ksys_write+0x192/0x1a0 [ 92.908538][ T6876] __x64_sys_mremap+0x67/0x80 [ 92.908562][ T6876] x64_sys_call+0x2a24/0x2ff0 [ 92.908581][ T6876] do_syscall_64+0xd2/0x200 [ 92.908607][ T6876] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 92.908630][ T6876] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 92.908656][ T6876] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 92.908675][ T6876] RIP: 0033:0x7fc1722aeba9 [ 92.908690][ T6876] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 92.908706][ T6876] RSP: 002b:00007fc170d17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 92.908725][ T6876] RAX: ffffffffffffffda RBX: 00007fc1724f5fa0 RCX: 00007fc1722aeba9 [ 92.908737][ T6876] RDX: 0000000000600000 RSI: 0000000000200003 RDI: 0000200000000000 [ 92.908748][ T6876] RBP: 00007fc170d17090 R08: 0000200000a00000 R09: 0000000000000000 [ 92.908760][ T6876] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 92.908771][ T6876] R13: 00007fc1724f6038 R14: 00007fc1724f5fa0 R15: 00007fff1c8a75e8 [ 92.908790][ T6876] [ 93.021213][ T6904] FAULT_INJECTION: forcing a failure. [ 93.021213][ T6904] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 93.256215][ T6927] lo speed is unknown, defaulting to 1000 [ 93.260974][ T6904] CPU: 1 UID: 0 PID: 6904 Comm: syz.1.1214 Not tainted syzkaller #0 PREEMPT(voluntary) [ 93.261001][ T6904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 93.261014][ T6904] Call Trace: [ 93.261030][ T6904] [ 93.261037][ T6904] __dump_stack+0x1d/0x30 [ 93.261058][ T6904] dump_stack_lvl+0xe8/0x140 [ 93.261076][ T6904] dump_stack+0x15/0x1b [ 93.261101][ T6904] should_fail_ex+0x265/0x280 [ 93.261124][ T6904] should_fail+0xb/0x20 [ 93.261144][ T6904] should_fail_usercopy+0x1a/0x20 [ 93.261167][ T6904] _copy_from_user+0x1c/0xb0 [ 93.261235][ T6904] sock_do_ioctl+0xe6/0x220 [ 93.261320][ T6904] sock_ioctl+0x41b/0x610 [ 93.261349][ T6904] ? __pfx_sock_ioctl+0x10/0x10 [ 93.261439][ T6904] __se_sys_ioctl+0xce/0x140 [ 93.261458][ T6904] __x64_sys_ioctl+0x43/0x50 [ 93.261475][ T6904] x64_sys_call+0x1816/0x2ff0 [ 93.261495][ T6904] do_syscall_64+0xd2/0x200 [ 93.261546][ T6904] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 93.261570][ T6904] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 93.261598][ T6904] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 93.261618][ T6904] RIP: 0033:0x7fc1722aeba9 [ 93.261645][ T6904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 93.261662][ T6904] RSP: 002b:00007fc170d17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 93.261680][ T6904] RAX: ffffffffffffffda RBX: 00007fc1724f5fa0 RCX: 00007fc1722aeba9 [ 93.261693][ T6904] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 000000000000001e [ 93.261705][ T6904] RBP: 00007fc170d17090 R08: 0000000000000000 R09: 0000000000000000 [ 93.261717][ T6904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 93.261728][ T6904] R13: 00007fc1724f6038 R14: 00007fc1724f5fa0 R15: 00007fff1c8a75e8 [ 93.261757][ T6904] [ 93.290407][ T6929] macvlan1: entered promiscuous mode [ 93.512964][ T6929] ipvlan0: entered promiscuous mode [ 93.518754][ T6929] ipvlan0: left promiscuous mode [ 93.524032][ T6929] macvlan1: left promiscuous mode [ 93.533179][ T6938] macvlan1: entered promiscuous mode [ 93.539352][ T6938] ipvlan0: entered promiscuous mode [ 93.545028][ T6938] ipvlan0: left promiscuous mode [ 93.550833][ T6938] macvlan1: left promiscuous mode [ 93.558346][ T6927] lo speed is unknown, defaulting to 1000 [ 93.833822][ T29] kauditd_printk_skb: 1223 callbacks suppressed [ 93.833859][ T29] audit: type=1400 audit(1757695636.567:5572): avc: denied { read write } for pid=3302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=821 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 93.897799][ T29] audit: type=1400 audit(1757695636.567:5573): avc: denied { read write } for pid=3576 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 93.922056][ T29] audit: type=1400 audit(1757695636.597:5574): avc: denied { create } for pid=6990 comm="syz.0.1251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 93.942863][ T29] audit: type=1400 audit(1757695636.597:5575): avc: denied { prog_load } for pid=6991 comm="syz.5.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 93.962050][ T29] audit: type=1400 audit(1757695636.597:5576): avc: denied { prog_load } for pid=6990 comm="syz.0.1251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 93.981137][ T29] audit: type=1400 audit(1757695636.597:5577): avc: denied { prog_load } for pid=6982 comm="syz.3.1247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 94.000660][ T29] audit: type=1400 audit(1757695636.597:5578): avc: denied { create } for pid=6990 comm="syz.0.1251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 94.000685][ T29] audit: type=1400 audit(1757695636.607:5579): avc: denied { read } for pid=6990 comm="syz.0.1251" dev="nsfs" ino=4026532384 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 94.000785][ T29] audit: type=1400 audit(1757695636.607:5580): avc: denied { create } for pid=6991 comm="syz.5.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 94.000807][ T29] audit: type=1400 audit(1757695636.607:5581): avc: denied { create } for pid=6990 comm="syz.0.1251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 94.102106][ T7008] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1260'. [ 94.190336][ T7015] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1261'. [ 94.300688][ T7050] FAULT_INJECTION: forcing a failure. [ 94.300688][ T7050] name failslab, interval 1, probability 0, space 0, times 0 [ 94.313424][ T7050] CPU: 0 UID: 0 PID: 7050 Comm: syz.2.1277 Not tainted syzkaller #0 PREEMPT(voluntary) [ 94.313452][ T7050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 94.313466][ T7050] Call Trace: [ 94.313473][ T7050] [ 94.313481][ T7050] __dump_stack+0x1d/0x30 [ 94.313503][ T7050] dump_stack_lvl+0xe8/0x140 [ 94.313523][ T7050] dump_stack+0x15/0x1b [ 94.313540][ T7050] should_fail_ex+0x265/0x280 [ 94.313604][ T7050] ? snd_seq_pool_new+0x32/0xe0 [ 94.313664][ T7050] should_failslab+0x8c/0xb0 [ 94.313690][ T7050] __kmalloc_cache_noprof+0x4c/0x320 [ 94.313788][ T7050] ? __pfx_snd_seq_open+0x10/0x10 [ 94.313816][ T7050] snd_seq_pool_new+0x32/0xe0 [ 94.313847][ T7050] ? __pfx_snd_seq_open+0x10/0x10 [ 94.313931][ T7050] seq_create_client1+0x4b/0x320 [ 94.313956][ T7050] ? __pfx_snd_seq_open+0x10/0x10 [ 94.313984][ T7050] snd_seq_open+0x50/0x320 [ 94.314113][ T7050] ? __pfx_snd_seq_open+0x10/0x10 [ 94.314147][ T7050] snd_open+0x275/0x2e0 [ 94.314170][ T7050] chrdev_open+0x2eb/0x3a0 [ 94.314256][ T7050] do_dentry_open+0x646/0xa20 [ 94.314286][ T7050] ? __pfx_chrdev_open+0x10/0x10 [ 94.314315][ T7050] vfs_open+0x37/0x1e0 [ 94.314343][ T7050] path_openat+0x1c5e/0x2170 [ 94.314438][ T7050] do_filp_open+0x109/0x230 [ 94.314467][ T7050] do_sys_openat2+0xa6/0x110 [ 94.314499][ T7050] __x64_sys_openat+0xf2/0x120 [ 94.314531][ T7050] x64_sys_call+0x2e9c/0x2ff0 [ 94.314608][ T7050] do_syscall_64+0xd2/0x200 [ 94.314683][ T7050] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 94.314708][ T7050] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 94.314756][ T7050] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 94.314787][ T7050] RIP: 0033:0x7f5110cbeba9 [ 94.314802][ T7050] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 94.314820][ T7050] RSP: 002b:00007f510f727038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 94.314854][ T7050] RAX: ffffffffffffffda RBX: 00007f5110f05fa0 RCX: 00007f5110cbeba9 [ 94.314868][ T7050] RDX: 0000000000062181 RSI: 00002000000000c0 RDI: ffffffffffffff9c [ 94.314881][ T7050] RBP: 00007f510f727090 R08: 0000000000000000 R09: 0000000000000000 [ 94.314894][ T7050] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 94.314907][ T7050] R13: 00007f5110f06038 R14: 00007f5110f05fa0 R15: 00007fff8f2f7308 [ 94.314926][ T7050] [ 94.608694][ T7065] FAULT_INJECTION: forcing a failure. [ 94.608694][ T7065] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 94.621916][ T7065] CPU: 0 UID: 0 PID: 7065 Comm: syz.0.1280 Not tainted syzkaller #0 PREEMPT(voluntary) [ 94.621945][ T7065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 94.621957][ T7065] Call Trace: [ 94.621964][ T7065] [ 94.621994][ T7065] __dump_stack+0x1d/0x30 [ 94.622012][ T7065] dump_stack_lvl+0xe8/0x140 [ 94.622030][ T7065] dump_stack+0x15/0x1b [ 94.622047][ T7065] should_fail_ex+0x265/0x280 [ 94.622072][ T7065] should_fail+0xb/0x20 [ 94.622130][ T7065] should_fail_usercopy+0x1a/0x20 [ 94.622156][ T7065] _copy_from_user+0x1c/0xb0 [ 94.622212][ T7065] snd_seq_event_dup+0x306/0x460 [ 94.622263][ T7065] snd_seq_client_enqueue_event+0x1dc/0x2a0 [ 94.622291][ T7065] snd_seq_write+0x41a/0x530 [ 94.622323][ T7065] ? __pfx_snd_seq_write+0x10/0x10 [ 94.622352][ T7065] vfs_write+0x269/0x960 [ 94.622432][ T7065] ? __rcu_read_unlock+0x4f/0x70 [ 94.622455][ T7065] ? __fget_files+0x184/0x1c0 [ 94.622557][ T7065] ksys_write+0xda/0x1a0 [ 94.622579][ T7065] __x64_sys_write+0x40/0x50 [ 94.622608][ T7065] x64_sys_call+0x27fe/0x2ff0 [ 94.622626][ T7065] do_syscall_64+0xd2/0x200 [ 94.622653][ T7065] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 94.622684][ T7065] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 94.622713][ T7065] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 94.622803][ T7065] RIP: 0033:0x7f88d85beba9 [ 94.622819][ T7065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 94.622904][ T7065] RSP: 002b:00007f88d7027038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 94.622924][ T7065] RAX: ffffffffffffffda RBX: 00007f88d8805fa0 RCX: 00007f88d85beba9 [ 94.622934][ T7065] RDX: 000000000000ffc8 RSI: 0000200000000000 RDI: 0000000000000004 [ 94.623007][ T7065] RBP: 00007f88d7027090 R08: 0000000000000000 R09: 0000000000000000 [ 94.623113][ T7065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 94.623126][ T7065] R13: 00007f88d8806038 R14: 00007f88d8805fa0 R15: 00007ffc001e4508 [ 94.623216][ T7065] [ 94.980742][ T7086] macvlan1: entered promiscuous mode [ 94.987204][ T7086] ipvlan0: entered promiscuous mode [ 94.993462][ T7086] ipvlan0: left promiscuous mode [ 95.009659][ T7086] macvlan1: left promiscuous mode [ 95.043055][ T7100] lo speed is unknown, defaulting to 1000 [ 95.099436][ T7100] lo speed is unknown, defaulting to 1000 [ 95.221657][ T7130] macvlan1: entered promiscuous mode [ 95.228188][ T7130] ipvlan0: entered promiscuous mode [ 95.233969][ T7130] ipvlan0: left promiscuous mode [ 95.239196][ T7130] macvlan1: left promiscuous mode [ 95.327355][ T7142] FAULT_INJECTION: forcing a failure. [ 95.327355][ T7142] name failslab, interval 1, probability 0, space 0, times 0 [ 95.340196][ T7142] CPU: 0 UID: 0 PID: 7142 Comm: syz.1.1313 Not tainted syzkaller #0 PREEMPT(voluntary) [ 95.340224][ T7142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 95.340235][ T7142] Call Trace: [ 95.340241][ T7142] [ 95.340248][ T7142] __dump_stack+0x1d/0x30 [ 95.340326][ T7142] dump_stack_lvl+0xe8/0x140 [ 95.340342][ T7142] dump_stack+0x15/0x1b [ 95.340356][ T7142] should_fail_ex+0x265/0x280 [ 95.340442][ T7142] ? audit_log_d_path+0x8d/0x150 [ 95.340468][ T7142] should_failslab+0x8c/0xb0 [ 95.340529][ T7142] __kmalloc_cache_noprof+0x4c/0x320 [ 95.340623][ T7142] audit_log_d_path+0x8d/0x150 [ 95.340648][ T7142] audit_log_d_path_exe+0x42/0x70 [ 95.340710][ T7142] audit_log_task+0x1e9/0x250 [ 95.340755][ T7142] audit_seccomp+0x61/0x100 [ 95.340780][ T7142] ? __seccomp_filter+0x68c/0x10d0 [ 95.340800][ T7142] __seccomp_filter+0x69d/0x10d0 [ 95.340818][ T7142] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 95.340945][ T7142] ? vfs_write+0x7e8/0x960 [ 95.340967][ T7142] ? __rcu_read_unlock+0x4f/0x70 [ 95.340989][ T7142] ? __fget_files+0x184/0x1c0 [ 95.341025][ T7142] __secure_computing+0x82/0x150 [ 95.341045][ T7142] syscall_trace_enter+0xcf/0x1e0 [ 95.341137][ T7142] do_syscall_64+0xac/0x200 [ 95.341163][ T7142] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 95.341239][ T7142] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 95.341283][ T7142] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 95.341301][ T7142] RIP: 0033:0x7fc1722aeba9 [ 95.341317][ T7142] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 95.341332][ T7142] RSP: 