last executing test programs: 8m56.387331609s ago: executing program 4 (id=2256): socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000004c0)='dctcp\x00', 0x6) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback, 0x7}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001500)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffdfc, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendto$inet6(r0, &(0x7f0000001080)='D', 0x1, 0x20000045, &(0x7f00000001c0)={0xa, 0x2, 0x398, @empty}, 0x1c) 8m56.117878873s ago: executing program 4 (id=2260): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000002900000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000060060000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0xc, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000180)='kfree\x00', r1}, 0x18) syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f00000003c0)='./file0\x00', 0x4891, &(0x7f0000000000)={[{@grpjquota}, {@discard}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x2000000}}]}, 0x0, 0x41e, &(0x7f0000000880)="$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") 8m56.050438204s ago: executing program 4 (id=2263): r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) fstat(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r2, 0x0, 0x5c, 0x2b, &(0x7f0000000580)="a766b78c17bc2cb121c158746ccb6b0bcf0006cedcf5e738c54bfcc5f590139c0f8e517397211cdc1929e408d3817802e891b60b3d18faf60dce79a1a7daf69bc1ae058b027c659ae843cec781ea5e1e4e1dca24ce628e9a298aed41", &(0x7f0000000600)=""/43, 0xc, 0x0, 0x79, 0xcd, &(0x7f0000000640)="ff88158f73713ebce6d3619d344a438e052123780e2c5348e610c4e38f4b5631d852424535639f29125c02931cd7f9e65f3d5a36de01e09f1a6d8eedc1dc404bb3593fec0af67dacf95254247d4d3b056e961956a7487b1b7bd4f9da9b4e517dfd6ae887da8424f5d5b600f374ecb3cca2e3455eb1e9c9438b", &(0x7f00000006c0)="714827943a9107e0c76df6c1787d68e6750ca1986871bd27ae56936d7348a98d52d9a3b6e90d7fa62ff2c6c53a38eabbafa69b18063b7dda686225e79139394f6e8260b941d1511ab9f4bb55f399caa09bc78406df29e623f9cab507a79626f04e64d5f8b65ef78d52a8e657108d501e77ce2ef9692332b889b1fba6a57cc0db03417da03cdb3c767c0fa9604671bfdbfa78d696706e7fe31e3a72c4a0e94d9df6cef30f382e6523d57ef51177eef6489011ea691698543565ccbd9ef0927d8b698abf5d19ed1eade1cb0dc6bd", 0x0, 0x0, 0x1}, 0x50) getgroups(0x3, &(0x7f0000000540)=[0xee01, 0xffffffffffffffff, r1]) keyctl$chown(0x4, r0, 0xee01, r3) keyctl$setperm(0x5, r0, 0x30925) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a000000020000000110000007"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r6, 0x0, &(0x7f00000002c0)=""/28}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0xfffffffffffffdd0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44000000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000ffa000/0x3000)=nil) brk(0x400000ffc020) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, &(0x7f0000000000), &(0x7f0000000040)=r5}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) rename(0x0, &(0x7f0000000040)='./file1\x00') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r9, 0xa02000000000000, 0x60, &(0x7f0000000000)={'filter\x00', 0xb001, 0x4, 0x3e8, 0x0, 0x0, 0x130, 0x300, 0x300, 0x300, 0x7fffffe, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pimreg\x00', 'veth0_to_bridge\x00'}, 0xc0, 0x130}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f67b23ffdfa27f907a03732da3acbc6518e62a77ca06f258762e88c0d9f9d2f413b94a105f4bdf01425ce81c5d000000000000000500ffffffff00"}}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_team\x00', 'ip6tnl0\x00'}, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r0, 0x1) quotactl$Q_QUOTAON(0xffffffff80000200, &(0x7f0000000200)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000100)='./file0\x00') 8m53.760465357s ago: executing program 4 (id=2296): r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) syz_mount_image$vfat(&(0x7f0000001200), &(0x7f00000000c0)='./file0\x00', 0x10, &(0x7f0000000440)=ANY=[@ANYBLOB="002918d910d46be7099c66b02010b1f0b7c3dc1dabe625969fb0adc922385af53d57a1d35dd71c90d9dd649b53a2fa626cd92c7326ce1ba2f33b0aef2b2164e01d910058b51684696959ea7f5a607a6572d2640cf9312a07000000260e3651a0cbfd2c080990fb4c76e9e613b759863734a70d0600ec77e8ba76aacbb21e4b903aa4873a9951f269a9c0f87805a1a0cbdf6b8644a1de05a8d9dd9687d67c8af7f68cb59e60d1fbefb49b93d6b72cce4162edc4468a13987d94d428df36915621aeff6dc1358a7331fa69e05c417c2e1e6b8dc29c496c76d02dfc2d7b48616fb3f01b221f4f8f484a00090964922de8909a1f9f7ef655a12a68a56cb341a8fba4cd81cedec9cb518d13d2a2564427b63b037494748a24daa21fe1256df68d000b2778bf0437cc642cd83c5a1b34eeffdf93ecbd85bb340eeef68dd60101769c74f94d217264c171feea0305bfc87c36247d90b129a9973f00000001d99b195d2f75653a110621d8095064f0a034f492cf5aa4767a772d6f4967722546bfd83d3202f76c20a9d7f40f9e7818d77129df7fd072560de9adcc5507f763e5804e0227ecaa03dddd303a318d6f7763ce011543587e6a306780ca2f37db7e8a5b64a5059ac91ff2110e40ea13d70e1504653ba9eebcf61b427797fb3fd79d2bb9aaa13c9729fe323c4ac222991981381e004684fb200b17d2f6ede181067662ad8a31f45b613869ca8fc5b1dae62407a1f6dcb86a4c430210e9bcfca9b83283b87316c4d17f388e0bab0500000092a82e12f8e3ab9b94ff9266b3bc33eaecec233179e5348f11e7739033e9081bfc598746cf032fa55d958147a2e9226819ac65f89ca7d96da3ca2db52f8ec80462fddf42dbbca24b72"], 0x1, 0x11dd, &(0x7f00000012c0)="$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") mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000e00000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x31) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f00000003c0)='.\x00', 0x500, 0x97) getdents(r2, &(0x7f0000001fc0)=""/184, 0xb8) bpf$MAP_CREATE(0x141e000000000000, &(0x7f0000000280)=ANY=[@ANYBLOB="0500000004000000036c00395e049c601a00ee000000040000da79c19927a2e5f36c7e8907b6c532eb0871e4a5df1ada7799b9e6710bc89852968ff0d6f2490ed9b829ebb0fcdc322a9146cd02169a4aa6aa84bd7096439d7f8ff9ac72e2688e6d49fa81de13946813b5f0ae53e41b3b4375381e32ef40d2cc0237b3500cddf53d8baf70ef4ced65222ebae33f0747a43759c989e77f0709c5876701208e141f9a39d22491dba8ff295d7e51976f6b6013e0ac5dbc6dd58ace38ab52116d6e539d6a225027", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) writev(r0, &(0x7f0000001380)=[{&(0x7f0000000240)='4', 0x1}, {&(0x7f0000000000)="d532", 0x2}], 0x2) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) 8m53.473206012s ago: executing program 4 (id=2301): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000fcffffff850000002d000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x10) socket(0x10, 0x3, 0x6) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0xd18c9b60, &(0x7f0000000080)=[{&(0x7f0000000100)="e03f03002a000b05d25a806c8c6f94f90524fc600400037a0a000900050282c137153e370e0c1180fc0b10000300", 0x33fe0}], 0x1}, 0x0) 8m53.400757083s ago: executing program 4 (id=2303): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000740)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@private=0xa010102, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8, 0xffff, 0xfffe, 0x0, 0x2}, {@in6=@mcast2, 0x0, 0x32}, @in=@rand_addr=0x64010101, {0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x9}, {}, 0x0, 0x3506, 0x2, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x40) 8m53.369723624s ago: executing program 32 (id=2303): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000740)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@private=0xa010102, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8, 0xffff, 0xfffe, 0x0, 0x2}, {@in6=@mcast2, 0x0, 0x32}, @in=@rand_addr=0x64010101, {0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x9}, {}, 0x0, 0x3506, 0x2, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x40) 5m29.524447004s ago: executing program 2 (id=4765): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r1}, 0x10) quotactl$Q_SETQUOTA(0xffffffff80000801, &(0x7f0000000040)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000100)={0x0, 0x100000000, 0x2000000000000000, 0x3, 0x0, 0xffffffffffffffff, 0x7b, 0xfffffffffffffffd, 0x9b}) 5m27.748949371s ago: executing program 2 (id=4772): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r0}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[@ANYBLOB], 0x5b0) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0) 5m27.698998362s ago: executing program 2 (id=4773): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x10f, &(0x7f0000000340)={0x0, 0xfad9}, &(0x7f0000000240)=0x0, &(0x7f00000000c0)=0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='sched_switch\x00', r3}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000060000000000000000008500000007000000850000000e00000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000012c0)={&(0x7f0000000040)='kfree\x00', r4}, 0x10) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, 0x0, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x48, 0x4000, @fd_index=0x3, 0x5, 0x0, 0x0, 0x2}) io_uring_enter(r0, 0x47f6, 0x0, 0x0, 0x0, 0x0) 5m27.652788942s ago: executing program 2 (id=4775): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x6b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x22023500, 0x0, 0x20010, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x18d811, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='mountinfo\x00') sendfile(r2, r2, 0x0, 0x1000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r3 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @loopback={0xff00000000000000, 0xac14140c}, 0xff000000}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)="8bcd", 0xffe3}], 0x1, 0x0, 0x0, 0x900}, 0x60) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x5, 0x0, 0x6, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x1efc, 0x0, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x800}, r1, 0x0, 0xffffffffffffffff, 0x3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x161042, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x18) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='sys_enter\x00', r7}, 0x10) clock_settime(0xa, 0x0) ioctl$PPPIOCNEWUNIT(r4, 0xc004743e, &(0x7f0000000140)) ioctl$PPPIOCSPASS(r4, 0x40107447, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x3, 0x1000}]}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r8}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) 5m27.302203328s ago: executing program 2 (id=4777): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000073117200000000008510000002000000850000000900000095000004000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={@map=r0, 0x14, 0x0, 0xfffffffe, &(0x7f0000000100)=[0x0], 0x1, 0x0, &(0x7f0000000140)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0], 0x0}, 0x40) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001500)={0x6, 0x13, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff7}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@jmp={0x5, 0x1, 0x0, 0x5, 0xa, 0x0, 0xfffffffffffffffc}, @alu={0x4, 0x0, 0x2, 0xa, 0x3, 0xfffffffffffffff0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x80000000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x699a93dc3a3830c}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000300)='GPL\x00', 0x9, 0x1000, &(0x7f0000000500)=""/4096, 0x41100, 0x2, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x1, 0x0, 0x40, 0x1}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000380)=[r1, r1], &(0x7f00000003c0)=[{0x2, 0x3, 0xb, 0xa}], 0x10, 0x80000000, @void, @value}, 0x94) r4 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000040)={r3, 0x0, 0x25, 0x4, @val=@tcx={@void, @value=r0, @void, @void, r2}}, 0x1c) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000000c0)={r4, r0, 0x4, r0}, 0x10) 5m27.10471518s ago: executing program 2 (id=4781): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000006280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=@newtaction={0xc4, 0x30, 0x1, 0x4000000, 0x0, {0x0, 0x0, 0x6a00}, [{0xb0, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0x0, 0x10000000, 0x0, 0x4}, 0x3, r2}}]}, {0x4, 0xa}, {0xc}, {0xffac, 0x8, {0x0, 0x2}}}}, @m_mpls={0x5c, 0x2, 0x0, 0x0, {{0x9}, {0x30}, {0x4}, {0xc}, {0xc}}}]}]}, 0xc4}}, 0x0) 5m27.068537291s ago: executing program 33 (id=4781): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000006280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)=@newtaction={0xc4, 0x30, 0x1, 0x4000000, 0x0, {0x0, 0x0, 0x6a00}, [{0xb0, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x0, 0x0, 0x10000000, 0x0, 0x4}, 0x3, r2}}]}, {0x4, 0xa}, {0xc}, {0xffac, 0x8, {0x0, 0x2}}}}, @m_mpls={0x5c, 0x2, 0x0, 0x0, {{0x9}, {0x30}, {0x4}, {0xc}, {0xc}}}]}]}, 0xc4}}, 0x0) 2m5.766651455s ago: executing program 1 (id=7084): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a000000020000000110000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) symlink(&(0x7f0000001780)='./file0/../file0\x00', &(0x7f00000017c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0/../file0\x00') 2m5.712261495s ago: executing program 1 (id=7086): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x65, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) pipe2(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@uname={'uname', 0x3d, '\xd0\xae\xde\xc1\xaa \xff\xd8\x1d\x1b\xf8\x93)!|\xb0X\xa3\x96\xed\xa2\xab@\xa2m\x93\xdd\b<\x00t\xdc\xabl\xab!\xae\x16\xc4\xcd\xf9{\xdc5_;A\xd2{eC\x014\\\xb3\xc4\xce\xc3yS2-\x01\xbe\xaarW\x96O\xd3\x0f\xe2\xd7/\x17\x1d\xa7.8\x9f8-\xea<\x8d\x91\x90j\xea\xd5\xd5\xae\xcc\xc0\x97\xef\x10\x92\xea\x98|+\x00\x00\x00\x00\x00\x00\x00\x00'}}]}}) 2m5.633355097s ago: executing program 1 (id=7087): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000c80)='kmem_cache_free\x00', r0}, 0x10) r1 = socket(0x1, 0x80802, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0xb000001d}) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') read$msr(r3, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r4}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a5000000080000"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000a40)=@nat={'nat\x00', 0x1b, 0x5, 0x618, 0x428, 0xf0, 0xffffffff, 0x0, 0x1e0, 0x548, 0x548, 0xffffffff, 0x548, 0x548, 0x5, &(0x7f0000000280), {[{{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@private1={0xfc, 0x1, '\x00', 0x1}, @ipv4=@empty, @icmp_id=0x67, @gre_key=0x1}}}, {{@ipv6={@empty, @remote, [0xffffff00, 0xff, 0xff, 0xffffffff], [0xff, 0x0, 0xff, 0xffffff00], 'vcan0\x00', 'erspan0\x00', {0xff}, {}, 0x2b, 0xf, 0x3, 0x20}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x18, @ipv4=@remote, @ipv6=@private1, @gre_key=0x7, @gre_key}}}, {{@ipv6={@mcast1, @local, [0xffffff00, 0xff000000, 0xff000000, 0xff000000], [0xff, 0x0, 0x0, 0xffffffff], 'vlan1\x00', 'netdevsim0\x00', {}, {}, 0x78, 0x80, 0x0, 0x11}, 0x0, 0x200, 0x248, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'batadv_slave_0\x00', {0x200, 0xfffffffffffffffd, 0x1, 0x7, 0x2, 0x5, 0x8000, 0xfffffffe, 0x78, 0x40}, {0x1ff}}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x3, @ipv6=@dev={0xfe, 0x80, '\x00', 0xb3}, @ipv6=@empty, @icmp_id=0x65, @gre_key=0x3}}}, {{@ipv6={@dev={0xfe, 0x80, '\x00', 0x3d}, @mcast1, [0x0, 0xffffff00, 0xff], [0xff, 0xff, 0xffffffff, 0xff], 'vlan1\x00', 'pimreg1\x00', {}, {0xff}, 0xf63d8b33ad232333, 0x9, 0x4, 0x10}, 0x0, 0xd8, 0x120, 0x0, {}, [@common=@srh={{0x30}, {0x5e, 0xff, 0x0, 0x6, 0xb97, 0xa00, 0x80}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0xa, @ipv6=@private1, @ipv4=@broadcast, @gre_key=0x8, @gre_key=0x3}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x678) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105002, 0x1db) writev(r6, &(0x7f0000000140)=[{&(0x7f0000000000)="7799c5bc4048a9ea702475e5050c50", 0xfffffee2}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000000)='kfree\x00'}, 0x18) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r7, &(0x7f0000000180)={0x0, 0x3b, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a58000000160a03020002000000000000020000000900020073797a30000000000900010073797a30000000002c00038008000140000000000800024000000000180003801400010073797a5f74756e00000000000000000014000000110001"], 0x80}}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000040)="2e00000011008188040f80ec59acbc0413a1f8480b0000005e140602000000000e0027001000000002800000121f", 0x2e}], 0x1}, 0x0) 2m5.602585967s ago: executing program 1 (id=7089): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d00000085000000500000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0xe, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00', r0}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x40042, 0x1ff) write$binfmt_elf32(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c460000004000000000000000000300030000000000000000003800000000000000000000000000200080"], 0x158) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0) 2m5.583532427s ago: executing program 1 (id=7091): r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x20, 0x0, 0x0, 0xfffff00c}, {0x6, 0xe, 0x0, 0x800}]}, 0x10) sendmmsg$unix(r1, &(0x7f0000002fc0)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)="643c87cf", 0xffffffffffffff6e}], 0x1, 0x0, 0x0, 0x4}}], 0x1, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000a50000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setresuid(0x0, r5, 0x0) quotactl$Q_GETINFO(0xffffffff80000502, &(0x7f0000000140)=@sr0, r5, &(0x7f0000000180)) r6 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$setperm(0x5, r6, 0x1c243811) keyctl$chown(0x4, r6, 0xee00, 0x0) keyctl$read(0xb, r6, 0x0, 0x0) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r7, 0x29, 0x36, &(0x7f0000000040)=ANY=[], 0x8) connect$inet6(r7, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x10) sendmmsg$inet6(r7, &(0x7f0000001880)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000480)="82df0268b34378335d5d919ec04d2771a7c13095ac0040231f23ddeade2fcf9b185d0e154c6dde01db6a458659aaf99298bc486f793af4e537cd565d670a3a0ab017434c93c391da69c126fd8fd667f76bf5072e0204b8a7da27ba138dcdd0d4dab10e2bcc2f880838a719783e35c36b2d6171b9c85666a99cd228777b92fcddffdc4339139d428af7fdad31b03a40a312063dd70e", 0x95}], 0x1}}], 0x1, 0x4400c800) sendto$inet6(r7, &(0x7f0000000300), 0x16, 0x3b00, 0x0, 0xfffffffffffffdfd) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000080)='.