program: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='attr\x00') fchdir(r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000980)={0x1, &(0x7f0000000940)=[{0x6}]}) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x2000, 0x0) getdents64(r1, 0x0, 0x0) [ 82.070628][ T4525] Bluetooth: hci0: command tx timeout [ 82.720754][ T24] audit: type=1326 audit(1724240117.174:2): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=5107 comm="syz.0.0" exe="/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9d0e179e79 code=0x0 [ 83.544650][ T5107] SYZFAIL: invalid kcov comp type [ 83.546647][ T5107] type=ffffffff8100b4e0 [ 83.546852][ T5107] (errno 110: Connection timed out) [ 83.581308][ T5087] SYZFAIL: child failed [ 83.582960][ T5087] (errno 0: Success) [ 86.500122][ T787] cfg80211: failed to load regulatory.db [ 87.192345][ T5087] syz-executor (5087) used greatest stack depth: 19792 bytes left [ 87.195554][ T5082] loop exited with status 67