002b:00007fc170d17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000089 [ 95.341348][ T7142] RAX: ffffffffffffffda RBX: 00007fc1724f5fa0 RCX: 00007fc1722aeba9 [ 95.341439][ T7142] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 95.341452][ T7142] RBP: 00007fc170d17090 R08: 0000000000000000 R09: 0000000000000000 [ 95.341463][ T7142] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 95.341473][ T7142] R13: 00007fc1724f6038 R14: 00007fc1724f5fa0 R15: 00007fff1c8a75e8 [ 95.341489][ T7142] [ 95.601048][ T7144] FAULT_INJECTION: forcing a failure. [ 95.601048][ T7144] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 95.614171][ T7144] CPU: 0 UID: 0 PID: 7144 Comm: syz.0.1314 Not tainted syzkaller #0 PREEMPT(voluntary) [ 95.614195][ T7144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 95.614205][ T7144] Call Trace: [ 95.614212][ T7144] [ 95.614220][ T7144] __dump_stack+0x1d/0x30 [ 95.614280][ T7144] dump_stack_lvl+0xe8/0x140 [ 95.614297][ T7144] dump_stack+0x15/0x1b [ 95.614310][ T7144] should_fail_ex+0x265/0x280 [ 95.614356][ T7144] should_fail+0xb/0x20 [ 95.614379][ T7144] should_fail_usercopy+0x1a/0x20 [ 95.614419][ T7144] _copy_from_iter+0xd2/0xe80 [ 95.614442][ T7144] ? __build_skb_around+0x1a0/0x200 [ 95.614466][ T7144] ? __alloc_skb+0x223/0x320 [ 95.614490][ T7144] netlink_sendmsg+0x471/0x6b0 [ 95.614519][ T7144] ? __pfx_netlink_sendmsg+0x10/0x10 [ 95.614599][ T7144] __sock_sendmsg+0x145/0x180 [ 95.614637][ T7144] ____sys_sendmsg+0x31e/0x4e0 [ 95.614665][ T7144] ___sys_sendmsg+0x17b/0x1d0 [ 95.614700][ T7144] __x64_sys_sendmsg+0xd4/0x160 [ 95.614724][ T7144] x64_sys_call+0x191e/0x2ff0 [ 95.614784][ T7144] do_syscall_64+0xd2/0x200 [ 95.614867][ T7144] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 95.614887][ T7144] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 95.614980][ T7144] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 95.615002][ T7144] RIP: 0033:0x7f88d85beba9 [ 95.615036][ T7144] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 95.615076][ T7144] RSP: 002b:00007f88d7027038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 95.615096][ T7144] RAX: ffffffffffffffda RBX: 00007f88d8805fa0 RCX: 00007f88d85beba9 [ 95.615109][ T7144] RDX: 0000000000000000 RSI: 00002000000012c0 RDI: 0000000000000003 [ 95.615121][ T7144] RBP: 00007f88d7027090 R08: 0000000000000000 R09: 0000000000000000 [ 95.615131][ T7144] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 95.615142][ T7144] R13: 00007f88d8806038 R14: 00007f88d8805fa0 R15: 00007ffc001e4508 [ 95.615157][ T7144] [ 95.843298][ T3963] Process accounting resumed [ 95.876218][ T7163] macvlan1: entered promiscuous mode [ 95.883002][ T7163] ipvlan0: entered promiscuous mode [ 95.888802][ T7163] ipvlan0: left promiscuous mode [ 95.894358][ T7163] macvlan1: left promiscuous mode [ 95.963003][ T7177] FAULT_INJECTION: forcing a failure. [ 95.963003][ T7177] name failslab, interval 1, probability 0, space 0, times 0 [ 95.975660][ T7177] CPU: 1 UID: 0 PID: 7177 Comm: syz.0.1328 Not tainted syzkaller #0 PREEMPT(voluntary) [ 95.975705][ T7177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 95.975771][ T7177] Call Trace: [ 95.975778][ T7177] [ 95.975785][ T7177] __dump_stack+0x1d/0x30 [ 95.975808][ T7177] dump_stack_lvl+0xe8/0x140 [ 95.975828][ T7177] dump_stack+0x15/0x1b [ 95.975845][ T7177] should_fail_ex+0x265/0x280 [ 95.975870][ T7177] should_failslab+0x8c/0xb0 [ 95.975921][ T7177] kmem_cache_alloc_noprof+0x50/0x310 [ 95.975945][ T7177] ? skb_clone+0x151/0x1f0 [ 95.975989][ T7177] skb_clone+0x151/0x1f0 [ 95.976024][ T7177] __netlink_deliver_tap+0x2c9/0x500 [ 95.976054][ T7177] netlink_unicast+0x66b/0x690 [ 95.976225][ T7177] netlink_sendmsg+0x58b/0x6b0 [ 95.976254][ T7177] ? __pfx_netlink_sendmsg+0x10/0x10 [ 95.976388][ T7177] __sock_sendmsg+0x145/0x180 [ 95.976420][ T7177] ____sys_sendmsg+0x31e/0x4e0 [ 95.976449][ T7177] ___sys_sendmsg+0x17b/0x1d0 [ 95.976494][ T7177] __x64_sys_sendmsg+0xd4/0x160 [ 95.976519][ T7177] x64_sys_call+0x191e/0x2ff0 [ 95.976536][ T7177] do_syscall_64+0xd2/0x200 [ 95.976561][ T7177] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 95.976660][ T7177] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 95.976746][ T7177] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 95.976768][ T7177] RIP: 0033:0x7f88d85beba9 [ 95.976784][ T7177] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 95.976849][ T7177] RSP: 002b:00007f88d7027038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 95.976869][ T7177] RAX: ffffffffffffffda RBX: 00007f88d8805fa0 RCX: 00007f88d85beba9 [ 95.976883][ T7177] RDX: 0000000000000000 RSI: 0000200000006280 RDI: 0000000000000003 [ 95.976895][ T7177] RBP: 00007f88d7027090 R08: 0000000000000000 R09: 0000000000000000 [ 95.976908][ T7177] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 95.976920][ T7177] R13: 00007f88d8806038 R14: 00007f88d8805fa0 R15: 00007ffc001e4508 [ 95.976957][ T7177] [ 96.000305][ T7177] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1328'. [ 96.192966][ T7177] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1328'. [ 96.192984][ T7177] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1328'. [ 96.193163][ T7177] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1328'. [ 96.219899][ T7177] netlink: 'syz.0.1328': attribute type 6 has an invalid length. [ 96.734913][ T7207] vlan0: entered promiscuous mode [ 96.740022][ T7207] vlan0: entered allmulticast mode [ 96.745274][ T7207] hsr_slave_1: entered allmulticast mode [ 96.861170][ T7213] FAULT_INJECTION: forcing a failure. [ 96.861170][ T7213] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 96.875418][ T7213] CPU: 0 UID: 0 PID: 7213 Comm: syz.2.1342 Not tainted syzkaller #0 PREEMPT(voluntary) [ 96.875445][ T7213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 96.875458][ T7213] Call Trace: [ 96.875465][ T7213] [ 96.875473][ T7213] __dump_stack+0x1d/0x30 [ 96.875508][ T7213] dump_stack_lvl+0xe8/0x140 [ 96.875524][ T7213] dump_stack+0x15/0x1b [ 96.875539][ T7213] should_fail_ex+0x265/0x280 [ 96.875563][ T7213] should_fail+0xb/0x20 [ 96.875579][ T7213] should_fail_usercopy+0x1a/0x20 [ 96.875606][ T7213] strncpy_from_user+0x25/0x230 [ 96.875716][ T7213] ? kmem_cache_alloc_noprof+0x186/0x310 [ 96.875741][ T7213] ? getname_flags+0x80/0x3b0 [ 96.875765][ T7213] getname_flags+0xae/0x3b0 [ 96.875812][ T7213] __se_sys_quotactl+0x16a/0x670 [ 96.875833][ T7213] __x64_sys_quotactl+0x55/0x70 [ 96.875851][ T7213] x64_sys_call+0x15d6/0x2ff0 [ 96.875874][ T7213] do_syscall_64+0xd2/0x200 [ 96.876035][ T7213] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 96.876055][ T7213] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 96.876081][ T7213] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 96.876159][ T7213] RIP: 0033:0x7f5110cbeba9 [ 96.876172][ T7213] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 96.876186][ T7213] RSP: 002b:00007f510f727038 EFLAGS: 00000246 ORIG_RAX: 00000000000000b3 [ 96.876205][ T7213] RAX: ffffffffffffffda RBX: 00007f5110f05fa0 RCX: 00007f5110cbeba9 [ 96.876218][ T7213] RDX: 0000000000000000 RSI: 0000200000000080 RDI: ffffffff80000200 [ 96.876278][ T7213] RBP: 00007f510f727090 R08: 0000000000000000 R09: 0000000000000000 [ 96.876288][ T7213] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 96.876299][ T7213] R13: 00007f5110f06038 R14: 00007f5110f05fa0 R15: 00007fff8f2f7308 [ 96.876314][ T7213] [ 97.428559][ T7249] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=7249 comm=syz.3.1357 [ 97.441891][ T7249] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1357'. [ 97.501937][ T7261] macvlan1: entered promiscuous mode [ 97.508180][ T7261] ipvlan0: entered promiscuous mode [ 97.513990][ T7261] ipvlan0: left promiscuous mode [ 97.518989][ T7261] macvlan1: left promiscuous mode [ 98.074544][ T7298] macvlan1: entered promiscuous mode [ 98.088834][ T7298] ipvlan0: entered promiscuous mode [ 98.097812][ T7298] ipvlan0: left promiscuous mode [ 98.103188][ T7298] macvlan1: left promiscuous mode [ 98.141911][ T7309] FAULT_INJECTION: forcing a failure. [ 98.141911][ T7309] name failslab, interval 1, probability 0, space 0, times 0 [ 98.154578][ T7309] CPU: 0 UID: 0 PID: 7309 Comm: syz.3.1386 Not tainted syzkaller #0 PREEMPT(voluntary) [ 98.154601][ T7309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 98.154628][ T7309] Call Trace: [ 98.154635][ T7309] [ 98.154643][ T7309] __dump_stack+0x1d/0x30 [ 98.154717][ T7309] dump_stack_lvl+0xe8/0x140 [ 98.154734][ T7309] dump_stack+0x15/0x1b [ 98.154750][ T7309] should_fail_ex+0x265/0x280 [ 98.154786][ T7309] should_failslab+0x8c/0xb0 [ 98.154812][ T7309] kmem_cache_alloc_noprof+0x50/0x310 [ 98.154839][ T7309] ? audit_log_start+0x365/0x6c0 [ 98.154864][ T7309] audit_log_start+0x365/0x6c0 [ 98.154931][ T7309] audit_seccomp+0x48/0x100 [ 98.154980][ T7309] ? __seccomp_filter+0x68c/0x10d0 [ 98.155002][ T7309] __seccomp_filter+0x69d/0x10d0 [ 98.155034][ T7309] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 98.155057][ T7309] ? vfs_write+0x7e8/0x960 [ 98.155088][ T7309] __secure_computing+0x82/0x150 [ 98.155109][ T7309] syscall_trace_enter+0xcf/0x1e0 [ 98.155134][ T7309] do_syscall_64+0xac/0x200 [ 98.155207][ T7309] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 98.155310][ T7309] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 98.155360][ T7309] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 98.155457][ T7309] RIP: 0033:0x7fac7db2eba9 [ 98.155472][ T7309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 98.155490][ T7309] RSP: 002b:00007fac7c58f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 98.155509][ T7309] RAX: ffffffffffffffda RBX: 00007fac7dd75fa0 RCX: 00007fac7db2eba9 [ 98.155522][ T7309] RDX: 0000200000000000 RSI: 00000000802c550a RDI: ffffffffffffffff [ 98.155535][ T7309] RBP: 00007fac7c58f090 R08: 0000000000000000 R09: 0000000000000000 [ 98.155547][ T7309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 98.155696][ T7309] R13: 00007fac7dd76038 R14: 00007fac7dd75fa0 R15: 00007ffcf1e6cfb8 [ 98.155715][ T7309] [ 98.473326][ T7329] ipvlan0: entered promiscuous mode [ 98.479822][ T7329] bridge0: port 3(ipvlan0) entered blocking state [ 98.486346][ T7329] bridge0: port 3(ipvlan0) entered disabled state [ 98.493170][ T7329] ipvlan0: entered allmulticast mode [ 98.498458][ T7329] bridge0: entered allmulticast mode [ 98.504462][ T7329] ipvlan0: left allmulticast mode [ 98.509488][ T7329] bridge0: left allmulticast mode [ 98.690107][ T7352] FAULT_INJECTION: forcing a failure. [ 98.690107][ T7352] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 98.690136][ T7352] CPU: 1 UID: 0 PID: 7352 Comm: syz.0.1403 Not tainted syzkaller #0 PREEMPT(voluntary) [ 98.690163][ T7352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 98.690215][ T7352] Call Trace: [ 98.690222][ T7352] [ 98.690230][ T7352] __dump_stack+0x1d/0x30 [ 98.690249][ T7352] dump_stack_lvl+0xe8/0x140 [ 98.690267][ T7352] dump_stack+0x15/0x1b [ 98.690281][ T7352] should_fail_ex+0x265/0x280 [ 98.690307][ T7352] should_fail+0xb/0x20 [ 98.690324][ T7352] should_fail_usercopy+0x1a/0x20 [ 98.690346][ T7352] _copy_to_user+0x20/0xa0 [ 98.690377][ T7352] simple_read_from_buffer+0xb5/0x130 [ 98.690451][ T7352] proc_fail_nth_read+0x10e/0x150 [ 98.690510][ T7352] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 98.690530][ T7352] vfs_read+0x1a8/0x770 [ 98.690579][ T7352] ? __rcu_read_unlock+0x4f/0x70 [ 98.690600][ T7352] ? __fget_files+0x184/0x1c0 [ 98.690623][ T7352] ksys_read+0xda/0x1a0 [ 98.690642][ T7352] __x64_sys_read+0x40/0x50 [ 98.690663][ T7352] x64_sys_call+0x27bc/0x2ff0 [ 98.690714][ T7352] do_syscall_64+0xd2/0x200 [ 98.690752][ T7352] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 98.690772][ T7352] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 98.690810][ T7352] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 98.690830][ T7352] RIP: 0033:0x7f88d85bd5bc [ 98.690918][ T7352] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 98.690935][ T7352] RSP: 002b:00007f88d7027030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 98.690952][ T7352] RAX: ffffffffffffffda RBX: 00007f88d8805fa0 RCX: 00007f88d85bd5bc [ 98.690963][ T7352] RDX: 000000000000000f RSI: 00007f88d70270a0 RDI: 0000000000000004 [ 98.690976][ T7352] RBP: 00007f88d7027090 R08: 