\x00', 0x0, 0x0, 0x400) perf_event_open(&(0x7f0000000400)={0x8, 0x80, 0x0, 0x0, 0x1, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0xfffffffffffffffd, 0xffffffff, 0x6, 0x40, 0x0, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2) socket$inet_udp(0x2, 0x2, 0x0) add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, r6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r3}, 0x10) r9 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r9, 0x107, 0x12, &(0x7f0000000100)={0x20, 0x7}, 0x4) setsockopt$packet_int(r9, 0x107, 0x16, &(0x7f0000000000)=0x4, 0x4) 2m5.558752907s ago: executing program 1 (id=7092): socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e24, 0x8, @remote, 0x3}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x86, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x805}, 0x20008800) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040), 0x280, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b0000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0xc, &(0x7f00000003c0)=ANY=[@ANYRESOCT=r3, @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r7}, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r8, &(0x7f0000000100)={0x0, 0xffffffffffffff57, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r9, 0x1, 0x3, 0x7f00, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x0, 0x8c, 0x4}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040010}, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000a40)=ANY=[@ANYRES64=0x0, @ANYRES8, @ANYRES64=r2, @ANYBLOB="d02acb360d5f60534adb9652971ec587ef62e925717303a0ba6d9c896cc7e3095b709c174b9db821db3937a7be6a9a3c263be60c1f8691c4bb4b65b3198cbde414209d0347be8146e3dd688712f88b7ef1cb8afa6bec3f39d6072a40e9f6e633bca48113944226cda16fdafa8d5cd9b6689d722ee95b1523fe1fc7a4bd17dced32da23ae6c278f3b471d8a21626ac146c431cc3355d74ab037824e13e9c7de4876", @ANYRESOCT=r5, @ANYBLOB="0084a9b05e38555507aac0f38490ecb1c891ba8e461863685815da1c4edc988d15322b3082df03e580f69b82cbeb4c4817679ae14916a77342c57c2b98d820491abfcaef34a1afa161df472e88e7c2f0b861f43937ad3a4dda008af57659de02d6a900ae0d4f6f6f0bc6daecfb521e193de13f57a70c669f4946d6345b4b8e0929558a48042aafe5ea6aa8558ccd3f2a22f55a273555e162b33dc20171f700b72c61f22ef3a4c718c63ff849561f52c1f78f03612600752538a833327f3087271eab", @ANYBLOB="abac48e76922320e12dbb07b2b266d70f205d48f1d5a8aa3f7efd71311727e423985a31b825fe396d15be8a07f00d61a00ccbe1b3231f82e59019b70cfc73214ea0ff1a71a1d00f6b48a72bb32552d3f9c27728d2503acb44c8895fd78f58fa56629242356788c6407fbc40663cc3990be1c33b565eaf94dd26f0d199699ff8916ed9403459566d8dce8602a9e9a22b03e41ec56b171d2f3bc191c54e70d2bda9e60a514ae2c3d51608d90090a713499", @ANYBLOB="64fc0e51cbbed7191c60c45257efcfe7dca8967b971fbcb325"], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001240)={&(0x7f0000000200)='kfree\x00', r10, 0x0, 0xfffffffffffffffd}, 0x18) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000050000000000000000000000000a20000000000a01030000000000000000010000000900010073797a310000000040000000030a01020000000000000000010000000900030073797a320000000014000480080002400000000008000140000000050900010073797a31000000004c000000050a01020000100000000000010020000c00024000000000000000010900010073797a310000000020000480140003006e657464657673696d300000000000000800014000"], 0xd4}}, 0x0) 1m50.478506921s ago: executing program 34 (id=7092): socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e24, 0x8, @remote, 0x3}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x86, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x805}, 0x20008800) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040), 0x280, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b0000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x15, 0xc, &(0x7f00000003c0)=ANY=[@ANYRESOCT=r3, @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r7}, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r8, &(0x7f0000000100)={0x0, 0xffffffffffffff57, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r9, 0x1, 0x3, 0x7f00, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x0, 0x8c, 0x4}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040010}, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000a40)=ANY=[@ANYRES64=0x0, @ANYRES8, @ANYRES64=r2, @ANYBLOB="d02acb360d5f60534adb9652971ec587ef62e925717303a0ba6d9c896cc7e3095b709c174b9db821db3937a7be6a9a3c263be60c1f8691c4bb4b65b3198cbde414209d0347be8146e3dd688712f88b7ef1cb8afa6bec3f39d6072a40e9f6e633bca48113944226cda16fdafa8d5cd9b6689d722ee95b1523fe1fc7a4bd17dced32da23ae6c278f3b471d8a21626ac146c431cc3355d74ab037824e13e9c7de4876", @ANYRESOCT=r5, @ANYBLOB="0084a9b05e38555507aac0f38490ecb1c891ba8e461863685815da1c4edc988d15322b3082df03e580f69b82cbeb4c4817679ae14916a77342c57c2b98d820491abfcaef34a1afa161df472e88e7c2f0b861f43937ad3a4dda008af57659de02d6a900ae0d4f6f6f0bc6daecfb521e193de13f57a70c669f4946d6345b4b8e0929558a48042aafe5ea6aa8558ccd3f2a22f55a273555e162b33dc20171f700b72c61f22ef3a4c718c63ff849561f52c1f78f03612600752538a833327f3087271eab", @ANYBLOB="abac48e76922320e12dbb07b2b266d70f205d48f1d5a8aa3f7efd71311727e423985a31b825fe396d15be8a07f00d61a00ccbe1b3231f82e59019b70cfc73214ea0ff1a71a1d00f6b48a72bb32552d3f9c27728d2503acb44c8895fd78f58fa56629242356788c6407fbc40663cc3990be1c33b565eaf94dd26f0d199699ff8916ed9403459566d8dce8602a9e9a22b03e41ec56b171d2f3bc191c54e70d2bda9e60a514ae2c3d51608d90090a713499", @ANYBLOB="64fc0e51cbbed7191c60c45257efcfe7dca8967b971fbcb325"], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001240)={&(0x7f0000000200)='kfree\x00', r10, 0x0, 0xfffffffffffffffd}, 0x18) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000050000000000000000000000000a20000000000a01030000000000000000010000000900010073797a310000000040000000030a01020000000000000000010000000900030073797a320000000014000480080002400000000008000140000000050900010073797a31000000004c000000050a01020000100000000000010020000c00024000000000000000010900010073797a310000000020000480140003006e657464657673696d300000000000000800014000"], 0xd4}}, 0x0) 3.646327986s ago: executing program 0 (id=8909): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) 3.611873906s ago: executing program 0 (id=8912): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='kfree\x00', r1}, 0x18) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000001000)={0x2, 0x4e21, @loopback}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) write$selinux_load(r2, &(0x7f0000000000)=ANY=[], 0x2000) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000001000040000000000000000000000000a20000000000a05000000000000000000070000010900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000025940000000c0a01030000000000000000070000080900020073797a31000000000900010073797a30000000006800038064000080080003400000000258000b802c0001800a0001006c696d69740000001c0002800c00014000000000000000030c0002400000000000000010140001800c0001"], 0x118}, 0x1, 0x0, 0x0, 0x40040}, 0x0) 3.542446447s ago: executing program 0 (id=8914): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000000)=ANY=[], 0x2000) (fail_nth: 5) 3.226698632s ago: executing program 0 (id=8916): syz_mount_image$ext4(&(0x7f00000004c0)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x400, &(0x7f0000000080), 0x1, 0x4a6, &(0x7f0000000a40)="$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") perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_config_ext={0x100000000}, 0x2, 0xffffffff, 0x2, 0x9, 0x4, 0x1, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xf, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000d80)=[{&(0x7f00000002c0)=""/205, 0xcd}], 0x1) 3.165162413s ago: executing program 0 (id=8918): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 3.138178883s ago: executing program 0 (id=8921): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='kfree\x00', r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000bc0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x0, &(0x7f00000000c0), 0x2, 0xbd1, &(0x7f0000002380)="$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") r4 = socket(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)=@newqdisc={0x78, 0x24, 0x3fe3aa0262d8c783, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0x3, 0x0, 0x7ff, 0x1}, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0xfffffffc}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) 1.497211738s ago: executing program 6 (id=8972): openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x20605) r0 = syz_io_uring_setup(0x22f, &(0x7f0000000080)={0x0, 0x5325, 0x10000, 0x0, 0x100002cf}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r4}, 0x18) syz_io_uring_submit(r1, r2, 0x0) io_uring_enter(r0, 0x7a98, 0x0, 0x0, 0x0, 0x0) 1.35266944s ago: executing program 6 (id=8975): openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x20605) r0 = syz_io_uring_setup(0x22f, &(0x7f0000000080)={0x0, 0x5325, 0x10000, 0x0, 0x100002cf}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r4}, 0x18) syz_io_uring_submit(r1, r2, &(0x7f00000009c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xffffffffffffff31}) io_uring_enter(r0, 0x7a98, 0x0, 0x0, 0x0, 0x0) 1.198178612s ago: executing program 6 (id=8977): prctl$PR_SET_NAME(0xf, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000031c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sys_enter\x00', r0}, 0x10) get_robust_list(0x0, &(0x7f0000000700)=0x0, &(0x7f0000000740)) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x1, 0x800001, 0x0, 0x0, 0x0) 836.956747ms ago: executing program 6 (id=8978): r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xb, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000009500"/23], &(0x7f0000000080)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001b0400000000ffdbdf25000000000000", @ANYRES32=0x0, @ANYBLOB="8000000094630000140012800b00010065727370616e0000040002800a000100ffffffffffff0000"], 0x40}, 0x1, 0x0, 0x0, 0x4000801}, 0x0) r1 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = timerfd_create(0x0, 0x0) read(r3, &(0x7f0000000380)=""/189, 0x8) timerfd_settime(r3, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x9, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f0000000040)) epoll_pwait(r5, &(0x7f00000000c0)=[{}], 0x1, 0x200, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), 0xffffffffffffffff) recvmmsg(r6, &(0x7f00000007c0), 0x0, 0x40010080, 0x0) socket$nl_route(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000c40)={0x2000000b}) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file2\x00', &(0x7f00000001c0)={{0x0, 0xea60}, {r7, r8/1000+10000}}) r9 = dup2(r2, r2) faccessat2(r9, &(0x7f0000000880)='\x00', 0x1, 0x1100) write$binfmt_register(r1, &(0x7f0000000440)={0x3a, 'syz1', 0x3a, 'M', 0x3a, 0x0, 0x3a, 'usrjquota=', 0x3a, '', 0x3a, './file2', 0x3a, [0x46]}, 0x32) 400.228324ms ago: executing program 7 (id=8980): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x20, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) 350.622965ms ago: executing program 3 (id=8981): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x10) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) 321.543995ms ago: executing program 3 (id=8982): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0202000311000000000000000000000005000500000000000a00000000000000fe8000000000000000000000000000bb000000000000000002000100000007000000000b000000000200090000000000000000000000000005000600000000000a00000000000000fe8800000000000000000000000000010000000000000000010018"], 0x88}}, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000040), 0x2, 0x240) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r4, 0x5403, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) r7 = socket(0x10, 0x803, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r8}, 0x10) sendmsg$NL80211_CMD_TDLS_OPER(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x1c}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$FOU_CMD_ADD(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)={0x38, r6, 0x209, 0x0, 0x0, {}, [@FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @loopback={0xff00000000000000}}, @FOU_ATTR_IFINDEX={0x8, 0xb, r9}]}, 0x38}}, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000015c0), 0x1, 0x0) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f0000000200)=0x7ffffffc) symlink(&(0x7f0000001780)='./file0/../file0\x00', &(0x7f00000017c0)='./file0\x00') listxattr(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000005e1a0000"], 0x50) ioctl$EVIOCGRAB(r3, 0x40044590, 0x0) 317.621235ms ago: executing program 7 (id=8983): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x20, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) 281.388426ms ago: executing program 6 (id=8985): r0 = socket$netlink(0x10, 0x3, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfff00002}, {0x16}]}, 0x10) sendmsg$netlink(r0, &(0x7f00000047c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=ANY=[@ANYBLOB], 0x14}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) pwritev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)='0', 0x1}], 0x1, 0xffff8001, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r2}, 0x18) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0x800000000003}, 0x1320, 0xffffffff, 0x3, 0x5, 0x8, 0x1088f109, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r4 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x40, r3, 0x1, 0x0, 0x0, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'bond0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x40}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa10000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 249.114826ms ago: executing program 7 (id=8986): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @loopback}, 0x10) sendmmsg$inet(r0, &(0x7f0000001680)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000004e40)="0349ee47070c03607b5bae292ac8b762044157dd1ea30758ca9a7bfbd23efe5ba3cf173f0478438cbae7a57fe81ae074996dfd64d0c8db1c53c331a33a95a0d2cb94d0cd09f710c11df6be5cc730821bae016a0ea4073e7e4bd62cc1aff09c799d1ebe2a8388a02e50dd19c4b7b1e91a0a1d8904b32b4571", 0x78}], 0x1}}, {{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f00000004c0)="3912", 0x2}], 0x1}}], 0x2, 0x8090) recvmmsg(r0, &(0x7f0000003780)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{0x0}, {&(0x7f0000000b80)=""/244, 0xf4}], 0x2}, 0x8}], 0x1, 0x40000000, 0x0) 220.896187ms ago: executing program 3 (id=8987): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @loopback}, 0x10) sendmmsg$inet(r0, &(0x7f0000001680)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000004e40)="0349ee47070c03607b5bae292ac8b762044157dd1ea30758ca9a7bfbd23efe5ba3cf173f0478438cbae7a57fe81ae074996dfd64d0c8db1c53c331a33a95a0d2cb94d0cd09f710c11df6be5cc730821bae016a0ea4073e7e4bd62cc1aff09c799d1ebe2a8388a02e50dd19c4b7b1e91a0a1d8904b32b4571", 0x78}], 0x1}}, {{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f00000004c0)="3912", 0x2}], 0x1}}], 0x2, 0x8090) recvmmsg(r0, &(0x7f0000003780)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{0x0}, {&(0x7f0000000b80)=""/244, 0xf4}], 0x2}, 0x8}], 0x1, 0x40000000, 0x0) 185.318207ms ago: executing program 7 (id=8989): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @loopback}, 0x10) sendmmsg$inet(r0, &(0x7f0000001680)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000004e40)="0349ee47070c03607b5bae292ac8b762044157dd1ea30758ca9a7bfbd23efe5ba3cf173f0478438cbae7a57fe81ae074996dfd64d0c8db1c53c331a33a95a0d2cb94d0cd09f710c11df6be5cc730821bae016a0ea4073e7e4bd62cc1aff09c799d1ebe2a8388a02e50dd19c4b7b1e91a0a1d8904b32b4571", 0x78}], 0x1}}, {{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f00000004c0)="3912", 0x2}], 0x1}}], 0x2, 0x8090) recvmmsg(r0, &(0x7f0000003780)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{0x0}, {&(0x7f0000000b80)=""/244, 0xf4}], 0x2}, 0x8}], 0x1, 0x40000000, 0x0) 182.994267ms ago: executing program 3 (id=8990): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_config_ext={0x4, 0x6}, 0x400, 0xfffffffd, 0x6, 0x3, 0x1, 0x1, 0xfff6, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, 0x0, &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xf, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r2, &(0x7f0000000d80)=[{&(0x7f00000002c0)=""/205, 0xcd}], 0x1) 173.855107ms ago: executing program 5 (id=8991): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={0x0, r1}, 0x18) r2 = memfd_secret(0x0) fcntl$setlease(r2, 0x400, 0x0) fremovexattr(r2, &(0x7f00000000c0)=@known='com.apple.system.Security\x00') 131.027558ms ago: executing program 5 (id=8992): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000009900"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kmem_cache_free\x00', r1, 0x0, 0xf7}, 0x18) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r2, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x8, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x32) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)='v', 0x34000}], 0x1) 130.403648ms ago: executing program 7 (id=8993): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_config_ext={0x4, 0x6}, 0x400, 0xfffffffd, 0x6, 0x3, 0x1, 0x1, 0xfff6, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xf, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_config_ext, 0x0, 0xb2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r2, &(0x7f0000000d80)=[{&(0x7f00000002c0)=""/205, 0xcd}], 0x1) 124.521318ms ago: executing program 5 (id=8994): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0202000311000000000000000000000005000500000000000a00000000000000fe8000000000000000000000000000bb000000000000000002000100000007000000000b000000000200090000000000000000000000000005000600000000000a00000000000000fe8800000000000000000000000000010000000000000000010018"], 0x88}}, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000040), 0x2, 0x240) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW(r4, 0x5403, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) r7 = socket(0x10, 0x803, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r8}, 0x10) sendmsg$NL80211_CMD_TDLS_OPER(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x1c}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$FOU_CMD_ADD(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)={0x38, r6, 0x209, 0x0, 0x0, {}, [@FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @loopback={0xff00000000000000}}, @FOU_ATTR_IFINDEX={0x8, 0xb, r9}]}, 0x38}}, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000015c0), 0x1, 0x0) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f0000000200)=0x7ffffffc) listxattr(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000005e1a0000"], 0x50) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f0000000000)=0x8000) ioctl$EVIOCGRAB(r3, 0x40044590, 0x0) 115.685198ms ago: executing program 3 (id=8995): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) getpeername$packet(r1, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000005c0)=0x14) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000600)='kfree\x00', r2, 0x0, 0x4}, 0x18) socket$inet_smc(0x2b, 0x1, 0x0) getpid() r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0), 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000040)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000001c0)={0x0, 0x80, 0x0, 'queue0\x00', 0x9}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 84.410709ms ago: executing program 3 (id=8996): r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0xb, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000009500"/23], &(0x7f0000000080)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="400000001b0400000000ffdbdf25000000000000", @ANYRES32=0x0, @ANYBLOB="8000000094630000140012800b00010065727370616e0000040002800a000100ffffffffffff0000"], 0x40}, 0x1, 0x0, 0x0, 0x4000801}, 0x0) r1 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = timerfd_create(0x0, 0x0) read(r3, &(0x7f0000000380)=""/189, 0x8) timerfd_settime(r3, 0x0, &(0x7f00000000c0)={{0x77359400}, {0x0, 0x3938700}}, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x9, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f0000000040)) epoll_pwait(r5, &(0x7f00000000c0)=[{}], 0x1, 0x200, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), 0xffffffffffffffff) recvmmsg(r6, &(0x7f00000007c0), 0x0, 0x40010080, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a40)=@newtaction={0x88c, 0x30, 0xffff, 0x3, 0x0, {}, [{0x878, 0x1, [@m_police={0x874, 0x1, 0x0, 0x0, {{0xb}, {0x848, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x1, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x22, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x8, 0x0, 0x0, 0x27ffdbfc, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x3, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0xeeb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffc, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x2000, 0xfffffffd, 0x0, 0x0, 0x0, 0x80, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x1000, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x100000]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x20000000, 0xffffffff, 0x0, 0x0, 0xfffffffc, 0x0, 0x20000000, 0x0, 0x5, 0x2, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x800, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x2, 0xfffffffc, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0xf9, 0x0, 0x0, 0x3, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x8, 0x0, 0x0, 0x100]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x7, 0x0, 0x0, 0xfffffffe, {0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, {0x4, 0x2, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x3}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x2}}}}]}]}, 0x88c}}, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r4, &(0x7f0000000c40)={0x2000000b}) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file2\x00', &(0x7f00000001c0)={{0x0, 0xea60}, {r7, r8/1000+10000}}) r9 = dup2(r2, r2) faccessat2(r9, &(0x7f0000000880)='\x00', 0x1, 0x1100) write$binfmt_register(r1, &(0x7f0000000440)={0x3a, 'syz1', 0x3a, 'M', 0x3a, 0x0, 0x3a, 'usrjquota=', 0x3a, '', 0x3a, './file2', 0x3a, [0x46]}, 0x32) 84.029529ms ago: executing program 5 (id=8997): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x110}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 81.166498ms ago: executing program 6 (id=8998): setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x68, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x7, 0xfffffffffffffffc}, 0x103200, 0x1, 0x840000, 0xc, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket$kcm(0x23, 0x5, 0x0) write$cgroup_pressure(r0, 0x0, 0xeaff) memfd_create(&(0x7f00000000c0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\xd2q#\xc6\xca\x97\x9d\xcb\x1e\x80\xd6\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec', 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000020b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r2}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x7ff) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) get_mempolicy(0x0, 0x0, 0x7, &(0x7f0000f8b000/0x4000)=nil, 0x2) 34.823799ms ago: executing program 7 (id=8999): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000001000)={0x2, 0x4e21, @loopback}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) write$selinux_load(r1, &(0x7f0000000000)=ANY=[], 0x2000) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000001000040000000000000000000000000a20000000000a05000000000000000000070000010900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000025940000000c0a01030000000000000000070000080900020073797a31000000000900010073797a30000000006800038064000080080003400000000258000b802c0001800a0001006c696d69740000001c0002800c00014000000000000000030c0002400000000000000010140001800c0001"], 0x118}, 0x1, 0x0, 0x0, 0x40040}, 0x0) 34.405079ms ago: executing program 5 (id=9000): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @loopback}, 0x10) sendmmsg$inet(r0, &(0x7f0000001680)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000004e40)="0349ee47070c03607b5bae292ac8b762044157dd1ea30758ca9a7bfbd23efe5ba3cf173f0478438cbae7a57fe81ae074996dfd64d0c8db1c53c331a33a95a0d2cb94d0cd09f710c11df6be5cc730821bae016a0ea4073e7e4bd62cc1aff09c799d1ebe2a8388a02e50dd19c4b7b1e91a0a1d8904b32b4571", 0x78}], 0x1}}, {{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f00000004c0)="3912", 0x2}], 0x1}}], 0x2, 0x8090) recvmmsg(r0, &(0x7f0000003780)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{0x0}, {&(0x7f0000000b80)=""/244, 0xf4}], 0x2}, 0x8}], 0x1, 0x40000000, 0x0) 0s ago: executing program 5 (id=9001): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r0, 0x0, 0x2}, 0x18) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) fsopen(&(0x7f0000000040)='cgroup2\x00', 0x1) kernel console output (not intermixed with test programs): fter parsing attributes in process `syz.5.8084'. [ 724.472040][T26377] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 724.498502][T26407] pimreg: entered allmulticast mode [ 724.506964][T26407] pimreg: left allmulticast mode [ 724.538469][T26409] netlink: 'syz.5.8092': attribute type 39 has an invalid length. [ 724.562000][T26377] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 724.578763][T26377] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 724.593225][T26377] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 724.604706][T26413] x_tables: ip6_tables: mh match: only valid for protocol 135 [ 724.618357][T26377] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 724.622063][T26415] serio: Serial port ptm0 [ 724.661851][T26419] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8097'. [ 724.913533][T26440] netlink: 'syz.7.8105': attribute type 39 has an invalid length. [ 724.939412][T26442] FAULT_INJECTION: forcing a failure. [ 724.939412][T26442] name failslab, interval 1, probability 0, space 0, times 0 [ 724.952113][T26442] CPU: 0 UID: 0 PID: 26442 Comm: syz.7.8106 Not tainted 6.15.0-rc3-syzkaller-00283-gf1a3944c860b #0 PREEMPT(voluntary) [ 724.952157][T26442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 724.952170][T26442] Call Trace: [ 724.952177][T26442] [ 724.952184][T26442] __dump_stack+0x1d/0x30 [ 724.952206][T26442] dump_stack_lvl+0xe8/0x140 [ 724.952226][T26442] dump_stack+0x15/0x1b [ 724.952267][T26442] should_fail_ex+0x265/0x280 [ 724.952298][T26442] ? audit_log_d_path+0x8d/0x150 [ 724.952329][T26442] should_failslab+0x8c/0xb0 [ 724.952357][T26442] __kmalloc_cache_noprof+0x4c/0x320 [ 724.952424][T26442] audit_log_d_path+0x8d/0x150 [ 724.952454][T26442] audit_log_d_path_exe+0x42/0x70 [ 724.952484][T26442] audit_log_task+0x1e9/0x250 [ 724.952513][T26442] audit_seccomp+0x61/0x100 [ 724.952557][T26442] ? __seccomp_filter+0x68c/0x10d0 [ 724.952578][T26442] __seccomp_filter+0x69d/0x10d0 [ 724.952674][T26442] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 724.952700][T26442] ? vfs_write+0x75e/0x8d0 [ 724.952812][T26442] __secure_computing+0x82/0x150 [ 724.952846][T26442] syscall_trace_enter+0xcf/0x1e0 [ 724.952870][T26442] do_syscall_64+0xaa/0x1a0 [ 724.952892][T26442] ? clear_bhb_loop+0x25/0x80 [ 724.952926][T26442] ? clear_bhb_loop+0x25/0x80 [ 724.953005][T26442] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 724.953027][T26442] RIP: 0033:0x7ff40a10e969 [ 724.953042][T26442] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 724.953084][T26442] RSP: 002b:00007ff408777038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c5 [ 724.953102][T26442] RAX: ffffffffffffffda RBX: 00007ff40a335fa0 RCX: 00007ff40a10e969 [ 724.953115][T26442] RDX: 0000000000000000 RSI: 00002000000004c0 RDI: 00002000000003c0 [ 724.953127][T26442] RBP: 00007ff408777090 R08: 0000000000000000 R09: 0000000000000000 [ 724.953139][T26442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 724.953151][T26442] R13: 0000000000000000 R14: 00007ff40a335fa0 R15: 00007ffffc264628 [ 724.953225][T26442] [ 725.252648][T26449] 9pnet_fd: Insufficient options for proto=fd [ 725.614808][T26462] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 725.672574][T26462] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 725.732794][T26462] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 725.753256][T26465] serio: Serial port ptm0 [ 725.792922][T26462] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 725.845474][T26462] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 725.857272][T26462] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 725.868546][T26462] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 725.879796][T26462] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 726.171916][T26476] pimreg: entered allmulticast mode [ 726.180209][T26476] pimreg: left allmulticast mode [ 726.251316][T26479] 9pnet_fd: Insufficient options for proto=fd [ 726.285545][T26483] 9pnet_fd: Insufficient options for proto=fd [ 726.302285][T26481] block device autoloading is deprecated and will be removed. [ 726.343125][T26494] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 726.357631][T26494] SELinux: failed to load policy [ 726.446879][T26507] FAULT_INJECTION: forcing a failure. [ 726.446879][T26507] name failslab, interval 1, probability 0, space 0, times 0 [ 726.459697][T26507] CPU: 1 UID: 0 PID: 26507 Comm: syz.7.8128 Not tainted 6.15.0-rc3-syzkaller-00283-gf1a3944c860b #0 PREEMPT(voluntary) [ 726.459725][T26507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 726.459738][T26507] Call Trace: [ 726.459746][T26507] [ 726.459755][T26507] __dump_stack+0x1d/0x30 [ 726.459780][T26507] dump_stack_lvl+0xe8/0x140 [ 726.459871][T26507] dump_stack+0x15/0x1b [ 726.459891][T26507] should_fail_ex+0x265/0x280 [ 726.459928][T26507] should_failslab+0x8c/0xb0 [ 726.459956][T26507] kmem_cache_alloc_node_noprof+0x57/0x320 [ 726.460061][T26507] ? __alloc_skb+0x101/0x320 [ 726.460091][T26507] __alloc_skb+0x101/0x320 [ 726.460147][T26507] netlink_alloc_large_skb+0xba/0xf0 [ 726.460235][T26507] netlink_sendmsg+0x3cf/0x6b0 [ 726.460269][T26507] ? __pfx_netlink_sendmsg+0x10/0x10 [ 726.460302][T26507] __sock_sendmsg+0x142/0x180 [ 726.460377][T26507] ____sys_sendmsg+0x31e/0x4e0 [ 726.460418][T26507] ___sys_sendmsg+0x17b/0x1d0 [ 726.460458][T26507] __x64_sys_sendmsg+0xd4/0x160 [ 726.460519][T26507] x64_sys_call+0x2999/0x2fb0 [ 726.460540][T26507] do_syscall_64+0xd0/0x1a0 [ 726.460561][T26507] ? clear_bhb_loop+0x25/0x80 [ 726.460584][T26507] ? clear_bhb_loop+0x25/0x80 [ 726.460747][T26507] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 726.460769][T26507] RIP: 0033:0x7ff40a10e969 [ 726.460787][T26507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 726.460805][T26507] RSP: 002b:00007ff408777038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 726.460823][T26507] RAX: ffffffffffffffda RBX: 00007ff40a335fa0 RCX: 00007ff40a10e969 [ 726.460862][T26507] RDX: 0000000004000894 RSI: 0000200000000300 RDI: 0000000000000004 [ 726.460877][T26507] RBP: 00007ff408777090 R08: 0000000000000000 R09: 0000000000000000 [ 726.460892][T26507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 726.460905][T26507] R13: 0000000000000000 R14: 00007ff40a335fa0 R15: 00007ffffc264628 [ 726.460924][T26507] [ 726.793042][T26526] 9pnet_fd: Insufficient options for proto=fd [ 726.813104][T26530] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 726.823019][T26530] SELinux: failed to load policy [ 726.916504][T26537] netdevsim netdevsim7 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 726.932856][T26539] FAULT_INJECTION: forcing a failure. [ 726.932856][T26539] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 726.946176][T26539] CPU: 0 UID: 0 PID: 26539 Comm: syz.0.8139 Not tainted 6.15.0-rc3-syzkaller-00283-gf1a3944c860b #0 PREEMPT(voluntary) [ 726.946297][T26539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 726.946313][T26539] Call Trace: [ 726.946321][T26539] [ 726.946386][T26539] __dump_stack+0x1d/0x30 [ 726.946467][T26539] dump_stack_lvl+0xe8/0x140 [ 726.946490][T26539] dump_stack+0x15/0x1b [ 726.946512][T26539] should_fail_ex+0x265/0x280 [ 726.946606][T26539] should_fail+0xb/0x20 [ 726.946640][T26539] should_fail_usercopy+0x1a/0x20 [ 726.946664][T26539] _copy_to_user+0x20/0xa0 [ 726.946691][T26539] simple_read_from_buffer+0xb5/0x130 [ 726.946719][T26539] proc_fail_nth_read+0x100/0x140 [ 726.946744][T26539] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 726.946867][T26539] vfs_read+0x19d/0x6f0 [ 726.946890][T26539] ? __rcu_read_unlock+0x4f/0x70 [ 726.946910][T26539] ? __fget_files+0x184/0x1c0 [ 726.946938][T26539] ksys_read+0xda/0x1a0 [ 726.946977][T26539] __x64_sys_read+0x40/0x50 [ 726.947002][T26539] x64_sys_call+0x2d77/0x2fb0 [ 726.947024][T26539] do_syscall_64+0xd0/0x1a0 [ 726.947051][T26539] ? clear_bhb_loop+0x25/0x80 [ 726.947138][T26539] ? clear_bhb_loop+0x25/0x80 [ 726.947158][T26539] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 726.947178][T26539] RIP: 0033:0x7f2e9e49d37c [ 726.947193][T26539] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 726.947220][T26539] RSP: 002b:00007f2e9cb07030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 726.947237][T26539] RAX: ffffffffffffffda RBX: 00007f2e9e6c5fa0 RCX: 00007f2e9e49d37c [ 726.947249][T26539] RDX: 000000000000000f RSI: 00007f2e9cb070a0 RDI: 0000000000000006 [ 726.947261][T26539] RBP: 00007f2e9cb07090 R08: 0000000000000000 R09: 0000000000000000 [ 726.947273][T26539] R10: 0000000000000066 R11: 0000000000000246 R12: 0000000000000001 [ 726.947288][T26539] R13: 0000000000000000 R14: 00007f2e9e6c5fa0 R15: 00007ffe078ba388 [ 726.947311][T26539] [ 727.155507][T26537] netdevsim netdevsim7 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 727.185405][T26545] SELinux: Context ÜãTEÆø#ó­FúpM†³€h¼bË q×}%*1°Ð‰¼V-vgžkX5žstvÑ#Q`IyX›ŸIm„cªý.®Ñ³K×Öp¨Œ‰Nªýyᆺëí!øÊ\„ËA~Ô±=ÇÇf C$`Ã9¡½ŽúHC^10/Èü`XML: 9ri¶%Ê<&M¿ë?] ܘ†á|á…]ÀD¯4çy¾g5:&ÎΉ^£™7bD!étö is not valid (left unmapped). [ 727.241268][T26537] netdevsim netdevsim7 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 727.301100][T26537] netdevsim netdevsim7 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 727.573140][T26571] 9pnet_fd: Insufficient options for proto=fd [ 727.718171][T26580] netlink: 'syz.3.8152': attribute type 39 has an invalid length. [ 727.958751][ T29] kauditd_printk_skb: 92 callbacks suppressed [ 727.958766][ T29] audit: type=1400 audit(1745935406.704:10326): avc: denied { ioctl } for pid=26577 comm="syz.0.8151" path="socket:[110681]" dev="sockfs" ino=110681 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 728.133948][T26593] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 728.187899][T26593] SELinux: failed to load policy [ 728.207346][ T29] audit: type=1326 audit(1745935406.954:10327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26596 comm="syz.6.8157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 728.231198][ T29] audit: type=1326 audit(1745935406.954:10328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26596 comm="syz.6.8157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 728.254789][ T29] audit: type=1326 audit(1745935406.954:10329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26596 comm="syz.6.8157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=258 compat=0 ip=0x7f7259e1d1d7 code=0x7ffc0000 [ 728.278449][ T29] audit: type=1326 audit(1745935406.954:10330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26596 comm="syz.6.8157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 728.302280][ T29] audit: type=1326 audit(1745935406.954:10331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26596 comm="syz.6.8157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 728.325978][ T29] audit: type=1326 audit(1745935406.954:10332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26596 comm="syz.6.8157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=4 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 728.349430][ T29] audit: type=1326 audit(1745935406.954:10333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26596 comm="syz.6.8157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 728.349551][ T29] audit: type=1326 audit(1745935406.954:10334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26596 comm="syz.6.8157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 728.349675][ T29] audit: type=1326 audit(1745935406.954:10335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26596 comm="syz.6.8157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 728.590737][T26620] FAULT_INJECTION: forcing a failure. [ 728.590737][T26620] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 728.603904][T26620] CPU: 0 UID: 0 PID: 26620 Comm: syz.0.8165 Not tainted 6.15.0-rc3-syzkaller-00283-gf1a3944c860b #0 PREEMPT(voluntary) [ 728.603935][T26620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 728.603951][T26620] Call Trace: [ 728.603959][T26620] [ 728.603969][T26620] __dump_stack+0x1d/0x30 [ 728.604053][T26620] dump_stack_lvl+0xe8/0x140 [ 728.604078][T26620] dump_stack+0x15/0x1b [ 728.604098][T26620] should_fail_ex+0x265/0x280 [ 728.604139][T26620] should_fail+0xb/0x20 [ 728.604259][T26620] should_fail_usercopy+0x1a/0x20 [ 728.604282][T26620] _copy_to_user+0x20/0xa0 [ 728.604368][T26620] simple_read_from_buffer+0xb5/0x130 [ 728.604397][T26620] proc_fail_nth_read+0x100/0x140 [ 728.604463][T26620] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 728.604493][T26620] vfs_read+0x19d/0x6f0 [ 728.604519][T26620] ? kmem_cache_free+0xdd/0x2f0 [ 728.604541][T26620] ? __rcu_read_unlock+0x4f/0x70 [ 728.604565][T26620] ? __fget_files+0x184/0x1c0 [ 728.604625][T26620] ksys_read+0xda/0x1a0 [ 728.604654][T26620] __x64_sys_read+0x40/0x50 [ 728.604682][T26620] x64_sys_call+0x2d77/0x2fb0 [ 728.604756][T26620] do_syscall_64+0xd0/0x1a0 [ 728.604784][T26620] ? clear_bhb_loop+0x25/0x80 [ 728.604810][T26620] ? clear_bhb_loop+0x25/0x80 [ 728.604838][T26620] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 728.604864][T26620] RIP: 0033:0x7f2e9e49d37c [ 728.604926][T26620] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 728.604946][T26620] RSP: 002b:00007f2e9cb07030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 728.604964][T26620] RAX: ffffffffffffffda RBX: 00007f2e9e6c5fa0 RCX: 00007f2e9e49d37c [ 728.604976][T26620] RDX: 000000000000000f RSI: 00007f2e9cb070a0 RDI: 0000000000000003 [ 728.605045][T26620] RBP: 00007f2e9cb07090 R08: 0000000000000000 R09: 0000000000000000 [ 728.605057][T26620] R10: 0000200000000240 R11: 0000000000000246 R12: 0000000000000001 [ 728.605117][T26620] R13: 0000000000000000 R14: 00007f2e9e6c5fa0 R15: 00007ffe078ba388 [ 728.605194][T26620] [ 728.884212][T26629] veth0: entered promiscuous mode [ 729.198697][T26537] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 729.221211][T26537] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 729.236426][T26537] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 729.240055][T26662] netlink: 'syz.3.8180': attribute type 4 has an invalid length. [ 729.248780][T26537] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 729.274221][T26662] netlink: 'syz.3.8180': attribute type 4 has an invalid length. [ 729.302335][T26671] FAULT_INJECTION: forcing a failure. [ 729.302335][T26671] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 729.315630][T26671] CPU: 1 UID: 0 PID: 26671 Comm: syz.6.8184 Not tainted 6.15.0-rc3-syzkaller-00283-gf1a3944c860b #0 PREEMPT(voluntary) [ 729.315697][T26671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 729.315714][T26671] Call Trace: [ 729.315721][T26671] [ 729.315730][T26671] __dump_stack+0x1d/0x30 [ 729.315754][T26671] dump_stack_lvl+0xe8/0x140 [ 729.315801][T26671] dump_stack+0x15/0x1b [ 729.315822][T26671] should_fail_ex+0x265/0x280 [ 729.315863][T26671] should_fail+0xb/0x20 [ 729.315977][T26671] should_fail_usercopy+0x1a/0x20 [ 729.316001][T26671] _copy_from_user+0x1c/0xb0 [ 729.316026][T26671] sk_ioctl+0x2b5/0x3c0 [ 729.316065][T26671] inet6_ioctl+0x13e/0x190 [ 729.316104][T26671] ? ioctl_has_perm+0x289/0x2e0 [ 729.316152][T26671] sock_do_ioctl+0x70/0x220 [ 729.316182][T26671] sock_ioctl+0x41b/0x610 [ 729.316313][T26671] ? __pfx_sock_ioctl+0x10/0x10 [ 729.316341][T26671] __se_sys_ioctl+0xcb/0x140 [ 729.316368][T26671] __x64_sys_ioctl+0x43/0x50 [ 729.316433][T26671] x64_sys_call+0x19a8/0x2fb0 [ 729.316454][T26671] do_syscall_64+0xd0/0x1a0 [ 729.316475][T26671] ? clear_bhb_loop+0x25/0x80 [ 729.316544][T26671] ? clear_bhb_loop+0x25/0x80 [ 729.316566][T26671] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 729.316587][T26671] RIP: 0033:0x7f7259e1e969 [ 729.316602][T26671] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 729.316626][T26671] RSP: 002b:00007f7258487038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 