0000000000000000 R09: 0000000000000000 [ 98.690988][ T7352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 98.691002][ T7352] R13: 00007f88d8806038 R14: 00007f88d8805fa0 R15: 00007ffc001e4508 [ 98.691076][ T7352] [ 98.777582][ T7358] macvlan1: entered promiscuous mode [ 98.868557][ T29] kauditd_printk_skb: 1338 callbacks suppressed [ 98.868611][ T29] audit: type=1400 audit(1757695641.597:6918): avc: denied { prog_load } for pid=7364 comm="syz.1.1409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 98.877454][ T7358] ipvlan0: entered promiscuous mode [ 98.936803][ T29] audit: type=1400 audit(1757695641.667:6919): avc: denied { prog_load } for pid=7364 comm="syz.1.1409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 98.952315][ T7358] ipvlan0: left promiscuous mode [ 98.962502][ T29] audit: type=1400 audit(1757695641.697:6920): avc: denied { map_create } for pid=7364 comm="syz.1.1409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 99.000188][ T7358] macvlan1: left promiscuous mode [ 99.000345][ T29] audit: type=1400 audit(1757695641.707:6921): avc: denied { prog_load } for pid=7364 comm="syz.1.1409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 99.000365][ T29] audit: type=1400 audit(1757695641.707:6922): avc: denied { mac_admin } for pid=7364 comm="syz.1.1409" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 99.000448][ T29] audit: type=1401 audit(1757695641.707:6923): op=fscreate invalid_context=DC [ 99.024896][ T29] audit: type=1400 audit(1757695641.737:6924): avc: denied { read write } for pid=3302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=821 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 99.030012][ T29] audit: type=1400 audit(1757695641.757:6925): avc: denied { map_create } for pid=7367 comm="syz.0.1410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 99.060068][ T29] audit: type=1400 audit(1757695641.767:6926): avc: denied { read write } for pid=3576 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 99.060139][ T29] audit: type=1400 audit(1757695641.767:6927): avc: denied { prog_load } for pid=7367 comm="syz.0.1410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 99.252382][ T7393] netlink: 68 bytes leftover after parsing attributes in process `syz.3.1420'. [ 99.301543][ T7395] ipvlan2: entered promiscuous mode [ 99.307353][ T7395] bridge0: port 3(ipvlan2) entered blocking state [ 99.313891][ T7395] bridge0: port 3(ipvlan2) entered disabled state [ 99.320985][ T7395] ipvlan2: entered allmulticast mode [ 99.326342][ T7395] bridge0: entered allmulticast mode [ 99.332409][ T7395] ipvlan2: left allmulticast mode [ 99.337457][ T7395] bridge0: left allmulticast mode [ 99.406235][ T7405] netlink: 'syz.3.1426': attribute type 1 has an invalid length. [ 99.441616][ T7405] bond4: entered promiscuous mode [ 99.450534][ T7405] 8021q: adding VLAN 0 to HW filter on device bond4 [ 99.465774][ T7418] bond_slave_1: mtu less than device minimum [ 99.498931][ T7421] netlink: 'syz.5.1431': attribute type 10 has an invalid length. [ 99.529114][ T7421] team0: Port device dummy0 added [ 99.539169][ T7421] FAULT_INJECTION: forcing a failure. [ 99.539169][ T7421] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 99.552331][ T7421] CPU: 0 UID: 0 PID: 7421 Comm: syz.5.1431 Not tainted syzkaller #0 PREEMPT(voluntary) [ 99.552420][ T7421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 99.552430][ T7421] Call Trace: [ 99.552437][ T7421] [ 99.552445][ T7421] __dump_stack+0x1d/0x30 [ 99.552467][ T7421] dump_stack_lvl+0xe8/0x140 [ 99.552487][ T7421] dump_stack+0x15/0x1b [ 99.552544][ T7421] should_fail_ex+0x265/0x280 [ 99.552564][ T7421] should_fail+0xb/0x20 [ 99.552581][ T7421] should_fail_usercopy+0x1a/0x20 [ 99.552647][ T7421] _copy_from_iter+0xd2/0xe80 [ 99.552674][ T7421] ? __build_skb_around+0x1a0/0x200 [ 99.552697][ T7421] ? __alloc_skb+0x223/0x320 [ 99.552722][ T7421] netlink_sendmsg+0x471/0x6b0 [ 99.552781][ T7421] ? __pfx_netlink_sendmsg+0x10/0x10 [ 99.552804][ T7421] __sock_sendmsg+0x145/0x180 [ 99.552833][ T7421] ____sys_sendmsg+0x31e/0x4e0 [ 99.552918][ T7421] ___sys_sendmsg+0x17b/0x1d0 [ 99.552962][ T7421] __x64_sys_sendmsg+0xd4/0x160 [ 99.553021][ T7421] x64_sys_call+0x191e/0x2ff0 [ 99.553064][ T7421] do_syscall_64+0xd2/0x200 [ 99.553094][ T7421] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 99.553119][ T7421] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 99.553148][ T7421] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 99.553211][ T7421] RIP: 0033:0x7f0f3877eba9 [ 99.553225][ T7421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 99.553241][ T7421] RSP: 002b:00007f0f371df038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 99.553258][ T7421] RAX: ffffffffffffffda RBX: 00007f0f389c5fa0 RCX: 00007f0f3877eba9 [ 99.553272][ T7421] RDX: 0000000000000000 RSI: 0000200000000600 RDI: 0000000000000004 [ 99.553284][ T7421] RBP: 00007f0f371df090 R08: 0000000000000000 R09: 0000000000000000 [ 99.553297][ T7421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 99.553310][ T7421] R13: 00007f0f389c6038 R14: 00007f0f389c5fa0 R15: 00007ffed418c498 [ 99.553337][ T7421] [ 99.809946][ T7430] syz.0.1435 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 99.898467][ T7438] ipvlan2: entered promiscuous mode [ 99.909600][ T7438] bridge0: port 3(ipvlan2) entered blocking state [ 99.916442][ T7438] bridge0: port 3(ipvlan2) entered disabled state [ 99.924698][ T7438] ipvlan2: entered allmulticast mode [ 99.930019][ T7438] bridge0: entered allmulticast mode [ 99.934759][ T7446] FAULT_INJECTION: forcing a failure. [ 99.934759][ T7446] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 99.937148][ T7438] ipvlan2: left allmulticast mode [ 99.948497][ T7446] CPU: 1 UID: 0 PID: 7446 Comm: syz.5.1443 Not tainted syzkaller #0 PREEMPT(voluntary) [ 99.948526][ T7446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 99.948624][ T7446] Call Trace: [ 99.948631][ T7446] [ 99.948639][ T7446] __dump_stack+0x1d/0x30 [ 99.948660][ T7446] dump_stack_lvl+0xe8/0x140 [ 99.948679][ T7446] dump_stack+0x15/0x1b [ 99.948716][ T7446] should_fail_ex+0x265/0x280 [ 99.948794][ T7446] should_fail+0xb/0x20 [ 99.948862][ T7446] should_fail_usercopy+0x1a/0x20 [ 99.948882][ T7446] _copy_to_user+0x20/0xa0 [ 99.948911][ T7446] simple_read_from_buffer+0xb5/0x130 [ 99.948934][ T7446] proc_fail_nth_read+0x10e/0x150 [ 99.949038][ T7446] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 99.949062][ T7446] vfs_read+0x1a8/0x770 [ 99.949082][ T7446] ? __rcu_read_unlock+0x4f/0x70 [ 99.949115][ T7446] ? __fget_files+0x184/0x1c0 [ 99.949141][ T7446] ksys_read+0xda/0x1a0 [ 99.949163][ T7446] __x64_sys_read+0x40/0x50 [ 99.949210][ T7446] x64_sys_call+0x27bc/0x2ff0 [ 99.949230][ T7446] do_syscall_64+0xd2/0x200 [ 99.949259][ T7446] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 99.949322][ T7446] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 99.949348][ T7446] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 99.949395][ T7446] RIP: 0033:0x7f0f3877d5bc [ 99.949409][ T7446] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 99.949425][ T7446] RSP: 002b:00007f0f371df030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 99.949444][ T7446] RAX: ffffffffffffffda RBX: 00007f0f389c5fa0 RCX: 00007f0f3877d5bc [ 99.949456][ T7446] RDX: 000000000000000f RSI: 00007f0f371df0a0 RDI: 0000000000000003 [ 99.949468][ T7446] RBP: 00007f0f371df090 R08: 0000000000000000 R09: 0000000000000000 [ 99.949480][ T7446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 99.949492][ T7446] R13: 00007f0f389c6038 R14: 00007f0f389c5fa0 R15: 00007ffed418c498 [ 99.949528][ T7446] [ 100.151515][ T7438] bridge0: left allmulticast mode [ 100.481351][ T7486] macvlan1: entered promiscuous mode [ 100.487264][ T7486] ipvlan0: entered promiscuous mode [ 100.497578][ T7486] ipvlan0: left promiscuous mode [ 100.509152][ T7486] macvlan1: left promiscuous mode [ 100.522034][ T7488] macvlan1: entered promiscuous mode [ 100.534713][ T7488] ipvlan0: entered promiscuous mode [ 100.540705][ T7488] ipvlan0: left promiscuous mode [ 100.545912][ T7488] macvlan1: left promiscuous mode [ 100.575882][ T7492] FAULT_INJECTION: forcing a failure. [ 100.575882][ T7492] name failslab, interval 1, probability 0, space 0, times 0 [ 100.588613][ T7492] CPU: 1 UID: 0 PID: 7492 Comm: syz.3.1463 Not tainted syzkaller #0 PREEMPT(voluntary) [ 100.588637][ T7492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 100.588648][ T7492] Call Trace: [ 100.588655][ T7492] [ 100.588662][ T7492] __dump_stack+0x1d/0x30 [ 100.588683][ T7492] dump_stack_lvl+0xe8/0x140 [ 100.588701][ T7492] dump_stack+0x15/0x1b [ 100.588781][ T7492] should_fail_ex+0x265/0x280 [ 100.588804][ T7492] should_failslab+0x8c/0xb0 [ 100.588878][ T7492] kmem_cache_alloc_noprof+0x50/0x310 [ 100.588936][ T7492] ? alloc_empty_file+0x76/0x200 [ 100.589011][ T7492] ? mntput+0x4b/0x80 [ 100.589037][ T7492] alloc_empty_file+0x76/0x200 [ 100.589063][ T7492] path_openat+0x68/0x2170 [ 100.589132][ T7492] ? _parse_integer_limit+0x170/0x190 [ 100.589154][ T7492] ? kstrtoull+0x111/0x140 [ 100.589202][ T7492] ? kstrtouint+0x76/0xc0 [ 100.589224][ T7492] do_filp_open+0x109/0x230 [ 100.589280][ T7492] do_sys_openat2+0xa6/0x110 [ 100.589306][ T7492] __x64_sys_openat+0xf2/0x120 [ 100.589336][ T7492] x64_sys_call+0x2e9c/0x2ff0 [ 100.589427][ T7492] do_syscall_64+0xd2/0x200 [ 100.589456][ T7492] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 100.589478][ T7492] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 100.589533][ T7492] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 100.589551][ T7492] RIP: 0033:0x7fac7db2eba9 [ 100.589564][ T7492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 100.589597][ T7492] RSP: 002b:00007fac7c58f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 100.589615][ T7492] RAX: ffffffffffffffda RBX: 00007fac7dd75fa0 RCX: 00007fac7db2eba9 [ 100.589627][ T7492] RDX: 0000000000084d03 RSI: 0000200000000380 RDI: ffffffffffffff9c [ 100.589711][ T7492] RBP: 00007fac7c58f090 R08: 0000000000000000 R09: 0000000000000000 [ 100.589769][ T7492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.589782][ T7492] R13: 00007fac7dd76038 R14: 00007fac7dd75fa0 R15: 00007ffcf1e6cfb8 [ 100.589799][ T7492] [ 100.831743][ T7504] FAULT_INJECTION: forcing a failure. [ 100.831743][ T7504] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 100.844843][ T7504] CPU: 1 UID: 0 PID: 7504 Comm: syz.5.1469 Not tainted syzkaller #0 PREEMPT(voluntary) [ 100.844871][ T7504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 100.844883][ T7504] Call Trace: [ 100.844889][ T7504] [ 100.844897][ T7504] __dump_stack+0x1d/0x30 [ 100.844970][ T7504] dump_stack_lvl+0xe8/0x140 [ 100.844990][ T7504] dump_stack+0x15/0x1b [ 100.845006][ T7504] should_fail_ex+0x265/0x280 [ 100.845041][ T7504] should_fail+0xb/0x20 [ 100.845061][ T7504] should_fail_usercopy+0x1a/0x20 [ 100.845134][ T7504] _copy_to_user+0x20/0xa0 [ 100.845166][ T7504] simple_read_from_buffer+0xb5/0x130 [ 100.845195][ T7504] proc_fail_nth_read+0x10e/0x150 [ 100.845223][ T7504] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 100.845324][ T7504] vfs_read+0x1a8/0x770 [ 100.845346][ T7504] ? __rcu_read_unlock+0x4f/0x70 [ 100.845369][ T7504] ? __fget_files+0x184/0x1c0 [ 100.845421][ T7504] ksys_read+0xda/0x1a0 [ 100.845505][ T7504] __x64_sys_read+0x40/0x50 [ 100.845595][ T7504] x64_sys_call+0x27bc/0x2ff0 [ 100.845659][ T7504] do_syscall_64+0xd2/0x200 [ 100.845736][ T7504] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 100.845792][ T7504] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 100.845820][ T7504] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 100.845841][ T7504] RIP: 0033:0x7f0f3877d5bc [ 100.845857][ T7504] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 100.845874][ T7504] RSP: 002b:00007f0f371df030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 100.845894][ T7504] RAX: ffffffffffffffda RBX: 00007f0f389c5fa0 RCX: 00007f0f3877d5bc [ 100.845906][ T7504] RDX: 000000000000000f RSI: 00007f0f371df0a0 RDI: 0000000000000004 [ 100.845926][ T7504] RBP: 00007f0f371df090 R08: 0000000000000000 R09: 0000000000000000 [ 100.845938][ T7504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.845950][ T7504] R13: 00007f0f389c6038 R14: 