729.316645][T26671] RAX: ffffffffffffffda RBX: 00007f725a045fa0 RCX: 00007f7259e1e969 [ 729.316669][T26671] RDX: 00002000000002c0 RSI: 00000000000089e0 RDI: 0000000000000003 [ 729.316681][T26671] RBP: 00007f7258487090 R08: 0000000000000000 R09: 0000000000000000 [ 729.316693][T26671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 729.316705][T26671] R13: 0000000000000000 R14: 00007f725a045fa0 R15: 00007ffded44e588 [ 729.316725][T26671] [ 729.338826][T26676] __nla_validate_parse: 71 callbacks suppressed [ 729.338846][T26676] netlink: 1676 bytes leftover after parsing attributes in process `syz.5.8186'. [ 729.571412][T26686] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8190'. [ 729.602394][T26688] serio: Serial port ptm0 [ 729.621028][T26692] syz.7.8193(26692): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 729.720277][T26696] serio: Serial port ptm0 [ 729.788513][T26707] FAULT_INJECTION: forcing a failure. [ 729.788513][T26707] name failslab, interval 1, probability 0, space 0, times 0 [ 729.801315][T26707] CPU: 0 UID: 0 PID: 26707 Comm: syz.5.8198 Not tainted 6.15.0-rc3-syzkaller-00283-gf1a3944c860b #0 PREEMPT(voluntary) [ 729.801423][T26707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 729.801436][T26707] Call Trace: [ 729.801443][T26707] [ 729.801450][T26707] __dump_stack+0x1d/0x30 [ 729.801546][T26707] dump_stack_lvl+0xe8/0x140 [ 729.801570][T26707] dump_stack+0x15/0x1b [ 729.801662][T26707] should_fail_ex+0x265/0x280 [ 729.801701][T26707] should_failslab+0x8c/0xb0 [ 729.801784][T26707] __kvmalloc_node_noprof+0x126/0x4d0 [ 729.801863][T26707] ? vmemdup_user+0x26/0xd0 [ 729.801882][T26707] ? should_fail_usercopy+0x1a/0x20 [ 729.801908][T26707] vmemdup_user+0x26/0xd0 [ 729.801997][T26707] path_setxattrat+0x1b6/0x310 [ 729.802062][T26707] __x64_sys_lsetxattr+0x71/0x90 [ 729.802087][T26707] x64_sys_call+0x1e36/0x2fb0 [ 729.802117][T26707] do_syscall_64+0xd0/0x1a0 [ 729.802219][T26707] ? clear_bhb_loop+0x25/0x80 [ 729.802240][T26707] ? clear_bhb_loop+0x25/0x80 [ 729.802265][T26707] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 729.802292][T26707] RIP: 0033:0x7fb0e1e1e969 [ 729.802323][T26707] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 729.802358][T26707] RSP: 002b:00007fb0e0487038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 729.802454][T26707] RAX: ffffffffffffffda RBX: 00007fb0e2045fa0 RCX: 00007fb0e1e1e969 [ 729.802470][T26707] RDX: 0000200000000240 RSI: 0000200000000200 RDI: 00002000000001c0 [ 729.802485][T26707] RBP: 00007fb0e0487090 R08: 0000000000000001 R09: 0000000000000000 [ 729.802499][T26707] R10: 0000000000000020 R11: 0000000000000246 R12: 0000000000000001 [ 729.802511][T26707] R13: 0000000000000000 R14: 00007fb0e2045fa0 R15: 00007ffee4f86538 [ 729.802529][T26707] [ 730.003910][T26709] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8199'. [ 730.012994][T26709] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8199'. [ 730.025951][T26709] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8199'. [ 730.038259][T26717] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8202'. [ 730.066966][T26709] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8199'. [ 730.075969][T26709] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8199'. [ 730.090374][T26709] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8199'. [ 730.102857][T26723] serio: Serial port ptm0 [ 730.115946][T26709] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8199'. [ 730.225983][T26732] pimreg: entered allmulticast mode [ 730.233026][T26732] pimreg: left allmulticast mode [ 730.267570][T26735] unsupported nlmsg_type 40 [ 730.597236][T26762] serio: Serial port ptm1 [ 730.816514][T26777] netlink: 'syz.7.8221': attribute type 39 has an invalid length. [ 730.934690][T26785] netlink: 'syz.7.8225': attribute type 15 has an invalid length. [ 731.283282][T26806] netlink: 'syz.5.8232': attribute type 39 has an invalid length. [ 731.625249][T26829] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 731.637378][T26829] SELinux: failed to load policy [ 731.704994][T26837] netlink: 'syz.7.8244': attribute type 39 has an invalid length. [ 732.378230][T26853] FAULT_INJECTION: forcing a failure. [ 732.378230][T26853] name failslab, interval 1, probability 0, space 0, times 0 [ 732.391061][T26853] CPU: 0 UID: 0 PID: 26853 Comm: syz.3.8251 Not tainted 6.15.0-rc3-syzkaller-00283-gf1a3944c860b #0 PREEMPT(voluntary) [ 732.391090][T26853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 732.391106][T26853] Call Trace: [ 732.391114][T26853] [ 732.391145][T26853] __dump_stack+0x1d/0x30 [ 732.391166][T26853] dump_stack_lvl+0xe8/0x140 [ 732.391184][T26853] dump_stack+0x15/0x1b [ 732.391205][T26853] should_fail_ex+0x265/0x280 [ 732.391265][T26853] ? alloc_bprm+0x62/0x660 [ 732.391323][T26853] should_failslab+0x8c/0xb0 [ 732.391434][T26853] __kmalloc_cache_noprof+0x4c/0x320 [ 732.391460][T26853] alloc_bprm+0x62/0x660 [ 732.391480][T26853] ? should_fail+0xb/0x20 [ 732.391509][T26853] do_execveat_common+0x12e/0x750 [ 732.391611][T26853] ? getname_flags+0x154/0x3b0 [ 732.391647][T26853] __x64_sys_execveat+0x73/0x90 [ 732.391678][T26853] x64_sys_call+0x2dae/0x2fb0 [ 732.391714][T26853] do_syscall_64+0xd0/0x1a0 [ 732.391740][T26853] ? clear_bhb_loop+0x25/0x80 [ 732.391826][T26853] ? clear_bhb_loop+0x25/0x80 [ 732.391853][T26853] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 732.391933][T26853] RIP: 0033:0x7fd652bce969 [ 732.391949][T26853] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 732.391968][T26853] RSP: 002b:00007fd651237038 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 732.392013][T26853] RAX: ffffffffffffffda RBX: 00007fd652df5fa0 RCX: 00007fd652bce969 [ 732.392029][T26853] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000005 [ 732.392045][T26853] RBP: 00007fd651237090 R08: 0000000000001000 R09: 0000000000000000 [ 732.392061][T26853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 732.392075][T26853] R13: 0000000000000000 R14: 00007fd652df5fa0 R15: 00007ffda2616e38 [ 732.392094][T26853] [ 732.828969][T26859] serio: Serial port ptm0 [ 732.965105][ T29] kauditd_printk_skb: 212 callbacks suppressed [ 732.965200][ T29] audit: type=1326 audit(1745935411.704:10546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26868 comm="syz.6.8257" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 732.995100][ T29] audit: type=1326 audit(1745935411.704:10547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26868 comm="syz.6.8257" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 733.018844][ T29] audit: type=1326 audit(1745935411.704:10548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26868 comm="syz.6.8257" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 733.081939][ T29] audit: type=1326 audit(1745935411.794:10549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26868 comm="syz.6.8257" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 733.121917][ T3713] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 733.191968][ T3713] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 733.241341][ T3713] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 733.301855][ T3713] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 733.313000][T26862] chnl_net:caif_netlink_parms(): no params data found [ 733.349883][ T29] audit: type=1326 audit(1745935412.104:10550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26868 comm="syz.6.8257" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 733.373598][ T29] audit: type=1326 audit(1745935412.104:10551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26868 comm="syz.6.8257" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 733.436659][ T29] audit: type=1326 audit(1745935412.184:10552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26892 comm="syz.6.8260" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 733.465529][T26862] bridge0: port 1(bridge_slave_0) entered blocking state [ 733.473023][T26862] bridge0: port 1(bridge_slave_0) entered disabled state [ 733.498076][T26862] bridge_slave_0: entered allmulticast mode [ 733.508069][ T29] audit: type=1326 audit(1745935412.214:10553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26892 comm="syz.6.8260" exe="/root/syz-executor" sig=0 arch=c000003e syscall=317 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 733.530302][T26862] bridge_slave_0: entered promiscuous mode [ 733.531718][ T29] audit: type=1326 audit(1745935412.234:10554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26892 comm="syz.6.8260" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 733.561149][ T29] audit: type=1326 audit(1745935412.234:10555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26892 comm="syz.6.8260" exe="/root/syz-executor" sig=0 arch=c000003e syscall=196 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 733.731487][ T3713] bond0 (unregistering): Released all slaves [ 733.739787][T26862] bridge0: port 2(bridge_slave_1) entered blocking state [ 733.746867][T26862] bridge0: port 2(bridge_slave_1) entered disabled state [ 733.754372][T26862] bridge_slave_1: entered allmulticast mode [ 733.761045][T26862] bridge_slave_1: entered promiscuous mode [ 733.804664][T26862] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 733.843024][ T3713] hsr_slave_0: left promiscuous mode [ 733.849264][ T3713] hsr_slave_1: left promiscuous mode [ 733.857802][ T3713] veth1_macvtap: left promiscuous mode [ 733.863967][ T3713] veth0_macvtap: left promiscuous mode [ 733.871290][ T3713] veth1_vlan: left promiscuous mode [ 733.876576][ T3713] veth0_vlan: left promiscuous mode [ 734.303791][T26862] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 734.473737][T26919] netlink: 'syz.3.8269': attribute type 4 has an invalid length. [ 734.543129][T26922] netlink: 'syz.3.8269': attribute type 4 has an invalid length. [ 734.561768][T26862] team0: Port device team_slave_0 added [ 734.597842][T26862] team0: Port device team_slave_1 added [ 734.758739][T26862] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 734.765787][T26862] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 734.791773][T26862] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 734.810602][T26925] __nla_validate_parse: 36 callbacks suppressed [ 734.810616][T26925] netlink: 40 bytes leftover after parsing attributes in process `syz.7.8270'. [ 734.947800][T26862] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 734.954816][T26862] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 734.980806][T26862] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 735.265134][T26862] hsr_slave_0: entered promiscuous mode [ 735.277477][T26948] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 735.294289][T26862] hsr_slave_1: entered promiscuous mode [ 735.304452][T26862] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 735.315047][T26862] Cannot create hsr debugfs directory [ 735.322337][T26948] SELinux: failed to load policy [ 735.329319][T26948] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8279'. [ 735.338447][T26948] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8279'. [ 735.368660][T26948] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8279'. [ 735.414283][T26952] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8280'. [ 735.423330][T26952] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8280'. [ 735.457870][T26952] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8280'. [ 735.462752][T26948] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8279'. [ 735.475718][T26948] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8279'. [ 735.489816][T26948] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8279'. [ 735.718888][T26989] netlink: 'syz.5.8291': attribute type 4 has an invalid length. [ 736.113204][T26862] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 736.157463][T26862] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 736.207687][T26862] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 736.219535][T26995] netlink: 'syz.5.8293': attribute type 39 has an invalid length. [ 736.248500][T26862] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 736.573354][T26862] 8021q: adding VLAN 0 to HW filter on device bond0 [ 736.616551][T26862] 8021q: adding VLAN 0 to HW filter on device team0 [ 736.643794][ T3718] bridge0: port 1(bridge_slave_0) entered blocking state [ 736.651043][ T3718] bridge0: port 1(bridge_slave_0) entered forwarding state [ 736.717777][T26862] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 736.728211][T26862] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 736.764386][ T3718] bridge0: port 2(bridge_slave_1) entered blocking state [ 736.771530][ T3718] bridge0: port 2(bridge_slave_1) entered forwarding state [ 737.023537][T26862] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 737.119308][T26862] veth0_vlan: entered promiscuous mode [ 737.129812][T26862] veth1_vlan: entered promiscuous mode [ 737.147690][T26862] veth0_macvtap: entered promiscuous mode [ 737.156674][T26862] veth1_macvtap: entered promiscuous mode [ 737.167955][T26862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 737.178566][T26862] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 737.188469][T26862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 737.198950][T26862] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 737.208807][T26862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 737.219269][T26862] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 737.229141][T26862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 737.239575][T26862] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 737.249463][T26862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 737.259980][T26862] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 737.269902][T26862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 737.280331][T26862] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 737.290978][T26862] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 737.303966][T26862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 737.314484][T26862] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 737.324472][T26862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 737.335044][T26862] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 737.344906][T26862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 737.355434][T26862] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 737.365307][T26862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 737.375787][T26862] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 737.385622][T26862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 737.396072][T26862] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 737.405900][T26862] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 737.416379][T26862] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 737.427089][T26862] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 737.437919][T26862] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 737.446744][T26862] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 737.455553][T26862] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 737.464321][T26862] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 737.515115][T27039] 9pnet_fd: Insufficient options for proto=fd [ 737.595771][T27042] netlink: 'syz.0.8304': attribute type 4 has an invalid length. [ 737.606843][T27041] netlink: 'syz.0.8304': attribute type 4 has an invalid length. [ 737.847067][T27056] pimreg: entered allmulticast mode [ 737.853437][T27056] pimreg: left allmulticast mode [ 737.964104][T27048] chnl_net:caif_netlink_parms(): no params data found [ 737.997147][T27066] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 738.026690][T27048] bridge0: port 1(bridge_slave_0) entered blocking state [ 738.033900][T27048] bridge0: port 1(bridge_slave_0) entered disabled state [ 738.041264][T27048] bridge_slave_0: entered allmulticast mode [ 738.047749][T27048] bridge_slave_0: entered promiscuous mode [ 738.054664][ T3698] bridge_slave_1: left allmulticast mode [ 738.060496][ T3698] bridge_slave_1: left promiscuous mode [ 738.066289][ T3698] bridge0: port 2(bridge_slave_1) entered disabled state [ 738.074767][ T3698] bridge_slave_0: left allmulticast mode [ 738.080464][ T3698] bridge_slave_0: left promiscuous mode [ 738.086340][ T3698] bridge0: port 1(bridge_slave_0) entered disabled state [ 738.142150][ T3698] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 738.151872][ T3698] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 738.160962][ T3698] bond0 (unregistering): Released all slaves [ 738.169729][T27048] bridge0: port 2(bridge_slave_1) entered blocking state [ 738.176803][T27048] bridge0: port 2(bridge_slave_1) entered disabled state [ 738.184009][T27048] bridge_slave_1: entered allmulticast mode [ 738.190577][T27048] bridge_slave_1: entered promiscuous mode [ 738.204026][T27066] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 738.222799][T27048] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 738.233867][T27048] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 738.261785][T27066] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 738.275338][ T3698] hsr_slave_0: left promiscuous mode [ 738.281170][ T3698] hsr_slave_1: left promiscuous mode [ 738.286862][ T3698] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 738.294402][ T3698] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 738.325648][ T3698] team0 (unregistering): Port device team_slave_1 removed [ 738.335503][ T3698] team0 (unregistering): Port device team_slave_0 removed [ 738.366103][T27048] team0: Port device team_slave_0 added [ 738.372985][T27048] team0: Port device team_slave_1 added [ 738.391658][T27048] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 738.398711][T27048] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 738.424939][T27048] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 738.436395][T27048] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 738.443410][T27048] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 738.469391][T27048] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 738.496840][T27048] hsr_slave_0: entered promiscuous mode [ 738.502984][T27048] hsr_slave_1: entered promiscuous mode [ 738.508943][T27048] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 738.516832][T27048] Cannot create hsr debugfs directory [ 738.824246][T27048] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 738.833466][T27048] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 738.842556][T27048] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 738.851599][T27048] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 738.886678][T27048] 8021q: adding VLAN 0 to HW filter on device bond0 [ 738.898823][T27048] 8021q: adding VLAN 0 to HW filter on device team0 [ 738.908827][ T3697] bridge0: port 1(bridge_slave_0) entered blocking state [ 738.915925][ T3697] bridge0: port 1(bridge_slave_0) entered forwarding state [ 738.927384][ T3698] bridge0: port 2(bridge_slave_1) entered blocking state [ 738.934530][ T3698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 738.995168][T27048] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 739.089891][T27048] veth0_vlan: entered promiscuous mode [ 739.098000][T27048] veth1_vlan: entered promiscuous mode [ 739.114470][T27048] veth0_macvtap: entered promiscuous mode [ 739.121946][T27048] veth1_macvtap: entered promiscuous mode [ 739.133084][T27048] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 