00007f0f389c5fa0 R15: 00007ffed418c498 [ 100.845969][ T7504] [ 101.067468][ T7518] mmap: syz.2.1474 (7518) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 101.098753][ T7521] IPVS: dh: UDP 224.0.0.2:0 - no destination available [ 101.119761][ T7523] macvlan1: entered promiscuous mode [ 101.135805][ T7523] ipvlan0: entered promiscuous mode [ 101.145828][ T7523] ipvlan0: left promiscuous mode [ 101.155699][ T7523] macvlan1: left promiscuous mode [ 101.241953][ T7542] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1484'. [ 101.251509][ T7542] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1484'. [ 101.303013][ T7548] FAULT_INJECTION: forcing a failure. [ 101.303013][ T7548] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 101.316142][ T7548] CPU: 1 UID: 0 PID: 7548 Comm: syz.5.1487 Not tainted syzkaller #0 PREEMPT(voluntary) [ 101.316167][ T7548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 101.316185][ T7548] Call Trace: [ 101.316190][ T7548] [ 101.316195][ T7548] __dump_stack+0x1d/0x30 [ 101.316213][ T7548] dump_stack_lvl+0xe8/0x140 [ 101.316229][ T7548] dump_stack+0x15/0x1b [ 101.316243][ T7548] should_fail_ex+0x265/0x280 [ 101.316265][ T7548] should_fail+0xb/0x20 [ 101.316335][ T7548] should_fail_usercopy+0x1a/0x20 [ 101.316355][ T7548] _copy_to_user+0x20/0xa0 [ 101.316383][ T7548] simple_read_from_buffer+0xb5/0x130 [ 101.316442][ T7548] proc_fail_nth_read+0x10e/0x150 [ 101.316467][ T7548] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 101.316540][ T7548] vfs_read+0x1a8/0x770 [ 101.316561][ T7548] ? __rcu_read_unlock+0x4f/0x70 [ 101.316632][ T7548] ? __fget_files+0x184/0x1c0 [ 101.316655][ T7548] ? finish_task_switch+0xad/0x2b0 [ 101.316677][ T7548] ksys_read+0xda/0x1a0 [ 101.316730][ T7548] __x64_sys_read+0x40/0x50 [ 101.316748][ T7548] x64_sys_call+0x27bc/0x2ff0 [ 101.316841][ T7548] do_syscall_64+0xd2/0x200 [ 101.316869][ T7548] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 101.316894][ T7548] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 101.317004][ T7548] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 101.317034][ T7548] RIP: 0033:0x7f0f3877d5bc [ 101.317049][ T7548] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 101.317069][ T7548] RSP: 002b:00007f0f371df030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 101.317168][ T7548] RAX: ffffffffffffffda RBX: 00007f0f389c5fa0 RCX: 00007f0f3877d5bc [ 101.317179][ T7548] RDX: 000000000000000f RSI: 00007f0f371df0a0 RDI: 0000000000000004 [ 101.317269][ T7548] RBP: 00007f0f371df090 R08: 0000000000000000 R09: 0000000000000000 [ 101.317279][ T7548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 101.317291][ T7548] R13: 00007f0f389c6038 R14: 00007f0f389c5fa0 R15: 00007ffed418c498 [ 101.317311][ T7548] [ 101.318431][ T7552] macvlan1: entered promiscuous mode [ 101.527814][ T7552] ipvlan0: entered promiscuous mode [ 101.533387][ T7552] ipvlan0: left promiscuous mode [ 101.538443][ T7552] macvlan1: left promiscuous mode [ 101.998004][ T7581] FAULT_INJECTION: forcing a failure. [ 101.998004][ T7581] name failslab, interval 1, probability 0, space 0, times 0 [ 102.010688][ T7581] CPU: 0 UID: 0 PID: 7581 Comm: syz.3.1502 Not tainted syzkaller #0 PREEMPT(voluntary) [ 102.010860][ T7581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 102.010870][ T7581] Call Trace: [ 102.010876][ T7581] [ 102.010883][ T7581] __dump_stack+0x1d/0x30 [ 102.010902][ T7581] dump_stack_lvl+0xe8/0x140 [ 102.010920][ T7581] dump_stack+0x15/0x1b [ 102.010999][ T7581] should_fail_ex+0x265/0x280 [ 102.011024][ T7581] should_failslab+0x8c/0xb0 [ 102.011050][ T7581] kmem_cache_alloc_noprof+0x50/0x310 [ 102.011072][ T7581] ? getname_flags+0x80/0x3b0 [ 102.011096][ T7581] getname_flags+0x80/0x3b0 [ 102.011136][ T7581] user_path_at+0x28/0x130 [ 102.011189][ T7581] __se_sys_mount+0x25b/0x2e0 [ 102.011279][ T7581] ? fput+0x8f/0xc0 [ 102.011304][ T7581] __x64_sys_mount+0x67/0x80 [ 102.011363][ T7581] x64_sys_call+0x2b4d/0x2ff0 [ 102.011390][ T7581] do_syscall_64+0xd2/0x200 [ 102.011518][ T7581] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 102.011543][ T7581] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 102.011572][ T7581] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 102.011593][ T7581] RIP: 0033:0x7fac7db2eba9 [ 102.011687][ T7581] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 102.011703][ T7581] RSP: 002b:00007fac7c58f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 102.011722][ T7581] RAX: ffffffffffffffda RBX: 00007fac7dd75fa0 RCX: 00007fac7db2eba9 [ 102.011735][ T7581] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000000 [ 102.011808][ T7581] RBP: 00007fac7c58f090 R08: 0000200000000040 R09: 0000000000000000 [ 102.011818][ T7581] R10: 0000000000084022 R11: 0000000000000246 R12: 0000000000000001 [ 102.011872][ T7581] R13: 00007fac7dd76038 R14: 00007fac7dd75fa0 R15: 00007ffcf1e6cfb8 [ 102.011888][ T7581] [ 102.317322][ T7602] FAULT_INJECTION: forcing a failure. [ 102.317322][ T7602] name failslab, interval 1, probability 0, space 0, times 0 [ 102.330013][ T7602] CPU: 0 UID: 0 PID: 7602 Comm: syz.3.1507 Not tainted syzkaller #0 PREEMPT(voluntary) [ 102.330061][ T7602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 102.330073][ T7602] Call Trace: [ 102.330079][ T7602] [ 102.330087][ T7602] __dump_stack+0x1d/0x30 [ 102.330108][ T7602] dump_stack_lvl+0xe8/0x140 [ 102.330127][ T7602] dump_stack+0x15/0x1b [ 102.330212][ T7602] should_fail_ex+0x265/0x280 [ 102.330236][ T7602] should_failslab+0x8c/0xb0 [ 102.330258][ T7602] kmem_cache_alloc_noprof+0x50/0x310 [ 102.330400][ T7602] ? security_file_alloc+0x32/0x100 [ 102.330427][ T7602] security_file_alloc+0x32/0x100 [ 102.330517][ T7602] init_file+0x5c/0x1d0 [ 102.330541][ T7602] alloc_empty_file+0x8b/0x200 [ 102.330566][ T7602] path_openat+0x68/0x2170 [ 102.330661][ T7602] ? _parse_integer_limit+0x170/0x190 [ 102.330752][ T7602] ? kstrtoull+0x111/0x140 [ 102.330774][ T7602] ? kstrtouint+0x76/0xc0 [ 102.330797][ T7602] do_filp_open+0x109/0x230 [ 102.330859][ T7602] do_sys_openat2+0xa6/0x110 [ 102.330887][ T7602] __x64_sys_openat+0xf2/0x120 [ 102.330985][ T7602] x64_sys_call+0x2e9c/0x2ff0 [ 102.331084][ T7602] do_syscall_64+0xd2/0x200 [ 102.331108][ T7602] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 102.331208][ T7602] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 102.331235][ T7602] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 102.331252][ T7602] RIP: 0033:0x7fac7db2d510 [ 102.331268][ T7602] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 102.331284][ T7602] RSP: 002b:00007fac7c56df70 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 102.331362][ T7602] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fac7db2d510 [ 102.331383][ T7602] RDX: 0000000000000000 RSI: 00007fac7dbb1f06 RDI: 00000000ffffff9c [ 102.331403][ T7602] RBP: 00007fac7dbb1f06 R08: 0000000000000000 R09: 0000000000000000 [ 102.331471][ T7602] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 102.331482][ T7602] R13: 00007fac7dd76128 R14: 00007fac7dd76090 R15: 00007ffcf1e6cfb8 [ 102.331497][ T7602] [ 103.072207][ T7653] FAULT_INJECTION: forcing a failure. [ 103.072207][ T7653] name failslab, interval 1, probability 0, space 0, times 0 [ 103.084871][ T7653] CPU: 0 UID: 0 PID: 7653 Comm: ¬í Not tainted syzkaller #0 PREEMPT(voluntary) [ 103.084960][ T7653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 103.084971][ T7653] Call Trace: [ 103.084979][ T7653] [ 103.084986][ T7653] __dump_stack+0x1d/0x30 [ 103.085005][ T7653] dump_stack_lvl+0xe8/0x140 [ 103.085021][ T7653] dump_stack+0x15/0x1b [ 103.085034][ T7653] should_fail_ex+0x265/0x280 [ 103.085096][ T7653] should_failslab+0x8c/0xb0 [ 103.085121][ T7653] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 103.085149][ T7653] ? __d_alloc+0x3d/0x340 [ 103.085217][ T7653] __d_alloc+0x3d/0x340 [ 103.085274][ T7653] ? avc_has_perm+0xf7/0x180 [ 103.085299][ T7653] d_alloc_parallel+0x53/0xc60 [ 103.085327][ T7653] ? selinux_file_open+0x2df/0x330 [ 103.085405][ T7653] ? __rcu_read_unlock+0x4f/0x70 [ 103.085424][ T7653] ? lockref_get_not_dead+0x120/0x1c0 [ 103.085453][ T7653] ? __rcu_read_unlock+0x4f/0x70 [ 103.085553][ T7653] __lookup_slow+0x8c/0x250 [ 103.085646][ T7653] lookup_slow+0x3c/0x60 [ 103.085673][ T7653] link_path_walk+0x753/0x900 [ 103.085704][ T7653] path_lookupat+0x63/0x2a0 [ 103.085744][ T7653] filename_lookup+0x147/0x340 [ 103.085783][ T7653] user_path_at+0x3e/0x130 [ 103.085876][ T7653] do_fchownat+0xb0/0x210 [ 103.085904][ T7653] __x64_sys_lchown+0x4a/0x60 [ 103.085931][ T7653] x64_sys_call+0x2861/0x2ff0 [ 103.085958][ T7653] do_syscall_64+0xd2/0x200 [ 103.085986][ T7653] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 103.086005][ T7653] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 103.086028][ T7653] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 103.086109][ T7653] RIP: 0033:0x7fac7db2eba9 [ 103.086124][ T7653] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 103.086142][ T7653] RSP: 002b:00007fac7c58f038 EFLAGS: 00000246 ORIG_RAX: 000000000000005e [ 103.086162][ T7653] RAX: ffffffffffffffda RBX: 00007fac7dd75fa0 RCX: 00007fac7db2eba9 [ 103.086241][ T7653] RDX: 000000000000ee00 RSI: 0000000000000000 RDI: 0000200000000ac0 [ 103.086293][ T7653] RBP: 00007fac7c58f090 R08: 0000000000000000 R09: 0000000000000000 [ 103.086306][ T7653] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 103.086319][ T7653] R13: 00007fac7dd76038 R14: 00007fac7dd75fa0 R15: 00007ffcf1e6cfb8 [ 103.086339][ T7653] [ 103.401572][ T7688] FAULT_INJECTION: forcing a failure. [ 103.401572][ T7688] name failslab, interval 1, probability 0, space 0, times 0 [ 103.414482][ T7688] CPU: 0 UID: 0 PID: 7688 Comm: syz.5.1547 Not tainted syzkaller #0 PREEMPT(voluntary) [ 103.414553][ T7688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 103.414585][ T7688] Call Trace: [ 103.414592][ T7688] [ 103.414600][ T7688] __dump_stack+0x1d/0x30 [ 103.414621][ T7688] dump_stack_lvl+0xe8/0x140 [ 103.414639][ T7688] dump_stack+0x15/0x1b [ 103.414745][ T7688] should_fail_ex+0x265/0x280 [ 103.414768][ T7688] should_failslab+0x8c/0xb0 [ 103.414793][ T7688] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 103.414900][ T7688] ? __d_alloc+0x3d/0x340 [ 103.414958][ T7688] __d_alloc+0x3d/0x340 [ 103.414982][ T7688] ? vfs_write+0x7e8/0x960 [ 103.415060][ T7688] d_alloc_pseudo+0x1e/0x80 [ 103.415161][ T7688] alloc_file_pseudo+0x71/0x160 [ 103.415193][ T7688] anon_inode_getfile+0xa0/0x120 [ 103.415222][ T7688] do_epoll_create+0x1d0/0x270 [ 103.415259][ T7688] __x64_sys_epoll_create+0x35/0x60 [ 103.415323][ T7688] x64_sys_call+0x2d89/0x2ff0 [ 103.415344][ T7688] do_syscall_64+0xd2/0x200 [ 103.415377][ T7688] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 103.415400][ T7688] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 103.415456][ T7688] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 103.415476][ T7688] RIP: 0033:0x7f0f3877eba9 [ 103.415492][ T7688] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 103.415510][ T7688] RSP: 002b:00007f0f371df038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d5 [ 103.415561][ T7688] RAX: ffffffffffffffda RBX: 00007f0f389c5fa0 RCX: 00007f0f3877eba9 [ 103.415572][ T7688] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000005f34 [ 103.415583][ T7688] RBP: 00007f0f371df090 R08: 0000000000000000 R09: 0000000000000000 [ 103.415593][ T7688] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 103.415605][ T7688] R13: 00007f0f389c6038 R14: 00007f0f389c5fa0 R15: 00007ffed418c498 [ 103.415622][ T7688] [ 103.681566][ T7707] macvlan1: entered promiscuous mode [ 103.693537][ T7707] ipvlan0: entered promiscuous mode [ 103.699180][ T7707] ipvlan0: left promiscuous mode [ 103.737831][ T7707] macvlan1: left promiscuous mode [ 103.857349][ T7740] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1570'. [ 103.872909][ T29] kauditd_printk_skb: 1290 callbacks suppressed [ 103.872924][ T29] audit: type=1400 audit(1757695646.607:8218): avc: denied { prog_load } for pid=7742 comm="syz.2.1571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 103.875977][ T7743] netlink: 24 bytes leftover after parsing attributes in process `syz.2.1571'. [ 103.879231][ T29] audit: type=1400 audit(1757695646.607:8219): avc: denied { prog_load } for pid=7742 comm="syz.2.1571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 103.879275][ T29] audit: type=1326 audit(1757695646.607:8220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7742 comm="syz.2.1571" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5110cbeba9 code=0x7ffc0000 [ 103.949867][ T29] audit: type=1326 audit(1757695646.607:8221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7742 comm="syz.2.1571" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5110cbeba9 code=0x7ffc0000 [ 103.973353][ T29] audit: type=1326 audit(1757695646.607:8222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7742 comm="syz.2.1571" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f5110cbeba9 code=0x7ffc0000 [ 103.996777][ T29] audit: type=1326 audit(1757695646.607:8223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7742 comm="syz.2.1571" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5110cbeba9 code=0x7ffc0000 [ 104.020182][ T29] audit: type=1326 audit(1757695646.607:8224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7742 comm="syz.2.1571" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5110cbeba9 code=0x7ffc0000 [ 104.043613][ T29] audit: type=1326 audit(1757695646.607:8225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7742 comm="syz.2.1571" exe="/root/syz-executor" sig=0 arch=c000003e syscall=49 compat=0 ip=0x7f5110cbeba9 code=0x7ffc0000 [ 104.067097][ T29] audit: type=1326 audit(1757695646.607:8226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7742 comm="syz.2.1571" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5110cbeba9 code=0x7ffc0000 [ 104.090659][ T29] audit: type=1326 audit(1757695646.607:8227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7742 comm="syz.2.1571" exe="/root/syz-executor" sig=0 arch=c000003e syscall=50 compat=0 ip=0x7f5110cbeba9 code=0x7ffc0000 [ 104.181460][ T7766] lo speed is unknown, defaulting to 1000 [ 104.215775][ T7766] lo speed is unknown, defaulting to 1000 [ 104.226454][ T7774] FAULT_INJECTION: forcing a failure. [ 104.226454][ T7774] name failslab, interval 1, probability 0, space 0, times 0 [ 104.239188][ T7774] CPU: 0 UID: 0 PID: 7774 Comm: syz.2.1584 Not tainted syzkaller #0 PREEMPT(voluntary) [ 104.239267][ T7774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 104.239274][ T7774] Call Trace: [ 104.239277][ T7774] [ 104.239282][ T7774] __dump_stack+0x1d/0x30 [ 104.239295][ T7774] dump_stack_lvl+0xe8/0x140 [ 104.239325][ T7774] dump_stack+0x15/0x1b [ 104.239333][ T7774] should_fail_ex+0x265/0x280 [ 104.239419][ T7774] ? __inet_diag_dump_start+0x53/0x790 [ 104.239434][ T7774] should_failslab+0x8c/0xb0 [ 104.239448][ T7774] __kmalloc_cache_noprof+0x4c/0x320 [ 104.239464][ T7774] ? __kfree_skb+0x109/0x150 [ 104.239483][ T7774] __inet_diag_dump_start+0x53/0x790 [ 104.239503][ T7774] ? __netlink_lookup+0x266/0x2a0 [ 104.239519][ T7774] inet_diag_dump_start_compat+0x1a/0x30 [ 104.239608][ T7774] __netlink_dump_start+0x334/0x520 [ 104.239622][ T7774] inet_diag_rcv_msg_compat+0x10b/0x1d0 [ 104.239636][ T7774] ? __pfx_inet_diag_dump_start_compat+0x10/0x10 [ 104.239650][ T7774] ? __pfx_inet_diag_dump_compat+0x10/0x10 [ 104.239696][ T7774] ? __pfx_inet_diag_dump_done+0x10/0x10 [ 104.239763][ T7774] sock_diag_rcv_msg+0x189/0x2c0 [ 104.239779][ T7774] netlink_rcv_skb+0x123/0x220 [ 104.239791][ T7774] ? __pfx_sock_diag_rcv_msg+0x10/0x10 [ 104.239809][ T7774] sock_diag_rcv+0x1c/0x30 [ 104.239889][ T7774] netlink_unicast+0x5bd/0x690 [ 104.239906][ T7774] netlink_sendmsg+0x58b/0x6b0 [ 104.239995][ T7774] ? __pfx_netlink_sendmsg+0x10/0x10 [ 104.240008][ T7774] __sock_sendmsg+0x145/0x180 [ 104.240089][ T7774] ____sys_sendmsg+0x31e/0x4e0 [ 104.240104][ T7774] ___sys_sendmsg+0x17b/0x1d0 [ 104.240125][ T7774] __x64_sys_sendmsg+0xd4/0x160 [ 104.240142][ T7774] x64_sys_call+0x191e/0x2ff0 [ 104.240231][ T7774] do_syscall_64+0xd2/0x200 [ 104.240249][ T7774] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 104.240264][ T7774] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 104.240307][ T7774] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 104.240335][ T7774] RIP: 0033:0x7f5110cbeba9 [ 104.240345][ T7774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 104.240355][ T7774] RSP: 002b:00007f510f727038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 104.240389][ T7774] RAX: ffffffffffffffda RBX: 00007f5110f05fa0 RCX: 00007f5110cbeba9 [ 104.240396][ T7774] RDX: 0000000000000000 RSI: 00002000000003c0 RDI: 0000000000000003 [ 104.240403][ T7774] RBP: 00007f510f727090 R08: 0000000000000000 R09: 0000000000000000 [ 104.240410][ T7774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 104.240446][ T7774] R13: 00007f5110f06038 R14: 00007f5110f05fa0 R15: 00007fff8f2f7308 [ 104.240459][ T7774] [ 104.520645][ T7778] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=23 sclass=netlink_tcpdiag_socket pid=7778 comm=syz.2.1585 [ 104.718366][ T7806] netlink: 5 bytes leftover after parsing attributes in process `syz.1.1598'. [ 104.727658][ T7806] 0ªî{X¹¦: renamed from gretap0 [ 104.740009][ T7806] 0ªî{X¹¦: entered allmulticast mode [ 104.746282][ T7806] A link change request failed with some changes committed already. Interface 30ªî{X¹¦ may have been left with an inconsistent configuration, please check. [ 104.771045][ T7802] lo speed is unknown, defaulting to 1000 [ 104.805310][ T7802] lo speed is unknown, defaulting to 1000 [ 105.522085][ T7833] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1608'. [ 105.856887][ T7882] FAULT_INJECTION: forcing a failure. [ 105.856887][ T7882] name failslab, interval 1, probability 0, space 0, times 0 [ 105.869685][ T7882] CPU: 0 UID: 0 PID: 7882 Comm: syz.3.1632 Not tainted syzkaller #0 PREEMPT(voluntary) [ 105.869720][ T7882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 105.869727][ T7882] Call Trace: [ 105.869732][ T7882] [ 105.869737][ T7882] __dump_stack+0x1d/0x30 [ 105.869751][ T7882] dump_stack_lvl+0xe8/0x140 [ 105.869797][ T7882] dump_stack+0x15/0x1b [ 105.869811][ T7882] should_fail_ex+0x265/0x280 [ 105.869835][ T7882] should_failslab+0x8c/0xb0 [ 105.869850][ T7882] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 105.869912][ T7882] ? __d_alloc+0x3d/0x340 [ 105.869927][ T7882] __d_alloc+0x3d/0x340 [ 105.869941][ T7882] ? mpol_shared_policy_init+0xbd/0x4c0 [ 105.870001][ T7882] d_alloc_pseudo+0x1e/0x80 [ 105.870016][ T7882] alloc_file_pseudo+0x71/0x160 [ 105.870035][ T7882] __shmem_file_setup+0x1de/0x210 [ 105.870079][ T7882] shmem_file_setup+0x3b/0x50 [ 105.870089][ T7882] __se_sys_memfd_create+0x2c3/0x590 [ 105.870101][ T7882] __x64_sys_memfd_create+0x31/0x40 [ 105.870137][ T7882] x64_sys_call+0x2abe/0x2ff0 [ 105.870161][ T7882] do_syscall_64+0xd2/0x200 [ 105.870189][ T7882] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 105.870264][ T7882] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 105.870290][ T7882] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 105.870310][ T7882] RIP: 0033:0x7fac7db2eba9 [ 105.870343][ T7882] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 105.870353][ T7882] RSP: 002b:00007fac7c58ed68 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 105.870367][ T7882] RAX: ffffffffffffffda RBX: 000000000000059d RCX: 00007fac7db2eba9 [ 105.870374][ T7882] RDX: 00007fac7c58edec RSI: 0000000000000000 RDI: 00007fac7dbb27e8 [ 105.870382][ T7882] RBP: 0000200000000000 R08: 00007fac7c58eb07 R09: 00007fac7c58f01f [ 105.870388][ T7882] R10: 000000000000000a R11: 0000000000000202 R12: 0000000000000001 [ 105.870429][ T7882] R13: 00007fac7c58edec R14: 00007fac7c58edf0 R15: 00007ffcf1e6cfb8 [ 105.870440][ T7882] [ 106.089152][ T7888] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1634'. [ 106.098106][ T7888] FAULT_INJECTION: forcing a failure. [ 106.098106][ T7888] name failslab, interval 1, probability 0, space 0, times 0 [ 106.110784][ T7888] CPU: 0 UID: 0 PID: 7888 Comm: syz.3.1634 Not tainted syzkaller #0 PREEMPT(voluntary) [ 106.110807][ T7888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 106.110818][ T7888] Call Trace: [ 106.110824][ T7888] [ 106.110832][ T7888] __dump_stack+0x1d/0x30 [ 106.110854][ T7888] dump_stack_lvl+0xe8/0x140 [ 106.110880][ T7888] dump_stack+0x15/0x1b [ 106.110896][ T7888] should_fail_ex+0x265/0x280 [ 106.110931][ T7888] should_failslab+0x8c/0xb0 [ 106.110957][ T7888] kmem_cache_alloc_node_noprof+0x57/0x320 [ 106.111003][ T7888] ? __alloc_skb+0x101/0x320 [ 106.111025][ T7888] __alloc_skb+0x101/0x320 [ 106.111048][ T7888] fdb_notify+0x6e/0x120 [ 106.111074][ T7888] fdb_delete+0x686/0x820 [ 106.111092][ T7888] br_fdb_delete+0x1cd/0x380 [ 106.111181][ T7888] ? __pfx_br_fdb_delete+0x10/0x10 [ 106.111203][ T7888] rtnl_fdb_del+0x4b7/0x730 [ 106.111296][ T7888] ? __pfx_rtnl_fdb_del+0x10/0x10 [ 106.111372][ T7888] rtnetlink_rcv_msg+0x657/0x6d0 [ 106.111409][ T7888] netlink_rcv_skb+0x123/0x220 [ 106.111430][ T7888] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 106.111533][ T7888] rtnetlink_rcv+0x1c/0x30 [ 106.111559][ T7888] netlink_unicast+0x5bd/0x690 [ 106.111657][ T7888] netlink_sendmsg+0x58b/0x6b0 [ 106.111701][ T7888] ? __pfx_netlink_sendmsg+0x10/0x10 [ 106.111725][ T7888] __sock_sendmsg+0x145/0x180 [ 106.111755][ T7888] ____sys_sendmsg+0x31e/0x4e0 [ 106.111782][ T7888] ___sys_sendmsg+0x17b/0x1d0 [ 106.111890][ T7888] __x64_sys_sendmsg+0xd4/0x160 [ 106.112014][ T7888] x64_sys_call+0x191e/0x2ff0 [ 106.112034][ T7888] do_syscall_64+0xd2/0x200 [ 106.112063][ T7888] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 106.112086][ T7888] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 106.112122][ T7888] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 106.112142][ T7888] RIP: 0033:0x7fac7db2eba9 [ 106.112157][ T7888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 106.112174][ T7888] RSP: 002b:00007fac7c58f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 106.112194][ T7888] RAX: ffffffffffffffda RBX: 00007fac7dd75fa0 RCX: 00007fac7db2eba9 [ 106.112206][ T7888] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 106.112266][ T7888] RBP: 00007fac7c58f090 R08: 0000000000000000 R09: 0000000000000000 [ 106.112278][ T7888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 106.112311][ T7888] R13: 00007fac7dd76038 R14: 00007fac7dd75fa0 R15: 00007ffcf1e6cfb8 [ 106.112389][ T7888] [ 106.531549][ T7920] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1646'. [ 106.540628][ T7920] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1646'. [ 106.549621][ T7920] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1646'. [ 106.558763][ T7920] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1646'. [ 106.567808][ T7920] netlink: 'syz.3.1646': attribute type 6 has an invalid length. [ 106.767752][ T7939] FAULT_INJECTION: forcing a failure. [ 106.767752][ T7939] name failslab, interval 1, probability 0, space 0, times 0 [ 106.780589][ T7939] CPU: 0 UID: 0 PID: 7939 Comm: syz.0.1654 Not tainted syzkaller #0 PREEMPT(voluntary) [ 106.780640][ T7939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 106.780651][ T7939] Call Trace: [ 106.780657][ T7939] [ 106.780663][ T7939] __dump_stack+0x1d/0x30 [ 106.780684][ T7939] dump_stack_lvl+0xe8/0x140 [ 106.780701][ T7939] dump_stack+0x15/0x1b [ 106.780780][ T7939] should_fail_ex+0x265/0x280 [ 106.780803][ T7939] should_failslab+0x8c/0xb0 [ 106.780828][ T7939] kmem_cache_alloc_node_noprof+0x57/0x320 [ 106.780924][ T7939] ? __alloc_skb+0x101/0x320 [ 106.780948][ T7939] __alloc_skb+0x101/0x320 [ 106.780970][ T7939] inet_ifmcaddr_notify+0x64/0x120 [ 106.781070][ T7939] __ip_mc_dec_group+0x1ac/0x3d0 [ 106.781096][ T7939] ip_mc_down+0x13d/0x1c0 [ 106.781118][ T7939] inetdev_event+0x1b3/0xc10 [ 106.781136][ T7939] ? __rcu_read_unlock+0x4f/0x70 [ 106.781188][ T7939] ? ib_netdevice_event+0x281/0x5f0 [ 106.781268][ T7939] ? __pfx_arp_netdev_event+0x10/0x10 [ 106.781356][ T7939] ? __pfx_inetdev_event+0x10/0x10 [ 106.781378][ T7939] raw_notifier_call_chain+0x6f/0x1b0 [ 106.781403][ T7939] ? call_netdevice_notifiers_info+0x9c/0x100 [ 106.781437][ T7939] call_netdevice_notifiers_info+0xae/0x100 [ 106.781463][ T7939] __dev_notify_flags+0xff/0x1a0 [ 106.781541][ T7939] netif_change_flags+0xac/0xd0 [ 106.781561][ T7939] dev_change_flags+0xce/0x180 [ 106.781581][ T7939] dev_ifsioc+0x44b/0xaa0 [ 106.781605][ T7939] ? __rcu_read_unlock+0x4f/0x70 [ 106.781626][ T7939] dev_ioctl+0x70a/0x960 [ 106.781769][ T7939] sock_do_ioctl+0x197/0x220 [ 106.781843][ T7939] sock_ioctl+0x41b/0x610 [ 106.781870][ T7939] ? __pfx_sock_ioctl+0x10/0x10 [ 106.781895][ T7939] __se_sys_ioctl+0xce/0x140 [ 106.781913][ T7939] __x64_sys_ioctl+0x43/0x50 [ 106.781930][ T7939] x64_sys_call+0x1816/0x2ff0 [ 106.781949][ T7939] do_syscall_64+0xd2/0x200 [ 106.781978][ T7939] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 106.782068][ T7939] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 106.782133][ T7939] RIP: 0033:0x7f88d85beba9 [ 106.782148][ T7939] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 106.782165][ T7939] RSP: 002b:00007f88d7027038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 106.782184][ T7939] RAX: ffffffffffffffda RBX: 00007f88d8805fa0 RCX: 00007f88d85beba9 [ 106.782216][ T7939] RDX: 0000200000000280 RSI: 0000000000008914 RDI: 0000000000000004 [ 106.782237][ T7939] RBP: 00007f88d7027090 R08: 0000000000000000 R09: 0000000000000000 [ 106.782249][ T7939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 106.782259][ T7939] R13: 00007f88d8806038 R14: 00007f88d8805fa0 R15: 00007ffc001e4508 [ 106.782279][ T7939] [ 107.075504][ T7946] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1656'. [ 107.244257][ T7977] macvlan1: entered promiscuous mode [ 107.250588][ T7977] ipvlan0: entered promiscuous mode [ 107.256271][ T7977] ipvlan0: left promiscuous mode [ 107.261343][ T7977] macvlan1: left promiscuous mode [ 107.344154][ T7982] FAULT_INJECTION: forcing a failure. [ 107.344154][ T7982] name failslab, interval 1, probability 0, space 0, times 0 [ 107.356883][ T7982] CPU: 1 UID: 0 PID: 7982 Comm: syz.0.1672 Not tainted syzkaller #0 PREEMPT(voluntary) [ 107.356905][ T7982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 107.356963][ T7982] Call Trace: [ 107.356967][ T7982] [ 107.356972][ T7982] __dump_stack+0x1d/0x30 [ 107.356987][ T7982] dump_stack_lvl+0xe8/0x140 [ 107.357032][ T7982] dump_stack+0x15/0x1b [ 107.357041][ T7982] should_fail_ex+0x265/0x280 [ 107.357135][ T7982] should_failslab+0x8c/0xb0 [ 107.357149][ T7982] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 107.357180][ T7982] ? sidtab_sid2str_get+0xa0/0x130 [ 107.357257][ T7982] kmemdup_noprof+0x2b/0x70 [ 107.357271][ T7982] sidtab_sid2str_get+0xa0/0x130 [ 107.357283][ T7982] security_sid_to_context_core+0x1eb/0x2e0 [ 107.357338][ T7982] security_sid_to_context+0x27/0x40 [ 107.357349][ T7982] avc_audit_post_callback+0x9d/0x520 [ 107.357364][ T7982] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 107.357402][ T7982] common_lsm_audit+0x1bb/0x230 [ 107.357419][ T7982] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 107.357432][ T7982] ? __rcu_read_unlock+0x4f/0x70 [ 107.357444][ T7982] slow_avc_audit+0x104/0x140 [ 107.357481][ T7982] avc_has_perm+0x13a/0x180 [ 107.357496][ T7982] selinux_kernel_module_request+0xb0/0xe0 [ 107.357510][ T7982] security_kernel_module_request+0x36/0x70 [ 107.357523][ T7982] __request_module+0x121/0x3e0 [ 107.357604][ T7982] ? capable+0x7c/0xb0 [ 107.357618][ T7982] dev_load+0x61/0xc0 [ 107.357633][ T7982] dev_ioctl+0x2d1/0x960 [ 107.357647][ T7982] sock_do_ioctl+0x197/0x220 [ 107.357715][ T7982] sock_ioctl+0x41b/0x610 [ 107.357895][ T7982] ? __pfx_sock_ioctl+0x10/0x10 [ 107.357916][ T7982] __se_sys_ioctl+0xce/0x140 [ 107.357927][ T7982] __x64_sys_ioctl+0x43/0x50 [ 107.357936][ T7982] x64_sys_call+0x1816/0x2ff0 [ 107.357976][ T7982] do_syscall_64+0xd2/0x200 [ 107.357994][ T7982] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 107.358014][ T7982] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 107.358040][ T7982] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 107.358052][ T7982] RIP: 0033:0x7f88d85beba9 [ 107.358061][ T7982] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 107.358072][ T7982] RSP: 002b:00007f88d7027038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 107.358084][ T7982] RAX: ffffffffffffffda RBX: 00007f88d8805fa0 RCX: 00007f88d85beba9 [ 107.358147][ T7982] RDX: 0000200000000000 RSI: 0000000000008946 RDI: 0000000000000003 [ 107.358154][ T7982] RBP: 00007f88d7027090 R08: 0000000000000000 R09: 0000000000000000 [ 107.358161][ T7982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 107.358168][ T7982] R13: 00007f88d8806038 R14: 00007f88d8805fa0 R15: 00007ffc001e4508 [ 107.358178][ T7982] [ 107.985888][ T8006] macvlan1: entered promiscuous mode [ 107.992811][ T8006] ipvlan0: entered promiscuous mode [ 107.998821][ T8006] ipvlan0: left promiscuous mode [ 108.004008][ T8006] macvlan1: left promiscuous mode [ 108.144358][ T8036] macvlan1: entered promiscuous mode [ 108.150959][ T8036] ipvlan0: entered promiscuous mode [ 108.156821][ T8036] ipvlan0: left promiscuous mode [ 108.165383][ T8036] macvlan1: left promiscuous mode [ 108.189213][ T8045] FAULT_INJECTION: forcing a failure. [ 108.189213][ T8045] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 108.202336][ T8045] CPU: 1 UID: 0 PID: 8045 Comm: syz.5.1699 Not tainted syzkaller #0 PREEMPT(voluntary) [ 108.202359][ T8045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 108.202369][ T8045] Call Trace: [ 108.202374][ T8045] [ 108.202381][ T8045] __dump_stack+0x1d/0x30 [ 108.202400][ T8045] dump_stack_lvl+0xe8/0x140 [ 108.202431][ T8045] dump_stack+0x15/0x1b [ 108.202446][ T8045] should_fail_ex+0x265/0x280 [ 108.202470][ T8045] should_fail+0xb/0x20 [ 108.202490][ T8045] should_fail_usercopy+0x1a/0x20 [ 108.202540][ T8045] _copy_from_iter+0xd2/0xe80 [ 108.202567][ T8045] ? __build_skb_around+0x1a0/0x200 [ 108.202590][ T8045] ? __alloc_skb+0x223/0x320 [ 108.202635][ T8045] netlink_sendmsg+0x471/0x6b0 [ 108.202723][ T8045] ? __pfx_netlink_sendmsg+0x10/0x10 [ 108.202776][ T8045] __sock_sendmsg+0x145/0x180 [ 108.202875][ T8045] ____sys_sendmsg+0x31e/0x4e0 [ 108.202953][ T8045] ___sys_sendmsg+0x17b/0x1d0 [ 108.203018][ T8045] __x64_sys_sendmsg+0xd4/0x160 [ 108.203077][ T8045] x64_sys_call+0x191e/0x2ff0 [ 108.203098][ T8045] do_syscall_64+0xd2/0x200 [ 108.203152][ T8045] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 108.203180][ T8045] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 108.203208][ T8045] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 108.203229][ T8045] RIP: 0033:0x7f0f3877eba9 [ 108.203286][ T8045] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 108.203303][ T8045] RSP: 002b:00007f0f371df038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 108.203324][ T8045] RAX: ffffffffffffffda RBX: 00007f0f389c5fa0 RCX: 00007f0f3877eba9 [ 108.203337][ T8045] RDX: 0000000004000c00 RSI: 0000200000000180 RDI: 0000000000000003 [ 108.203350][ T8045] RBP: 00007f0f371df090 R08: 0000000000000000 R09: 0000000000000000 [ 108.203362][ T8045] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 108.203374][ T8045] R13: 00007f0f389c6038 R14: 00007f0f389c5fa0 R15: 00007ffed418c498 [ 108.203447][ T8045] [ 108.405926][ T8062] ipvlan0: entered promiscuous mode [ 108.416023][ T8062] bridge0: port 3(ipvlan0) entered blocking state [ 108.422757][ T8062] bridge0: port 3(ipvlan0) entered disabled state [ 108.429402][ T8062] ipvlan0: entered allmulticast mode [ 108.434961][ T8062] bridge0: entered allmulticast mode [ 108.441174][ T8062] ipvlan0: left allmulticast mode [ 108.446203][ T8062] bridge0: left allmulticast mode [ 108.518363][ T8078] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1714'. [ 108.551654][ T8078] 8021q: adding VLAN 0 to HW filter on device bond5 [ 108.578792][ T8087] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1714'. [ 108.596227][ T8087] bond5 (unregistering): Released all slaves [ 108.613654][ T8086] lo speed is unknown, defaulting to 1000 [ 108.641600][ T8097] FAULT_INJECTION: forcing a failure. [ 108.641600][ T8097] name failslab, interval 1, probability 0, space 0, times 0 [ 108.654282][ T8097] CPU: 1 UID: 0 PID: 8097 Comm: syz.0.1717 Not tainted syzkaller #0 PREEMPT(voluntary) [ 108.654310][ T8097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 108.654322][ T8097] Call Trace: [ 108.654329][ T8097] [ 108.654336][ T8097] __dump_stack+0x1d/0x30 [ 108.654358][ T8097] dump_stack_lvl+0xe8/0x140 [ 108.654446][ T8097] dump_stack+0x15/0x1b [ 108.654463][ T8097] should_fail_ex+0x265/0x280 [ 108.654488][ T8097] should_failslab+0x8c/0xb0 [ 108.654513][ T8097] kmem_cache_alloc_noprof+0x50/0x310 [ 108.654543][ T8097] ? getname_flags+0x80/0x3b0 [ 108.654571][ T8097] getname_flags+0x80/0x3b0 [ 108.654754][ T8097] __se_sys_quotactl+0x16a/0x670 [ 108.654779][ T8097] __x64_sys_quotactl+0x55/0x70 [ 108.654800][ T8097] x64_sys_call+0x15d6/0x2ff0 [ 108.654849][ T8097] do_syscall_64+0xd2/0x200 [ 108.654905][ T8097] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 108.654936][ T8097] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 108.654966][ T8097] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 108.654988][ T8097] RIP: 0033:0x7f88d85beba9 [ 108.655004][ T8097] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 108.655074][ T8097] RSP: 002b:00007f88d7006038 EFLAGS: 00000246 ORIG_RAX: 00000000000000b3 [ 108.655094][ T8097] RAX: ffffffffffffffda RBX: 00007f88d8806090 RCX: 00007f88d85beba9 [ 108.655159][ T8097] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: ffffffff80000201 [ 108.655189][ T8097] RBP: 00007f88d7006090 R08: 0000000000000000 R09: 0000000000000000 [ 108.655203][ T8097] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 108.655216][ T8097] R13: 00007f88d8806128 R14: 00007f88d8806090 R15: 00007ffc001e4508 [ 108.655282][ T8097] [ 108.663544][ T8086] lo speed is unknown, defaulting to 1000 [ 108.874240][ T8114] lo speed is unknown, defaulting to 1000 [ 108.889756][ T29] kauditd_printk_skb: 1755 callbacks suppressed [ 108.889785][ T29] audit: type=1400 audit(1757695651.617:9983): avc: denied { read write } for pid=3302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=821 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 108.903527][ T8121] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1731'. [ 108.938112][ T29] audit: type=1400 audit(1757695651.667:9984): avc: denied { read write } for pid=8112 comm="syz.2.1728" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 108.963865][ T8121] 8021q: adding VLAN 0 to HW filter on device bond5 [ 108.971220][ T8123] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1731'. [ 108.971690][ T29] audit: type=1400 audit(1757695651.707:9985): avc: denied { map_create } for pid=8120 comm="syz.0.1731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 108.999211][ T29] audit: type=1400 audit(1757695651.707:9986): avc: denied { prog_load } for pid=8120 comm="syz.0.1731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 109.018403][ T29] audit: type=1400 audit(1757695651.707:9987): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 109.042614][ T29] audit: type=1400 audit(1757695651.707:9988): avc: denied { map_create } for pid=8124 comm="syz.2.1732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 109.061849][ T29] audit: type=1400 audit(1757695651.707:9989): avc: denied { prog_load } for pid=8124 comm="syz.2.1732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 109.081406][ T29] audit: type=1400 audit(1757695651.707:9990): avc: denied { create } for pid=8124 comm="syz.2.1732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 109.101863][ T29] audit: type=1400 audit(1757695651.707:9991): avc: denied { create } for pid=8124 comm="syz.2.1732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 109.122635][ T29] audit: type=1400 audit(1757695651.707:9992): avc: denied { create } for pid=8124 comm="syz.2.1732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 109.144430][ T8123] bond5 (unregistering): Released all slaves [ 109.169317][ T8114] lo speed is unknown, defaulting to 1000 [ 109.209941][ T8142] FAULT_INJECTION: forcing a failure. [ 109.209941][ T8142] name failslab, interval 1, probability 0, space 0, times 0 [ 109.222727][ T8142] CPU: 0 UID: 0 PID: 8142 Comm: syz.2.1740 Not tainted syzkaller #0 PREEMPT(voluntary) [ 109.222752][ T8142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 109.222840][ T8142] Call Trace: [ 109.222845][ T8142] [ 109.222851][ T8142] __dump_stack+0x1d/0x30 [ 