739.143694][T27048] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 739.153659][T27048] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 739.164213][T27048] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 739.174076][T27048] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 739.184532][T27048] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 739.194358][T27048] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 739.204836][T27048] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 739.214656][T27048] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 739.225153][T27048] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 739.234977][T27048] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 739.245524][T27048] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 739.255342][T27048] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 739.265759][T27048] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 739.276807][T27048] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 739.289456][T27048] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 739.300146][T27048] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 739.310041][T27048] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 739.320581][T27048] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 739.330517][T27048] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 739.341080][T27048] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 739.350992][T27048] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 739.361576][T27048] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 739.371457][T27048] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 739.381887][T27048] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 739.391723][T27048] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 739.402236][T27048] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 739.412169][T27048] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 739.422634][T27048] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 739.434598][T27048] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 739.446255][T27048] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 739.455039][T27048] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 739.463895][T27048] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 739.472635][T27048] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 739.597863][ T29] kauditd_printk_skb: 32 callbacks suppressed [ 739.597881][ T29] audit: type=1400 audit(1745935418.344:10588): avc: denied { mount } for pid=27099 comm="syz.3.8314" name="/" dev="ramfs" ino=111580 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 739.640819][ T29] audit: type=1400 audit(1745935418.394:10589): avc: denied { create } for pid=27099 comm="syz.3.8314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 739.674089][ T29] audit: type=1400 audit(1745935418.414:10590): avc: denied { ioctl } for pid=27099 comm="syz.3.8314" path="socket:[112934]" dev="sockfs" ino=112934 ioctlcmd=0x48d2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 739.700094][ T29] audit: type=1400 audit(1745935418.414:10591): avc: denied { bind } for pid=27099 comm="syz.3.8314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 739.800202][T27117] netlink: 'syz.5.8319': attribute type 4 has an invalid length. [ 739.825477][T27066] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 739.837502][T27116] netlink: 'syz.3.8320': attribute type 4 has an invalid length. [ 739.850183][T27116] netlink: 'syz.3.8320': attribute type 4 has an invalid length. [ 740.102751][T27141] __nla_validate_parse: 37 callbacks suppressed [ 740.102768][T27141] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8329'. [ 740.118145][T27141] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8329'. [ 740.118221][T27141] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8329'. [ 740.150657][ T29] audit: type=1400 audit(1745935418.904:10592): avc: denied { create } for pid=27142 comm="syz.7.8330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 740.172441][ T29] audit: type=1400 audit(1745935418.904:10593): avc: denied { connect } for pid=27142 comm="syz.7.8330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 740.206069][T27145] usb usb1: usbfs: process 27145 (syz.7.8330) did not claim interface 63 before use [ 740.250117][T27147] netlink: 'syz.6.8331': attribute type 39 has an invalid length. [ 740.261939][T27149] serio: Serial port ptm0 [ 740.291197][ T29] audit: type=1400 audit(1745935419.044:10594): avc: denied { write } for pid=27150 comm="syz.3.8333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 740.313454][T27151] IPv6: NLM_F_CREATE should be specified when creating new route [ 740.506545][T27162] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8337'. [ 740.515634][T27162] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8337'. [ 740.540863][ T29] audit: type=1326 audit(1745935419.294:10595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27163 comm="syz.6.8338" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 740.555272][T27162] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8337'. [ 740.582972][ T29] audit: type=1326 audit(1745935419.294:10596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27163 comm="syz.6.8338" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 740.606716][ T29] audit: type=1326 audit(1745935419.294:10597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27163 comm="syz.6.8338" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 740.641893][T27162] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8337'. [ 740.650888][T27162] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8337'. [ 740.663055][T27162] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8337'. [ 740.702116][T27162] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8337'. [ 740.885276][T27180] 9pnet_fd: Insufficient options for proto=fd [ 741.159951][T27066] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 741.172254][T27066] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 741.184051][T27066] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 741.196262][T27066] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 741.248607][T27202] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 741.258671][T27202] SELinux: failed to load policy [ 741.505388][T27208] pimreg: entered allmulticast mode [ 741.639025][T27208] pimreg: left allmulticast mode [ 741.719055][T27220] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 741.761745][T27220] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 741.801251][T27227] serio: Serial port ptm1 [ 741.810821][T27220] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 741.865462][T27220] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 742.207283][T27246] pimreg: entered allmulticast mode [ 742.223519][T27246] pimreg: left allmulticast mode [ 742.395209][T27269] serio: Serial port ptm0 [ 742.426921][T27271] 9pnet_fd: Insufficient options for proto=fd [ 742.480141][T27277] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 742.490151][T27277] SELinux: failed to load policy [ 742.690496][T27293] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 742.743017][T27293] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 742.801583][T27293] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 742.833052][T27312] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 742.855191][T27312] SELinux: failed to load policy [ 742.862154][T27293] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 742.879118][T27317] 9pnet_fd: Insufficient options for proto=fd [ 742.929461][T27293] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 742.941697][T27293] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 742.953388][T27293] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 742.973025][T27293] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 743.707472][T27372] FAULT_INJECTION: forcing a failure. [ 743.707472][T27372] name failslab, interval 1, probability 0, space 0, times 0 [ 743.720412][T27372] CPU: 0 UID: 0 PID: 27372 Comm: syz.5.8416 Not tainted 6.15.0-rc3-syzkaller-00283-gf1a3944c860b #0 PREEMPT(voluntary) [ 743.720441][T27372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 743.720453][T27372] Call Trace: [ 743.720461][T27372] [ 743.720471][T27372] __dump_stack+0x1d/0x30 [ 743.720509][T27372] dump_stack_lvl+0xe8/0x140 [ 743.720534][T27372] dump_stack+0x15/0x1b [ 743.720610][T27372] should_fail_ex+0x265/0x280 [ 743.720650][T27372] should_failslab+0x8c/0xb0 [ 743.720741][T27372] __kvmalloc_node_noprof+0x126/0x4d0 [ 743.720764][T27372] ? __se_sys_add_key+0x1e9/0x350 [ 743.720822][T27372] __se_sys_add_key+0x1e9/0x350 [ 743.720857][T27372] ? trace_reschedule_exit+0xd/0xc0 [ 743.720941][T27372] __x64_sys_add_key+0x67/0x80 [ 743.721009][T27372] x64_sys_call+0x1d0d/0x2fb0 [ 743.721106][T27372] do_syscall_64+0xd0/0x1a0 [ 743.721137][T27372] ? clear_bhb_loop+0x25/0x80 [ 743.721162][T27372] ? clear_bhb_loop+0x25/0x80 [ 743.721244][T27372] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 743.721264][T27372] RIP: 0033:0x7fde2453e969 [ 743.721281][T27372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 743.721353][T27372] RSP: 002b:00007fde22ba7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 743.721380][T27372] RAX: ffffffffffffffda RBX: 00007fde24765fa0 RCX: 00007fde2453e969 [ 743.721392][T27372] RDX: 0000200000000840 RSI: 0000000000000000 RDI: 00002000000001c0 [ 743.721404][T27372] RBP: 00007fde22ba7090 R08: fffffffffffffffc R09: 0000000000000000 [ 743.721480][T27372] R10: 000000000000000c R11: 0000000000000246 R12: 0000000000000001 [ 743.721491][T27372] R13: 0000000000000000 R14: 00007fde24765fa0 R15: 00007ffc39b8ded8 [ 743.721511][T27372] [ 744.767945][ T29] kauditd_printk_skb: 104 callbacks suppressed [ 744.767961][ T29] audit: type=1400 audit(1745935423.514:10702): avc: denied { read } for pid=27388 comm="syz.5.8423" name="rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 744.833846][T27386] netlink: 'syz.7.8422': attribute type 39 has an invalid length. [ 744.883846][ T29] audit: type=1400 audit(1745935423.554:10703): avc: denied { open } for pid=27388 comm="syz.5.8423" path="/dev/rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 744.907556][ T29] audit: type=1326 audit(1745935423.554:10704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27392 comm="syz.3.8424" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd652bce969 code=0x7ffc0000 [ 744.931194][ T29] audit: type=1326 audit(1745935423.554:10705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27392 comm="syz.3.8424" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd652bce969 code=0x7ffc0000 [ 744.954865][ T29] audit: type=1400 audit(1745935423.564:10706): avc: denied { ioctl } for pid=27388 comm="syz.5.8423" path="/dev/rtc0" dev="devtmpfs" ino=244 ioctlcmd=0x7010 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 744.980013][ T29] audit: type=1400 audit(1745935423.564:10707): avc: denied { append } for pid=27388 comm="syz.5.8423" name="ptp0" dev="devtmpfs" ino=246 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 745.003798][ T29] audit: type=1400 audit(1745935423.564:10708): avc: denied { mac_admin } for pid=27388 comm="syz.5.8423" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 745.025328][ T29] audit: type=1400 audit(1745935423.564:10709): avc: denied { relabelto } for pid=27388 comm="syz.5.8423" name="bus" dev="tmpfs" ino=221 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:textrel_shlib_t:s0" [ 745.052125][ T29] audit: type=1400 audit(1745935423.564:10710): avc: denied { associate } for pid=27388 comm="syz.5.8423" name="bus" dev="tmpfs" ino=221 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:textrel_shlib_t:s0" [ 745.079737][ T29] audit: type=1326 audit(1745935423.564:10711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27392 comm="syz.3.8424" exe="/root/syz-executor" sig=0 arch=c000003e syscall=113 compat=0 ip=0x7fd652bce969 code=0x7ffc0000 [ 745.160671][T27409] __nla_validate_parse: 53 callbacks suppressed [ 745.160691][T27409] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8431'. [ 745.176067][T27409] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8431'. [ 745.185399][T27409] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8431'. [ 745.202833][T27414] netlink: 24 bytes leftover after parsing attributes in process `syz.6.8433'. [ 745.233033][T27419] 9pnet_fd: Insufficient options for proto=fd [ 745.605386][T27428] 9pnet_fd: Insufficient options for proto=fd [ 745.697660][T27432] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1051 sclass=netlink_route_socket pid=27432 comm=syz.7.8440 [ 746.311606][T27440] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8442'. [ 746.338989][T27440] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 746.360390][T27432] binfmt_misc: register: failed to install interpreter file ./file2 [ 746.403819][T27440] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 746.425923][T27443] netlink: 8 bytes leftover after parsing attributes in process `syz.7.8443'. [ 746.437436][T27443] netdevsim netdevsim7 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 746.480930][T27440] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 746.532328][T27443] netdevsim netdevsim7 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 746.571550][T27440] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 746.584697][T27448] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8445'. [ 746.593651][T27448] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8445'. [ 746.602885][T27448] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8445'. [ 746.621417][T27443] netdevsim netdevsim7 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 746.702893][T27443] netdevsim netdevsim7 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 746.768481][T27443] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 746.783109][T27443] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 746.810976][T27454] netlink: 24 bytes leftover after parsing attributes in process `syz.5.8447'. [ 746.823953][T27443] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 746.845393][T27443] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 747.112494][T27479] IPv6: NLM_F_CREATE should be specified when creating new route [ 749.182147][T27510] sch_tbf: peakrate 8 is lower than or equals to rate 12 ! [ 749.201314][T27510] netlink: 'syz.6.8467': attribute type 1 has an invalid length. [ 749.209093][T27510] netlink: 'syz.6.8467': attribute type 2 has an invalid length. [ 749.227441][T27511] netlink: 'syz.7.8468': attribute type 4 has an invalid length. [ 749.271862][T27509] netlink: 'syz.7.8468': attribute type 4 has an invalid length. [ 749.407527][T27220] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 749.426028][T27220] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 749.441321][T27515] FAULT_INJECTION: forcing a failure. [ 749.441321][T27515] name failslab, interval 1, probability 0, space 0, times 0 [ 749.454445][T27515] CPU: 0 UID: 0 PID: 27515 Comm: syz.7.8469 Not tainted 6.15.0-rc3-syzkaller-00283-gf1a3944c860b #0 PREEMPT(voluntary) [ 749.454553][T27515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 749.454566][T27515] Call Trace: [ 749.454573][T27515] [ 749.454582][T27515] __dump_stack+0x1d/0x30 [ 749.454609][T27515] dump_stack_lvl+0xe8/0x140 [ 749.454634][T27515] dump_stack+0x15/0x1b [ 749.454653][T27515] should_fail_ex+0x265/0x280 [ 749.454691][T27515] should_failslab+0x8c/0xb0 [ 749.454725][T27515] kmem_cache_alloc_node_noprof+0x57/0x320 [ 749.454769][T27515] ? __alloc_skb+0x101/0x320 [ 749.454826][T27515] __alloc_skb+0x101/0x320 [ 749.454865][T27515] netlink_alloc_large_skb+0xba/0xf0 [ 749.454901][T27515] netlink_sendmsg+0x3cf/0x6b0 [ 749.454990][T27515] ? __pfx_netlink_sendmsg+0x10/0x10 [ 749.455026][T27515] __sock_sendmsg+0x142/0x180 [ 749.455055][T27515] ____sys_sendmsg+0x31e/0x4e0 [ 749.455090][T27515] ___sys_sendmsg+0x17b/0x1d0 [ 749.455149][T27515] __x64_sys_sendmsg+0xd4/0x160 [ 749.455178][T27515] x64_sys_call+0x2999/0x2fb0 [ 749.455220][T27515] do_syscall_64+0xd0/0x1a0 [ 749.455289][T27515] ? clear_bhb_loop+0x25/0x80 [ 749.455323][T27515] ? clear_bhb_loop+0x25/0x80 [ 749.455351][T27515] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 749.455377][T27515] RIP: 0033:0x7ff40a10e969 [ 749.455456][T27515] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 749.455477][T27515] RSP: 002b:00007ff408777038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 749.455501][T27515] RAX: ffffffffffffffda RBX: 00007ff40a335fa0 RCX: 00007ff40a10e969 [ 749.455525][T27515] RDX: 0000000004000054 RSI: 0000200000000480 RDI: 0000000000000005 [ 749.455537][T27515] RBP: 00007ff408777090 R08: 0000000000000000 R09: 0000000000000000 [ 749.455548][T27515] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 749.455560][T27515] R13: 0000000000000000 R14: 00007ff40a335fa0 R15: 00007ffffc264628 [ 749.455579][T27515] [ 749.729218][T27220] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 749.769049][T27220] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 749.849621][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 749.849637][ T29] audit: type=1400 audit(1745935428.594:10736): avc: denied { bind } for pid=27521 comm="syz.0.8472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 749.915027][T27522] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 749.930996][ T29] audit: type=1400 audit(1745935428.664:10737): avc: denied { setopt } for pid=27521 comm="syz.0.8472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 749.986343][T27522] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 749.999951][T27528] serio: Serial port ptm0 [ 750.063354][T27522] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 750.159674][T27522] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 750.177886][T27544] __nla_validate_parse: 13 callbacks suppressed [ 750.177904][T27544] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8481'. [ 750.193180][T27544] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8481'. [ 750.204163][T27544] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8481'. [ 750.227135][ T29] audit: type=1326 audit(1745935428.974:10738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27549 comm="syz.7.8483" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff40a10e969 code=0x7ffc0000 [ 750.227191][T27544] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8481'. [ 750.250829][ T29] audit: type=1326 audit(1745935428.974:10739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27549 comm="syz.7.8483" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff40a10e969 code=0x7ffc0000 [ 750.250883][ T29] audit: type=1326 audit(1745935428.974:10740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27549 comm="syz.7.8483" exe="/root/syz-executor" sig=0 arch=c000003e syscall=113 compat=0 ip=0x7ff40a10e969 code=0x7ffc0000 [ 750.259854][T27544] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8481'. [ 750.283526][ T29] audit: type=1326 audit(1745935428.974:10741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27549 comm="syz.7.8483" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff40a10e969 code=0x7ffc0000 [ 750.340957][T27544] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8481'. [ 750.341516][T27554] serio: Serial port ptm0 [ 750.369349][T27544] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8481'. [ 750.378421][T27544] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8481'. [ 750.387476][T27544] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8481'. [ 750.419040][ T29] audit: type=1400 audit(1745935429.164:10742): avc: denied { write } for pid=27558 comm="syz.7.8486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 750.455251][T27561] netlink: 'syz.5.8487': attribute type 39 has an invalid length. [ 751.312155][T27569] netlink: 24 bytes leftover after parsing attributes in process `syz.7.8489'. [ 751.545327][T27440] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 751.558704][T27440] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 751.582981][T27440] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 751.601562][T27440] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 751.651845][T27587] FAULT_INJECTION: forcing a failure. [ 751.651845][T27587] name failslab, interval 1, probability 0, space 0, times 0 [ 751.664586][T27587] CPU: 0 UID: 0 PID: 27587 Comm: syz.3.8495 Not tainted 6.15.0-rc3-syzkaller-00283-gf1a3944c860b #0 PREEMPT(voluntary) [ 751.664615][T27587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 751.664665][T27587] Call Trace: [ 751.664674][T27587] [ 751.664684][T27587] __dump_stack+0x1d/0x30 [ 751.664711][T27587] dump_stack_lvl+0xe8/0x140 [ 751.664732][T27587] dump_stack+0x15/0x1b [ 751.664747][T27587] should_fail_ex+0x265/0x280 [ 751.664855][T27587] should_failslab+0x8c/0xb0 [ 751.664962][T27587] kmem_cache_alloc_noprof+0x50/0x310 [ 751.664994][T27587] ? prepare_creds+0x37/0x4c0 [ 751.665019][T27587] prepare_creds+0x37/0x4c0 [ 751.665050][T27587] lookup_user_key+0x263/0xd10 [ 751.665079][T27587] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 751.665108][T27587] keyctl_session_to_parent+0x28/0x4b0 [ 751.665209][T27587] ? proc_fail_nth_write+0x12d/0x160 [ 751.665243][T27587] __se_sys_keyctl+0x44a/0xb80 [ 751.665266][T27587] ? __rcu_read_unlock+0x4f/0x70 [ 751.665320][T27587] ? __fget_files+0x184/0x1c0 [ 751.665355][T27587] ? fput+0x8f/0xc0 [ 751.665396][T27587] ? arch_syscall_is_vdso_sigreturn+0xc6/0x110 [ 751.665422][T27587] __x64_sys_keyctl+0x67/0x80 [ 751.665453][T27587] x64_sys_call+0x2e7f/0x2fb0 [ 751.665474][T27587] do_syscall_64+0xd0/0x1a0 [ 751.665567][T27587] ? clear_bhb_loop+0x25/0x80 [ 751.665594][T27587] ? clear_bhb_loop+0x25/0x80 [ 751.665620][T27587] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 751.665644][T27587] RIP: 0033:0x7fd652bce969 [ 751.665658][T27587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 751.665758][T27587] RSP: 002b:00007fd651237038 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 751.665776][T27587] RAX: ffffffffffffffda RBX: 00007fd652df5fa0 RCX: 00007fd652bce969 [ 751.665788][T27587] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000012 [ 751.665799][T27587] RBP: 00007fd651237090 R08: 0000000000000000 R09: 0000000000000000 [ 751.665812][T27587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 751.665863][T27587] R13: 0000000000000000 R14: 00007fd652df5fa0 R15: 00007ffda2616e38 [ 751.665957][T27587] [ 751.982475][ T29] audit: type=1326 audit(1745935430.734:10743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27595 comm="syz.7.8499" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff40a10e969 code=0x7ffc0000 [ 752.049012][ T29] audit: type=1326 audit(1745935430.764:10744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27595 comm="syz.7.8499" exe="/root/syz-executor" sig=0 arch=c000003e syscall=113 compat=0 ip=0x7ff40a10e969 code=0x7ffc0000 [ 752.072769][ T29] audit: type=1326 audit(1745935430.764:10745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27595 comm="syz.7.8499" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff40a10e969 code=0x7ffc0000 [ 752.120215][T27603] pimreg: entered allmulticast mode [ 752.126809][T27603] pimreg: left allmulticast mode [ 752.234999][T27613] netlink: 'syz.7.8506': attribute type 39 has an invalid length. [ 752.260764][T27620] FAULT_INJECTION: forcing a failure. [ 752.260764][T27620] name failslab, interval 1, probability 0, space 0, times 0 [ 752.273514][T27620] CPU: 1 UID: 0 PID: 27620 Comm: syz.7.8509 Not tainted 6.15.0-rc3-syzkaller-00283-gf1a3944c860b #0 PREEMPT(voluntary) [ 752.273612][T27620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 752.273624][T27620] Call Trace: [ 752.273700][T27620] [ 752.273708][T27620] __dump_stack+0x1d/0x30 [ 752.273729][T27620] dump_stack_lvl+0xe8/0x140 [ 752.273769][T27620] dump_stack+0x15/0x1b [ 752.273790][T27620] should_fail_ex+0x265/0x280 [ 752.273880][T27620] should_failslab+0x8c/0xb0 [ 752.273915][T27620] kmem_cache_alloc_node_noprof+0x57/0x320 [ 752.273974][T27620] ? __alloc_skb+0x101/0x320 [ 752.274010][T27620] __alloc_skb+0x101/0x320 [ 752.274036][T27620] ? audit_log_start+0x365/0x6c0 [ 752.274069][T27620] audit_log_start+0x380/0x6c0 [ 752.274155][T27620] audit_seccomp+0x48/0x100 [ 752.274181][T27620] ? __seccomp_filter+0x68c/0x10d0 [ 752.274200][T27620] __seccomp_filter+0x69d/0x10d0 [ 752.274221][T27620] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 752.274292][T27620] ? vfs_write+0x75e/0x8d0 [ 752.274331][T27620] ? __rcu_read_unlock+0x4f/0x70 [ 752.274410][T27620] ? __fget_files+0x184/0x1c0 [ 752.274445][T27620] __secure_computing+0x82/0x150 [ 752.274471][T27620] syscall_trace_enter+0xcf/0x1e0 [ 752.274521][T27620] do_syscall_64+0xaa/0x1a0 [ 752.274579][T27620] ? clear_bhb_loop+0x25/0x80 [ 752.274652][T27620] ? clear_bhb_loop+0x25/0x80 [ 752.274677][T27620] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 752.274751][T27620] RIP: 0033:0x7ff40a10e969 [ 752.274767][T27620] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 752.274784][T27620] RSP: 002b:00007ff408777038 EFLAGS: 00000246 ORIG_RAX: 000000000000009a [ 752.274808][T27620] RAX: ffffffffffffffda RBX: 00007ff40a335fa0 RCX: 00007ff40a10e969 [ 752.274823][T27620] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 752.274839][T27620] RBP: 00007ff408777090 R08: 0000000000000000 R09: 0000000000000000 [ 752.274931][T27620] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 752.274946][T27620] R13: 0000000000000000 R14: 00007ff40a335fa0 R15: 00007ffffc264628 [ 752.274997][T27620] [ 752.507733][T27620] bridge0: port 2(bridge_slave_1) entered disabled state [ 752.515046][T27620] bridge0: port 1(bridge_slave_0) entered disabled state [ 752.523747][T27620] bridge0: entered allmulticast mode [ 752.606081][T27628] IPv6: NLM_F_CREATE should be specified when creating new route [ 752.759792][T27637] bridge0: port 2(bridge_slave_1) entered disabled state [ 752.767077][T27637] bridge0: port 1(bridge_slave_0) entered disabled state [ 752.774434][T27637] bridge0: entered allmulticast mode [ 752.919814][T27654] netlink: 'syz.6.8522': attribute type 4 has an invalid length. [ 752.931477][T27654] netlink: 'syz.6.8522': attribute type 4 has an invalid length. [ 752.993830][T27662] serio: Serial port ptm1 [ 753.069085][T27668] FAULT_INJECTION: forcing a failure. [ 753.069085][T27668] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 753.082332][T27668] CPU: 1 UID: 0 PID: 27668 Comm: syz.5.8528 Not tainted 6.15.0-rc3-syzkaller-00283-gf1a3944c860b #0 PREEMPT(voluntary) [ 753.082412][T27668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 753.082475][T27668] Call Trace: [ 753.082483][T27668] [ 753.082497][T27668] __dump_stack+0x1d/0x30 [ 753.082523][T27668] dump_stack_lvl+0xe8/0x140 [ 753.082547][T27668] dump_stack+0x15/0x1b [ 753.082567][T27668] should_fail_ex+0x265/0x280 [ 753.082607][T27668] should_fail+0xb/0x20 [ 753.082668][T27668] should_fail_usercopy+0x1a/0x20 [ 753.082755][T27668] _copy_from_user+0x1c/0xb0 [ 753.082852][T27668] sctp_setsockopt+0x154/0xe30 [ 753.082891][T27668] sock_common_setsockopt+0x66/0x80 [ 753.082921][T27668] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 753.082954][T27668] __sys_setsockopt+0x181/0x200 [ 753.082994][T27668] __x64_sys_setsockopt+0x64/0x80 [ 753.083024][T27668] x64_sys_call+0x2bd5/0x2fb0 [ 753.083043][T27668] do_syscall_64+0xd0/0x1a0 [ 753.083068][T27668] ? clear_bhb_loop+0x25/0x80 [ 753.083105][T27668] ? clear_bhb_loop+0x25/0x80 [ 753.083131][T27668] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 753.083156][T27668] RIP: 0033:0x7fde2453e969 [ 753.083173][T27668] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 753.083257][T27668] RSP: 002b:00007fde22ba7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 753.083276][T27668] RAX: ffffffffffffffda RBX: 00007fde24765fa0 RCX: 00007fde2453e969 [ 753.083292][T27668] RDX: 0000000000000017 RSI: 0000000000000084 RDI: 0000000000000003 [ 753.083307][T27668] RBP: 00007fde22ba7090 R08: 0000000000000009 R09: 0000000000000000 [ 753.083319][T27668] R10: 0000200000000440 R11: 0000000000000246 R12: 0000000000000001 [ 753.083334][T27668] R13: 0000000000000000 R14: 00007fde24765fa0 R15: 00007ffc39b8ded8 [ 753.083357][T27668] [ 753.444900][T27692] netlink: 'syz.3.8536': attribute type 4 has an invalid length. [ 753.465010][T27694] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 753.473023][T27692] netlink: 'syz.3.8536': attribute type 4 has an invalid length. [ 753.474864][T27694] SELinux: failed to load policy [ 753.529357][T27699] serio: Serial port ptm0 [ 753.583851][T27705] netlink: 'syz.3.8540': attribute type 39 has an invalid length. [ 754.022465][T27732] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 754.088972][T27732] SELinux: failed to load policy [ 755.104686][T27741] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1051 sclass=netlink_route_socket pid=27741 comm=syz.6.8551 [ 755.744782][ T29] kauditd_printk_skb: 151 callbacks suppressed [ 755.744800][ T29] audit: type=1326 audit(1745935434.494:10895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27743 comm="syz.5.8553" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde2453e969 code=0x7ffc0000 [ 755.971601][ T29] audit: type=1326 audit(1745935434.704:10896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27743 comm="syz.5.8553" exe="/root/syz-executor" sig=0 arch=c000003e syscall=149 compat=0 ip=0x7fde2453e969 code=0x7ffc0000 [ 756.075302][ T29] audit: type=1326 audit(1745935434.824:10897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27743 comm="syz.5.8553" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde2453e969 code=0x7ffc0000 [ 756.099197][ T29] audit: type=1326 audit(1745935434.824:10898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27743 comm="syz.5.8553" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde2453e969 code=0x7ffc0000 [ 756.139329][T27748] __nla_validate_parse: 49 callbacks suppressed [ 756.139346][T27748] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8552'. [ 756.247824][ T29] audit: type=1326 audit(1745935434.914:10899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27743 comm="syz.5.8553" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fde2453e969 code=0x7ffc0000 [ 756.271736][ T29] audit: type=1326 audit(1745935434.914:10900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27743 comm="syz.5.8553" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde2453e969 code=0x7ffc0000 [ 756.295456][ T29] audit: type=1326 audit(1745935434.914:10901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27743 comm="syz.5.8553" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde2453e969 code=0x7ffc0000 [ 756.429829][T27755] netlink: 'syz.5.8555': attribute type 39 has an invalid length. [ 756.467101][T27522] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 756.519066][T27522] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 756.535759][T27761] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8559'. [ 756.544724][T27761] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8559'. [ 756.569283][T27522] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 756.587194][T27522] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 756.631654][T27761] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8559'. [ 756.736480][ T29] audit: type=1400 audit(1745935435.484:10902): avc: denied { create } for pid=27762 comm="syz.5.8560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 756.743189][T27771] netlink: 'syz.3.8563': attribute type 4 has an invalid length. [ 756.756301][ T29] audit: type=1400 audit(1745935435.484:10903): avc: denied { listen } for pid=27762 comm="syz.5.8560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 756.777844][T27771] netlink: 'syz.3.8563': attribute type 4 has an invalid length. [ 756.806713][T27774] netlink: 24 bytes leftover after parsing attributes in process `syz.0.8564'. [ 756.838682][T27776] serio: Serial port ptm0 [ 756.856460][ T29] audit: type=1326 audit(1745935435.604:10904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27778 comm="syz.3.8567" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd652bce969 code=0x7ffc0000 [ 756.896919][T27780] bridge0: port 3(team0) entered disabled state [ 756.903388][T27780] bridge0: port 2(bridge_slave_1) entered disabled state [ 756.910609][T27780] bridge0: port 1(bridge_slave_0) entered disabled state [ 756.920016][T27780] bridge0: entered allmulticast mode [ 756.987854][T27789] netlink: 'syz.3.8571': attribute type 39 has an invalid length. [ 757.402915][T27797] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8573'. [ 757.411874][T27797] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8573'. [ 757.462348][T27797] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8573'. [ 758.189644][T27815] serio: Serial port ptm0 [ 758.315225][T27802] bridge0: port 2(bridge_slave_1) entered disabled state [ 758.322573][T27802] bridge0: port 1(bridge_slave_0) entered disabled state [ 758.377893][T27802] bridge0: entered allmulticast mode [ 758.445107][T27827] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8583'. [ 758.446652][T27827] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 758.511206][T27827] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 758.571412][T27827] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 758.626908][T27836] serio: Serial port ptm0 [ 758.633212][T27827] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 758.701604][T27827] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 758.718279][T27827] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 758.730494][T27827] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 758.744162][T27827] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 759.184635][T27848] usb usb1: usbfs: process 27848 (syz.0.8591) did not claim interface 63 before use [ 759.327909][T27852] serio: Serial port ptm0 [ 759.504834][T27860] IPv6: NLM_F_CREATE should be specified when creating new route [ 759.636214][T27867] usb usb1: usbfs: process 27867 (syz.5.8599) did not claim interface 63 before use [ 759.710554][T27870] netlink: 'syz.5.8600': attribute type 1 has an invalid length. [ 759.746737][T27870] 8021q: adding VLAN 0 to HW filter on device bond1 [ 759.793890][T27873] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8600'. [ 759.805585][T27873] bond1 (unregistering): Released all slaves [ 759.939008][T27882] pimreg: entered allmulticast mode [ 759.947428][T27882] pimreg: left allmulticast mode [ 760.095030][T27890] serio: Serial port ptm0 [ 761.166647][T27899] netlink: 24 bytes leftover after parsing attributes in process `syz.6.8611'. [ 761.223835][ T29] kauditd_printk_skb: 111 callbacks suppressed [ 761.223854][ T29] audit: type=1400 audit(1745935439.974:11016): avc: denied { remount } for pid=27896 comm="syz.7.8610" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 761.482996][T27903] netlink: 16 bytes leftover after parsing attributes in process `syz.5.8612'. [ 761.508693][T27901] tmpfs: Unknown parameter '.ÇTÇ­C' [ 761.535294][T27907] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8613'. [ 761.544400][T27907] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8613'. [ 761.604486][T27907] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8613'. [ 761.748410][ T29] audit: type=1400 audit(1745935440.494:11017): avc: denied { read write } for pid=27921 comm="syz.6.8620" name="rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 761.774166][T27923] FAULT_INJECTION: forcing a failure. [ 761.774166][T27923] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 761.787407][T27923] CPU: 0 UID: 0 PID: 27923 Comm: syz.6.8620 Not tainted 6.15.0-rc3-syzkaller-00283-gf1a3944c860b #0 PREEMPT(voluntary) [ 761.787503][T27923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 761.787519][T27923] Call Trace: [ 761.787526][T27923] [ 761.787536][T27923] __dump_stack+0x1d/0x30 [ 761.787562][T27923] dump_stack_lvl+0xe8/0x140 [ 761.787597][T27923] dump_stack+0x15/0x1b [ 761.787617][T27923] should_fail_ex+0x265/0x280 [ 761.787654][T27923] should_fail+0xb/0x20 [ 761.787711][T27923] should_fail_usercopy+0x1a/0x20 [ 761.787734][T27923] _copy_from_user+0x1c/0xb0 [ 761.787756][T27923] ucma_bind_ip+0x4c/0x290 [ 761.787805][T27923] ucma_write+0x1b0/0x250 [ 761.787826][T27923] ? __pfx_ucma_write+0x10/0x10 [ 761.787873][T27923] vfs_write+0x266/0x8d0 [ 761.787904][T27923] ? __rcu_read_unlock+0x4f/0x70 [ 761.787926][T27923] ? __fget_files+0x184/0x1c0 [ 761.787960][T27923] ksys_write+0xda/0x1a0 [ 761.788027][T27923] __x64_sys_write+0x40/0x50 [ 761.788055][T27923] x64_sys_call+0x2cdd/0x2fb0 [ 761.788075][T27923] do_syscall_64+0xd0/0x1a0 [ 761.788096][T27923] ? clear_bhb_loop+0x25/0x80 [ 761.788123][T27923] ? clear_bhb_loop+0x25/0x80 [ 761.788161][T27923] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 761.788186][T27923] RIP: 0033:0x7f7259e1e969 [ 761.788236][T27923] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 761.788258][T27923] RSP: 002b:00007f7258487038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 761.788279][T27923] RAX: ffffffffffffffda RBX: 00007f725a045fa0 RCX: 00007f7259e1e969 [ 761.788291][T27923] RDX: 0000000000000030 RSI: 0000200000000340 RDI: 0000000000000003 [ 761.788303][T27923] RBP: 00007f7258487090 R08: 0000000000000000 R09: 0000000000000000 [ 761.788360][T27923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 761.788374][T27923] R13: 0000000000000000 R14: 00007f725a045fa0 R15: 00007ffded44e588 [ 761.788399][T27923] [ 761.999557][ T29] audit: type=1400 audit(1745935440.524:11018): avc: denied { open } for pid=27921 comm="syz.6.8620" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 762.237889][T27933] serio: Serial port ptm0 [ 762.364449][T27937] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8624'. [ 762.373454][T27937] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8624'. [ 762.385383][T27937] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8624'. [ 762.440313][T27941] serio: Serial port ptm0 [ 762.462890][T27937] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8624'. [ 762.471944][T27937] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8624'. [ 762.616342][T27949] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1051 sclass=netlink_route_socket pid=27949 comm=syz.7.8628 [ 763.003771][T27949] binfmt_misc: register: failed to install interpreter file ./file2 [ 763.168834][T27959] netlink: 'syz.7.8630': attribute type 4 has an invalid length. [ 763.181380][T27959] netlink: 'syz.7.8630': attribute type 4 has an invalid length. [ 763.294242][T27961] netlink: 'syz.7.8631': attribute type 4 has an invalid length. [ 763.314217][T27961] netlink: 'syz.7.8631': attribute type 4 has an invalid length. [ 763.324809][T27963] netlink: 'syz.0.8632': attribute type 4 has an invalid length. [ 763.359002][T27963] netlink: 'syz.0.8632': attribute type 4 has an invalid length. [ 