109.222871][ T8142] dump_stack_lvl+0xe8/0x140 [ 109.222887][ T8142] dump_stack+0x15/0x1b [ 109.222901][ T8142] should_fail_ex+0x265/0x280 [ 109.222949][ T8142] should_failslab+0x8c/0xb0 [ 109.223052][ T8142] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 109.223078][ T8142] ? sidtab_sid2str_get+0xa0/0x130 [ 109.223098][ T8142] kmemdup_noprof+0x2b/0x70 [ 109.223133][ T8142] sidtab_sid2str_get+0xa0/0x130 [ 109.223151][ T8142] security_sid_to_context_core+0x1eb/0x2e0 [ 109.223170][ T8142] security_sid_to_context+0x27/0x40 [ 109.223191][ T8142] selinux_lsmprop_to_secctx+0x67/0xf0 [ 109.223211][ T8142] security_lsmprop_to_secctx+0x43/0x80 [ 109.223234][ T8142] audit_log_task_context+0x77/0x190 [ 109.223262][ T8142] audit_log_task+0xf4/0x250 [ 109.223336][ T8142] audit_seccomp+0x61/0x100 [ 109.223356][ T8142] ? __seccomp_filter+0x68c/0x10d0 [ 109.223406][ T8142] __seccomp_filter+0x69d/0x10d0 [ 109.223424][ T8142] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 109.223447][ T8142] ? vfs_write+0x7e8/0x960 [ 109.223471][ T8142] __secure_computing+0x82/0x150 [ 109.223566][ T8142] syscall_trace_enter+0xcf/0x1e0 [ 109.223587][ T8142] do_syscall_64+0xac/0x200 [ 109.223612][ T8142] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 109.223631][ T8142] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 109.223731][ T8142] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 109.223749][ T8142] RIP: 0033:0x7f5110cbeba9 [ 109.223762][ T8142] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 109.223777][ T8142] RSP: 002b:00007f510f727038 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 109.223852][ T8142] RAX: ffffffffffffffda RBX: 00007f5110f05fa0 RCX: 00007f5110cbeba9 [ 109.223863][ T8142] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 109.223874][ T8142] RBP: 00007f510f727090 R08: 000000000000000c R09: 0000000000000002 [ 109.223884][ T8142] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 109.223894][ T8142] R13: 00007f5110f06038 R14: 00007f5110f05fa0 R15: 00007fff8f2f7308 [ 109.223910][ T8142] [ 109.318828][ T8151] macvlan1: entered promiscuous mode [ 109.397812][ T8155] netlink: 'syz.2.1746': attribute type 10 has an invalid length. [ 109.432831][ T8151] ipvlan0: entered promiscuous mode [ 109.484887][ T8151] ipvlan0: left promiscuous mode [ 109.490541][ T8160] netlink: 'syz.2.1746': attribute type 10 has an invalid length. [ 109.490558][ T8151] macvlan1: left promiscuous mode [ 109.507497][ T8155] team0: Port device dummy0 added [ 109.526755][ T8160] team0: Port device dummy0 removed [ 109.534655][ T8160] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 109.553615][ T8162] macvlan1: entered promiscuous mode [ 109.561069][ T8162] ipvlan0: entered promiscuous mode [ 109.568448][ T8162] ipvlan0: left promiscuous mode [ 109.578022][ T8162] macvlan1: left promiscuous mode [ 109.606770][ T8168] lo speed is unknown, defaulting to 1000 [ 109.661761][ T8168] lo speed is unknown, defaulting to 1000 [ 109.768833][ T8181] lo speed is unknown, defaulting to 1000 [ 109.845315][ T8181] lo speed is unknown, defaulting to 1000 [ 109.963299][ T8211] netlink: 8 bytes leftover after parsing attributes in process `syz.5.1771'. [ 110.041739][ T8226] 8021q: adding VLAN 0 to HW filter on device bond1 [ 110.065153][ T8226] bond1 (unregistering): Released all slaves [ 110.233066][ T8257] FAULT_INJECTION: forcing a failure. [ 110.233066][ T8257] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 110.246452][ T8257] CPU: 1 UID: 0 PID: 8257 Comm: syz.0.1792 Not tainted syzkaller #0 PREEMPT(voluntary) [ 110.246475][ T8257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 110.246485][ T8257] Call Trace: [ 110.246490][ T8257] [ 110.246497][ T8257] __dump_stack+0x1d/0x30 [ 110.246569][ T8257] dump_stack_lvl+0xe8/0x140 [ 110.246596][ T8257] dump_stack+0x15/0x1b [ 110.246659][ T8257] should_fail_ex+0x265/0x280 [ 110.246685][ T8257] should_fail+0xb/0x20 [ 110.246725][ T8257] should_fail_usercopy+0x1a/0x20 [ 110.246746][ T8257] _copy_to_user+0x20/0xa0 [ 110.246771][ T8257] simple_read_from_buffer+0xb5/0x130 [ 110.246795][ T8257] proc_fail_nth_read+0x10e/0x150 [ 110.246894][ T8257] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 110.246919][ T8257] vfs_read+0x1a8/0x770 [ 110.246938][ T8257] ? __rcu_read_unlock+0x4f/0x70 [ 110.246956][ T8257] ? __fget_files+0x184/0x1c0 [ 110.247058][ T8257] ksys_read+0xda/0x1a0 [ 110.247077][ T8257] __x64_sys_read+0x40/0x50 [ 110.247095][ T8257] x64_sys_call+0x27bc/0x2ff0 [ 110.247114][ T8257] do_syscall_64+0xd2/0x200 [ 110.247197][ T8257] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 110.247292][ T8257] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 110.247320][ T8257] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 110.247341][ T8257] RIP: 0033:0x7f88d85bd5bc [ 110.247357][ T8257] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 110.247439][ T8257] RSP: 002b:00007f88d7027030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 110.247456][ T8257] RAX: ffffffffffffffda RBX: 00007f88d8805fa0 RCX: 00007f88d85bd5bc [ 110.247466][ T8257] RDX: 000000000000000f RSI: 00007f88d70270a0 RDI: 0000000000000003 [ 110.247477][ T8257] RBP: 00007f88d7027090 R08: 0000000000000000 R09: 0000000000000000 [ 110.247489][ T8257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 110.247558][ T8257] R13: 00007f88d8806038 R14: 00007f88d8805fa0 R15: 00007ffc001e4508 [ 110.247574][ T8257] [ 110.495435][ T8267] 8021q: adding VLAN 0 to HW filter on device bond5 [ 110.507723][ T8267] bond5 (unregistering): Released all slaves [ 110.683206][ T8300] 8021q: adding VLAN 0 to HW filter on device bond5 [ 110.692629][ T8303] FAULT_INJECTION: forcing a failure. [ 110.692629][ T8303] name failslab, interval 1, probability 0, space 0, times 0 [ 110.705328][ T8303] CPU: 1 UID: 0 PID: 8303 Comm: syz.2.1812 Not tainted syzkaller #0 PREEMPT(voluntary) [ 110.705354][ T8303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 110.705365][ T8303] Call Trace: [ 110.705370][ T8303] [ 110.705377][ T8303] __dump_stack+0x1d/0x30 [ 110.705451][ T8303] dump_stack_lvl+0xe8/0x140 [ 110.705468][ T8303] dump_stack+0x15/0x1b [ 110.705481][ T8303] should_fail_ex+0x265/0x280 [ 110.705551][ T8303] should_failslab+0x8c/0xb0 [ 110.705604][ T8303] kmem_cache_alloc_noprof+0x50/0x310 [ 110.705630][ T8303] ? security_file_alloc+0x32/0x100 [ 110.705714][ T8303] security_file_alloc+0x32/0x100 [ 110.705743][ T8303] init_file+0x5c/0x1d0 [ 110.705790][ T8303] alloc_empty_file+0x8b/0x200 [ 110.705806][ T8303] alloc_file_pseudo+0xc6/0x160 [ 110.705824][ T8303] __shmem_file_setup+0x1de/0x210 [ 110.705854][ T8303] shmem_file_setup+0x3b/0x50 [ 110.705904][ T8303] __se_sys_memfd_create+0x2c3/0x590 [ 110.705917][ T8303] __x64_sys_memfd_create+0x31/0x40 [ 110.705928][ T8303] x64_sys_call+0x2abe/0x2ff0 [ 110.705940][ T8303] do_syscall_64+0xd2/0x200 [ 110.706012][ T8303] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 110.706025][ T8303] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 110.706040][ T8303] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 110.706052][ T8303] RIP: 0033:0x7f5110cbeba9 [ 110.706061][ T8303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 110.706140][ T8303] RSP: 002b:00007f510f726e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 110.706151][ T8303] RAX: ffffffffffffffda RBX: 000000000000036e RCX: 00007f5110cbeba9 [ 110.706158][ T8303] RDX: 00007f510f726ef0 RSI: 0000000000000000 RDI: 00007f5110d427e8 [ 110.706183][ T8303] RBP: 0000200000000c00 R08: 00007f510f726bb7 R09: 00007f510f726e40 [ 110.706190][ T8303] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000200 [ 110.706197][ T8303] R13: 00007f510f726ef0 R14: 00007f510f726eb0 R15: 0000200000000340 [ 110.706207][ T8303] [ 110.708234][ T8300] bond5 (unregistering): Released all slaves [ 111.002685][ T8327] FAULT_INJECTION: forcing a failure. [ 111.002685][ T8327] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 111.015813][ T8327] CPU: 0 UID: 0 PID: 8327 Comm: syz.3.1822 Not tainted syzkaller #0 PREEMPT(voluntary) [ 111.015852][ T8327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 111.015864][ T8327] Call Trace: [ 111.015871][ T8327] [ 111.015878][ T8327] __dump_stack+0x1d/0x30 [ 111.015897][ T8327] dump_stack_lvl+0xe8/0x140 [ 111.015975][ T8327] dump_stack+0x15/0x1b [ 111.015989][ T8327] should_fail_ex+0x265/0x280 [ 111.016009][ T8327] should_fail+0xb/0x20 [ 111.016028][ T8327] should_fail_usercopy+0x1a/0x20 [ 111.016059][ T8327] _copy_from_user+0x1c/0xb0 [ 111.016083][ T8327] vcs_write+0x354/0xbc0 [ 111.016099][ T8327] ? __import_iovec+0x321/0x540 [ 111.016141][ T8327] ? avc_policy_seqno+0x15/0x30 [ 111.016222][ T8327] vfs_writev+0x406/0x8b0 [ 111.016252][ T8327] ? __pfx_vcs_write+0x10/0x10 [ 111.016330][ T8327] do_writev+0xe7/0x210 [ 111.016360][ T8327] __x64_sys_writev+0x45/0x50 [ 111.016390][ T8327] x64_sys_call+0x1e9a/0x2ff0 [ 111.016412][ T8327] do_syscall_64+0xd2/0x200 [ 111.016556][ T8327] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 111.016575][ T8327] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 111.016603][ T8327] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 111.016625][ T8327] RIP: 0033:0x7fac7db2eba9 [ 111.016665][ T8327] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 111.016746][ T8327] RSP: 002b:00007fac7c58f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 111.016767][ T8327] RAX: ffffffffffffffda RBX: 00007fac7dd75fa0 RCX: 00007fac7db2eba9 [ 111.016781][ T8327] RDX: 0000000000000003 RSI: 00002000000003c0 RDI: 0000000000000003 [ 111.016792][ T8327] RBP: 00007fac7c58f090 R08: 0000000000000000 R09: 0000000000000000 [ 111.016808][ T8327] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 111.016818][ T8327] R13: 00007fac7dd76038 R14: 00007fac7dd75fa0 R15: 00007ffcf1e6cfb8 [ 111.016894][ T8327] [ 111.240985][ T8338] macvlan1: entered promiscuous mode [ 111.247366][ T8338] ipvlan0: entered promiscuous mode [ 111.253192][ T8338] ipvlan0: left promiscuous mode [ 111.258260][ T8338] macvlan1: left promiscuous mode [ 111.269382][ T8340] 8021q: adding VLAN 0 to HW filter on device bond5 [ 111.280435][ T8340] bond5 (unregistering): Released all slaves [ 111.522536][ T8369] 8021q: adding VLAN 0 to HW filter on device bond5 [ 111.532938][ T8369] bond5 (unregistering): Released all slaves [ 111.674945][ T8385] lo speed is unknown, defaulting to 1000 [ 111.708220][ T8385] lo speed is unknown, defaulting to 1000 [ 112.043981][ T8450] __nla_validate_parse: 11 callbacks suppressed [ 112.044051][ T8450] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1878'. [ 112.059283][ T8450] netlink: 24 bytes leftover after parsing attributes in process `syz.1.1878'. [ 112.084048][ T8441] lo speed is unknown, defaulting to 1000 [ 112.090816][ T8455] ipvlan2: entered promiscuous mode [ 112.096374][ T8455] bridge0: port 3(ipvlan2) entered blocking state [ 112.102976][ T8455] bridge0: port 3(ipvlan2) entered disabled state [ 112.109650][ T8455] ipvlan2: entered allmulticast mode [ 112.115036][ T8455] bridge0: entered allmulticast mode [ 112.120882][ T8455] ipvlan2: left allmulticast mode [ 112.125895][ T8455] bridge0: left allmulticast mode [ 112.133341][ T8441] lo speed is unknown, defaulting to 1000 [ 112.267897][ T8478] ipvlan2: entered promiscuous mode [ 112.273639][ T8478] bridge0: port 3(ipvlan2) entered blocking state [ 112.280117][ T8478] bridge0: port 3(ipvlan2) entered disabled state [ 112.286825][ T8478] ipvlan2: entered allmulticast mode [ 112.292177][ T8478] bridge0: entered allmulticast mode [ 112.298789][ T8478] ipvlan2: left allmulticast mode [ 112.303881][ T8478] bridge0: left allmulticast mode [ 112.425489][ T8489] FAULT_INJECTION: forcing a failure. [ 112.425489][ T8489] name failslab, interval 1, probability 0, space 0, times 0 [ 112.438157][ T8489] CPU: 0 UID: 0 PID: 8489 Comm: syz.0.1892 Not tainted syzkaller #0 PREEMPT(voluntary) [ 112.438252][ T8489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 112.438263][ T8489] Call Trace: [ 112.438269][ T8489] [ 112.438276][ T8489] __dump_stack+0x1d/0x30 [ 112.438338][ T8489] dump_stack_lvl+0xe8/0x140 [ 112.438356][ T8489] dump_stack+0x15/0x1b [ 112.438372][ T8489] should_fail_ex+0x265/0x280 [ 112.438426][ T8489] should_failslab+0x8c/0xb0 [ 112.438472][ T8489] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 112.438574][ T8489] ? sidtab_sid2str_get+0xa0/0x130 [ 112.438596][ T8489] kmemdup_noprof+0x2b/0x70 [ 112.438622][ T8489] sidtab_sid2str_get+0xa0/0x130 [ 112.438645][ T8489] security_sid_to_context_core+0x1eb/0x2e0 [ 112.438668][ T8489] security_sid_to_context+0x27/0x40 [ 112.438739][ T8489] avc_audit_post_callback+0x9d/0x520 [ 112.438760][ T8489] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 112.438781][ T8489] common_lsm_audit+0x1bb/0x230 [ 112.438822][ T8489] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 112.438858][ T8489] slow_avc_audit+0x104/0x140 [ 112.438881][ T8489] avc_has_perm+0x13a/0x180 [ 112.438966][ T8489] sel_write_load+0xf8/0x380 [ 112.439008][ T8489] ? __pfx_sel_write_load+0x10/0x10 [ 112.439032][ T8489] vfs_write+0x269/0x960 [ 112.439050][ T8489] ? __rcu_read_unlock+0x4f/0x70 [ 112.439068][ T8489] ? __fget_files+0x184/0x1c0 [ 112.439165][ T8489] ? finish_task_switch+0x1b8/0x2b0 [ 112.439183][ T8489] ksys_write+0xda/0x1a0 [ 112.439252][ T8489] __x64_sys_write+0x40/0x50 [ 112.439270][ T8489] x64_sys_call+0x27fe/0x2ff0 [ 112.439289][ T8489] do_syscall_64+0xd2/0x200 [ 112.439322][ T8489] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 112.439343][ T8489] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 112.439428][ T8489] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 112.439450][ T8489] RIP: 0033:0x7f88d85beba9 [ 112.439466][ T8489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 112.439483][ T8489] RSP: 002b:00007f88d7027038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 112.439503][ T8489] RAX: ffffffffffffffda RBX: 00007f88d8805fa0 RCX: 00007f88d85beba9 [ 112.439514][ T8489] RDX: 00000000000044f0 RSI: 0000200000000000 RDI: 0000000000000003 [ 112.439576][ T8489] RBP: 00007f88d7027090 R08: 0000000000000000 R09: 0000000000000000 [ 112.439588][ T8489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 112.439601][ T8489] R13: 00007f88d8806038 R14: 00007f88d8805fa0 R15: 00007ffc001e4508 [ 112.439621][ T8489] [ 113.036444][ T8543] lo speed is unknown, defaulting to 1000 [ 113.043449][ T8542] netlink: 'syz.1.1914': attribute type 46 has an invalid length. [ 113.093308][ T8549] FAULT_INJECTION: forcing a failure. [ 113.093308][ T8549] name failslab, interval 1, probability 0, space 0, times 0 [ 113.106301][ T8549] CPU: 0 UID: 0 PID: 8549 Comm: syz.5.1919 Not tainted syzkaller #0 PREEMPT(voluntary) [ 113.106325][ T8549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 113.106368][ T8549] Call Trace: [ 113.106374][ T8549] [ 113.106382][ T8549] __dump_stack+0x1d/0x30 [ 113.106401][ T8549] dump_stack_lvl+0xe8/0x140 [ 113.106420][ T8549] dump_stack+0x15/0x1b [ 113.106474][ T8549] should_fail_ex+0x265/0x280 [ 113.106498][ T8549] should_failslab+0x8c/0xb0 [ 113.106523][ T8549] kmem_cache_alloc_node_noprof+0x57/0x320 [ 113.106552][ T8549] ? __alloc_skb+0x101/0x320 [ 113.106647][ T8549] __alloc_skb+0x101/0x320 [ 113.106702][ T8549] netlink_alloc_large_skb+0xba/0xf0 [ 113.106722][ T8549] netlink_sendmsg+0x3cf/0x6b0 [ 113.106744][ T8549] ? __pfx_netlink_sendmsg+0x10/0x10 [ 113.106822][ T8549] __sock_sendmsg+0x145/0x180 [ 113.106930][ T8549] ____sys_sendmsg+0x31e/0x4e0 [ 113.106958][ T8549] ___sys_sendmsg+0x17b/0x1d0 [ 113.107120][ T8549] __x64_sys_sendmsg+0xd4/0x160 [ 113.107144][ T8549] x64_sys_call+0x191e/0x2ff0 [ 113.107162][ T8549] do_syscall_64+0xd2/0x200 [ 113.107267][ T8549] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 113.107293][ T8549] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 113.107317][ T8549] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 113.107339][ T8549] RIP: 0033:0x7f0f3877eba9 [ 113.107355][ T8549] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 113.107430][ T8549] RSP: 002b:00007f0f371df038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 113.107446][ T8549] RAX: ffffffffffffffda RBX: 00007f0f389c5fa0 RCX: 00007f0f3877eba9 [ 113.107457][ T8549] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 113.107468][ T8549] RBP: 00007f0f371df090 R08: 0000000000000000 R09: 0000000000000000 [ 113.107482][ T8549] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 113.107558][ T8549] R13: 00007f0f389c6038 R14: 00007f0f389c5fa0 R15: 00007ffed418c498 [ 113.107574][ T8549] [ 113.311315][ T8543] lo speed is unknown, defaulting to 1000 [ 113.443674][ T8584] macvlan1: entered promiscuous mode [ 113.453460][ T8584] ipvlan0: entered promiscuous mode [ 113.459270][ T8584] ipvlan0: left promiscuous mode [ 113.465084][ T8584] macvlan1: left promiscuous mode [ 113.717312][ T8631] ipvlan2: entered promiscuous mode [ 113.738512][ T8631] bridge0: port 3(ipvlan2) entered blocking state [ 113.745092][ T8631] bridge0: port 3(ipvlan2) entered disabled state [ 113.774743][ T8631] ipvlan2: entered allmulticast mode [ 113.780078][ T8631] bridge0: entered allmulticast mode [ 113.804757][ T8631] ipvlan2: left allmulticast mode [ 113.810278][ T8631] bridge0: left allmulticast mode [ 113.827486][ T8642] netlink: 32 bytes leftover after parsing attributes in process `syz.2.1960'. [ 113.857824][ T8643] lo speed is unknown, defaulting to 1000 [ 113.891741][ T29] kauditd_printk_skb: 2110 callbacks suppressed [ 113.891827][ T29] audit: type=1400 audit(1757695656.627:12100): avc: denied { create } for pid=8646 comm="syz.1.1962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 113.919803][ T8643] lo speed is unknown, defaulting to 1000 [ 113.932964][ T29] audit: type=1400 audit(1757695656.657:12101): avc: denied { create } for pid=8646 comm="syz.1.1962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 113.952742][ T29] audit: type=1400 audit(1757695656.657:12102): avc: denied { prog_load } for pid=8644 comm="syz.2.1961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 113.971895][ T29] audit: type=1400 audit(1757695656.657:12103): avc: denied { prog_load } for pid=8629 comm="syz.3.1955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 113.991041][ T29] audit: type=1400 audit(1757695656.667:12104): avc: denied { map_create } for pid=8644 comm="syz.2.1961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 114.010346][ T29] audit: type=1400 audit(1757695656.667:12105): avc: denied { create } for pid=8646 comm="syz.1.1962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 114.030016][ T29] audit: type=1400 audit(1757695656.667:12106): avc: denied { prog_load } for pid=8644 comm="syz.2.1961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 114.049271][ T29] audit: type=1400 audit(1757695656.667:12107): avc: denied { prog_load } for pid=8644 comm="syz.2.1961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 114.068649][ T29] audit: type=1400 audit(1757695656.787:12108): avc: denied { create } for pid=8644 comm="syz.2.1961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 114.099851][ T29] audit: type=1400 audit(1757695656.827:12109): avc: denied { prog_load } for pid=8629 comm="syz.3.1955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 114.287170][ T8669] FAULT_INJECTION: forcing a failure. [ 114.287170][ T8669] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 114.300328][ T8669] CPU: 1 UID: 0 PID: 8669 Comm: syz.1.1971 Not tainted syzkaller #0 PREEMPT(voluntary) [ 114.300356][ T8669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 114.300374][ T8669] Call Trace: [ 114.300381][ T8669] [ 114.300388][ T8669] __dump_stack+0x1d/0x30 [ 114.300410][ T8669] dump_stack_lvl+0xe8/0x140 [ 114.300466][ T8669] dump_stack+0x15/0x1b [ 114.300483][ T8669] should_fail_ex+0x265/0x280 [ 114.300507][ T8669] should_fail+0xb/0x20 [ 114.300574][ T8669] should_fail_usercopy+0x1a/0x20 [ 114.300594][ T8669] _copy_to_user+0x20/0xa0 [ 114.300621][ T8669] simple_read_from_buffer+0xb5/0x130 [ 114.300723][ T8669] proc_fail_nth_read+0x10e/0x150 [ 114.300751][ T8669] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 114.300777][ T8669] vfs_read+0x1a8/0x770 [ 114.300798][ T8669] ? __rcu_read_unlock+0x4f/0x70 [ 114.300880][ T8669] ? __fget_files+0x184/0x1c0 [ 114.300908][ T8669] ksys_read+0xda/0x1a0 [ 114.300989][ T8669] __x64_sys_read+0x40/0x50 [ 114.301011][ T8669] x64_sys_call+0x27bc/0x2ff0 [ 114.301032][ T8669] do_syscall_64+0xd2/0x200 [ 114.301063][ T8669] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 114.301166][ T8669] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 114.301247][ T8669] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 114.301268][ T8669] RIP: 0033:0x7fc1722ad5bc [ 114.301283][ T8669] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 114.301303][ T8669] RSP: 002b:00007fc170d17030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 114.301323][ T8669] RAX: ffffffffffffffda RBX: 00007fc1724f5fa0 RCX: 00007fc1722ad5bc [ 114.301336][ T8669] RDX: 000000000000000f RSI: 00007fc170d170a0 RDI: 0000000000000003 [ 114.301349][ T8669] RBP: 00007fc170d17090 R08: 0000000000000000 R09: 0000000000000000 [ 114.301377][ T8669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 114.301390][ T8669] R13: 00007fc1724f6038 R14: 00007fc1724f5fa0 R15: 00007fff1c8a75e8 [ 114.301409][ T8669] [ 114.625471][ T8691] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1979'. [ 114.645174][ T8691] 8021q: adding VLAN 0 to HW filter on device bond5 [ 114.806649][ T8724] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1993'. [ 114.835564][ T8724] 8021q: adding VLAN 0 to HW filter on device bond1 [ 114.847646][ T8728] macvlan1: entered promiscuous mode [ 114.854060][ T8728] ipvlan0: entered promiscuous mode [ 114.859679][ T8728] ipvlan0: left promiscuous mode [ 114.865606][ T8728] macvlan1: left promiscuous mode [ 114.903885][ T8735] pim6reg1: entered promiscuous mode [ 115.024611][ T8752] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2004'. [ 115.033596][ T8752] bridge_slave_1: left allmulticast mode [ 115.039388][ T8752] bridge_slave_1: left promiscuous mode [ 115.045220][ T8752] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.052994][ T8752] bridge_slave_0: left allmulticast mode [ 115.058649][ T8752] bridge_slave_0: left promiscuous mode [ 115.064433][ T8752] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.106115][ T8761] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2007'. [ 115.135997][ T8761] 8021q: adding VLAN 0 to HW filter on device bond2 [ 115.164059][ T8764] pim6reg1: entered promiscuous mode [ 115.169396][ T8764] pim6reg1: entered allmulticast mode [ 115.285606][ T8785] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2018'. [ 115.304101][ T8785] 8021q: adding VLAN 0 to HW filter on device bond3 [ 115.329101][ T8791] ================================================================== [ 115.337207][ T8791] BUG: KCSAN: data-race in copy_mm / dup_mmap [ 115.343327][ T8791] [ 115.345642][ T8791] read-write to 0xffff888109f473f8 of 4 bytes by task 8792 on cpu 1: [ 115.353686][ T8791] dup_mmap+0xd8/0xf20 [ 115.357827][ T8791] copy_mm+0x11a/0x370 [ 115.361887][ T8791] copy_process+0xd08/0x2000 [ 115.366465][ T8791] kernel_clone+0x16c/0x5c0 [ 115.371655][ T8791] __x64_sys_clone+0xe6/0x120 [ 115.376333][ T8791] x64_sys_call+0x119c/0x2ff0 [ 115.380998][ T8791] do_syscall_64+0xd2/0x200 [ 115.385497][ T8791] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.391415][ T8791] [ 115.393743][ T8791] read to 0xffff888109f47300 of 1408 bytes by task 8791 on cpu 0: [ 115.401544][ T8791] copy_mm+0xe2/0x370 [ 115.405515][ T8791] copy_process+0xd08/0x2000 [ 115.410096][ T8791] kernel_clone+0x16c/0x5c0 [ 115.414589][ T8791] __x64_sys_clone+0xe6/0x120 [ 115.419257][ T8791] x64_sys_call+0x119c/0x2ff0 [ 115.423928][ T8791] do_syscall_64+0xd2/0x200 [ 115.428438][ T8791] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.434331][ T8791] [ 115.436644][ T8791] Reported by Kernel Concurrency Sanitizer on: [ 115.442775][ T8791] CPU: 0 UID: 0 PID: 8791 Comm: syz.0.2020 Not tainted syzkaller #0 PREEMPT(voluntary) [ 115.452496][ T8791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 115.462549][ T8791] ================================================================== [ 115.494744][ T8792] lo speed is unknown, defaulting to 1000 [ 115.520634][ T8791] lo speed is unknown, defaulting to 1000 [ 115.520885][ T8792] lo speed is unknown, defaulting to 1000 [ 115.562583][ T8791] lo speed is unknown, defaulting to 1000