763.370654][T27965] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 763.383854][T27965] SELinux: failed to load policy [ 763.435003][T27969] pimreg: entered allmulticast mode [ 763.458871][T27969] pimreg: left allmulticast mode [ 763.665443][T27981] netlink: 'syz.6.8639': attribute type 39 has an invalid length. [ 763.707924][T27983] 9pnet_fd: Insufficient options for proto=fd [ 763.759677][T27991] pimreg: entered allmulticast mode [ 763.776410][T27991] pimreg: left allmulticast mode [ 763.844861][T28001] serio: Serial port ptm0 [ 763.859270][T28004] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 763.922219][T28004] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 764.222108][T28004] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 764.281809][T28004] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 764.384153][T28004] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 764.424639][T28004] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 764.463193][T28004] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 764.478366][T28021] sch_tbf: peakrate 8 is lower than or equals to rate 12 ! [ 764.495001][T28004] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 764.506225][T28021] netlink: 'syz.0.8652': attribute type 1 has an invalid length. [ 764.514349][T28021] netlink: 'syz.0.8652': attribute type 2 has an invalid length. [ 764.987383][ T29] audit: type=1400 audit(1745935443.734:11019): avc: denied { read } for pid=28036 comm="syz.5.8658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 765.104913][T28042] pimreg: entered allmulticast mode [ 765.130449][T28042] pimreg: left allmulticast mode [ 765.151435][T28045] program syz.6.8660 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 765.259027][T28049] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 765.299436][ T29] audit: type=1400 audit(1745935444.044:11020): avc: denied { read } for pid=28050 comm="wg1" name="loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 765.323561][ T29] audit: type=1400 audit(1745935444.044:11021): avc: denied { open } for pid=28050 comm="wg1" path="/dev/loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 765.359877][T28049] SELinux: failed to load policy [ 765.451694][T28059] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 765.478938][ T29] audit: type=1400 audit(1745935444.104:11022): avc: denied { ioctl } for pid=28050 comm="wg1" path="/dev/loop-control" dev="devtmpfs" ino=99 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 765.504901][ T29] audit: type=1400 audit(1745935444.154:11023): avc: denied { bind } for pid=28050 comm="wg1" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 765.524967][ T29] audit: type=1400 audit(1745935444.154:11024): avc: denied { name_bind } for pid=28050 comm="wg1" src=128 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 765.545328][ T29] audit: type=1400 audit(1745935444.154:11025): avc: denied { node_bind } for pid=28050 comm="wg1" saddr=fe80::bb src=128 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 765.624718][T28066] serio: Serial port ptm0 [ 765.630978][T28059] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 765.682681][T28059] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 765.740936][T28059] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 765.806553][T28059] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 765.823387][T28085] pimreg: entered allmulticast mode [ 765.834836][T28059] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 765.844456][T28085] pimreg: left allmulticast mode [ 765.859746][T28059] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 765.875685][T28059] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 765.916877][T28093] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 765.927076][T28093] SELinux: failed to load policy [ 765.964072][T28090] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28090 comm=syz.6.8675 [ 766.416668][T28113] atomic_op ffff88811c69b528 conn xmit_atomic 0000000000000000 [ 766.432708][T28112] serio: Serial port ptm0 [ 766.637163][T28118] __nla_validate_parse: 58 callbacks suppressed [ 766.637177][T28118] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8682'. [ 766.652501][T28118] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8682'. [ 766.895716][T28118] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8682'. [ 766.982857][T28118] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8682'. [ 766.991871][T28118] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8682'. [ 767.035837][T28118] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8682'. [ 767.106740][T28135] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 767.136813][T28118] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8682'. [ 767.145813][T28118] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8682'. [ 767.156739][T28135] SELinux: failed to load policy [ 767.176291][T28135] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8689'. [ 767.185258][T28135] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8689'. [ 767.296378][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 767.296397][ T29] audit: type=1326 audit(1745935446.044:11037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28147 comm="syz.3.8691" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd652bce969 code=0x7ffc0000 [ 767.326264][ T29] audit: type=1326 audit(1745935446.044:11038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28147 comm="syz.3.8691" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd652bce969 code=0x7ffc0000 [ 767.349950][ T29] audit: type=1326 audit(1745935446.044:11039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28147 comm="syz.3.8691" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd652bce969 code=0x7ffc0000 [ 767.373584][ T29] audit: type=1326 audit(1745935446.044:11040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28147 comm="syz.3.8691" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd652bce969 code=0x7ffc0000 [ 767.397322][ T29] audit: type=1326 audit(1745935446.044:11041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28147 comm="syz.3.8691" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd652bce969 code=0x7ffc0000 [ 767.421012][ T29] audit: type=1326 audit(1745935446.044:11042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28147 comm="syz.3.8691" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd652bce969 code=0x7ffc0000 [ 767.444579][ T29] audit: type=1326 audit(1745935446.044:11043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28147 comm="syz.3.8691" exe="/root/syz-executor" sig=0 arch=c000003e syscall=192 compat=0 ip=0x7fd652bce969 code=0x7ffc0000 [ 767.468214][ T29] audit: type=1326 audit(1745935446.044:11044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28147 comm="syz.3.8691" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd652bce969 code=0x7ffc0000 [ 767.503563][T28150] netlink: 'syz.5.8694': attribute type 1 has an invalid length. [ 767.594553][T28150] 8021q: adding VLAN 0 to HW filter on device bond1 [ 767.694377][T28158] bond1 (unregistering): Released all slaves [ 767.785935][ T29] audit: type=1326 audit(1745935446.534:11045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28168 comm="syz.0.8699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f28fddbe969 code=0x7ffc0000 [ 767.854434][ T29] audit: type=1326 audit(1745935446.564:11046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28168 comm="syz.0.8699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f28fddbe969 code=0x7ffc0000 [ 767.920463][T28179] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 767.930341][T28179] SELinux: failed to load policy [ 768.039338][T28193] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1051 sclass=netlink_route_socket pid=28193 comm=syz.5.8709 [ 768.165925][T28211] IPv6: NLM_F_CREATE should be specified when creating new route [ 768.242423][T28219] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pid=28219 comm=syz.7.8717 [ 768.313503][T28193] binfmt_misc: register: failed to install interpreter file ./file2 [ 768.371961][T28226] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 768.402746][T28226] SELinux: failed to load policy [ 768.405414][T28230] FAULT_INJECTION: forcing a failure. [ 768.405414][T28230] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 768.420916][T28230] CPU: 1 UID: 0 PID: 28230 Comm: syz.0.8722 Not tainted 6.15.0-rc3-syzkaller-00283-gf1a3944c860b #0 PREEMPT(voluntary) [ 768.420946][T28230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 768.421000][T28230] Call Trace: [ 768.421008][T28230] [ 768.421018][T28230] __dump_stack+0x1d/0x30 [ 768.421077][T28230] dump_stack_lvl+0xe8/0x140 [ 768.421097][T28230] dump_stack+0x15/0x1b [ 768.421152][T28230] should_fail_ex+0x265/0x280 [ 768.421190][T28230] should_fail+0xb/0x20 [ 768.421225][T28230] should_fail_usercopy+0x1a/0x20 [ 768.421262][T28230] _copy_from_user+0x1c/0xb0 [ 768.421282][T28230] ___sys_sendmsg+0xc1/0x1d0 [ 768.421319][T28230] __x64_sys_sendmsg+0xd4/0x160 [ 768.421427][T28230] x64_sys_call+0x2999/0x2fb0 [ 768.421454][T28230] do_syscall_64+0xd0/0x1a0 [ 768.421481][T28230] ? clear_bhb_loop+0x25/0x80 [ 768.421509][T28230] ? clear_bhb_loop+0x25/0x80 [ 768.421578][T28230] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 768.421600][T28230] RIP: 0033:0x7f28fddbe969 [ 768.421618][T28230] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 768.421718][T28230] RSP: 002b:00007f28fc427038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 768.421741][T28230] RAX: ffffffffffffffda RBX: 00007f28fdfe5fa0 RCX: 00007f28fddbe969 [ 768.421757][T28230] RDX: 0000000004000800 RSI: 0000200000006040 RDI: 0000000000000004 [ 768.421784][T28230] RBP: 00007f28fc427090 R08: 0000000000000000 R09: 0000000000000000 [ 768.421798][T28230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 768.421813][T28230] R13: 0000000000000000 R14: 00007f28fdfe5fa0 R15: 00007ffc74556ba8 [ 768.421832][T28230] [ 768.676764][T28239] FAULT_INJECTION: forcing a failure. [ 768.676764][T28239] name failslab, interval 1, probability 0, space 0, times 0 [ 768.689530][T28239] CPU: 0 UID: 0 PID: 28239 Comm: syz.0.8725 Not tainted 6.15.0-rc3-syzkaller-00283-gf1a3944c860b #0 PREEMPT(voluntary) [ 768.689613][T28239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 768.689629][T28239] Call Trace: [ 768.689636][T28239] [ 768.689650][T28239] __dump_stack+0x1d/0x30 [ 768.689676][T28239] dump_stack_lvl+0xe8/0x140 [ 768.689711][T28239] dump_stack+0x15/0x1b [ 768.689731][T28239] should_fail_ex+0x265/0x280 [ 768.689771][T28239] should_failslab+0x8c/0xb0 [ 768.689807][T28239] __kmalloc_noprof+0xa5/0x3e0 [ 768.689830][T28239] ? genl_family_rcv_msg_attrs_parse+0x75/0x190 [ 768.689917][T28239] genl_family_rcv_msg_attrs_parse+0x75/0x190 [ 768.689964][T28239] ? selinux_capable+0x1f9/0x270 [ 768.689986][T28239] genl_family_rcv_msg_doit+0x48/0x1b0 [ 768.690010][T28239] ? security_capable+0x83/0x90 [ 768.690069][T28239] ? ns_capable+0x7d/0xb0 [ 768.690126][T28239] genl_rcv_msg+0x422/0x460 [ 768.690154][T28239] ? __pfx_netlbl_mgmt_adddef+0x10/0x10 [ 768.690196][T28239] netlink_rcv_skb+0x120/0x220 [ 768.690227][T28239] ? __pfx_genl_rcv_msg+0x10/0x10 [ 768.690316][T28239] genl_rcv+0x28/0x40 [ 768.690341][T28239] netlink_unicast+0x59e/0x670 [ 768.690456][T28239] netlink_sendmsg+0x58b/0x6b0 [ 768.690545][T28239] ? __pfx_netlink_sendmsg+0x10/0x10 [ 768.690588][T28239] __sock_sendmsg+0x142/0x180 [ 768.690613][T28239] ____sys_sendmsg+0x31e/0x4e0 [ 768.690658][T28239] ___sys_sendmsg+0x17b/0x1d0 [ 768.690702][T28239] __x64_sys_sendmsg+0xd4/0x160 [ 768.690739][T28239] x64_sys_call+0x2999/0x2fb0 [ 768.690766][T28239] do_syscall_64+0xd0/0x1a0 [ 768.690845][T28239] ? clear_bhb_loop+0x25/0x80 [ 768.690873][T28239] ? clear_bhb_loop+0x25/0x80 [ 768.690901][T28239] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 768.690937][T28239] RIP: 0033:0x7f28fddbe969 [ 768.690955][T28239] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 768.691058][T28239] RSP: 002b:00007f28fc427038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 768.691077][T28239] RAX: ffffffffffffffda RBX: 00007f28fdfe5fa0 RCX: 00007f28fddbe969 [ 768.691089][T28239] RDX: 0000000004040000 RSI: 0000200000000100 RDI: 0000000000000006 [ 768.691102][T28239] RBP: 00007f28fc427090 R08: 0000000000000000 R09: 0000000000000000 [ 768.691169][T28239] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 768.691228][T28239] R13: 0000000000000000 R14: 00007f28fdfe5fa0 R15: 00007ffc74556ba8 [ 768.691248][T28239] [ 769.011559][T28246] validate_nla: 3 callbacks suppressed [ 769.011576][T28246] netlink: 'syz.0.8727': attribute type 39 has an invalid length. [ 769.109209][T28256] pimreg: entered allmulticast mode [ 769.118341][T28256] pimreg: left allmulticast mode [ 769.152514][T28261] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 769.165979][T28261] SELinux: failed to load policy [ 769.207621][T28268] FAULT_INJECTION: forcing a failure. [ 769.207621][T28268] name failslab, interval 1, probability 0, space 0, times 0 [ 769.220415][T28268] CPU: 0 UID: 0 PID: 28268 Comm: syz.5.8736 Not tainted 6.15.0-rc3-syzkaller-00283-gf1a3944c860b #0 PREEMPT(voluntary) [ 769.220442][T28268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 769.220455][T28268] Call Trace: [ 769.220536][T28268] [ 769.220545][T28268] __dump_stack+0x1d/0x30 [ 769.220622][T28268] dump_stack_lvl+0xe8/0x140 [ 769.220684][T28268] dump_stack+0x15/0x1b [ 769.220735][T28268] should_fail_ex+0x265/0x280 [ 769.220775][T28268] should_failslab+0x8c/0xb0 [ 769.220807][T28268] kmem_cache_alloc_noprof+0x50/0x310 [ 769.220846][T28268] ? skb_clone+0x151/0x1f0 [ 769.220920][T28268] skb_clone+0x151/0x1f0 [ 769.220943][T28268] __netlink_deliver_tap+0x2c9/0x500 [ 769.221036][T28268] netlink_unicast+0x64c/0x670 [ 769.221099][T28268] netlink_sendmsg+0x58b/0x6b0 [ 769.221219][T28268] ? __pfx_netlink_sendmsg+0x10/0x10 [ 769.221302][T28268] __sock_sendmsg+0x142/0x180 [ 769.221326][T28268] ____sys_sendmsg+0x345/0x4e0 [ 769.221363][T28268] ___sys_sendmsg+0x17b/0x1d0 [ 769.221473][T28268] __sys_sendmmsg+0x178/0x300 [ 769.221512][T28268] __x64_sys_sendmmsg+0x57/0x70 [ 769.221536][T28268] x64_sys_call+0x2f2f/0x2fb0 [ 769.221563][T28268] do_syscall_64+0xd0/0x1a0 [ 769.221609][T28268] ? clear_bhb_loop+0x25/0x80 [ 769.221629][T28268] ? clear_bhb_loop+0x25/0x80 [ 769.221649][T28268] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 769.221669][T28268] RIP: 0033:0x7fde2453e969 [ 769.221768][T28268] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 769.221786][T28268] RSP: 002b:00007fde22ba7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 769.221804][T28268] RAX: ffffffffffffffda RBX: 00007fde24765fa0 RCX: 00007fde2453e969 [ 769.221816][T28268] RDX: 040000000000009f RSI: 00002000000002c0 RDI: 0000000000000004 [ 769.221831][T28268] RBP: 00007fde22ba7090 R08: 0000000000000000 R09: 0000000000000000 [ 769.221890][T28268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 769.221902][T28268] R13: 0000000000000000 R14: 00007fde24765fa0 R15: 00007ffc39b8ded8 [ 769.221920][T28268] [ 769.761621][T28297] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 769.771625][T28297] SELinux: failed to load policy [ 770.406730][T28335] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 770.444408][T28335] SELinux: failed to load policy [ 770.690703][T28345] pimreg: entered allmulticast mode [ 770.756734][T28345] pimreg: left allmulticast mode [ 771.044570][T28359] 9pnet_fd: Insufficient options for proto=fd [ 771.107159][T28361] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1051 sclass=netlink_route_socket pid=28361 comm=syz.6.8772 [ 771.296366][T28374] netlink: 'syz.7.8777': attribute type 4 has an invalid length. [ 771.331540][T28374] netlink: 'syz.7.8777': attribute type 4 has an invalid length. [ 771.480242][T28371] binfmt_misc: register: failed to install interpreter file ./file2 [ 771.561247][ T3691] bridge_slave_1: left allmulticast mode [ 771.566962][ T3691] bridge_slave_1: left promiscuous mode [ 771.572940][ T3691] bridge0: port 2(bridge_slave_1) entered disabled state [ 771.582435][ T3691] bridge_slave_0: left allmulticast mode [ 771.588104][ T3691] bridge_slave_0: left promiscuous mode [ 771.593905][ T3691] bridge0: port 1(bridge_slave_0) entered disabled state [ 771.605422][ T3691] bond_slave_0: left promiscuous mode [ 771.610916][ T3691] bond_slave_1: left promiscuous mode [ 771.714676][ T3691] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 771.724928][ T3691] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 771.734008][T28394] netlink: 'syz.7.8786': attribute type 1 has an invalid length. [ 771.742804][ T3691] bond0 (unregistering): Released all slaves [ 771.751692][ T3691] bond1 (unregistering): Released all slaves [ 771.765466][T28394] 8021q: adding VLAN 0 to HW filter on device bond1 [ 771.774464][T28394] __nla_validate_parse: 68 callbacks suppressed [ 771.774476][T28394] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8786'. [ 771.792643][T28394] bond1 (unregistering): Released all slaves [ 771.830229][ T3691] hsr_slave_0: left promiscuous mode [ 771.835936][ T3691] hsr_slave_1: left promiscuous mode [ 771.842608][ T3691] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 771.850133][ T3691] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 771.858192][ T3691] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 771.865736][ T3691] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 771.909838][ T3691] team0 (unregistering): Port device team_slave_1 removed [ 771.919500][ T3691] team0 (unregistering): Port device team_slave_0 removed [ 772.014250][T28405] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8789'. [ 772.023247][T28405] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8789'. [ 772.048904][T28405] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8789'. [ 772.065639][T28405] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8789'. [ 772.074723][T28405] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8789'. [ 772.089325][T28405] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8789'. [ 772.125595][T28405] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8789'. [ 772.134586][T28405] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8789'. [ 772.145584][T28405] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8789'. [ 772.329193][ T3691] IPVS: stop unused estimator thread 0... [ 772.447425][T28428] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1051 sclass=netlink_route_socket pid=28428 comm=syz.5.8797 [ 772.578423][ T29] kauditd_printk_skb: 38 callbacks suppressed [ 772.578441][ T29] audit: type=1400 audit(1745935451.324:11083): avc: denied { read } for pid=28438 comm="syz.7.8801" name="usbmon7" dev="devtmpfs" ino=163 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 772.608322][ T29] audit: type=1400 audit(1745935451.324:11084): avc: denied { open } for pid=28438 comm="syz.7.8801" path="/dev/usbmon7" dev="devtmpfs" ino=163 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 772.645746][ T29] audit: type=1400 audit(1745935451.394:11085): avc: denied { setopt } for pid=28438 comm="syz.7.8801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 772.786163][T28435] binfmt_misc: register: failed to install interpreter file ./file2 [ 772.857682][T28449] netlink: 'syz.3.8804': attribute type 4 has an invalid length. [ 772.893573][T28449] netlink: 'syz.3.8804': attribute type 4 has an invalid length. [ 773.058335][ T29] audit: type=1326 audit(1745935451.804:11086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28464 comm="syz.7.8811" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff40a10e969 code=0x7ffc0000 [ 773.082133][ T29] audit: type=1326 audit(1745935451.804:11087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28464 comm="syz.7.8811" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff40a10e969 code=0x7ffc0000 [ 773.105897][ T29] audit: type=1326 audit(1745935451.804:11088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28464 comm="syz.7.8811" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff40a10e969 code=0x7ffc0000 [ 773.129611][ T29] audit: type=1326 audit(1745935451.804:11089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28464 comm="syz.7.8811" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff40a10e969 code=0x7ffc0000 [ 773.153272][ T29] audit: type=1326 audit(1745935451.804:11090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28464 comm="syz.7.8811" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff40a10e969 code=0x7ffc0000 [ 773.176890][ T29] audit: type=1326 audit(1745935451.804:11091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28464 comm="syz.7.8811" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff40a10e969 code=0x7ffc0000 [ 773.200572][ T29] audit: type=1326 audit(1745935451.804:11092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28464 comm="syz.7.8811" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff40a10e969 code=0x7ffc0000 [ 773.296867][T28470] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 773.306717][T28470] SELinux: failed to load policy [ 773.461967][T28486] netlink: 'syz.5.8817': attribute type 4 has an invalid length. [ 773.567679][T28500] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 773.578877][T28500] SELinux: failed to load policy [ 773.729270][T28517] netlink: 'syz.3.8831': attribute type 4 has an invalid length. [ 774.022122][T28546] netlink: 'syz.3.8843': attribute type 4 has an invalid length. [ 774.115792][T28549] bridge_slave_0: left allmulticast mode [ 774.121637][T28549] bridge_slave_0: left promiscuous mode [ 774.127475][T28549] bridge0: port 1(bridge_slave_0) entered disabled state [ 774.144974][T28549] bridge_slave_1: left allmulticast mode [ 774.150859][T28549] bridge_slave_1: left promiscuous mode [ 774.156568][T28549] bridge0: port 2(bridge_slave_1) entered disabled state [ 774.173156][T28549] bond0: (slave bond_slave_0): Releasing backup interface [ 774.187276][T28549] bond0: (slave bond_slave_1): Releasing backup interface [ 774.212204][T28562] 9pnet: Could not find request transport: tcp-port=0x000000000004e22 [ 774.222296][T28549] team0: Port device team_slave_0 removed [ 774.254492][T28549] team0: Port device team_slave_1 removed [ 774.266474][T28549] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 774.274122][T28549] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 774.283647][T28549] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 774.291186][T28549] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 774.342403][T28570] FAULT_INJECTION: forcing a failure. [ 774.342403][T28570] name failslab, interval 1, probability 0, space 0, times 0 [ 774.355383][T28570] CPU: 1 UID: 0 PID: 28570 Comm: syz.7.8853 Not tainted 6.15.0-rc3-syzkaller-00283-gf1a3944c860b #0 PREEMPT(voluntary) [ 774.355419][T28570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 774.355435][T28570] Call Trace: [ 774.355443][T28570] [ 774.355452][T28570] __dump_stack+0x1d/0x30 [ 774.355481][T28570] dump_stack_lvl+0xe8/0x140 [ 774.355506][T28570] dump_stack+0x15/0x1b [ 774.355527][T28570] should_fail_ex+0x265/0x280 [ 774.355567][T28570] should_failslab+0x8c/0xb0 [ 774.355598][T28570] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 774.355635][T28570] ? __d_alloc+0x3d/0x350 [ 774.355672][T28570] __d_alloc+0x3d/0x350 [ 774.355709][T28570] ? __rcu_read_unlock+0x34/0x70 [ 774.355841][T28570] d_alloc_parallel+0x53/0xc40 [ 774.355866][T28570] ? selinux_inode_permission+0x32a/0x400 [ 774.355902][T28570] ? lockref_get_not_dead+0x120/0x1c0 [ 774.355927][T28570] ? __rcu_read_unlock+0x4f/0x70 [ 774.355947][T28570] __lookup_slow+0x8c/0x250 [ 774.356050][T28570] lookup_slow+0x3c/0x60 [ 774.356133][T28570] walk_component+0x1ec/0x220 [ 774.356231][T28570] path_lookupat+0xfe/0x2a0 [ 774.356264][T28570] filename_lookup+0x147/0x340 [ 774.356314][T28570] ? __pfx_resume_store+0x10/0x10 [ 774.356396][T28570] kern_path+0x3b/0x130 [ 774.356425][T28570] ? __pfx_resume_store+0x10/0x10 [ 774.356445][T28570] lookup_bdev+0x66/0x150 [ 774.356547][T28570] resume_store+0x10b/0x3d0 [ 774.356577][T28570] ? _copy_from_iter+0x16d/0xdd0 [ 774.356599][T28570] ? should_fail_ex+0xdb/0x280 [ 774.356632][T28570] ? __pfx_resume_store+0x10/0x10 [ 774.356660][T28570] kobj_attr_store+0x47/0x70 [ 774.356730][T28570] ? __pfx_kobj_attr_store+0x10/0x10 [ 774.356764][T28570] sysfs_kf_write+0xfb/0x120 [ 774.356868][T28570] ? __pfx_sysfs_kf_write+0x10/0x10 [ 774.356912][T28570] kernfs_fop_write_iter+0x1be/0x2d0 [ 774.356949][T28570] ? __pfx_kernfs_fop_write_iter+0x10/0x10 [ 774.357045][T28570] vfs_write+0x49d/0x8d0 [ 774.357081][T28570] ksys_write+0xda/0x1a0 [ 774.357113][T28570] __x64_sys_write+0x40/0x50 [ 774.357188][T28570] x64_sys_call+0x2cdd/0x2fb0 [ 774.357215][T28570] do_syscall_64+0xd0/0x1a0 [ 774.357237][T28570] ? clear_bhb_loop+0x25/0x80 [ 774.357335][T28570] ? clear_bhb_loop+0x25/0x80 [ 774.357361][T28570] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 774.357381][T28570] RIP: 0033:0x7ff40a10e969 [ 774.357398][T28570] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 774.357421][T28570] RSP: 002b:00007ff408777038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 774.357501][T28570] RAX: ffffffffffffffda RBX: 00007ff40a335fa0 RCX: 00007ff40a10e969 [ 774.357514][T28570] RDX: 0000000000000012 RSI: 0000200000000040 RDI: 0000000000000005 [ 774.357526][T28570] RBP: 00007ff408777090 R08: 0000000000000000 R09: 0000000000000000 [ 774.357538][T28570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 774.357553][T28570] R13: 0000000000000000 R14: 00007ff40a335fa0 R15: 00007ffffc264628 [ 774.357576][T28570] [ 774.830654][T28589] netlink: 'syz.0.8859': attribute type 4 has an invalid length. [ 774.931541][T28598] 9pnet_fd: Insufficient options for proto=fd [ 775.123250][T28616] FAULT_INJECTION: forcing a failure. [ 775.123250][T28616] name failslab, interval 1, probability 0, space 0, times 0 [ 775.136008][T28616] CPU: 0 UID: 0 PID: 28616 Comm: syz.0.8869 Not tainted 6.15.0-rc3-syzkaller-00283-gf1a3944c860b #0 PREEMPT(voluntary) [ 775.136050][T28616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 775.136119][T28616] Call Trace: [ 775.136126][T28616] [ 775.136134][T28616] __dump_stack+0x1d/0x30 [ 775.136155][T28616] dump_stack_lvl+0xe8/0x140 [ 775.136179][T28616] dump_stack+0x15/0x1b [ 775.136256][T28616] should_fail_ex+0x265/0x280 [ 775.136313][T28616] should_failslab+0x8c/0xb0 [ 775.136347][T28616] kmem_cache_alloc_noprof+0x50/0x310 [ 775.136462][T28616] ? skb_clone+0x151/0x1f0 [ 775.136483][T28616] skb_clone+0x151/0x1f0 [ 775.136501][T28616] __netlink_deliver_tap+0x2c9/0x500 [ 775.136608][T28616] netlink_unicast+0x64c/0x670 [ 775.136642][T28616] netlink_sendmsg+0x58b/0x6b0 [ 775.136685][T28616] ? __pfx_netlink_sendmsg+0x10/0x10 [ 775.136725][T28616] __sock_sendmsg+0x142/0x180 [ 775.136811][T28616] ____sys_sendmsg+0x31e/0x4e0 [ 775.136854][T28616] ___sys_sendmsg+0x17b/0x1d0 [ 775.136893][T28616] __x64_sys_sendmsg+0xd4/0x160 [ 775.136916][T28616] x64_sys_call+0x2999/0x2fb0 [ 775.136946][T28616] do_syscall_64+0xd0/0x1a0 [ 775.136971][T28616] ? clear_bhb_loop+0x25/0x80 [ 775.136992][T28616] ? clear_bhb_loop+0x25/0x80 [ 775.137012][T28616] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 775.137109][T28616] RIP: 0033:0x7f28fddbe969 [ 775.137124][T28616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 775.137142][T28616] RSP: 002b:00007f28fc427038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 775.137160][T28616] RAX: ffffffffffffffda RBX: 00007f28fdfe5fa0 RCX: 00007f28fddbe969 [ 775.137173][T28616] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 775.137187][T28616] RBP: 00007f28fc427090 R08: 0000000000000000 R09: 0000000000000000 [ 775.137203][T28616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 775.137235][T28616] R13: 0000000000000000 R14: 00007f28fdfe5fa0 R15: 00007ffc74556ba8 [ 775.137254][T28616] [ 775.347862][T28618] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 775.356384][T28618] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 775.432908][T28627] 9pnet_fd: Insufficient options for proto=fd [ 775.618877][T28656] 9pnet_fd: Insufficient options for proto=fd [ 775.737305][T28665] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 775.749870][T28665] SELinux: failed to load policy [ 775.849431][T28684] 9pnet_fd: Insufficient options for proto=fd [ 775.979186][T28703] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 775.991782][T28703] SELinux: failed to load policy [ 775.999102][T28696] FAULT_INJECTION: forcing a failure. [ 775.999102][T28696] name failslab, interval 1, probability 0, space 0, times 0 [ 776.011938][T28696] CPU: 0 UID: 0 PID: 28696 Comm: syz.0.8904 Not tainted 6.15.0-rc3-syzkaller-00283-gf1a3944c860b #0 PREEMPT(voluntary) [ 776.012043][T28696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 776.012055][T28696] Call Trace: [ 776.012061][T28696] [ 776.012069][T28696] __dump_stack+0x1d/0x30 [ 776.012156][T28696] dump_stack_lvl+0xe8/0x140 [ 776.012234][T28696] dump_stack+0x15/0x1b [ 776.012255][T28696] should_fail_ex+0x265/0x280 [ 776.012286][T28696] should_failslab+0x8c/0xb0 [ 776.012317][T28696] kmem_cache_alloc_node_noprof+0x57/0x320 [ 776.012406][T28696] ? __alloc_skb+0x101/0x320 [ 776.012445][T28696] __alloc_skb+0x101/0x320 [ 776.012476][T28696] netlink_alloc_large_skb+0xba/0xf0 [ 776.012510][T28696] netlink_sendmsg+0x3cf/0x6b0 [ 776.012552][T28696] ? __pfx_netlink_sendmsg+0x10/0x10 [ 776.012643][T28696] __sock_sendmsg+0x142/0x180 [ 776.012690][T28696] ____sys_sendmsg+0x31e/0x4e0 [ 776.012760][T28696] ___sys_sendmsg+0x17b/0x1d0 [ 776.012791][T28696] __x64_sys_sendmsg+0xd4/0x160 [ 776.012856][T28696] x64_sys_call+0x2999/0x2fb0 [ 776.012910][T28696] do_syscall_64+0xd0/0x1a0 [ 776.012938][T28696] ? clear_bhb_loop+0x25/0x80 [ 776.012964][T28696] ? clear_bhb_loop+0x25/0x80 [ 776.012991][T28696] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 776.013071][T28696] RIP: 0033:0x7f28fddbe969 [ 776.013087][T28696] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 776.013106][T28696] RSP: 002b:00007f28fc427038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 776.013129][T28696] RAX: ffffffffffffffda RBX: 00007f28fdfe5fa0 RCX: 00007f28fddbe969 [ 776.013145][T28696] RDX: 0000000000000010 RSI: 0000200000000280 RDI: 0000000000000008 [ 776.013161][T28696] RBP: 00007f28fc427090 R08: 0000000000000000 R09: 0000000000000000 [ 776.013176][T28696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 776.013191][T28696] R13: 0000000000000000 R14: 00007f28fdfe5fa0 R15: 00007ffc74556ba8 [ 776.013256][T28696] [ 776.320970][T28722] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 776.336441][T28722] SELinux: failed to load policy [ 776.387481][T28729] FAULT_INJECTION: forcing a failure. [ 776.387481][T28729] name failslab, interval 1, probability 0, space 0, times 0 [ 776.400223][T28729] CPU: 0 UID: 0 PID: 28729 Comm: syz.0.8914 Not tainted 6.15.0-rc3-syzkaller-00283-gf1a3944c860b #0 PREEMPT(voluntary) [ 776.400259][T28729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 776.400276][T28729] Call Trace: [ 776.400284][T28729] [ 776.400293][T28729] __dump_stack+0x1d/0x30 [ 776.400337][T28729] dump_stack_lvl+0xe8/0x140 [ 776.400356][T28729] dump_stack+0x15/0x1b [ 776.400527][T28729] should_fail_ex+0x265/0x280 [ 776.400558][T28729] ? security_load_policy+0x66/0x890 [ 776.400595][T28729] should_failslab+0x8c/0xb0 [ 776.400658][T28729] __kmalloc_cache_noprof+0x4c/0x320 [ 776.400682][T28729] ? exc_page_fault+0x54/0xc0 [ 776.400789][T28729] security_load_policy+0x66/0x890 [ 776.400827][T28729] ? rep_movs_alternative+0x4a/0x90 [ 776.400864][T28729] sel_write_load+0x1d4/0x380 [ 776.400996][T28729] ? __pfx_sel_write_load+0x10/0x10 [ 776.401095][T28729] vfs_write+0x266/0x8d0 [ 776.401117][T28729] ? __rcu_read_unlock+0x4f/0x70 [ 776.401202][T28729] ? __fget_files+0x184/0x1c0 [ 776.401237][T28729] ksys_write+0xda/0x1a0 [ 776.401268][T28729] __x64_sys_write+0x40/0x50 [ 776.401308][T28729] x64_sys_call+0x2cdd/0x2fb0 [ 776.401333][T28729] do_syscall_64+0xd0/0x1a0 [ 776.401352][T28729] ? clear_bhb_loop+0x25/0x80 [ 776.401433][T28729] ? clear_bhb_loop+0x25/0x80 [ 776.401531][T28729] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 776.401551][T28729] RIP: 0033:0x7f28fddbe969 [ 776.401565][T28729] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 776.401642][T28729] RSP: 002b:00007f28fc427038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 776.401665][T28729] RAX: ffffffffffffffda RBX: 00007f28fdfe5fa0 RCX: 00007f28fddbe969 [ 776.401680][T28729] RDX: 0000000000002000 RSI: 0000200000000000 RDI: 0000000000000006 [ 776.401691][T28729] RBP: 00007f28fc427090 R08: 0000000000000000 R09: 0000000000000000 [ 776.401709][T28729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 776.401725][T28729] R13: 0000000000000000 R14: 00007f28fdfe5fa0 R15: 00007ffc74556ba8 [ 776.401785][T28729] [ 776.401792][T28729] SELinux: failed to load policy [ 776.735155][T28736] SELinux: policydb magic number 0x18 does not match expected magic number 0xf97cff8c [ 776.745006][T28736] SELinux: failed to load policy [ 776.931792][T28760] netlink: 'syz.5.8926': attribute type 39 has an invalid length. [ 777.127563][T28787] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 777.165488][T28787] SELinux: failed to load policy [ 777.181760][T28787] __nla_validate_parse: 74 callbacks suppressed [ 777.181779][T28787] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8938'. [ 777.197109][T28787] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8938'. [ 777.212656][T28787] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8938'. [ 777.227659][T28796] 9pnet_fd: Insufficient options for proto=fd [ 777.229349][T28787] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8938'. [ 777.242850][T28787] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8938'. [ 777.253771][T28787] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8938'. [ 777.284959][T28787] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8938'. [ 777.293992][T28787] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8938'. [ 777.315120][T28787] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8938'. [ 777.472993][T28817] netlink: 'syz.5.8948': attribute type 1 has an invalid length. [ 777.498446][T28817] 8021q: adding VLAN 0 to HW filter on device bond1 [ 777.509309][T28817] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8948'. [ 777.523859][T28817] bond1 (unregistering): Released all slaves [ 777.590423][T28827] 9pnet_fd: Insufficient options for proto=fd [ 777.633812][T28829] 9pnet_fd: Insufficient options for proto=fd [ 777.866835][T28857] netlink: 'syz.3.8965': attribute type 1 has an invalid length. [ 777.878688][T28854] 9pnet_fd: Insufficient options for proto=fd [ 777.891753][T28857] 8021q: adding VLAN 0 to HW filter on device bond1 [ 777.931624][T28857] bond1 (unregistering): Released all slaves [ 778.657978][T28882] netdevsim netdevsim7 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 779.021588][T28882] netdevsim netdevsim7 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 779.050905][T28895] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1051 sclass=netlink_route_socket pid=28895 comm=syz.6.8978 [ 779.121783][T28882] netdevsim netdevsim7 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 779.203585][T28882] netdevsim netdevsim7 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 779.276209][T28882] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 779.312505][T28882] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 779.352925][T28882] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 779.391990][T28882] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 779.532466][T28895] binfmt_misc: register: failed to install interpreter file ./file2 [ 779.642881][T28910] 9pnet_fd: Insufficient options for proto=fd [ 779.846617][T28937] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1051 sclass=netlink_route_socket pid=28937 comm=syz.3.8996 [ 779.897222][T28944] SELinux: policydb magic number 0x80 does not match expected magic number 0xf97cff8c [ 779.902527][ T29] kauditd_printk_skb: 47 callbacks suppressed [ 779.902543][ T29] audit: type=1326 audit(1745935458.654:11140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28939 comm="syz.6.8998" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 779.927510][T28944] SELinux: failed to load policy [ 779.949943][ T3697] ================================================================== [ 779.958137][ T3697] BUG: KCSAN: data-race in alloc_pid / copy_process [ 779.964735][ T3697] [ 779.967068][ T3697] read-write to 0xffffffff8685f030 of 4 bytes by task 3698 on cpu 1: [ 779.975161][ T3697] alloc_pid+0x539/0x720 [ 779.979409][ T3697] copy_process+0xe0e/0x1f90 [ 779.984008][ T3697] kernel_clone+0x16c/0x5b0 [ 779.988522][ T3697] user_mode_thread+0x7d/0xb0 [ 779.993210][ T3697] call_usermodehelper_exec_work+0x7a/0x160 [ 779.999124][ T3697] process_scheduled_works+0x4cb/0x9d0 [ 780.004596][ T3697] worker_thread+0x582/0x770 [ 780.009213][ T3697] kthread+0x486/0x510 [ 780.013315][ T3697] ret_from_fork+0x4b/0x60 [ 780.017764][ T3697] ret_from_fork_asm+0x1a/0x30 [ 780.022536][ T3697] [ 780.024859][ T3697] read to 0xffffffff8685f030 of 4 bytes by task 3697 on cpu 0: [ 780.032401][ T3697] copy_process+0x1790/0x1f90 [ 780.037091][ T3697] kernel_clone+0x16c/0x5b0 [ 780.041693][ T3697] user_mode_thread+0x7d/0xb0 [ 780.046381][ T3697] call_usermodehelper_exec_work+0x7a/0x160 [ 780.052292][ T3697] process_scheduled_works+0x4cb/0x9d0 [ 780.057766][ T3697] worker_thread+0x582/0x770 [ 780.062371][ T3697] kthread+0x486/0x510 [ 780.066442][ T3697] ret_from_fork+0x4b/0x60 [ 780.070875][ T3697] ret_from_fork_asm+0x1a/0x30 [ 780.075648][ T3697] [ 780.077972][ T3697] value changed: 0x800000bf -> 0x800000c0 [ 780.083688][ T3697] [ 780.086008][ T3697] Reported by Kernel Concurrency Sanitizer on: [ 780.092155][ T3697] CPU: 0 UID: 0 PID: 3697 Comm: kworker/u8:58 Not tainted 6.15.0-rc3-syzkaller-00283-gf1a3944c860b #0 PREEMPT(voluntary) [ 780.104834][ T3697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 780.114936][ T3697] Workqueue: events_unbound call_usermodehelper_exec_work [ 780.122069][ T3697] ================================================================== [ 780.130725][ T29] audit: type=1326 audit(1745935458.694:11141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28939 comm="syz.6.8998" exe="/root/syz-executor" sig=0 arch=c000003e syscall=239 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 780.154527][ T29] audit: type=1326 audit(1745935458.694:11142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28939 comm="syz.6.8998" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 780.178102][ T29] audit: type=1326 audit(1745935458.694:11143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28939 comm="syz.6.8998" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7259e1e969 code=0x7ffc0000 [ 780.444428][T28937] binfmt_misc: register: failed to install interpreter file ./file2